Топ-100
  • Titan Rain Titan Rain

    Titan Rain was the designation given by the federal government of the United States to a series of coordinated attacks on American computer systems since 200...

  • Targeted Killings: Law and Morality in an Asymmetrical World Targeted Killings: Law and Morality in an Asymmetrical World

    Targeted Killings: Law and Morality in an Asymmetrical World is a non-fiction compilation book about targeted killing edited by Claire Finkelstein, Jens Davi...

  • Targeted Killing in International Law Targeted Killing in International Law

    Targeted Killing in International Law is a book about the legality of targeted killing, written by Nils Melzer. It was first published by Oxford University P...

  • Targeted killing Targeted killing

    Targeted killing is defined as a form of assassination which is carried out by governments against their perceived enemies. Analysts believe that it is a mod...

  • Stovepiping Stovepiping

    Stovepiping is a metaphorical term which recalls a stovepipes function as an isolated vertical conduit, and has been used, in the context of intelligence, to...

  • Curfew Pass Curfew Pass

    A Curfew Pass or Movement and Curfew Pass is a document issued by an empowered authority such as police or military for public officials or civilians to trav...

  • Soft target Soft target

    A soft target is "a person or thing that is relatively unprotected or vulnerable, especially to military or terrorist attack." Alternatively, a highly defend...

  • Sky marshal Sky marshal

    A sky marshal is a covert law enforcement or counter-terrorist agent on board a commercial aircraft to counter aircraft hijackings. Sky marshals may be provi...

  • Security clearance Security clearance

    A security clearance is a status granted to individuals allowing them access to classified information or to restricted areas, after completion of a thorough...

  • Secret service Secret service

    A secret service is a government agency, intelligence agency, or the activities of a government agency, concerned with the gathering of intelligence data. Th...

  • Secret police Secret police

    Secret police are intelligence, security or police agencies that engage in covert operations against a governments political opponents and dissidents. Secret...

  • Read into Read into

    The process of being read into a compartmented program generally entails being approved for access to particularly sensitive and restricted information about...

  • Postal censorship Postal censorship

    Postal censorship is the inspection or examination of mail, most often by governments. It can include opening, reading and total or selective obliteration of...

  • Peace through strength Peace through strength

    Peace through strength is a phrase which suggests that military power can help preserve peace. It is quite old and has famously been used by many leaders fro...

  • Normandy Format Normandy Format

    The Normandy Format talks involve the representatives of four countries, Germany, Russia, Ukraine and France, who met unformally during the D-Day Celebration...

  • No-hearing hearings No-hearing hearings

    No-Hearing Hearings is the title of a study published by Professor Mark P. Denbeaux of the Center for Policy and Research at Seton Hall University School of ...

  • National Security Committee (Ireland) National Security Committee (Ireland)

    The National Security Committee of Ireland is a secretive inter-departmental committee responsible for ensuring that the Taoiseach and Government of Ireland ...

  • National Agency Check with Local Agency Check and Credit Check National Agency Check with Local Agency Check and Credit Check

    National Agency Check with Local Agency and Credit Checks is a type of background check required in the United States for granting of security clearances. Ac...

  • List of people under Five Eyes surveillance List of people under Five Eyes surveillance

    The "Five Eyes" refers to an alliance comprising Australia, Canada, New Zealand, the United Kingdom and the United States. These countries are bound by the m...

  • Lawfare Lawfare

    Lawfare is the misuse of legal systems and principles against an enemy, such as by damaging or delegitimizing them, tying up their time or winning a public r...

  • Internal Security Service Internal Security Service

    Internal Security Service transliterated: Jahaz al Amn al Dakhly, is the national security agency of the Sultanate of Oman. The agency focuses solely upon do...

  • Information sensitivity Information sensitivity

    Information sensitivity is the control of access to information or knowledge that might result in loss of an advantage or level of security if disclosed to o...

  • High policing High policing

    High policing is a form of intelligence-led policing that serves to protect the national government or a conglomerate of national governments from internal t...

