Espionage

Results: 3893



#Item
151Data collection / Espionage / Cyberwarfare / Signals intelligence / Elbit Systems / Electronic warfare / Signals intelligence by alliances /  nations and industries / Signals intelligence operational platforms by nation / National security / Intelligence / Intelligence gathering disciplines

June 11, 2015 Paris Air Show 2015: Elbit Systems Launches Air Keeper - A Unique Airborne SIGINT and EW Solution Already operational, the new solution is suitable for cargo, transport or

Add to Reading List

Source URL: www.elbitsystems.com

Language: English - Date: 2015-06-11 07:36:05
152

U.S. Policy on Economic Espionage James A. Lewis, Center for Strategic and International Studies One source of tension in the relationship with China revolves around economic espionage, and one difficult aspect is the qu

Add to Reading List

Source URL: csis.org

Language: English - Date: 2011-12-07 11:39:41
    153

    A+ I first learned of Mary Bowser while researching my doctoral dissertation on African American literature, when I read a few sentences about her espionage in A Shining Thread of Hope: The History of Black Women in Ame

    Add to Reading List

    Source URL: loisleveen.com

    Language: English - Date: 2012-04-27 00:47:18
      154

      THE WINDING, BUMPY ROAD FROM ESPIONAGE TO INTELLIGENCE By David S. Black INTRODUCTION For the purposes of this essay, I wish to define “intelligence” as information about, and assessments of, the capabilities and int

      Add to Reading List

      Source URL: spywise.net

      Language: English
        155

        TM How To Play A game of espionage and deduction for 2 players, ages 12 and up

        Add to Reading List

        Source URL: upload.snakesandlattes.com

        Language: English - Date: 2014-06-03 13:31:07
          156

          THE WINDING, BUMPY ROAD FROM ESPIONAGE TO INTELLIGENCE By David S. Black INTRODUCTION For the purposes of this essay, I wish to define “intelligence” as information about, and assessments of, the capabilities and int

          Add to Reading List

          Source URL: www.spywise.net

          Language: English - Date: 2009-08-06 20:17:54
            157Malware / Digital video recorders / Computer security / Rootkit / Keystroke logging / National Security Agency / TiVo / Smart grid / Security / Espionage / Cyberwarfare

            Security Now! #Q&A #212  This week on Security Now! ● ●

            Add to Reading List

            Source URL: www.grc.com

            Language: English - Date: 2015-05-12 13:10:51
            158Brute-force attack / Side channel attack / Workshop on Cryptographic Hardware and Embedded Systems / MIFARE / Cryptography / Espionage / Advanced Encryption Standard

            Real world AES key extraction CHES-2010 Rump Session, Santa Barbara, USA, 19 August 2010 Real world AES key extraction Sergei Skorobogatov

            Add to Reading List

            Source URL: www.cl.cam.ac.uk

            Language: English - Date: 2010-09-09 06:37:08
            159Data security / Information Risk Management / Risk analysis / Espionage / Computing / SAS / Hardware security module / Classified information / Asset / Security / UICC / Computer security

            FSG.04 Security Accreditation Scheme for UICC Production - Standard v0.1 (Current)

            Add to Reading List

            Source URL: www.gsma.com

            Language: English - Date: 2015-05-11 10:46:08
            160Cybercrime / Espionage / Computer network security / Fraud / Crime prevention / Internet Crime Complaint Center / Identity theft / Federal Bureau of Investigation / Cyberterrorism / Crime / Computer crimes / Security

            C y b e rcr i m e s  Read the fine print on website privacy policies—On many social networking and photo sharing sites, there is wording on

            Add to Reading List

            Source URL: www.ncpc.org

            Language: English - Date: 2015-05-05 06:09:00
            UPDATE