Espionage

Results: 3893



#Item
121Ciphertext / Cipher / Espionage / Vigenère cipher / Cryptography / Chaocipher / Cyberwarfare

Chaocipher: Exhibit 5 Solution by Jeff CalofThe photograph above is of the actual, printed document prepared by Prof. Cipher Deavours and Louis Kruh (with John Byrne) as found in the donated Byrne Family files

Add to Reading List

Source URL: www.mountainvistasoft.com

Language: English - Date: 2014-03-22 13:51:16
122Cyberwarfare / Mathematics / RSA / Chosen-ciphertext attack / Ciphertext / Cryptanalysis / Prime number / Blum–Goldwasser cryptosystem / Merkle–Hellman knapsack cryptosystem / Public-key cryptography / Electronic commerce / Espionage

A chosen text attack on the RSA cryptosystem and some discrete logarithm schemes Y. Desmedt Aangesteld Navorser NFWO Katholieke Universiteit Leuven Laboratorium ESAT

Add to Reading List

Source URL: www.dtc.umn.edu

Language: English - Date: 1999-02-17 16:51:49
123

unclassified Cyber-Espionage Threats and Impacts to the Italian Economy and Businesses Preliminary Research AnalysisShai Blitzblau - Maglan Grp. Managing Director

Add to Reading List

Source URL: www.infowar.it

Language: English - Date: 2011-11-22 08:25:56
    124Presentence investigation report / Plame affair / Espionage / Crime in the United States / Iraq War / Criminal law / Jeffrey Alexander Sterling / United States Federal Sentencing Guidelines / Jonathan Pollard

    Case 1:10-crLMB Document 466 FiledPage 1 of 15 PageID# 4412 IN THE UNITED STATES DISTRICT COURT FOR THE EASTERN DISTRICT OF VIRGINIA Alexandria Division ____________________________________

    Add to Reading List

    Source URL: exposefacts.org

    Language: English - Date: 2015-04-24 17:25:33
    125Technology / Computer network security / Computer crimes / Rogue software / Spyware / Social engineering / Pharming / Dumpster diving / Phishing / Espionage / Malware / Cyberwarfare

    Glossary of Common Terms This is a listing of some of the key words, concepts and slang used to describe identity crimes and the tools/techniques used by perpetrators. The language of identity crimes changes often as per

    Add to Reading List

    Source URL: www.theiacp.org

    Language: English - Date: 2014-02-04 08:47:54
    126Security / Intelligence / Law enforcement in the United Kingdom / MI5 / Institute for Science and International Security / Secret Intelligence Service / Espionage / United States Intelligence Community / Eye Spy Magazine / National security / Military communications of the United Kingdom / Data collection

    READ BY THE WORLD’S INTELLIGENCE COMMUNITY EYE SPY INTELLIGENCE MAGAZINE ISSUE NUMBER 93

    Add to Reading List

    Source URL: www.eyespymag.com

    Language: English - Date: 2014-10-11 08:44:14
    127Security / Trade secrets / Corporate crime / Industrial espionage / Counterintelligence / Secretaría de Inteligencia / Foreign Intelligence Service / General Intelligence and Security Service / Intelligence agency / Espionage / Cyberwarfare / National security

    Reto Klar/AP/SIPA The threat of state-sponsored industrial espionage

    Add to Reading List

    Source URL: www.iss.europa.eu

    Language: English - Date: 2015-06-05 08:42:24
    128Privacy of telecommunications / Surveillance / Computer network security / Internet privacy / Lawful interception / Tor / Denial-of-service attack / National security / Security / Espionage

    Research Brief August 2014 The Citizen Lab Schrodinger’s Cat Video and the Death of Clear-Text

    Add to Reading List

    Source URL: citizenlab.org

    Language: English - Date: 2015-03-18 14:57:43
    129National security / Police Service of Northern Ireland / Government of the United Kingdom / Espionage / Information sensitivity / Security clearance / Vetting / Classified information / Northern Ireland Policing Board / Government of Northern Ireland / Northern Ireland peace process / Security

    Police Service of Northern Ireland PSNI Vetting Procedures Equality Impact Assessment Page 1

    Add to Reading List

    Source URL: www.psni.police.uk

    Language: English - Date: 2015-06-05 09:12:17
    130National security / Espionage / Information Security Oversight Office / National Archives and Records Administration / United States Office of Personnel Management / Security clearance / Computer security / United States Department of Homeland Security / OPM / Government / United States government secrecy / Security

    ISOO Notice: Message from OPM to Security Clearance Holders June 16, 2015 ISOO provides the following message from OPM to security clearance holders:

    Add to Reading List

    Source URL: www.dss.mil

    Language: English - Date: 2015-06-17 15:22:00
    UPDATE