- counter eavesdropping receiver
- (радио) приемник (для) обнаружения устройств подслушивания (закла
Англо-русский словарь по компьютерной безопасности. Академик.ру. 2011.
Англо-русский словарь по компьютерной безопасности. Академик.ру. 2011.
Technical Surveillance Counter-Measures — TSCM (Technical Surveillance Counter Measures) is the original Unites States military abbreviation denoting the process of bug sweeping or electronic countersurveillance. It is related to ELINT, SIGINT and Electronic countermeasures (ECM).The… … Wikipedia
Direction finding — (DF) refers to the establishment of the direction from which a received signal was transmitted. This can refer to radio or other forms of wireless communication. By combining the direction information from two or more suitably spaced receivers… … Wikipedia
Signals intelligence operational platforms by nation — This article is a subset article under the main article Signals intelligence, which addresses the unifying conceptual and technical factors and common technologies in this intelligence discipline. This article deals with current signals… … Wikipedia
Signals intelligence — SIGINT redirects here. For the UNIX signal, see SIGINT (POSIX). RAF Menwith Hill, a large site in the United Kingdom, part of ECHELON and the UK USA Security Agreement. Signals intelligence (often contracted to SIGINT) is intelligence gathering… … Wikipedia
Cryptography — Secret code redirects here. For the Aya Kamiki album, see Secret Code. Symmetric key cryptography, where the same key is used both for encryption and decryption … Wikipedia
TEMPEST — is a codename referring to investigations and studies of compromising emanations (CE). Compromising emanations are defined as unintentional intelligence bearing signals which, if intercepted and analyzed, may disclose the information transmitted … Wikipedia
List of James Bond gadgets — A popular element of the James Bond franchise is the exotic equipment and vehicles he is assigned on his missions, which often prove to be critically useful.The original books and early adaptations had only relatively minimal pieces like the… … Wikipedia
Clandestine HUMINT operational techniques — The Clandestine HUMINT page deals with the functions of that discipline, including espionage and active counterintelligence. This page deals with Clandestine HUMINT operational techniques, also called tradecraft . It applies to clandestine… … Wikipedia
Numbers station — Fictional example of a numbers station. Numbers stations (or number stations) are shortwave radio stations of uncertain origin. In the 1950s, Time magazine reported that the numbers stations first appeared shortly after World War II and were… … Wikipedia
Counterintelligence — This article is a subset article of intelligence cycle security. Counterintelligence or counter intelligence (see spelling differences) (CI) refers to efforts made by intelligence organizations to prevent hostile or enemy intelligence… … Wikipedia
NSA call database — The United States National Security Agency (NSA) maintains a database containing hundreds of billions of records of telephone calls made by U.S. citizens from the four largest telephone carriers in the United States: AT T, SBC, BellSouth (all… … Wikipedia