Espionage

Results: 3893



#Item
61Espionage / Intelligence gathering disciplines / Business intelligence / Market research / Strategic management / Military intelligence / Open-source intelligence / Geospatial intelligence / Intelligence analysis / Competitive intelligence / Human intelligence / Internet privacy

GLOBAL COURSE PROGRAM 2016 Brussels • New York • Singapore • Zurich

Add to Reading List

Source URL: www.i-intelligence.eu

Language: English - Date: 2016-01-12 06:23:24
62Nomenclature of Territorial Units for Statistics / Eastern Bloc / Decommunization / Communism / Institute for the Study of Totalitarian Regimes / Platform of European Memory and Conscience / Prague / Counterintelligence / StB / Espionage

Prague from the Perspective of the Pathological Powerful

Add to Reading List

Source URL: www.ustrcr.cz

Language: English - Date: 2010-04-01 03:53:35
63Computing / Media access control / Computer networking / Network architecture / Espionage / Carrier sense multiple access with collision avoidance / IEEE 802.11 / Covert channel / Carrier sense multiple access / Collision / Traffic flow / Channel access method

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 8, NO. 3, MARCHA Timing Channel Spyware for the CSMA/CA Protocol

Add to Reading List

Source URL: coleman.ucsd.edu

Language: English
64Espionage / United States intelligence agencies / Geospatial intelligence / United States Geospatial Intelligence Foundation / Intelligence gathering disciplines / National Reconnaissance Office

Fresh summer abstract background. Connecting dots, lens flare

Add to Reading List

Source URL: trajectorymagazine.com

Language: English - Date: 2016-05-15 21:46:29
65Security / News leaks / WikiLeaks / Cryptography / Secrecy / Espionage / National security / Whistleblowing / Daniel Ellsberg / Reception of WikiLeaks / Information published by WikiLeaks

RESOLUTION ON ACCESS TO INFORMATION AND WIKILEAKS WHEREAS, WikiLeaks is a non-profit organization that publishes submissions of secret documents from anonymous sources and news leaks; and

Add to Reading List

Source URL: libr.org

Language: English - Date: 2013-07-27 13:59:54
66Security / Cyberwarfare / Prevention / Cybercrime / National security / Hacking / Military technology / Stuxnet / Cyber-attack / Computer security / Sabotage / Espionage

OPINION End this phony cyberwar Talk of combat in the fifth domain has become a fixture in Washington. But cyberwar has never happened and probably never will, says Thomas Rid EXACTLY two decades ago, the

Add to Reading List

Source URL: ridt.co

Language: English - Date: 2015-12-18 07:31:22
67Privacy of telecommunications / Mass surveillance / National security / Espionage / Surveillance / Foreign Intelligence Surveillance Act / National Security Agency / United States Foreign Intelligence Surveillance Court / NSA warrantless surveillance / PRISM

Massie-Lofgren Amendment Fact Sheet What the Massie-Lofgren Amendment does [subsections (a) and (b)]:  Prohibits government funds from being spent to perform warrantless backdoor searches.

Add to Reading List

Source URL: lofgren.house.gov

Language: English - Date: 2016-06-15 15:30:30
68Espionage / Data / Geographic data and information / Geospatial intelligence / United States intelligence agencies / United States Geospatial Intelligence Foundation / National Geospatial-Intelligence Agency / Open Geospatial Consortium / Geospatial / Geographic information systems in geospatial intelligence

GWG: NGA GWG Secretariat

Add to Reading List

Source URL: www.gwg.nga.mil

Language: English - Date: 2009-09-07 13:35:45
69United States intelligence agencies / Government / Espionage / Security / United States Intelligence Community / Director of National Intelligence / Central Intelligence Agency / Foreign Intelligence Surveillance Act / Defense Intelligence Agency / Under Secretary of Defense for Intelligence / Executive Order 12333 / National Reconnaissance Office

114TH CONGRESS " HOUSE OF REPRESENTATIVES 2d Session !

Add to Reading List

Source URL: www.gpo.gov

Language: English - Date: 2016-05-19 08:32:21
70Espionage / Cyberwarfare / Rogue software / Cybercrime / Computing / Identity theft / Keystroke logging / Spyware / Surveillance / Screenshot / Computer keyboard / Internet privacy

Defeat Spyware With Anti-Screen Capture Technology Using Visual Persistence Johnny Lim Netrust 10 Collyer Quay, #09-05 Ocean Building, Singapore

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2007-06-22 15:47:38
UPDATE