Espionage

Results: 3893



#Item
131Cyberwarfare / Espionage / Cryptography / Chaocipher / Cipher

Exhibit #3 – Encipherment Grids Byrne has created a 4-page Encipherment Grid (PDF Pages 2 thru 5) displaying both the plaintext and ciphertext as found in Silent Years. For maximum size viewing of those pages, rotate

Add to Reading List

Source URL: www.mountainvistasoft.com

Language: English - Date: 2013-05-29 13:49:46
132Espionage / Packaging / Disk encryption / Tamper resistance / Computer security / FIPS 140-2 / IBM / Data security / Encryption / Cryptography / Security / Technology

Trusted Hardware Radu Sion Stony Brook Trusted Hardware Laboratory An important part of the tutorial will lie in conveying the insights of how practical limitations of

Add to Reading List

Source URL: www.sigsac.org

Language: English - Date: 2008-10-06 10:03:17
133Intelligence / Military intelligence / Central Intelligence Agency / Human intelligence / United States Intelligence Community / Clandestine HUMINT / Director of Central Intelligence / Secretaría de Inteligencia / Counterintelligence / National security / Espionage / Data collection

Microsoft Word - Artists Versus Bureaucrats....doc

Add to Reading List

Source URL: turcopolier.typepad.com

Language: English - Date: 2009-05-29 14:36:59
134Computer security / Spyware / Rootkits / Joanna Rutkowska / Year of birth missing / Rutkowski / Backdoor / Computer virus / Keystroke logging / Espionage / Cyberwarfare / Malware

Rootkits vs. Stealth by Design Malware Joanna Rutkowska invisiblethings.org Black Hat Europe 2006, Amsterdam, the Netherlands

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2015-05-28 15:51:30
135

pionaaz – (pr. Espionage, sõnast espion, it. spione) – (pioon )- kuritegu, milline seisneb riigisaladust moodustavate andmete salajases kogumises ja varguses, et neis anda edasi teisele riigile. See on kõikide rii

Add to Reading List

Source URL: koit.pri.ee

Language: Estonian - Date: 2012-03-28 13:39:21
    136Espionage / Cipher / Bletchley Park / Alberti cipher disk / Banburismus / Cyberwarfare / Cryptography / Cipher disk

    A new approach to revealing the Byrne machine. Introduction. Up until now the methodology used has been to statistically analyse the plain and ciphertexts provided by Byrne and from that to draw conclusions on how the ma

    Add to Reading List

    Source URL: www.mountainvistasoft.com

    Language: English - Date: 2009-09-02 13:29:47
    137Security / Defense Security Service / Data security / U.S. Air Force Office of Special Investigations / Counterintelligence / Central Intelligence Agency / National Industrial Security Program / Diplomatic Security Service / Bureau of Diplomatic Security / Espionage / National security

    Senior Leader Annual Meeting | Awards Ceremony | DSS Welcomes ... SEC UR IT

    Add to Reading List

    Source URL: www.dss.mil

    Language: English - Date: 2015-06-19 09:34:00
    138Intelligence / Collective intelligence / Open-source intelligence / Central Intelligence Agency / Defense Intelligence Agency / Military intelligence / Robert David Steele / United States Intelligence Community / Organizational structure of the Central Intelligence Agency / National security / Espionage / Data collection

    2013 Open Source Agency: Executive Access Point 2.1 This is the Cabinet, OSD, Major Command, and Congressional-level access point for staff on the Open Source Agency.  Five people have been fighting for this for 20 yea

    Add to Reading List

    Source URL: www.phibetaiota.net

    Language: English - Date: 2014-10-22 10:21:28
    139Intelligence / Military intelligence / Defense Intelligence Agency / Central Intelligence Agency / Open-source intelligence / Biometrics / Signals intelligence / United States Intelligence Community / Operations security / National security / Data collection / Espionage

    UNCLASSIFIED INTELLIGENCE Enabling the Future of Military Operations  and Intelligence

    Add to Reading List

    Source URL: biometrics.org

    Language: English - Date: 2010-10-15 18:15:34
    140Signals intelligence / Military intelligence / Intelligence / Mass surveillance / Central Intelligence Agency / United States Intelligence Community / Director of Central Intelligence / Counterintelligence / National Security Agency / National security / Espionage / Data collection

    Signals Intelligence Activities While protecting our nation through the collection of signals intelligence (SIGINT) as authorized by law and policy, the Central Intelligence Agency (CIA), referred to herein as the "Agenc

    Add to Reading List

    Source URL: cryptome.org

    Language: English - Date: 2015-06-17 07:06:29
    UPDATE