Theft
in sentence
234 examples of Theft in a sentence
From 1993 to 2001 a series of abrasive encounters poisoned the atmosphere: the forced boarding of a Chinese merchant ship (wrongly suspected of carrying chemical warfare components to Iran) in the Arabian Gulf;US efforts to block China's bid to host the 2000 Olympics; escalating tensions over Taiwan; the Wen Ho Lee affair (where China was falsely implicated in the
theft
of American nuclear secrets); the accidental bombing of China's embassy by US warplanes during the Kosovo war; and the mid-air collision of a US spy plane and a Chinese jet fighter last year.
Guns require just a little training to operate, whereas an electrical utility requires a large team of people with varied expertise to run the generators, install and service the transmission lines and sub-stations, limit theft, and compel customers to pay their bills on time.
Initially, the market economy breeds new crimes - especially petty crime such as
theft
and burglary - because its booty can be resold much easier on a market, and thus becomes more valuable.
Where far-reaching privatization has occurred, new owners have a real interest in combating
theft.
He likens trade deficits to economic losses – almost to
theft
– and declares China the enemy.
And it is set to impose punitive tariffs on a range of Chinese goods over alleged intellectual-property
theft.
China, which has faced sharp criticism from the US, the EU and Japan for unfair trade practices – including export subsidies, currency manipulation, intellectual-property theft, and forced technology transfer – has a particular responsibility here.
In reneging on promises of reform and further market opening, President Xi Jinping is reinforcing the state sector against foreign competition while ignoring intellectual property
theft.
Although it is difficult to know with certainty, it appears that such cyber
theft
has been reduced dramatically.
The current technology
theft
takes a different form.
But in the case of the World Cup infrastructure, large-scale fraud, theft, and graft is unlikely to have occurred.
These are all firsts, and the reason is obvious: curbing
theft
by government cronies is among the fastest and most effective ways to raise revenues.
But that danger becomes far more acute in a combat zone, where nuclear materials and weapons are at risk of theft, and reactors can become bombing targets.
When Moore discovered in 1984 that he had become patent number 4,438,032, he sued for malpractice and property
theft.
Countries that forego open bidding processes end up with the kind of large-scale
theft
that has been documented in Venezuela and almost certainly occurred in Ukraine under deposed President Viktor Yanukovych.
The challenge for US policy is to ensure that Chinese policies comply with WTO rules, including the requirement to notify other countries of subsidy programs and the prohibition of zero-sum tactics like IP theft, forced technology transfer, and discriminatory procurement practices.Finally, the PCAST report underscores the need for the US to respond to China’s challenge in semiconductors with an industrial policy of its own.
The challenge for US policy is to ensure that Chinese policies comply with WTO rules, including the requirement to notify other countries of subsidy programs and the prohibition of zero-sum tactics like IP theft, forced technology transfer, and discriminatory procurement practices.
When the tradeoff is between taking lives and, say, reducing property theft, the case for milder punishments is far stronger.
Every dollar invested in bolstering a country’s nuclear arsenal is a diversion of resources from its schools, hospitals, and other social services, and a
theft
from the millions around the globe who go hungry or are denied access to basic medicines.
If my bicycle is insured against theft, I might buy a cheaper lock for it, making it more likely that it will be stolen.
Discipline and restructuring must be imposed on the so called natural monopolies: railways, power utilities and, above all, Gazprom - the country’s largest company, and in which there is overwhelming evidence of
theft
by managers.
Government officials and their cronies did not necessarily engage in straightforward
theft
or pillaging.
But in the Arab world, as everywhere else, this leads to theft, corruption, uncompetitive monopolies, a stifling of enterprise, and, eventually and inevitably, to decline and decay.
Official corruption, insecure property rights, stifling regulatory restraints, weak payment discipline, poor logistics and distribution, widespread counterfeiting, and vulnerability to other forms of intellectual-property theft: all of these obstacles increase transaction costs and make it difficult for entrepreneurs to thrive in domestic markets.
In order to enjoy the same low transaction costs that they have in exporting, China’s entrepreneurs need a much better business environment: an effective legal system, a sound regulatory framework, a government that protects their brands by fighting intellectual-property theft, dependable logistics and distribution networks, and a graft-resistant bureaucracy.
Currently, the judiciary is incapable of trying a case of petty
theft
much less of ensuring human rights.
Presidents Xi and Obama subsequently signed a communiqué in 2013 renouncing such cyber
theft.
The so-called Section 301 trade investigation launched by Trump’s administration last year accused China of acquiring foreign technologies using discriminatory licensing restrictions, unfair technology-transfer agreements, targeted outbound investment, unauthorized intrusions into US commercial computer networks, and cyber-enabled IP
theft.
The final issue raised by the Section 301 report relates to cyber-enabled
theft
of IP and sensitive commercial information, which the US claims is carried out by the Chinese government.
The report acknowledges that since 2015 – when China and the US agreed that neither would “conduct or knowingly support cyber-enabled
theft
of intellectual property, including trade secrets or other confidential business information for commercial advantage” – the number of detected incidents of Chinese cyber-espionage has declined.
Back
Related words
Technology
Property
Intellectual
Their
Other
Government
Trade
About
Which
Forced
Companies
Through
Would
Transfer
Nuclear
Including
Country
Without
While
Identity