Espionage

Results: 3893



#Item
481Blood for goods / Mossad / Universal jurisdiction / Nazi hunter / Central Intelligence Agency / J. Edgar Hoover / Espionage / Federal Bureau of Investigation / Nazi Germany / Nazis in South America / The Holocaust / Adolf Eichmann

In Cold War, U.S. Spy Agencies Used 1,000 Nazis By ERIC LICHTBLAU OCT. 26, 2014 New York Times WASHINGTON — In the decades after World War II, the C.I.A. and other United States

Add to Reading List

Source URL: www.ferris.edu

Language: English - Date: 2014-11-04 17:10:05
482Forensic science / Counterintelligence / Department of Defense Cyber Crime Center / Espionage / Computer forensics / Information technology audit

Data Forensics Consulting Paul French, Managing Director Paul came to NTI Breakwater in 1999 following a thirteen year career in the U. S. Air Force. At the Air Force, he performed diverse roles in felony crime investig

Add to Reading List

Source URL: www.farmersinsurancegroupsucks.com

Language: English - Date: 2013-09-03 14:59:37
483Pseudoscience / Defense Criminal Investigative Service / U.S. Air Force Office of Special Investigations / Naval Criminal Investigative Service / Counterintelligence / National security / Espionage / Lie detection / Polygraph

DoD Directive, April 24, 2015

Add to Reading List

Source URL: cryptome.org

Language: English - Date: 2015-04-25 08:59:10
484Military of Pakistan / Network performance management / Trunking / Traffic analysis / Telecommunications engineering / Electronic engineering / Espionage / Network management / Networks / Inter-Services Intelligence

Case Study | State University Challenge “Trying to determine an approach to optimizing network bandwidth was intimidating. We knew our traffic and trunks weren’t operating at

Add to Reading List

Source URL: www.isi-info.com

Language: English - Date: 2015-01-06 16:17:22
485Malware / Rogue software / Computer network security / Spyware / Spybot – Search & Destroy / ActiveX / Pop-up ad / Features new to Windows XP / Features new to Windows Vista / Software / System software / Espionage

AFFIDAVIT OF SIBU THOMAS State of New York ) ) County of New York )

Add to Reading List

Source URL: www.benedelman.org

Language: English - Date: 2006-04-07 10:57:41
486United States government secrecy / Secretary / Patent application / Chaplain / Security / Government / Espionage / National security / Security clearance

ANNEXURE B DEPARTMENT OF DEFENCE APPLICATIONS :

Add to Reading List

Source URL: www.dpsa.gov.za

Language: English - Date: 2015-04-13 04:37:05
487Steganography / Advantage / Ciphertext indistinguishability / RSA / Information theory / Cyberwarfare / Security / Espionage / Public-key cryptography / Cryptography

Public-Key Steganography Luis von Ahn and Nicholas J. Hopper Carnegie Mellon University Abstract. Informally, a public-key steganography protocol allows two parties, who have never met or exchanged a secret, to send hidd

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2003-11-06 19:00:02
488Bletchley Park / Cyberwarfare / Enigma machine / Biuro Szyfrów / Cryptanalysis of the Enigma / Alan Turing / Cryptography / Espionage / Rotor machines

Enigma Officier and Staff Procedures 1940 formatted by Tony Sale (cCheck No. 790 Secret Command Material ! THE ENIGMA

Add to Reading List

Source URL: www.codesandciphers.org.uk

Language: English - Date: 2013-08-19 02:13:22
489Malware / Rogue software / Computer network security / Spyware / Spybot – Search & Destroy / Web browser / Internet Explorer / Pop-up ad / Screenshot / Software / System software / Espionage

AFFIDAVIT OF JOSEPH RIVELA State of New York ) ) County of New York )

Add to Reading List

Source URL: www.benedelman.org

Language: English - Date: 2006-04-07 10:57:37
490Physics / Signals intelligence / TEMPEST / United States government secrecy / Electronic test equipment / Measuring instruments / Computer keyboard / Laser / Voltmeter / Espionage / Surveillance / Technology

Sniffing Keystrokes With Lasers/Voltmeters Side Channel Attacks Using Optical Sampling Of Mechanical Energy And Power Line Leakage Andrea Barisani

Add to Reading List

Source URL: dev.inversepath.com

Language: English - Date: 2009-10-01 18:33:06
UPDATE