Wireless networks: current status and prospects.
Wireless Networks: CURRENT STATE AND PROSPECTS RadioEthernet wireless network equipment is becoming increasingly widespread in Russia and the CIS countries for organizing local networks, connecting to the Internet and connecting…
Wireless communications
The world is so arranged that any technical invention of the human mind that expands our capabilities and creates additional comfort for us inevitably contains negative aspects that can pose…
The latest in wireless technology.
Wireless technologies of the last inch. UKOV Vyacheslav Sergeevich, Candidate of Technical Sciences PONOMAREV Andrey Alekseevich The problem of the so-called “last mile” in information transmission systems has long attracted…
Local Area Network Security
It is extremely important to understand that security is not a product that you can buy in a store and be confident in your own protection. «Security» is a special…
Security of fiber optic cable systems.
When network system providers are asked about possible solutions, they briskly answer: «If you need security, use fiber optics.» At first glance, everything is obvious. Fiber optics are ordinary glass…
Cell phone blocker RS Jammer.
RS jammer cell phone blocker. RS jammer cell phone blocker RS jammer cell phone blocker Potentially, a cell phone is a ready-made eavesdropping device that transmits information via a…
Bulletproof vests. Protection classes. GOST, DIN, NIJ, CEN..
Body armor. Protection classes. GOST, DIN, NIJ, CEN. Source: NPO Special Materials GOST, DIN, NIJ, CEN Ballistic requirements for body armor for the armed forces and police are mainly established…
Bulletproof vest, its purpose and capabilities.
Body armor, its purpose and capabilities. This popular product has saved more than one thousand human lives, but it has also killed many people who believed in the miraculous invulnerability…
Paper for secret documents with security marks and the method of its production.
Paper for secret documents with security marks and the method of its manufacture. Paper for secret documents with security marks and the method of its manufacture. Patent. 2705107 France, IPC…
CDMA without secrets.
CDMA without secrets. CDMA without secrets CDMA without secrets There is an opinion among communications specialists that the «era of great radio engineering discoveries» ended happily a hundred years ago.…
Prices, availability and purchasing procedures for Kaiser products.
Prices, availability and procedure for purchasing Kaiser products. Kaiser Product Pricing, Availability, and Purchase Procedures Seller Granit Island Group, Manufacturer Martin L. Keiser, Inc. James M. Atkinson, Granite Island Group…
Frequency distribution for Moscow.
Frequency distribution in Moscow. 1. RADIO STATIONS AND TELEVISION
What is a vocoder and lipreader?
What is a vocoder and a lipreader? What is a vocoder and a lipreader? What is a vocoder and a lipreader? Proceedings of the 2nd All-Russian Conference «Theory and Practice…
Digital processing of images of dynamic spectrograms of audio signals in problems of voice communication security.
Digital processing of images of dynamic spectrograms of audio signals in the problems of voice communication security.. Digital processing of images of dynamic spectrograms of audio signals in the problems…
Computer equipment. Protection from unauthorized access to information.
Computer equipment. Protection against unauthorized access to information. Indicators of protection against unauthorized access to information. Guidance document. This Guidance document establishes the classification of computer equipment by the level…
Further development of technologies for searching for explosives and explosive objects in open areas, transport facilities and transport infrastructure.
Further development of technologies for searching explosives and explosive objects in open areas, transport facilities and transport infrastructure. Further development of technologies for searching explosives and explosive objects in open…
Security alarm sensors
#alarm Sensors are the main component of the security alarm system and largely determine the reliability of the entire system. An analysis of the range of security alarm sensors offered…
Delta Telecom has implemented SIS.
Delta Telecom has implemented SIS. Delta Telecom has implemented SIS «Delta Telecom» has implemented SIS Delta Telecom is the first cellular company in the world operating according to the NMT…
Explosives Detectors. Summary Table..
Explosives detectors. Summary table.. Explosives detectors. Summary table. Explosives detectors. Summary table. Item No. Name, manufacturer Detectable substances, sensitivity Note 1 EVD-3000, IDS Most military and civilian explosives (C-4,…
The lie detector is not about technology.
A lie detector is not about technology. A lie detector is not about technology. A lie detector is not about technology. Alexander Strunin Nowadays, not only the level of…
Itemiser Contraband Detector Explosives and Drugs Detector.
Itemiser Contraband Detector, an explosive and drug detector. Itemiser Contraband Detector, an explosive and drug detector. Aviation Week & Space Technology.- 1996 .- 145, No. 5 — P. 66. Itemiser…
DMR is a new radio communication standard.
DMR is a new radio communication standard. DMR is a new radio communication standard. CHIVILEV Sergey Vladimirovich, Candidate of Technical Sciences DMR is a new radio communication standard. Source: «Special…
US Dollars..
US dollars.. US dollars. US dollars. Shaposhnikov Yu.I. Source: US dollars are the currency of the United States of America and are non-convertible US treasury notes. The first US bank…
Inspection system for detection of explosives and narcotics.
