Search results

Jump to navigation Jump to search
  • ...nded to be separate in the various theaters of the '''Second World War'''. Communications security, on the part of the Allies, was more centralized. Given that there were th ...g in China and Manchuria since the 1930s. They were overconfident in their communications security. <ref name=Kahn1996>{{cite book
    23 KB (3,456 words) - 18:47, 3 April 2024
  • ...formation using simple technology and smart people, as well as sloppy U.S. communications security. <ref name=Fiedler>{{citation | title = Project touchdown: how we paid the price for lack of communications security in Vietnam - A costly lesson
    24 KB (3,782 words) - 01:05, 8 April 2024
  • [[Covert channel]]s are deliberate means to elude communications security<ref>{{cite web
    36 KB (5,247 words) - 05:49, 8 April 2024
  • * [[Communications security/Definition]]
    28 KB (2,875 words) - 16:19, 7 April 2024
  • * [[Communications security/Related Articles]]
    36 KB (4,044 words) - 16:22, 7 April 2024
  • ...the way up to secure mobile communications. In many situations, by adding communications security features to the military sites, a new or upgraded telephone system, includi
    47 KB (7,180 words) - 07:29, 18 March 2024
  • * [[Template:Communications security/Metadata]]
    39 KB (4,231 words) - 05:22, 8 April 2024
  • ...(OPSEC), a counterintelligence function within government that goes beyond communications security. ...cially in a [[compartmented control system]], as used for intelligence and communications security information.
    72 KB (10,689 words) - 08:11, 4 May 2024
  • NSA observed patterns of communications security changes that, when taken together, indicated increased preparedness for som
    35 KB (5,549 words) - 20:45, 2 April 2024
  • ...working for his own Service A, but Service B has somehow managed what, in communications security, is called a man-in-the-middle attack. Service A believes it is in contact
    60 KB (9,516 words) - 04:30, 21 March 2024
  • ...ogress. At least one report reached Churchill. The Germans imposed greater communications security and this source dried up. Remember that the Germans themselves had not dec
    29 KB (4,288 words) - 14:27, 29 March 2024
  • ...d not share a secret key in order to communicate securely. When used for [[communications security#content confidentiality|content confidentiality]], the ''public key'' is ty
    52 KB (8,332 words) - 05:49, 8 April 2024
  • A separate SIGINT and communications security organization, or Service Cryptologic Element (SCE), existed for the US Army ...h service branch for SIGINT is not unheard of; "NSA’s Canadian cousin, the Communications Security Establishment (CSE) relies entirely upon the Canadian Forces Supplementary
    74 KB (11,149 words) - 11:11, 4 April 2024
  • ...the first warning of the actual attack would be exploding bombs. Poor U.S. communications security, as well as Soviet intelligence ships in international waters near the main
    22 KB (3,413 words) - 15:53, 4 April 2024
  • ...lete it unless, in my qualified opinion, it's flatly wrong. In the area of communications security, for example, there are techniques that indeed make no sense in civilian ap
    66 KB (10,879 words) - 17:02, 5 March 2024
View ( | next 50) (20 | 50 | 100 | 250 | 500)