  • List of government mass surveillance projects List of government mass surveillance projects

    Schengen Information System: A database kept for national security and law enforcement purposes. INDECT: Research project funded by the European Union to dev...

  • Global surveillance Global surveillance

    Global mass surveillance refers to the mass surveillance of entire populations across national borders. Its roots can be traced back to the middle of the 20t...

  • Five Eyes Five Eyes

    The Five Eyes is an anglophone intelligence alliance comprising Australia, Canada, New Zealand, the United Kingdom and the United States. These countries are...

  • Environmental security Environmental security

    Environmental security examines threats posed by environmental events and trends to individuals, communities or nations. It may focus on the impact of human ...

  • Economics of defense Economics of defense

    The economics of defense or defense economics is a subfield of economics, an application of the economic theory to the issues of military defense. It is a re...

  • E-QIP E-QIP

    e-QIP is a secure website managed by OPM that is designed to automate the common security questionnaires used to process federal background investigations. e...

  • Domain Based Security Domain Based Security

    "Domain Based Security", abbreviated to "DBSy", is a model-based approach to help analyse information security risks in a business context and provide a clea...

  • Death squad Death squad

    A death squad is an armed group that conducts extrajudicial killings or forced disappearances of persons for the purposes such as political repression, assas...

  • De-escalation De-escalation

    De-escalation refers to behavior that is intended to escape escalations of conflicts. It may also refer to approaches in conflict resolution. Escalations of ...

  • Cyberwarfare Cyberwarfare

    Cyberwarfare is the use of technology to attack a nation, causing comparable harm to actual warfare. There is significant debate among experts regarding the ...

  • Cyber-collection Cyber-collection

    Cyber-collection refers to the use of cyber-warfare techniques in order to conduct espionage. Cyber-collection activities typically rely on the insertion of ...

  • Cyber spying Cyber spying

    Cyber spying, or cyber espionage, is the act or practice of obtaining secrets and information without the permission and knowledge of the holder of the infor...

  • Curfew bell Curfew bell

    The curfew bell was a bell rung in the evening in Medieval England as the curfew signal for everyone to go to bed. A bell was rung usually around eight ocloc...

  • Curfew Curfew

    A Curfew is an order specifying a time during which certain regulations apply. Typically it refers to the time when individuals are required to return to and...

  • Counter-terrorism Counter-terrorism

    Counter-terrorism, also known as antiterrorism, incorporates the practice, military tactics, techniques, and strategy that government, military, law enforcem...

  • Climate security Climate security

    Climate-related security risks have far-reaching implications for the way the world manages peace and security. Climate security is a concept that summons th...

  • Advance Passenger Information System Advance Passenger Information System

    Advance Passenger Information System or APIS is an electronic data interchange system established by the U.S. Customs and Border Protection, APIS governs the...

  • Security agency Security agency

    A security agency is a governmental organization which conducts intelligence activities for the internal security of a nation. They are the domestic cousins ...

  • National security National security

    National security or national defense is the security and defense of a nation state, including its citizens, economy, and institutions, which is regarded as ...

National security

National security or national defense is the security and defense of a nation state, including its citizens, economy, and institutions, which is regarded
National security directives are presidential directives issued for the National Security Council NSC Starting with Harry Truman, every president since
The Assistant to the President for National Security Affairs APNSA commonly referred to as the National Security Advisor NSA or at times informally
National security of the United States is a collective term encompassing the policies of both U.S. national defense and foreign relations. Measures taken
reference of the National Security Council are to consider matters relating to national security foreign policy, defence, cyber security resilience, energy
House National Security Council NSC is the principal forum used by the President of the United States for consideration of national security military
The National Security Council NSC Chinese: 國家安全會議 pinyin: Guojiā Ᾱnquan Huìyì Pe h - ōe - jī: Kok - ka An - choan Hōe - gī is an organ of the Republic of China
Supreme National Security Council SNSC Persian: شورای عالی امنیت ملی Showrāye Āliye Amniyate Mellī is the national security council of the Islamic
The National Security Advisor NSA ISO: Rāstrīya Suraksā Salāhkār is the senior official on the National Security Council of India, and the chief adviser
The Afghan National Security Forces ANSF also known as the Afghan National Defense and Security Forces ANDSF consist of: Afghan Armed Forces Afghan
A National Security Council NSC is usually an executive branch governmental body responsible for coordinating policy on national security issues and

