Counter-intelligence

Results: 1412



#Item
771Organized crime / Law / Organization for Security and Co-operation in Europe / Human trafficking / Counter-terrorism / Definitions of terrorism / Central Intelligence Agency / Transnational crime / United Nations Office on Drugs and Crime / Crime / Ethics / Terrorism

United States Mission to the OSCE Session 1: Transnational threats and challenges I As delivered by Dr. Michael Haltzel, Head of Delegation OSCE Review Conference Vienna, Austria

Add to Reading List

Source URL: photos.state.gov

Language: English - Date: 2011-01-14 10:02:57
772Operation Enduring Freedom / Defense Security Cooperation Agency / Counter-terrorism / Central Intelligence Agency / Political geography / Afghanistan / International relations / Military budget of the United States / Under Secretary of Defense for Policy / War in Afghanistan / Asia / International Security Assistance Force

Defense Security Cooperation Agency Operation Enduring Freedom Operation and Maintenance, Defense-Wide Budget Activity 04: Administrative and Service-Wide Activities I. Description of Operations Financed: Participation b

Add to Reading List

Source URL: comptroller.defense.gov

Language: English - Date: 2014-07-09 13:24:54
773Trusted computing / Key management / Cryptographic protocols / Trusted Platform Module / Trusted Computing Group / Certificate authority / HTTP Secure / Public key certificate / Counter / Cryptography / Computer security / Public-key cryptography

Offline Untrusted Storage with Immediate Detection of Forking and Replay Attacks ∗ Marten van Dijk, Jonathan Rhodes, Luis F. G. Sarmenta, and Srinivas Devadas Computer Science and Artificial Intelligence Laboratory (CS

Add to Reading List

Source URL: projects.csail.mit.edu

Language: English - Date: 2007-08-28 16:29:40
774Occupational safety and health / Gary Doer / Canada–United States relations / Canada–United States border / Public safety / Politics of Canada / Management / Office-holders of Canada / Counter-intelligence and counter-terrorism organizations / Disaster preparedness / Emergency management / Humanitarian aid

Microsoft Word - Border Issues Report - report - final public.doc

Add to Reading List

Source URL: www.scics.gc.ca

Language: English - Date: 2011-03-05 14:13:25
775Oss / Enemy Objectives Unit / Virginia Hall / Military intelligence / Spies / X-2 Counter Espionage Branch / Offshore Super Series / Office of Strategic Services / World War II / William L. Langer

Microsoft Word - NPS OSS Front Matter Paginated Oct. 08.doc

Add to Reading List

Source URL: www.nps.gov

Language: English - Date: 2008-12-06 08:11:58
776World War II / Office of Strategic Services / Counter-intelligence / William J. Donovan / Central Intelligence Agency / James Jesus Angleton / Virginia Hall / Intelligence assessment / X-2 Counter Espionage Branch / Espionage / Spies / Knights of Malta

Chapter 2 A Wartime Organization for Unconventional Warfare On a clear and brisk afternoon on Sunday, December 7, 1941, William J. Donovan was enjoying an exhibition football game at the New York’s Polo Grounds, when u

Add to Reading List

Source URL: www.nps.gov

Language: English - Date: 2008-12-03 10:55:40
777Counter-terrorism / Security / Safety / National security / Ladue /  Missouri / Improvised explosive device

May[removed]Volume 1, Issue 9 A Narrowly Averted Tragedy in Minnesota Stratfor Global Intelligence - http://us4.campaign-archive2.com/?

Add to Reading List

Source URL: www.illinois.gov

Language: English - Date: 2014-05-19 12:01:19
778Public safety / War on Terror / Counter-terrorism / National Memorial Institute for the Prevention of Terrorism / National Consortium for the Study of Terrorism and Responses to Terrorism / DHS Office of Intelligence and Analysis / United States Intelligence Community / United States Department of Homeland Security / Terrorism / National security / Security / Government

Understanding Law Enforcement Intelligence Processes Report to the Office of University Programs, Science and Technology Directorate, U.S. Department of Homeland Security

Add to Reading List

Source URL: www.start.umd.edu

Language: English - Date: 2014-07-30 17:23:53
779Trusted computing / Trusted Platform Module / Cryptographic nonce / Revocation list / Certificate authority / Counter / Transmission Control Protocol / Public key certificate / Trusted Computing Group / Cryptography / Public-key cryptography / Key management

Securing Shared Untrusted Storage by using TPM 1.2 Without Requiring a Trusted OS Marten van Dijk, Luis F. G. Sarmenta, Jonathan Rhodes, and Srinivas Devadas MIT Computer Science and Artificial Intelligence Laboratory (C

Add to Reading List

Source URL: csg.csail.mit.edu

Language: English - Date: 2007-05-24 15:48:08
780Law enforcement / Privacy / Counter-terrorism / National Counterterrorism Center / Information Sharing Environment / United States Department of Homeland Security / United States Intelligence Community / Surveillance / Internet privacy / National security / Security / Ethics

WASHINGTON LEGISLATIVE OFFICE O October 26, 2012

Add to Reading List

Source URL: www.pclob.gov

Language: English - Date: 2014-08-11 09:02:04
UPDATE