Search results

Jump to navigation Jump to search

Page title matches

  • {{ dambigbox| Traffic analysis | Analysis }} '''Traffic analysis''' is a kind of [[signals intelligence]].
    6 KB (943 words) - 05:48, 8 April 2024
  • #Redirect [[Traffic analysis]]
    30 bytes (3 words) - 11:58, 4 June 2008
  • Traffic analysis is a branch of [[signals intelligence]], inferring useful information from
    167 bytes (20 words) - 23:31, 9 November 2011
  • Auto-populated based on [[Special:WhatLinksHere/Traffic analysis]]. Needs checking by a human.
    1 KB (133 words) - 21:04, 11 January 2010

Page text matches

  • {{rpl|Traffic analysis}}
    254 bytes (27 words) - 04:01, 26 September 2013
  • #Redirect [[Traffic analysis]]
    30 bytes (3 words) - 11:58, 4 June 2008
  • Traffic analysis is a branch of [[signals intelligence]], inferring useful information from
    167 bytes (20 words) - 23:31, 9 November 2011
  • {{ dambigbox| Traffic analysis | Analysis }} '''Traffic analysis''' is a kind of [[signals intelligence]].
    6 KB (943 words) - 05:48, 8 April 2024
  • {{r|Traffic analysis}}
    701 bytes (92 words) - 10:46, 5 January 2009
  • ...Canada's [[SIGINT]].various forms of [[signals intelligence]], including [[traffic analysis]] and [[cryptanalysis]]. It has SIGINT collection stations scattered throug
    2 KB (206 words) - 05:48, 8 April 2024
  • Auto-populated based on [[Special:WhatLinksHere/Traffic analysis]]. Needs checking by a human.
    1 KB (133 words) - 21:04, 11 January 2010
  • {{r|Traffic analysis}}
    686 bytes (86 words) - 21:24, 30 November 2013
  • {{r|Traffic analysis}}
    531 bytes (66 words) - 19:06, 14 September 2009
  • ...tion, and of its transmission, must remain secret against the threats of [[traffic analysis]] and [[direction finding]].
    725 bytes (96 words) - 13:27, 30 September 2009
  • {{r|traffic analysis}}
    563 bytes (72 words) - 22:09, 13 June 2008
  • {{r|Traffic analysis}}
    715 bytes (96 words) - 02:45, 25 November 2010
  • {{r|Traffic analysis}}
    715 bytes (85 words) - 20:16, 9 February 2010
  • {{r|Traffic analysis||**}}
    697 bytes (85 words) - 11:30, 27 February 2010
  • {{r|Traffic analysis}}
    751 bytes (97 words) - 17:31, 12 September 2009
  • ...Initially, she was only able to do [[signals intelligence#traffic analysis|traffic analysis]] on the material. ...passing documents to the Soviets. VENONA analysis, probably still through traffic analysis, confirmed her accounts.<ref name=FBIvenona>{{citation
    5 KB (731 words) - 08:11, 4 May 2024
  • {{r|Traffic analysis}}
    896 bytes (110 words) - 18:21, 12 May 2008
  • {{r|Traffic analysis}}
    881 bytes (109 words) - 20:17, 9 February 2010
  • {{r|Traffic analysis}}
    880 bytes (115 words) - 15:55, 11 January 2010
  • {{r|Traffic analysis}}
    888 bytes (121 words) - 11:11, 4 April 2024
  • {{r|Traffic analysis}}
    1 KB (148 words) - 19:44, 6 September 2010
  • ...fic flow confidentiality, also called protection against traffic analysis. Traffic analysis is not always a threat; the relevant security policy must show a need for i
    5 KB (761 words) - 16:22, 30 March 2024
  • {{r|Traffic analysis}}
    1 KB (161 words) - 08:37, 4 May 2024
  • ...ovement information on the Japanese came purely from direction finding and traffic analysis. | title = Radio-traffic analysis' contributions
    6 KB (782 words) - 12:48, 2 April 2024
  • ...them unless he is remarkably good at [[cryptanalysis]]. If the threat is [[traffic analysis]], then neither BTNS nor full IPsec is of much help &mdash; the firewall ca
    3 KB (516 words) - 05:48, 8 April 2024
  • ...e Japanese launched a ground operation to recapture the field, and, from [[traffic analysis]], it was learned that Japanese fleet elements were at sea, perhaps to rein
    2 KB (279 words) - 15:42, 8 April 2024
  • ...ing agencies' big antenna farms out of business, or leave them with only [[traffic analysis]] to go on. That was FreeS/WAN's goal.
    6 KB (914 words) - 05:48, 8 April 2024
  • ...S also obtained valuable intelligence through [[direction finding]] and [[traffic analysis]] by a division called the "Y Service".
    3 KB (353 words) - 05:48, 8 April 2024
  • ...For example, wiretapping an unencrypted line is a passive attack. So is [[traffic analysis]], attempting to infer useful information from the source, destination, tim
