This file is a brief overview of the field of advanced COMSEC pertaining specifically to data communications. COMSEC is technical jargon for those in the field of security, and it is an acronym for COMmunications SECurity.
4fa0747b7347da4d9b2e50fd59fcfd8f03a7e1a13fcbdc95af118d67247312ff
From the U.S. Code Online via GPO Access [wais.access.gpo.gov] [Laws in effect as of January 16, 1996] [Document not affected by Public Laws enacted between January 16, 1996 and August 28, 1996] [CITE: 50USC] TITLE 50--WAR AND NATIONAL DEFENSE CHAPTER 36--FOREIGN INTELLIGENCE SURVEILLANCE SUBCHAPTER I--ELECTRONIC SURVEILLANCE
5d452d53f046ea9c03545ac70b1b048485b560b6a3abbcc89b42f88868588217
This article deals with the field of surveillance. In this article the author performs a product review of the various General Purpose Amplifiers, whos purpose will be discussed below. The intent of this article is to make you aware of the various models of such units from different manufacturers as well as the prices of such units. In addition, each unit will be reviewd for quality and usefullness.
55ae0f7abecbbb6cfbb2dde2210018715288eb0782296379f39b68de6f78c0f1
Amusing read from the 90s on the perception of Internet Computer Crime.
d1f5b6512e01486040ac1defe28e8b17fdf93f25fabe99d4c234991bf02dae44
Whitepaper on Optoelectronic Eavesdropping Techniques.
f50752b55f4c6a7459238b7055c1669f690c30cd88bf689b777d7ab1940e843b
--------------------------------------------------- POLITICAL and SOCIAL PROPAGANDA "The brainwashing of a society" by, Alan Hoffman (a.k.a. "-Q-") 1 April 1997 [revision 1]
ddca3f678211f2c19bc5e1b311bd98c57990af0cc318ae592057987884217053
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= COMMUNICATIONS SECURITY OVERVIEW A Non-Technical Discussion of Modern Transmission Methods -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= written by Alan Hoffman ("Q") =============================
b8965cf6bc0079a1e22f4fc2e456dee708c23e03a122b5d443cee7325bc711b8
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- Building a Long Range Directional Listening Device -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- Written by -Q- ==============
0a771903fee58cef28d7f7c93b6425178d97454f5f0034b166d0fb2fd936f8cc
-=-=-=-=-=-=-=-=-=-=-=-=-=- Surveillance & Security Terminology and Definitions Reference File -=-=-=-=-=-=-=-=-=-=-=-=-=- by Alan Hoffman a.k.a -Q- =========================
6f8a4e7f976017dfa73f8d803bcf1cd6bc268f6b7fe68776bd39cf598ec5dbf3
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- RULES FOR INSURING PRIVACY IN AN ORGANIZATION. CONSTANT AWARENESS OF THREATS. -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- Written by: -Q- -=-=-=-=-=-=-=-=-
d443613752dcb13273c45e1063865434bb66090a1ea0bfe2caf4f9abdf453374