Espionage

Results: 3893



#Item
831Computer network security / Privacy of telecommunications / Surveillance / Internet privacy / Lawful interception / Tor / Denial-of-service attack / Security / National security / Espionage

          Research Brief

Add to Reading List

Source URL: citizenlab.org

Language: English - Date: 2014-11-11 14:06:44
832Data collection / Mercyhurst University / Military intelligence / Mercyhurst University Institute for Intelligence Studies / Intelligence analysis / Open-source intelligence / Central Intelligence Agency / Intelligence assessment / Global Intelligence Forum / National security / Espionage / Intelligence

Mercyhurst College Institute Of Intelligence Studies Kristan J. Wheaton, Associate Professor William Welch, Assistant Professor Brad Gleason, Grants Administrator

Add to Reading List

Source URL: www.iarpa.gov

Language: English - Date: 2014-03-06 18:49:38
833Military history of Australia during World War II / Queensland / South West Pacific theatre of World War II / Central Bureau / Military history of Japan during World War II / Douglas MacArthur / FRUMEL / Pacific War / Traffic analysis / Military / Australian intelligence agencies / Espionage

Central Bureau Intelligence Corps - Association Newsletter December 2004 CENTRAL BUREAU INTELLIGENCE CORPS ASSOCIATION

Add to Reading List

Source URL: www.ozatwar.com

Language: English - Date: 2014-03-30 07:23:28
834Enhanced interrogation techniques / Ethics / Espionage / International criminal law / Cordaid / Human rights abuses / Torture in the United States

Microsoft Word - Cordaid NGO.doc

Add to Reading List

Source URL: www.nab.gov.pk

Language: English - Date: 2009-08-26 14:02:28
835Security clearance / Finance / Security / Government / Government Accountability Office / Internal Revenue Service / Federal Reserve System / Tax / United States government secrecy / National security / Espionage

GAO-15-467T Highlights, SECURITY CLEARANCES: Additional Mechanisms May Aid Federal Tax-Debt Detection

Add to Reading List

Source URL: www.gao.gov

Language: English - Date: 2015-03-18 13:04:02
836Mass surveillance / Espionage / United States government secrecy / WikiLeaks / Anti-corporate activism / Whistleblower / National Security Agency / News leak / NSA warrantless surveillance controversy / Ethics / National security / Security

A Public Accountability Defense for National Security Leakers and Whistleblowers 8(2) Harv. Rev. L. & Policy, July 2014 Yochai Benkler* In June 2013 Glenn Greenwald, Laura Poitras, and Barton Gellman began to publish sto

Add to Reading List

Source URL: www.benkler.org

Language: English - Date: 2014-07-29 10:38:25
837Espionage / Biometrics / Facial recognition system / Surveillance / Security / National security

          Cyber & Intelligence Division 

Add to Reading List

Source URL: www.iarpa.gov

Language: English - Date: 2014-03-06 18:49:05
838Cryptography / UICC configuration / UICC / Subscriber identity module / GlobalPlatform / Smart card application protocol data unit / Java Card / European Telecommunications Standards Institute / Smart card / Smart cards / Security / Espionage

TS[removed]V12[removed]Smart Cards; Remote APDU structure for UICC based applications (Release 12)

Add to Reading List

Source URL: www.etsi.org

Language: English - Date: 2015-02-19 09:07:40
839United States government secrecy / Kenya Pipeline Company / Kenya / Government / Politics / Espionage / National security / Security clearance

SU/QT/049N/15 12th February, 2015 TO: ALL BIDDERS Dear Sirs,

Add to Reading List

Source URL: www.kpc.co.ke

Language: English - Date: 2015-02-17 02:11:05
840Backup software / Antivirus software / Proprietary software / Symantec / Spyware / Norton AntiVirus / Norton 360 / Software / System software / Espionage

SYMANTEC CORPORATION SOFTWARE LICENSE AGREEMENT

Add to Reading List

Source URL: www.symantec.com

Language: English - Date: 2012-07-10 22:08:58
UPDATE