Search results
Jump to navigation
Jump to search
- ...des. While it is jam-resistant, it is not encrypted and not authorized for classified information.5 KB (697 words) - 10:44, 22 May 2024
- ...e public perception. Legal means such as [[Non-Disclosure Agreement]]s, [[classified information|information security classification]] (e.g., SECRET), and contract stipulat6 KB (850 words) - 09:34, 7 February 2011
- ...and New Zealand, and allies such as Japan and Singapore. ROE are usually classified information, for the obvious reason that one does want one's enemy to know how far they2 KB (380 words) - 07:36, 18 March 2024
- Above and beyond their regular classified information|security classification systems for military, diplomatic, and intelligence ==Sharing of classified information with other countries==24 KB (3,594 words) - 05:16, 31 March 2024
- ...rast, GIG services tend to run over the some of the networks, of different classified information|security levels, which are overlaid on the shared Defense Information Syste8 KB (1,196 words) - 16:22, 30 March 2024
- ...lationship. For example, general-purpose U.S. military networks that carry classified information, such as [[SIPRNET]] or [[JWICS]], have a reasonable amount of mutual trust3 KB (397 words) - 20:52, 4 November 2008
- ...e used for the most sensitive command and operations information, at the [[classified information|collateral TOP SECRET]] level and above. "Spirit" is an acronym for "Spec7 KB (976 words) - 13:59, 30 May 2024
- While it produces reports at all levels of [[classified information]], it probably publishes more of its analytical output than any world intel14 KB (2,044 words) - 10:34, 12 June 2024
- ...ource intelligence systems at compartmented control system|TOP SECRET/SCI, classified information|SECRET, and unclassified levels.7 KB (1,004 words) - 16:21, 30 March 2024
- ...r weapons. Military units in the field are almost always authorized, by [[classified information|classified]] [[rules of engagement]], to use force in self-defense. There h6 KB (903 words) - 09:38, 28 April 2024
- {{r|Classified information}}3 KB (520 words) - 07:48, 6 June 2024
- ...the Manhattan Project, he learned how to break into filing cabinets where classified information was stored. Although he never took any of the secret documents, he left beh3 KB (482 words) - 12:53, 25 June 2013
- ...e fully prepared to observe the problems of security, to withhold printing classified information." There was a genuine clash here, as Moyar agrees the military did, at time7 KB (1,104 words) - 16:22, 30 March 2024
- * Not advisable for [[classified information|security-classified]] or proprietary files9 KB (1,384 words) - 03:56, 13 September 2009
- ...cks and takes 128, 192 or 256-bit keys. While DES was never intended for [[classified information]], although it was approved for such use in some specific cases, AES, with16 KB (2,456 words) - 05:48, 8 April 2024
- * to protect certain classified information from disclosure under the Freedom of Information Act.6 KB (896 words) - 09:28, 6 July 2023
- ...distant duty for a secret project." Their identities and activities were [[Classified information|very highly classified]], since the slightest leak of information could rui9 KB (1,453 words) - 08:46, 4 May 2024
- ...tamper resistance techniques, and methods of overcoming them, tend to be [[classified information]].9 KB (1,330 words) - 10:44, 22 May 2024
- ...ere valid analogies to [[automatic declassification]] of most government [[classified information]] after a certain period of time.7 KB (1,055 words) - 05:49, 8 April 2024
- ...a, or recording it as a possible new emitter. ELINT data is usually highly classified information, and is protected as such. In the US and its allies, rather confusingly, EL14 KB (2,151 words) - 07:29, 18 March 2024