considering national security and foreign policy matters with the senior national security advisers and Cabinet ministers. The idea and inception of National Security
The National Security Archive is a 501 c 3 non - governmental, non - profit research and archival institution located on the campus of the George Washington
This article is about the National security of China. It includes the coordination of a variety of organizations, including law enforcement, military
security councils. National Security Advisor Afghanistan National Security Adviser Australia National Security Advisor Canada National Security
The National Security Agency NSA is a national - level intelligence agency of the United States Department of Defense, under the authority of the Director
The National Security Council NSC IAST: Rāstrīya Suraksā Parisad of India is an executive government agency tasked with advising the Prime Minister s
field of national security and is the staff forum on national security for the Israeli Prime Minister and Government. However, national security decisions
Deputy National Security Advisor is a member of the Executive Office of the President of the United States and the United States National Security Council
The National Security Committee NSC of Ireland is a secretive inter - departmental committee responsible for ensuring that the Taoiseach Prime Minister
A National Special Security Event NSSE is an event of national or international significance deemed by the United States Department of Homeland Security
The National Nuclear Security Administration NNSA is a United States federal agency responsible for safeguarding national security through the military
Commander - in - chief for consideration of national security military, and foreign policy matters with senior national security officials, and for coordinating

The Azerbaijan Ministry of National Security MNS, Azerbaijani: Milli Təhlukəsizlik Nazirliyi was an intelligence agency within the cabinet of Azerbaijan
The Director of the National Security Agency DIRNSA is the highest - ranking official of the National Security Agency, which is a Defense Agency within
The Central National Security Commission abbreviated CNSC Chinese: 中央国家安全委员会 pinyin: Zhōngyāng Guojiā ānquan Weiyuanhuì of the Communist Party of
A national security letter NSL is an administrative subpoena issued by the United States government to gather information for national security purposes
The Ministry for National Security or MNB Turkmen: Turkmenistanyn Milli howpsuzlyk ministrilgi is the secret police agency for the government of Turkmenistan
Commission on National Security 21st Century USCNS 21 also known as the Hart - Rudman Commission or Hart - Rudman Task Force on Homeland Security was chartered
The Cabinet Committee on National Security CCNS or C2NS previously known as the Defence Committee of Cabinet, is the principal federal institution

National security

National security or national defense is the security and defense of a nation state, including its citizens, economy, and institutions, which is regarded as ...

Security agency

A security agency is a governmental organization which conducts intelligence activities for the internal security of a nation. They are the domestic cousins ...

Advance Passenger Information System

Advance Passenger Information System or APIS is an electronic data interchange system established by the U.S. Customs and Border Protection, APIS governs the...

Climate security

Climate-related security risks have far-reaching implications for the way the world manages peace and security. Climate security is a concept that summons th...

Compartmentalization (information security)

Compartmentalization, in information security, whether public or private, is the limiting of access to information to persons or other entities on a need-to-...

Counter-terrorism

Counter-terrorism, also known as antiterrorism, incorporates the practice, military tactics, techniques, and strategy that government, military, law enforcem...

Curfew

A Curfew is an order specifying a time during which certain regulations apply. Typically it refers to the time when individuals are required to return to and...

Curfew bell

The curfew bell was a bell rung in the evening in Medieval England as the curfew signal for everyone to go to bed. A bell was rung usually around eight ocloc...

Cyber resilience

Cyber resilience refers to an entitys ability to continuously deliver the intended outcome despite adverse cyber events. Cyber resilience is an evolving pers...

Cyber sovereignty

Cyber sovereignty is a phrase used in the field of Internet governance to describe governments desire to exercise control over the Internet within their own ...