Inspection system for detecting explosives and narcotics. In recent years, there has been a continuous increase in the use of explosives (HE) and drug smuggling by terrorists and other criminal…
Soul in computer networks.
Soul in computer networks. Soul in computer networks «Soul in computer networks» Komsomolskaya Pravda, No. 182 10/06/1995 For the first time in the history of mankind, it has become possible…
Economic security — in the hands of professionals.
Put economic security in the hands of professionals. Put economic security in the hands of professionals Put economic security in the hands of professionals The 1990s have shown that force…
Shielding of electromagnetic waves.
Shielding of electromagnetic waves. Shielding of electromagnetic waves Shielding of electromagnetic waves Shielding of electromagnetic waves is the basis of environmental safety and one of the most effective means of…
Expert practice..
Expert practice.. Expert practice. Expert practice Forensic examination of sound recordings. Experts: Ivanov I.L., Popova A.R. Characteristic questions of the examination: 1. Was the phonogram presented for…
Expert study of the GSM format.
Expert examination of the GSM format. Expert examination of the GSM format. Expert examination of the GSM format. Examination of phonograms for the presence/absence of signs of editing or changes…
Expert study of the parameters of the distribution of the CHOT.
Expert study of the parameters of the distribution of the NFC. Expert study of the parameters of the distribution of the NFC Expert study of the parameters of the distribution…
Express analysis of the authenticity of special and excise stamps of the 2006 model.
Express analysis of the authenticity of special and excise stamps of the 2006 model. Express analysis of the authenticity of special and excise stamps of the 2006 model. Express analysis…
Electronic identification methods.
Electronic identification methods. Electronic identification methods. Electronic identification methods. Electronic methods of human identification, used in systems for ensuring authorized access to protected areas of the territory, as well as…
The Era of Night Warfare. Review of the International Market of Night Vision Devices.
The era of night warfare. Review of the international market of night vision devices.. The era of night warfare. Review of the international market of night vision devices. Salikov Vyacheslav…
More about the eight-story microphone.
More about the eight-story microphone. More about the eight-story microphone More about the «eight-story microphone». The article «The story of the «eight-story microphone». Fiction or reality» contains a number of…
Once again about “steganography” – the most modern of the ancient sciences.
Once again about “steganography” – the most modern of the ancient sciences.. Once again about “steganography” – the most modern of the ancient sciences. UKOV Vyacheslav Sergeevich, Candidate of Technical…
Federal Law on Operational Investigative Activities No. 144-F3.
Federal Law on Operational — Investigative Activities N 144-F3. Federal Law on Operational — Investigative Activities N 144-F3 RUSSIAN FEDERATION FEDERAL LAW ON OPERATIONAL — SEARCH ACTIVITIES» N 144-FZ Adopted…
Federal Law of 10.01.96 N 5-FZ On Foreign Intelligence.
Federal Law of 10.01.96 N 5-FZ On Foreign Intelligence. Federal Law of 10.01.96 N 5-FZ On Foreign Intelligence FEDERAL LAW OF 10.01.96 N 5-FZ » ON FOREIGN INTELLIGENCE « Article…
Federal Law of February 20, 1995 N 24-FZ On information, informatization and information protection.
Federal Law of February 20, 1995 N 24-FZ On information, informatization and information protection. Federal Law of February 20, 1995 N 24-FZ On Information, Informatization, and Information Protection Federal Law…
Federal Law of the Russian Federation «On Communications». Part 1
Federal Law of the Russian Federation «On Communications». RUSSIAN FEDERATION FEDERAL LAW N 15-FZ «On Communications» Adopted by the State Duma on January 20, 1995 This Federal Law establishes…
Photo camera of the rolling of Alycha.
Camera rolling Cherry plum. Camera rolling cherry plum Camera rolling «Cherry plum& #187; 1959 — 60 In the 50s, one of the most original Soviet cameras, the «Alycha», was developed…
Functional capabilities of the FPSU-IP complexes.
Functional capabilities of the FPSU-IP complexes. Functional capabilities of the FPSU-IP complexes Functional capabilities of the FPSU-IP complexes The main functional capabilities of the FPSU-1R complexes are: • filtering IP…
Minotaur is a flexible, scalable security system for personal computers.
Flexible scalable Minotaur security system for personal computers. Flexible scalable Minotaur security system for personal computers. Signal- 1995 .-50, №2-P. 29-31 Flexible scalable Minotaur security system for personal computers Developed…
ANTHEM OF THE EXPLOSIVE EXPERTS.
ANTHEM OF EXPLOSIVE EXPERTS. EXPLOSION EXPERTS' ANTHEM Words by A.Yu. Semenov EXPLOSION EXPERTS' ANTHEM Here's a grenade lying on the table, We need to disassemble it, But we want to…
State Standard of the Russian Federation. GOST No. 34.11-94
State Standard of the Russian Federation. GOST No. 34.11-94 Information technology. Cryptographic protection of information. Caching function. STATE STANDARD OF THE RUSSIAN FEDERATION GOST No. 34.11-94 Information technology. Cryptographic protection…
State Standard of the Russian Federation. GOST No. 50739-95 Computer equipment.