    3 KB (440 words) - 05:49, 8 April 2024
  • ...ame=Lee>Lee p. 10-12</ref>. In World War II, the British referred to their traffic analysis function as the "Y service".
    16 KB (2,460 words) - 06:04, 8 April 2024
  • ...Canada's [[SIGINT]].various forms of [[signals intelligence]], including [[traffic analysis]] and [[cryptanalysis]]. It has SIGINT collection stations scattered throug
    8 KB (1,088 words) - 08:11, 4 May 2024
  • ...eiver. There are several reasons for doing this, the most important making traffic analysis difficult or impossible. Indeed, using the technique of '''masking''', the
    12 KB (1,744 words) - 05:48, 8 April 2024
  • Early on, Admiralty dismissal of SIGINT information (also traffic analysis in this instance) contributed to the loss of HMS Glorious|HMS ''Glorious'' ...lysis certainly played a role in dealing with German submarines, HF/DF and traffic analysis were complementary.
    23 KB (3,456 words) - 18:47, 3 April 2024
  • ...have been communicating. More generally, it provides no defense against [[traffic analysis]]. In certain environments (particularly in countries with authoritarian go ...tional security agency &mdash; to track the communication. They might do [[traffic analysis]] to discover everyone that suspect A sends email to. Or they could ask for
    11 KB (1,766 words) - 09:26, 31 October 2015
  • ...he French had identified a number of Viet Minh network and were able to do traffic analysis. They also monitored Nationalist and Communist Chinese, British, Dutch and
    25 KB (3,805 words) - 22:34, 14 June 2009
  • === Traffic analysis === ...and length of messages to derive valuable information; this is known as [[traffic analysis]], and can be quite useful to an alert adversary. Encrypting messages does
    32 KB (4,913 words) - 14:38, 18 March 2024
  • === Traffic analysis === ...and length of messages to derive valuable information; this is known as [[traffic analysis]], and can be quite useful to an alert adversary. Encrypting messages does
    32 KB (4,916 words) - 05:49, 8 April 2024
  • ...en encrypted, SIGINT often involves the use of [[cryptanalysis]]. However, traffic analysis&mdash;the study of who is signalling whom and in what quantity&mdash;can of ===Traffic analysis===
    36 KB (5,247 words) - 05:49, 8 April 2024
  • | title = Identifying MMORPG Bots: A Traffic Analysis Approach
    12 KB (1,816 words) - 16:45, 28 March 2010
  • These protect against traffic analysis and, for transmitting sites, direction finding.
    13 KB (2,000 words) - 16:21, 30 March 2024
  • ...man-in-the-middle attack]]s . Also note that encryption does not prevent [[traffic analysis]]. ''IPsec does not stop traffic analysis'' [[Traffic analysis]] is the attempt to derive intelligence from messages without regard for th
    40 KB (6,219 words) - 05:49, 8 April 2024
  • ...own about the situation? This is the attribute of '''expectability'''. If traffic analysis put the headquarters of a tank unit at a given location, and IMINT revealed In the previous example, the COMINT report has the '''support''' of traffic analysis and IMINT.
    34 KB (5,215 words) - 14:05, 8 August 2010
  • ...contact lists which can be used either for their intelligence value (see [[traffic analysis]]) or to help set up additional attacks such as spear phishing.
    12 KB (1,977 words) - 08:55, 22 April 2024
  • ...fire control radars, and also how to do tactical [[direction finding]], [[traffic analysis]], and field-level [[cryptanalysis]] against opposing ground forces.
    72 KB (10,689 words) - 08:11, 4 May 2024
  • ...not directly send him a covering message. That would tell an enemy doing [[traffic analysis]] at least that A and B were communicating. Instead, she can place a classi
    52 KB (8,332 words) - 05:49, 8 April 2024
  • .... I can be suggested that since the material after the redactions spoke of traffic analysis as more general, the redacted sections dealt with message content intercept ...fire control radars, and also how to do tactical [[direction finding]], [[traffic analysis]], and field-level [[cryptanalysis]] against opposing ground forces.
    74 KB (11,149 words) - 11:11, 4 April 2024
  • ...e Japanese launched a ground operation to recapture the field, and, from [[traffic analysis]], it was learned that Japanese fleet elements were at sea, perhaps to rein
    40 KB (6,361 words) - 05:12, 31 March 2024