counter eavesdropping receiver

counter eavesdropping receiver
(радио) приемник (для) обнаружения устройств подслушивания (закла

Англо-русский словарь по компьютерной безопасности. . 2011.

Игры ⚽ Нужно сделать НИР?

Смотреть что такое "counter eavesdropping receiver" в других словарях:

  • Technical Surveillance Counter-Measures — TSCM (Technical Surveillance Counter Measures) is the original Unites States military abbreviation denoting the process of bug sweeping or electronic countersurveillance. It is related to ELINT, SIGINT and Electronic countermeasures (ECM).The… …   Wikipedia

  • Direction finding — (DF) refers to the establishment of the direction from which a received signal was transmitted. This can refer to radio or other forms of wireless communication. By combining the direction information from two or more suitably spaced receivers… …   Wikipedia

  • Signals intelligence operational platforms by nation — This article is a subset article under the main article Signals intelligence, which addresses the unifying conceptual and technical factors and common technologies in this intelligence discipline. This article deals with current signals… …   Wikipedia

  • Signals intelligence — SIGINT redirects here. For the UNIX signal, see SIGINT (POSIX). RAF Menwith Hill, a large site in the United Kingdom, part of ECHELON and the UK USA Security Agreement. Signals intelligence (often contracted to SIGINT) is intelligence gathering… …   Wikipedia

  • Cryptography — Secret code redirects here. For the Aya Kamiki album, see Secret Code. Symmetric key cryptography, where the same key is used both for encryption and decryption …   Wikipedia

  • TEMPEST — is a codename referring to investigations and studies of compromising emanations (CE). Compromising emanations are defined as unintentional intelligence bearing signals which, if intercepted and analyzed, may disclose the information transmitted …   Wikipedia

  • List of James Bond gadgets — A popular element of the James Bond franchise is the exotic equipment and vehicles he is assigned on his missions, which often prove to be critically useful.The original books and early adaptations had only relatively minimal pieces like the… …   Wikipedia

  • Clandestine HUMINT operational techniques — The Clandestine HUMINT page deals with the functions of that discipline, including espionage and active counterintelligence. This page deals with Clandestine HUMINT operational techniques, also called tradecraft . It applies to clandestine… …   Wikipedia

  • Numbers station — Fictional example of a numbers station. Numbers stations (or number stations) are shortwave radio stations of uncertain origin. In the 1950s, Time magazine reported that the numbers stations first appeared shortly after World War II and were… …   Wikipedia

  • Counterintelligence — This article is a subset article of intelligence cycle security. Counterintelligence or counter intelligence (see spelling differences) (CI) refers to efforts made by intelligence organizations to prevent hostile or enemy intelligence… …   Wikipedia

  • NSA call database — The United States National Security Agency (NSA) maintains a database containing hundreds of billions of records of telephone calls made by U.S. citizens from the four largest telephone carriers in the United States: AT T, SBC, BellSouth (all… …   Wikipedia


Поделиться ссылкой на выделенное

Прямая ссылка:
Нажмите правой клавишей мыши и выберите «Копировать ссылку»