State Standard of the Russian Federation. GOST No. 50739-95 Computer equipment. Protection against unauthorized access to information. General technical requirements. Date of introduction 01/01/96 KGS code P85 OKSTU code 4002…
State Standard of the USSR GOST 28147-89
USSR State Standard GOST 28147-89 Information processing systems. Cryptographic protection. Cryptographic transformation algorithm. Date of entry into force 07/01/90 KGS code: П85 OKSTU code: 5017 GRNTI rubricator index: 500509 OKS…
State Standard of the USSR GOST No. 3410-94
USSR State Standard GOST No. 3410-94. Information technology. Cryptographic protection of information. Procedures for generating and verifying an electronic digital signature based on an asymmetric cryptographic algorithm. STATE STANDARD OF…
GSM: the security of your information.
GSM: the security of your information. GSM: the security of your information GSM: the security of your information Customers can rest assured that the security mechanisms adopted in the GSM…
State Customs Committee under the President of the Russian Federation. Regulations on the state system of information protection in the Russian Federation from foreign technical intelligence services and from its leakage through technical channels.
State Customs Committee under the President of the Russian Federation. Regulations On the state system of information protection in the Russian Federation from foreign technical intelligence services and from its…
IDENTIFICATION, AUTHENTICATION…LOYALTY!..
IDENTIFICATION, AUTHENTICATION…LOYALTY!.. IDENTIFICATION, AUTHENTICATION…LOYALTY!. IVANOV Vitaly Viktorovich IDENTIFICATION, AUTHENTICATION…LOYALTY! The work examines one of the promising areas of development of access control systems, related to checking the loyalty of enterprise…
Identification of users of computing systems.
Identification of users of computing systems. Identification of users of computing systems Identification of users of computing systems based on modern speech technologies In connection with the increased informatization of…
Means of indicating narcotic substances.
Narcotic substance indicator devices. The fight against illegal drug trafficking (sometimes abbreviated as «NV») has recently rapidly transformed from a social and public problem into a problem of ensuring the…
Inductive devices for organizing hidden radio communications.
Inductive devices for organizing covert radio communications.. Inductive devices for organizing covert radio communications. Ovchinnikov Andrey Mikhailovich, Archagov Oleg Igorevich INDUCTIVE DEVICES FOR ORGANIZING COVERT RADIO COMMUNICATION In the practice…
Information letter on conducting psycho-physiological examinations.
Information letter On conducting psycho-physiological examinations. Information letter On conducting psycho-physiological examinations. Moscow City Prosecutor's Office INFORMATION LETTER “On conducting psycho-physiological examinations” The intensification of the fight against crime, as…
Infrared laser spotlights.
Infrared laser projectors. ARKHUTIK Stepan Trofimovich, VOLKOV Viktor Genrikhovich, Candidate of Technical Sciences, Associate Professor KOZLOV Konstantin Valerievich SALIKOV Vyacheslav Lvovich UKRAINSKY Sergey Alekseevich INFRARED LASER PROJECTORS The night vision…
Tools for carrying out attacks on Microsoft OS.
Tools for carrying out attacks on Microsoft OS. Tools for carrying out attacks on Microsoft OS Tools for carrying out attacks on Microsoft OS This work is an attempt to…
Internet telephony.
Internet telephony. Internet telephony Internet telephony Over the past few years, the world has seen a rapid increase in the number of Internet users. Its popularity is due to a…
USE OF WIRELESS COMMUNICATION IN GEOGRAPHICALLY DISTRIBUTED SYSTEMS FOR COLLECTING AND PROCESSING INFORMATION.
USE OF WIRELESS COMMUNICATION IN GEOGRAPHICALLY DISTRIBUTED SYSTEMS OF INFORMATION COLLECTION AND PROCESSING.. USE OF WIRELESS COMMUNICATION IN GEOGRAPHICALLY DISTRIBUTED SYSTEMS OF INFORMATION COLLECTION AND PROCESSING. IVANOV Vitaly Viktorovich USE…
Using digital watermarks to combat insiders.
Using digital watermarks to combat insiders. Using digital watermarks to combat insiders TERENIN Aleksey Alekseevich, Candidate of Technical Sciences MELNIKOV Yury Nikolaevich, Doctor of Technical Sciences, Professor POGULYAYEV Vadim Vladimirovich…
Using a mobile NQR detector with a mini-helicopter.
Using a mobile NQR detector with a mini-helicopter.. Using a mobile NQR detector with a mini-helicopter. GRECHISHKIN Vadim Sergeevich, Doctor of Physical and Mathematical Sciences, Professor USE OF A MOBILE…
Using backscattered ionizing radiation to control objects.