Cyber spying

Cyber spying, or cyber espionage, is the act or practice of obtaining secrets and information without the permission and knowledge of the holder of the infor...

Cyber spying on universities

Cyber spying on universities is the practice of obtaining secrets and information without the permission and knowledge of the university through its informat...

Cyber-collection

Cyber-collection refers to the use of cyber-warfare techniques in order to conduct espionage. Cyber-collection activities typically rely on the insertion of ...

Cyberwarfare

Cyberwarfare is the use of technology to attack a nation, causing comparable harm to actual warfare. There is significant debate among experts regarding the ...

D-Day Daily Telegraph crossword security alarm

In 1944, codenames related to the D-Day plans appeared as solutions in crosswords in the British newspaper, The Daily Telegraph, which the British Secret Ser...

De-escalation

De-escalation refers to behavior that is intended to escape escalations of conflicts. It may also refer to approaches in conflict resolution. Escalations of ...

Death squad

A death squad is an armed group that conducts extrajudicial killings or forced disappearances of persons for the purposes such as political repression, assas...

Domain Based Security

"Domain Based Security", abbreviated to "DBSy", is a model-based approach to help analyse information security risks in a business context and provide a clea...

E-QIP

e-QIP is a secure website managed by OPM that is designed to automate the common security questionnaires used to process federal background investigations. e...

Economics of defense

The economics of defense or defense economics is a subfield of economics, an application of the economic theory to the issues of military defense. It is a re...

Elements of national security

National security has a number of component elements which, when individually satisfied, provide a nation with security of its values, interests and freedom ...

Environmental security

Environmental security examines threats posed by environmental events and trends to individuals, communities or nations. It may focus on the impact of human ...

Failure in the intelligence cycle

For the album see Intelligence Failure Failure in the intelligence cycle or intelligence failure, is the outcome of the inadequacies within the intelligence ...

Five Eyes

The Five Eyes is an anglophone intelligence alliance comprising Australia, Canada, New Zealand, the United Kingdom and the United States. These countries are...

Ghost detainee

Ghost detainee is a term used in the executive branch of the United States government to designate a person held in a detention center, whose identity has be...

Global surveillance

Global mass surveillance refers to the mass surveillance of entire populations across national borders. Its roots can be traced back to the middle of the 20t...

List of government mass surveillance projects

Schengen Information System: A database kept for national security and law enforcement purposes. INDECT: Research project funded by the European Union to dev...

Greek wiretapping case 2004–05

The Greek wiretapping case of 2004-2005, also referred to as Greek Watergate, involved the illegal tapping of more than 100 mobile phones on the Vodafone Gre...

High policing

High policing is a form of intelligence-led policing that serves to protect the national government or a conglomerate of national governments from internal t...

Information Security Automation Program

The Information Security Automation Program is a U.S. government multi-agency initiative to enable automation and standardization of technical security opera...

Information sensitivity

Information sensitivity is the control of access to information or knowledge that might result in loss of an advantage or level of security if disclosed to o...

Internal Security Service

Internal Security Service transliterated: Jahaz al Amn al Dakhly, is the national security agency of the Sultanate of Oman. The agency focuses solely upon do...

International trade and state security

International economic structures range from complete autarky to complete market openness. This structure has undergone numerous changes since the beginning ...

Lawfare

Lawfare is the misuse of legal systems and principles against an enemy, such as by damaging or delegitimizing them, tying up their time or winning a public r...

List of people under Five Eyes surveillance

The "Five Eyes" refers to an alliance comprising Australia, Canada, New Zealand, the United Kingdom and the United States. These countries are bound by the m...

National Agency Check with Local Agency Check and Credit Check

National Agency Check with Local Agency and Credit Checks is a type of background check required in the United States for granting of security clearances. Ac...

National Security Committee (Ireland)

The National Security Committee of Ireland is a secretive inter-departmental committee responsible for ensuring that the Taoiseach and Government of Ireland ...

