Cryptome

Results: 876



#Item
241Intelligence / Military communications / Military intelligence / Cyberwarfare / REL / National security / Data collection / Signals intelligence

TOP SECRET//COMINT//REL (U) Outline • (U) Project Description • (U) Definition of Medical Pattern of Life(PoL) • (S//SI//REL) Advantages of Medical Intel over

Add to Reading List

Source URL: cryptome.org

Language: English - Date: 2015-05-21 10:29:39
242Public safety / Data security / Critical infrastructure protection / Infrastructure / Security engineering / United States Department of Homeland Security / Information security / Mission assurance / National security / Security / Computer security

D E PA R T M E N T O F T H E N AV Y O F F I C E O F T H E S E C R E TA R YN AV Y P E N TAG O N WA S H I N G TO N D C 0 SECNAVINST

Add to Reading List

Source URL: cryptome.org

Language: English - Date: 2015-05-19 17:53:16
243Terrorism / September 11 attacks / Al-Qaeda / Osama bin Laden / Central Intelligence Agency / War in Afghanistan / Islamic terrorism / War on Terror / Islam

DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL Welcome! Friday, 09 Nov 2012 • •

Add to Reading List

Source URL: cryptome.org

Language: English - Date: 2015-05-19 09:36:46
244Law enforcement in Europe / Terrorism / National security / Europol / Islamic terrorism / Eurojust / Counter-terrorism / ETA / Definitions of terrorism / Politics / Government / Agencies of the European Union

20953 TESAT makets ar vaku

Add to Reading List

Source URL: cryptome.org

Language: English - Date: 2007-05-15 05:54:07
245Signaling / Transmission Control Protocol / Subroutine / Call sign / Electronic engineering / Electronics / Signaling System 7 / Computing / Release

Lawfully Authorized Electronic Surveillance J-STD-025 Rev. A

Add to Reading List

Source URL: cryptome.org

Language: English - Date: 2007-05-02 06:20:10
246Technology / Security / Cyberterrorism / Internet-related prefixes / Kuala Lumpur / Cryptome / Stuxnet / Computer security / Computer crimes / Cyberwarfare / Terrorism

CYBERTERRORISM WORKSHOP 14 – 16 MAY 2014 KUALA LUMPUR A Cyberterrorism Workshop was co-organised by SEARCCT and CyberSecurity Malaysia from 14 to 16 May 2014 in Kuala Lumpur. Twenty three (23)

Add to Reading List

Source URL: www.searcct.gov.my

Language: English - Date: 2014-09-02 01:45:05
247Crime prevention / Mass surveillance / National Security Agency / Telephone tapping / Surveillance / Internet privacy / Government Communications Headquarters / Privacy / Information security / Security / National security / Public safety

Full Disclosure The Internet Dark Age • Removing Governments on-line stranglehold • Disabling NSA/GCHQ major capabilities (BULLRUN / EDGEHILL) • Restoring on-line privacy - immediately

Add to Reading List

Source URL: cryptome.org

Language: English - Date: 2014-01-05 08:28:31
248United States federal executive departments / Department of Defense Information Assurance Certification and Accreditation Process / Security controls / Assistant Secretary of Defense for Networks and Information Integration / IUID / Defense Technical Information Center / Mission assurance / Information assurance / Government procurement in the United States / Computer security / United States Department of Defense / Security

DoD Instruction, November 5, 2012

Add to Reading List

Source URL: cryptome.org

Language: English - Date: 2012-11-24 07:03:14
249Data security / Information sensitivity / Mass surveillance / Classified information / Central Intelligence Agency / National Security Agency / Security guard / Vulnerability / Security clearance / Security / National security / United States government secrecy

STUDY OF THE SECURITY DIVISION

Add to Reading List

Source URL: cryptome.org

Language: English - Date: 2015-04-25 13:16:22
250

PDF Document

Add to Reading List

Source URL: cryptome.org

- Date: 2015-04-24 12:05:00
    UPDATE