Using backscattered ionizing radiation to monitor objects. Boris Aleksandrovich Vandyshev, Candidate of Technical Sciences USE OF BACKSCATTERED IONIZING RADIATION TO MONITOR OBJECTS The article discusses some types of inspection equipment,…
Use of the polygraph in the interests of the state and commercial security.
Using a polygraph in the interests of the state and commercial security. (based on publications by Yu.I.Kholodny, V.V.Korovina, V.A.Varlamov, O.V.Belyushina, A.A.Stepanov and others) Polygraph (lie detector). History and modern times.…
The Use of the Polygraph in the Interests of U.S. Commercial Security.
#Polygraph Using the Polygraph in the Interests of US Commercial Security. Michael Allenson Lafayette Inst. I would like to briefly discuss how the polygraph has been used for commercial security…
Use of the polygraph in Russia.
#Polygraph Use of polygraph in Russia. V. M. Gladyshev, Head of the Federal Center of the FSB of Russia for Licensing and Protection of State Secrets A. V. Fesenko, Doctor…
Using radio monitoring to identify threats.
Using radio monitoring to identify threats. Vorobyov Sergey Viktorovich USE OF RADIO MONITORING TO IDENTIFY THREAT The article discusses the use of radio monitoring to detect the preparation of a…
Using radio-absorbing materials to protect ground penetrating radar from electromagnetic interference.
Using radio-absorbing materials to protect ground penetrating radar from electromagnetic interference.. Using radio-absorbing materials to protect ground penetrating radar from electromagnetic interference. GORBATENKO Olga Nikolaevna, BIBIKOV Sergey Borisovich, Candidate of…
Examination of phonograms for the presence/absence of signs of editing as a task of expert diagnostics.
Examination of phonograms for the presence/absence of signs of editing as a task of expert diagnostics. Examination of phonograms for the presence/absence of signs of editing as a task of…
Study of the continuity of the harmonic phase at the Nyquist frequency, search for stable features of digital voice recorders.
Study of the continuity of the phase of harmonics at the Nyquist frequency, search for stable features of digital voice recorders.. Study of the continuity of the phase of harmonics…
Study of the tactical and technical characteristics of the walk-through multi-zone metal detector Intelliscan 12000.
Study of the tactical and technical characteristics of the Intelliscan 12000 walk-through multi-zone metal detector. Study of the tactical and technical characteristics of the Intelliscan 12000 walk-through multi-zone metal detector.…
Study of the tactical and technical characteristics of the programmable metal detector PMD 1.
Study of the tactical and technical characteristics of the programmable metal detector PMD 1. Study of the tactical and technical characteristics of the programmable metal detector PMD 1 Material received…
Study of tactical and technical characteristics of the Metor-200 walk-through multi-zone metal detector.
Study of the tactical and technical characteristics of the Metor-200 walk-through multi-zone metal detector. Study of the tactical and technical characteristics of the Metor-200 walk-through multi-zone metal detector Material received…
Study of the tactical and technical characteristics of the Shakhta-U selective weapon detector.
Study of the tactical and technical characteristics of the Shakhta-U selective weapon detector. Study of the tactical and technical characteristics of the Shakhta-U selective weapon detector Material received in April…
Power supplies for radio monitoring equipment.
Power supplies for radio monitoring equipment.. Power supplies for radio monitoring equipment. BELYAKOV Andrey Leonidovich, GLADKIKH Aleksandr Viktorovich POWER SUPPLIES FOR RADIO CONTROL EQUIPMENT The options for power supply…
History of microdot
#microdot Vadim Antonovich Shelkov HISTORY OF «MICRODOTS» I would like to express my sincere gratitude to Keith Melton, the creator and curator of the “Museum of the History of Spy Equipment”…
Results of the 15th anniversary of the legalization of the polygraph in Russia and current tasks for the near future.
Results of the 15th anniversary of the legalization of the polygraph in Russia and urgent tasks for the near future. Kholodny Yu.I., Doctor of Law, Candidate of Psychological Sciences, Professor,…
Products of JSC Krasnogorsk Plant named after A.S. Zverev
Products of OJSC Krasnogorsk Plant named after A.S. Zvereva NIGHT SIGHTS «ZENIT NV-100», «ZENIT -100-1», «ZENIT NV-100-3» SET «ZENIT NV-100 -Z-FS» NIGHT SIGHT «ZENIT NV-500» NIGHT SIGHT «ZENIT NV-1000» ILLUMINATION…
CHANGING THE NATURE OF TERRORISM AND THE PROBLEMS OF LAW ENFORCEMENT MANAGEMENT IN THE FIGHT AGAINST ILLEGAL ARMED GROUPS IN THE CHECHEN REPUBLIC.
CHANGING THE NATURE OF TERRORISM AND PROBLEMS OF LAW ENFORCEMENT MANAGEMENT IN THE FIGHT AGAINST ILLEGAL ARMED FORMATIONS IN THE CHECHEN REPUBLIC. CHANGING THE NATURE OF TERRORISM AND PROBLEMS OF…
How to identify counterfeit dollars.