National Security Whistleblowers Coalition

The National Security Whistleblowers Coalition, founded in 2004 by former FBI translator Sibel Edmonds in league with over 50 former and current United State...

No-hearing hearings

No-Hearing Hearings is the title of a study published by Professor Mark P. Denbeaux of the Center for Policy and Research at Seton Hall University School of ...

Normandy Format

The Normandy Format talks involve the representatives of four countries, Germany, Russia, Ukraine and France, who met unformally during the D-Day Celebration...

Patriotic hacking

Patriotic hacking is a term for computer hacking or system cracking in which citizens or supporters of a country, traditionally industrialized Western countr...

Peace through strength

Peace through strength is a phrase which suggests that military power can help preserve peace. It is quite old and has famously been used by many leaders fro...

Phone surveillance

Phone surveillance is the act of performing surveillance on phone conversations, location tracking and data monitoring of a phone. Before the era of mobile p...

Postal censorship

Postal censorship is the inspection or examination of mail, most often by governments. It can include opening, reading and total or selective obliteration of...

Potentially dangerous taxpayer

Potentially Dangerous Taxpayer is a government designation assigned by the Internal Revenue Service to taxpayers of the United States of America whom IRS off...

Proactive cyber defence

Strategically, cyber defence refers to operations that are conducted in the cyber domain in support of mission objectives. To help understand the practical d...

Read into

The process of being read into a compartmented program generally entails being approved for access to particularly sensitive and restricted information about...

Secret police

Secret police are intelligence, security or police agencies that engage in covert operations against a governments political opponents and dissidents. Secret...

Secret service

A secret service is a government agency, intelligence agency, or the activities of a government agency, concerned with the gathering of intelligence data. Th...

Security clearance

A security clearance is a status granted to individuals allowing them access to classified information or to restricted areas, after completion of a thorough...

Security dilemma

The security dilemma, also referred to as the spiral model, is a term used in international relations and refers to a situation in which, under anarchy, acti...

Single Scope Background Investigation

A Single Scope Background Investigation is a type of United States security clearance investigation required for Top Secret, SCI Q access and TOP SECRET-leve...

Sky marshal

A sky marshal is a covert law enforcement or counter-terrorist agent on board a commercial aircraft to counter aircraft hijackings. Sky marshals may be provi...

Soft target

A soft target is "a person or thing that is relatively unprotected or vulnerable, especially to military or terrorist attack." Alternatively, a highly defend...

Special Intelligence Department

The Special Intelligence Department is headed by the Police Brigadier Generals of the Republic of the Union of Myanmar. Their job is to issue passports, to c...

Standard Form 86

Standard Form 86 is a United States form that individuals complete in order for the government to collect information for "conducting background investigatio...

Curfew Pass

A Curfew Pass or Movement and Curfew Pass is a document issued by an empowered authority such as police or military for public officials or civilians to trav...

Stovepiping

Stovepiping is a metaphorical term which recalls a stovepipes function as an isolated vertical conduit, and has been used, in the context of intelligence, to...

Synthetic Environment for Analysis and Simulations

Purdue Universitys Synthetic Environment for Analysis and Simulations, or SEAS, is currently being used by Homeland Security and the US Defense Department to...

Targeted killing

Targeted killing is defined as a form of assassination which is carried out by governments against their perceived enemies. Analysts believe that it is a mod...

Targeted Killing in International Law

Targeted Killing in International Law is a book about the legality of targeted killing, written by Nils Melzer. It was first published by Oxford University P...

Targeted Killings: Law and Morality in an Asymmetrical World

Targeted Killings: Law and Morality in an Asymmetrical World is a non-fiction compilation book about targeted killing edited by Claire Finkelstein, Jens Davi...

Titan Rain

Titan Rain was the designation given by the federal government of the United States to a series of coordinated attacks on American computer systems since 200...

UN Counter-Terrorism Implementation Task Force

The UN Counter-Terrorism Implementation Task Force is an instrument designed to roll out the UN Global Counter-Terrorism Strategy. Since its formation in 200...