exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 10 of 10 RSS Feed

Files

Practical COMSEC Equipment For Protecting Your Privacy
Posted Aug 26, 2002

This file is a brief overview of the field of advanced COMSEC pertaining specifically to data communications. COMSEC is technical jargon for those in the field of security, and it is an acronym for COMmunications SECurity.

tags | bbs
SHA-256 | 4fa0747b7347da4d9b2e50fd59fcfd8f03a7e1a13fcbdc95af118d67247312ff
fisa2.txt
Posted Aug 26, 2002

From the U.S. Code Online via GPO Access [wais.access.gpo.gov] [Laws in effect as of January 16, 1996] [Document not affected by Public Laws enacted between January 16, 1996 and August 28, 1996] [CITE: 50USC] TITLE 50--WAR AND NATIONAL DEFENSE CHAPTER 36--FOREIGN INTELLIGENCE SURVEILLANCE SUBCHAPTER I--ELECTRONIC SURVEILLANCE

tags | bbs
SHA-256 | 5d452d53f046ea9c03545ac70b1b048485b560b6a3abbcc89b42f88868588217
Product Review And Technical Analysis General Purpose Amplifiers
Posted Aug 26, 2002

This article deals with the field of surveillance. In this article the author performs a product review of the various General Purpose Amplifiers, whos purpose will be discussed below. The intent of this article is to make you aware of the various models of such units from different manufacturers as well as the prices of such units. In addition, each unit will be reviewd for quality and usefullness.

tags | bbs
SHA-256 | 55ae0f7abecbbb6cfbb2dde2210018715288eb0782296379f39b68de6f78c0f1
Internet Computer Crime Fact or Fiction
Posted Aug 26, 2002

Amusing read from the 90s on the perception of Internet Computer Crime.

tags | bbs
SHA-256 | d1f5b6512e01486040ac1defe28e8b17fdf93f25fabe99d4c234991bf02dae44
Optoelectronic Eavesdropping Techniques
Posted Aug 26, 2002

Whitepaper on Optoelectronic Eavesdropping Techniques.

tags | bbs
SHA-256 | f50752b55f4c6a7459238b7055c1669f690c30cd88bf689b777d7ab1940e843b
propagan.da
Posted Aug 26, 2002

--------------------------------------------------- POLITICAL and SOCIAL PROPAGANDA "The brainwashing of a society" by, Alan Hoffman (a.k.a. "-Q-") 1 April 1997 [revision 1]

tags | bbs
SHA-256 | ddca3f678211f2c19bc5e1b311bd98c57990af0cc318ae592057987884217053
scram.ble
Posted Aug 26, 2002

-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= COMMUNICATIONS SECURITY OVERVIEW A Non-Technical Discussion of Modern Transmission Methods -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= written by Alan Hoffman ("Q") =============================

tags | bbs
SHA-256 | b8965cf6bc0079a1e22f4fc2e456dee708c23e03a122b5d443cee7325bc711b8
shotgun.mic
Posted Aug 26, 2002

-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- Building a Long Range Directional Listening Device -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- Written by -Q- ==============

tags | bbs
SHA-256 | 0a771903fee58cef28d7f7c93b6425178d97454f5f0034b166d0fb2fd936f8cc
spyterms.q
Posted Aug 26, 2002

-=-=-=-=-=-=-=-=-=-=-=-=-=- Surveillance & Security Terminology and Definitions Reference File -=-=-=-=-=-=-=-=-=-=-=-=-=- by Alan Hoffman a.k.a -Q- =========================

tags | bbs
SHA-256 | 6f8a4e7f976017dfa73f8d803bcf1cd6bc268f6b7fe68776bd39cf598ec5dbf3
tscmrule.q
Posted Aug 26, 2002

-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- RULES FOR INSURING PRIVACY IN AN ORGANIZATION. CONSTANT AWARENESS OF THREATS. -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- Written by: -Q- -=-=-=-=-=-=-=-=-

tags | bbs
SHA-256 | d443613752dcb13273c45e1063865434bb66090a1ea0bfe2caf4f9abdf453374
Page 1 of 1
Back1Next

Top Authors In Last 30 Days

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close