How to identify counterfeit dollars. There are special detectors in exchange offices and banks that use infrared and magnetic radiation to determine the authenticity of American currency. But those who…
How to organize a business intelligence service.
How to organize a business intelligence service. How to organize a business intelligence service HOW TO ORGANIZE A BUSINESS INTELLIGENCE SERVICE Boris Liflyandchik, Nikolay Likhodeyev candidates of physical and mathematical…
How to behave if you suspect that you have been bookmarked.
How to behave if you suspect that you have been bookmarked. How to behave if you suspect that you have been bookmarked James M. Atkinson, Granite Island Group How to…
How to order TSCM inspection.
How to order a TSCM inspection. How to order a TSCM inspection. James M. Atkinson, Granite Island Group How to order a TSCM inspection. Remember that there are only six…
Catalogue of the company AUDIOTEL.
AUDIOTEL company catalog. AUDIOTEL company catalog Received in May 1998. AUDIOTEL company catalog Search equipment for detecting technical control devices Detection of radio bugs Scanlock ECM Plus 201-360 Described by…
Catalogue of Audiotel International.
Audiotel International catalog. Audiotel International catalog
Catalogue of the company IKMC.
Catalog of the IKMC company. Catalog of the company IKMC Hardware and software complex for conducting vibroacoustic measurements VNK-012GL Vibroacoustic protection equipment VNG-012GL Device for protecting premises from speech information…
Catalog of technical equipment from Shearwater ECM.
Shearwater ECM technical equipment catalog. . Company History Products Antennae Bloodhound Hunter Locator XD Merlin NEW Product Spectrum ECM6 NEW Product Training
Keith Melton and his spy museum. Listening devices.
Keith Melton and his spy equipment museum. Vadim Antonovich Shelkov Keith Melton and his spy equipment museum. Eavesdropping devices It seems to me that the desire to learn someone's secrets…
Classifications, features and information-measuring models of detection equipment.
Classifications, features and information-measuring models of detection equipment. Classifications, features and information-measuring models of detection equipment. Classifications, features and information-measuring models of detection equipment. ZVEZHINSKY Stanislav Sigismundovich, Doctor of Technical…
Classification of electronic devices for interception of information.
Classification of electronic devices for intercepting information. Classification of electronic devices for intercepting information ХОРЕВ Анатолий Анатольевич,профессор, док& #1090;ор технических наук, Московский государствен&# 1085;ый институт электронной техники (Технический у& #1085;иверситет)…
When will the limit be reached?
When will the limit be reached?. When will the limit be reached? When will the limit be reached? The proposed article once again returns us to the question of the…
When it's time to pick up the keys.
When it's time to pick keys. When it's time to pick keys When it's time to pick keys Is it always necessary to start cryptanalysis immediately after receiving the ciphertext?…
Integrated application of various technologies to improve airport security.
Integrated application of various technologies to improve airport safety. Integrated application of various technologies to improve airport safety. Aviation Week & Space Technology.- 1996 .- 145, №15-P. 50-52. Integrated application…
Compromise of active and passive methods of vibroacoustic information protection.
Compromise of active and passive methods of vibroacoustic information protection. Compromise of active and passive methods of vibroacoustic information protection. Compromise of active and passive methods of vibroacoustic information protection.…
Computer crime in Russia. Current state.
Computer crime in Russia. Current state. Computer crime in Russia. Current state Computer crime in Russia. Current state Banking information systems containing commercial information are actively subject to external intrusion…
Computer steganography yesterday, today, tomorrow..
Computer steganography yesterday, today, tomorrow. Vyacheslav Sergeevich Ukov, PhD in Engineering Andrey Petrovich Romantsov COMPUTER STEGANOGRAPHY YESTERDAY, TODAY, TOMORROW. Information security technologies of the 21st century. The task of reliable…
Who can listen to your cell phone?
Who can listen in on your cell phone?. Who can listen in on your cell phone? Who can listen in on your cell phone? ‘Everyone has the right to privacy…
CONCEPT OF SECURE ADMINISTRATION OF WINDOWS NT.
WINDOWS NT SECURE ADMINISTRATION CONCEPT. WINDOWS NT SECURE ADMINISTRATION CONCEPT WINDOWS NT SECURE ADMINISTRATION CONCEPT Most concepts of secure administration of the Microsoft Windows MT OS assign a special role…
Security concept: mathematical analysis of efficiency.
Security concept: mathematical analysis of efficiency. Security concept: mathematical analysis of efficiency . Security concept: mathematical analysis of efficiency In modern conditions, threats are constant companions of business, sadly enough.…
The concept of protecting computing equipment and automated systems from unauthorized access to information.
Concept of protecting computing equipment and automated systems from unauthorized access to information.. Concept of protecting computing equipment and automated systems from unauthorized access to information. GUIDELINES CONCEPT OF PROTECTION…
Briefly about the radioactive gas radon. Article updated in 2023.
