نتایج جستجو برای: espionage
تعداد نتایج: 371 فیلتر نتایج به سال:
The article – on the basis of American official and court documents (relating to four documented cases espionage between 1975 1991) using empirical, quantitative comparative methods for first time comprehensively analyses activities carried out benefit KGB foreign intelligence service by emigrants from USSR who arrived in United States 1971 1984. In addition describing scale peculiarities afore...
The intelligence service is a specialized organization that provides the protection of national security and accomplishment interests. It also an instrument state foreign policy. As such, it always at centre international events. On other hand, modern threats, such as terrorism, organized crime corruption are difficult to overcome without involvement services. They use different measures, metho...
trade secrets has an important role in economic growth and development of economic competition. however ,one of the challenges in this sphere is the emergence of economice spionag. increasing growth of economic espionage causes to emerge a new phenomenon which is called information terrorism. so the mechanism of protection of the trade secretsincivil and criminal law is necessary for economic g...
The United States has moved large portions of business and commerce, including the control of critical infrastructure, onto IP-based networks. This reliance on information systems leaves the U.S. highly exposed and vulnerable to cyberattack. Yet despite this, U.S. law enforcement and national security policy remain firmly focused on building wiretapping systems within communications infrastruct...
DNS tunnels allow circumventing access and security policies in firewalled networks. Such a security breach can be misused for activities like free web browsing, but also for command & control traffic or cyber espionage, thus motivating the search for effective automated DNS tunnel detection techniques. In this paper we develop such a technique, based on the monitoring and analysis of network f...
This fascinating and highly topical subject has a history dating back to the secret world of 1970s Cold War espionage, when the US military and Central intelligence agencies, aided by the latest mainframe systems, were the first to use computer forensics techniques in counterintelligence. In the decades since, cybercrime has emerged from the obscurity of low-level prosecution evidence to become...
Nearly every language contains a term or phrase labeling those youngsters whose actions and styles are sufficiently different as to provoke some suspicion or alarm. Standards for such behavior vary across and within cultures [1] . Though lawbreaking per se is not condoned by middle-class society, the escape of a government espionage agent in the employ of that society is lauded as a major victo...
This paper identifies an intrusion surveillance framework which provides an analyst with the ability to investigate and monitor cyber-attacks in a covert manner. Where cyber-attacks are perpetrated for the purposes of espionage the ability to understand an adversary’s techniques and objectives are an important element in network and computer security. With the appropriate toolset, security inve...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید