Espionage

Results: 3893



#Item
291Cyberwarfare / Backdoor / Computer keyboard / Keystroke logging / AutoRun / Espionage / Spyware / System software

Microsoft PowerPoint - Blackhat2004.ppt

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2015-05-28 15:51:40
292Intelligence analysis / Central Intelligence Agency / Defense Intelligence Agency / Intelligence gathering disciplines / Intelligence / Director of National Intelligence / United States Intelligence Community / National Clandestine Service / Defense Intelligence Operations Coordination Center / National security / Espionage / United States Department of Defense

Microsoft Word - overview.docx

Add to Reading List

Source URL: fas.org

Language: English - Date: 2014-05-06 20:30:16
293Tamper resistance / Public-key cryptography / Power analysis / Encryption / Computer security / Timing attack / Password / Key size / Secure cryptoprocessor / Cryptography / Security / Espionage

Fairy dust, secrets, and the real world - Security & Privacy Magazine, IEEE

Add to Reading List

Source URL: www.cs.dartmouth.edu

Language: English - Date: 2005-08-19 15:38:40
294Intelligence analysis / Military intelligence / Intelligence / Central Intelligence Agency / United States Intelligence Community / Defense Intelligence Agency / Counterintelligence / Director of National Intelligence / Secretaría de Inteligencia / National security / Espionage / Data collection

FY2016 budget request for the National Intelligence Program - Fact Sheet

Add to Reading List

Source URL: fas.org

Language: English - Date: 2015-02-02 14:24:22
295Government / Espionage / Security clearance / Classified information in the United States / United States Department of Defense / Washington Headquarters Services / National Security Agency / Department of the Navy Central Adjudication Facility / United States Department of the Navy / United States government secrecy / National security / Security

ASMITH AMENDMENT@ UPDATE MAY 2004 Sheldon I. Cohen1 The ASmith Amendment,@ 10 U.S.C. 986, which was enacted in October 2000, prohibits the Department of Defense from granting or renewing a security clearance to

Add to Reading List

Source URL: fas.org

Language: English - Date: 2014-05-06 14:32:31
296Government / Attention / Vigilance / Central Intelligence Agency / Income Tax Department / Military intelligence / Secretaría de Inteligencia / Intelligence / Espionage / National security

6 Intelligence Network – an effective instrument for preventive vigilance in PSEsIntelligence as an important input for effective governance has been testified by history. In the modern dimensions of administ

Add to Reading List

Source URL: cvc.nic.in

Language: English - Date: 2004-01-21 03:54:13
297Government / Mass surveillance / Espionage / Security clearance / Computer security / United States Intelligence Community / Central Intelligence Agency / National Reconnaissance Office / L clearance / National security / Security / United States government secrecy

2012 Report on Security Clearance Determinations

Add to Reading List

Source URL: www.fas.org

Language: English - Date: 2014-05-06 23:00:24
298Espionage / Council on American-Islamic Relations / Fourth Amendment to the United States Constitution / United States v. U.S. District Court / United States v. Knotts / American Civil Liberties Union / GPS tracking unit / Surveillance / National security / Law

Microsoft WordAbbas cv 02.docx

Add to Reading List

Source URL: epic.org

Language: English - Date: 2011-10-03 15:45:49
299Data collection / Intelligence / McLean /  Virginia / Human intelligence / Military intelligence / 9/11 Commission / Organizational structure of the Central Intelligence Agency / National Clandestine Service / National security / Central Intelligence Agency / Espionage

Microsoft Word - Testimony to Senate Armed Services Cmte 2004.doc

Add to Reading List

Source URL: www.globalsecurity.org

Language: English
300Alan Turing / Turing machine / Colossus computer / Bombe / Enigma machine / Lorenz cipher / Gordon Welchman / Known-plaintext attack / Cryptanalysis / Cryptography / Espionage / Bletchley Park

FEATURE ALAN TURING, COLOSSUS, AND TURING MACHINES We’re taking a break from our Olde Code series this issue to get some background on a man who was in the news as recently as last year. Juliet Kemp looks back at the

Add to Reading List

Source URL: www.linuxvoice.com

Language: English - Date: 2015-02-09 09:27:27
UPDATE