Briefly about the radioactive gas radon. Briefly about the radioactive gas radon. Radon is an inert gas that has no color, taste, or odor. Of the three isotopes of radon…
A brief history of the development of the psychophysiological instrumental method of lie detection.
A brief history of the development of the psychophysiological hardware method of lie detection. A Brief History of the Development of the Psychophysiological Instrumental Method of Lie Detection Kholodny Yu.…
Short messages.
Brief messages. Brief messages Brief messages According to the Moscow Times, a graduate of the University of California, Yakov Goldberg, reported that he managed to crack the strongest cipher allowed…
Forensic polygraphology and its application in law enforcement practice.
Forensic polygraph science and its application in law enforcement practice. Kholodny Yu. I, Doctor of Law, Candidate of Psychological Sciences, Head of Department, Institute of Forensic Science of the FSB…
FORENSIC SYSTEM FOR DETERMINING CONTRADICTIONS IN WITNESS TESTIMONY.
CRIMINALISTIC SYSTEM FOR DETERMINING CONTRADICTIONS IN WITNESS TESTIMONY. RATKIN Leonid Sergeevich, Candidate of Technical Sciences In forensic science, a situation often arises when the testimonies of defendants, witnesses and other…
Forensic investigations using a polygraph and forensic psychophysiological examination.
Forensic examinations using a polygraph and forensic psychophysiological examination. Yu.I. Kholodny Doctor of Law, Candidate of Psychological Sciences, Bauman Moscow State Technical University In the spring of 1993, polygraph interrogations…
Cryptographic algorithms.
Cryptographic algorithms. Cryptographic algorithms Cryptographic algorithms A chain is only as secure as its weakest link: the stronger the link, the stronger the chain. A good cryptosystem must have its…
Cryptographic logic unit for encoders.
#Cryptographic logical device, #encoder Cryptographic logical device for encoders. Pat. 5365591 USA, IPC N 04 K 1/00.- Publ. 11/15/94. The US patent described below notes that modern encoders implement complex…
Who is listening to your cell phone
Is your cell phone being tapped? The world is so arranged that any technical invention of the human mind that expands our capabilities and creates additional comfort for us inevitably…
For discussion of the draft Law on Electronic Digital Signature.
To discuss the draft Law on Electronic Digital Signature. To discuss the draft Law on Electronic Digital Signature To discuss the draft Law on Electronic Digital Signature From December 22…
On the issue of increasing the level of information protection from leakage from technical means.
On the issue of increasing the level of information protection from leakage from technical means. On the issue of increasing the level of information protection from leakage from technical means…
Laser microphones — a universal means of reconnaissance or another fashion fad?
Laser microphones — a universal reconnaissance tool or another fashion fad?. Laser microphones — a universal reconnaissance tool or another fashion fad? Laser microphones — a universal reconnaissance tool or…
Licensing of activities in the field of technical protection of confidential information.
Licensing of activities in the field of technical protection of confidential information.. Licensing of activities in the field of technical protection of confidential information. Licensing of activities in the field…
Lumens, candelas, watts and photons.
#Special Equipment Lumens, candelas, watts and photons. KRUTIK Mikhail Ilyich, MAYOROV Viktor Petrovich LUMENS, CANDELAS, WATTS AND PHOTONS. DIFFERENT UNITS – DIFFERENT RESULTS OF MEASURING THE SENSITIVITY OF TELEVISION CAMERAS…
Luminescent fingerprint scanners.
Luminescent devices for taking fingerprints. Luminescent devices for taking fingerprints Law Enforcement Technology.- 1995 .- March.- P. 50-51. Luminescent devices for taking fingerprints When the possibility of detecting latent fingerprints…
Models of explosive devices.
Models of explosive devices. Models of explosive devices MODELS OF EXPLOSIVE DEVICES Source: magazine «Special Equipment» Model of an explosive device in an electric razor. General view of the model.…
Little tricks of counterfeiters..
Little tricks of counterfeiters.. Little tricks of counterfeiters. Little tricks of counterfeiters. Shaposhnikov Yu.I. Source: When talking about counterfeit banknotes, we can't help but mention how counterfeiters imitate watermarks. There…
Masking of information emissions from computer equipment.
Masking of information radiation from computing equipment. Masking of information radiation from computing equipment Masking of information radiation from computing equipment In recent years, much attention has been paid to…
The place of forensic psychophysiological examination using a polygraph in the system of forensic examinations.
The place of forensic psychophysiological examination using a polygraph in the forensic examination system. Kholopova E.N. Doctor of Law, Candidate of Psychological Sciences, Expert Psychologist of the State Institution KLSE…
Metal detectors — weapon detectors.
Metal detectors — weapon detectors. David Pavlovich Berezansky, Candidate of Technical Sciences Source: magazine «Special Equipment» ; Currently, devices that use magnetic methods to solve problems of detecting conductive objects…
Metal detectors and metal detectors from Institute Dr. Forster.
Metal detectors and metal detectors by Institute Dr. Forster. Metal detectors and metal detectors by Institute Dr. Forster Securitech.- 1995 .- Reference index 37. Metal detectors and metal detectors by…
Metal detectors and ferromagnetic material detectors from Vallon.
Vallon metal detectors and ferromagnetic material detectors. Vallon metal detectors and ferromagnetic material detectors. Securitech. — 1995 .- Reference indexes 66,67. Vallon metal detectors and ferromagnetic material detectors. Vallon (Germany)…
Methodology for examining premises using the CPM-700 device.
Methodology for examining premises with the CPM-700 device. Methodology for examining premises with the CPM-700 device. Methodology for examining premises with the CPM-700 device. Position 1: Unauthorized devices use transmission…
Methodology for constructing a corporate information security system.
Methodology for building a corporate information security system. Methodology for building a corporate information security system. Methodology for building a corporate information security system. Sergey Petrenko Source — Most of…
Methods and equipment for adaptive filtering of speech signal.
Methods and equipment for adaptive filtering of speech signal. Methods and equipment for adaptive filtering of speech signal. Methods and equipment for adaptive filtering of speech signal. V. I. Zolotarev,…
Methods and equipment for adaptive sound filtering.
Methods and equipment for adaptive sound filtering. Methods and equipment for adaptive sound filtering Methods and equipment for adaptive sound filtering V. I. Zolotarev, Head of Department «Business Security»,…
Methods and techniques of counterfeiting.
Methods and techniques of counterfeiting.. Methods and techniques of counterfeiting. Methods and techniques of counterfeiting. Shaposhnikov Yu.I. Having familiarized ourselves with the main features of production and «secrets» of genuine…
Methods and means of protecting telephone sets and telephone lines.
Methods and means of protecting telephone sets and telephone lines. Methods and means of protecting telephone sets and telephone lines Khorev Anatoly Anatolyevich Methods and means of protecting telephone sets…
Mine Detection Methods – Applied to the Problem of Humanitarian Demining
SHCHERBAKOV Grigory Nikolaevich, Doctor of Technical Sciences, Professor METHODS OF MINE DETECTION — AS APPLIED TO THE PROBLEM OF HUMANITARIAN DEMINING RELEVANCE OF THE PROBLEM One of the unsolved…
Methods of dead reckoning in systems for determining the location of moving objects.
Dead reckoning methods in positioning systems for moving objects.. Dead reckoning methods in positioning systems for moving objects. Petrov Nikolay Nikolaevich, Candidate of Technical Sciences DAY REPORTING METHODS IN POSITIONING…
Method of magnetometric detection of explosive objects.
Method of magnetometric detection of explosive objects. ZVEZHINSKY Stanislav Sigismundovich, Doctor of Technical Sciences PARFENTSEV Igor Valerievich, Candidate of Technical Sciences METHOD OF MAGNETOMETRIC DETECTION OF EXPLOSIVE OBJECTS Source: Magazine…
A method for protecting information on floppy disks from unauthorized copying.
Method of protecting information on floppy disks from unauthorized copying. Method of protecting information on floppy disks from unauthorized copying Method of protecting information on floppy disks from unauthorized copying…
METOR — the choice of professionals.
METOR — the choice of professionals. METOR — the choice of professionals METOR — the choice of professionals Anyone who has ever flown on an airplane is familiar with an…
Instant erasure of information..
Instant erasure of information.. Instant erasure of information. Instant erasure of information. Today, magnetic media occupy the leading positions among storage media. These include audio, video, streamer cassettes, floppy disks,…
Micro camera Zodchiy.
Microphoto camera Zodchiy. Microphoto camera Zodchiy Microphoto camera «Zodchiy» In the early 80s, the micro-miniature camera «Zodchiy» was created, which is rightfully considered one of the best Soviet special cameras…
Multi-channel telephone conversation recording system PHANTOM.
Multi-channel system for recording telephone conversations PHANTOM. Multi-channel system for recording telephone conversations PHANTOM Multi-channel system for recording telephone conversations PHANTOM There have been many publications on multi-channel telephone call…
Multichannel software-controlled electron-optical complexes for high-speed recording of a series of images of a fast-moving process.
Multichannel software-controlled electron-optical complexes for high-speed recording of a series of images of a fast-moving process. Mikhail Ilyich Krutik The article presents the principles of constructing software-controlled complexes for ultra-high-speed…
Multichannel registration systems.
Multi-channel recording systems. General Provisions Recently, thanks to the improvement of computer technology (increased processor performance, the emergence of high-capacity “hard” drives, magneto-optical drives, etc.), as well as advances in…
Multispectral optical-electronic systems.
Multispectral optoelectronic systems. TARASOV Viktor Vasilievich, Doctor of Technical Sciences YAKUSHENKOV Yuri Grigorievich, Doctor of Technical Sciences In this article, after considering some terminological issues, an attempt is made to…
Multifunctional monitoring system for mobile and stationary objects Almaz.
MULTIFUNCTIONAL SYSTEM FOR DISPATCHING AND MONITORING MOBILE AND STATIONARY OBJECTS “ALMAZ” INTRODUCTION The basis of any complex of technical means for determining the location of moving objects is, first…
Mobile metal detectors.
Mobile metal detectors. Mobile metal detectors Mobile metal detectors The increasing number of aircraft hijackings in the late 1960s and early 1970s prompted the development of weapons detection equipment, particularly…
Modernization of night vision devices.
Modernization of night vision devices. ARKHUTIK Stepan Trofimovich, VOLKOV Viktor Genrikhovich, Candidate of Technical Sciences, Associate Professor, ZAYTSEVA Elena Ivanovna, SALIKOV Vyacheslav Lvovich, UKRAINSKY Sergey Alekseevich Night vision devices (NVD)…
Monograph. Methods of document protection.
Monograph. Methods of document protection. Contents INTRODUCTION Chapter 1. TECHNOLOGICAL PROTECTION Watermarks Methods of imitation of watermarks Security threads Imitation of security threads Security fibers Imitation of security fibers Optically…
Chipset for building Spread Spectrum devices.
Chipsets for building Spread Spectrum devices. Chipsets for building Spread Spectrum devices Chipsets for building Spread Spectrum devices Broadband data transmission systems, or Spread Spectrum, produced by various foreign companies…
Cash EURO. How to identify counterfeit euros.
Cash EURO. How to identify counterfeit euros. Cash EURO. How to identify counterfeit euros. Cash EURO. How to spot counterfeit euros Cash EURO: BANKNOTES Denomination: 500 euros Size: 160*82 mm…
Directional microphones — myths and reality. Abalmazov E.I.
Directional microphones — myths and reality. Abalmazov E.I. Directional microphones — myths and reality. Abalmazov E.I. Directional microphones: myths and reality. Abalmazov Eduard Ivanovich, Doctor of Technical Sciences, Professor The…
DRUG ANALYSIS — science or art?
DRUG ANALYSIS — science or art?. DRUG ANALYSIS — science or art? DRUG ANALYSIS — science or art? In the practice of investigation, there are often cases when the only…
Some aspects of building integrated security systems. Architecture of automated systems.
Some aspects of building integrated security systems. architecture of automated systems.. Some aspects of building integrated security systems. architecture of automated systems. KOROLEV Vladimir Sergeevich Some aspects of building integrated…
Some features of post-test behavior of respondents.
Some features of the post-test behavior of respondents.. Some features of the post-test behavior of respondents. Molchanov A.Yu. Leading teacher of the polygraph examiner training school of the Ministry of…
Some ways to improve thermal imaging systems.
TARASOV Viktor Vasilievich, Doctor of Technical Sciences YAKUSHENKOV Yuri Grigorievich, Doctor of Technical Sciences, Professor SOME WAYS TO IMPROVE THERMAL IMAGING SYSTEMS The ever-increasing need for new optoelectronic systems used…
SOME ISSUES OF LEGAL REGULATION OF THE ORGANIZATION OF COUNTER-TERRORIST OPERATIONS.
SOME ISSUES OF LEGAL REGULATION OF ORGANIZING COUNTER-TERRORIST OPERATIONS. SOME ISSUES OF LEGAL REGULATION OF ORGANIZING COUNTER-TERRORIST OPERATIONS Bondarenko A.E., professor of the FSB Academy of Russia, candidate of legal…
Some issues of computer crime investigation.
Some issues of computer crime investigation. Some issues of computer crime investigation. Some issues of computer crime investigation. V. Golubev Speech on February 26, 2003 at the Southeast Cybercrime Summit…
Non-linear radar: the “NR” concept.
Nonlinear radar: the “NR” concept. Dmitry Vladimirovich Semenov, postgraduate student at Bauman Moscow State Technical University Dmitry Viktorovich Tkachev NONLINEAR RADAR: THE “NR” CONCEPT. Over the last 6-7 years, Russia…
NONLINEAR RADAR AND FEATURES OF THEIR APPLICATION FOR SEARCHING FOR BUGS.
NONLINEAR RADAR AND FEATURES OF THEIR APPLICATION FOR SEARCHING FOR BUGS.. NONLINEAR RADAR AND FEATURES OF THEIR APPLICATION FOR SEARCHING FOR BUGS. LOBASHEV Aleksey Konstantinovich, Candidate of Technical Sciences, Associate…
Nonlinear locator is an effective means of ensuring security in the field of information leakage.
Non-linear locator is an effective means of ensuring security in the field of information leakage. Non-linear locator is an effective means of ensuring security in the field of information leakage.…
Don't be afraid: It IS.
Do not be afraid: It IS. Do not be afraid: It IS Do not be afraid: It IS Doctor of Psychology V.N. Pushkin writes: «The entire history of mankind testifies…
Nickel-containing thin-film coatings on fibrous materials.
Nickel-containing thin-film coatings on fibrous materials.. Nickel-containing thin-film coatings on fibrous materials. Nickel-containing thin-film coatings on fibrous materials © L.M. Lynkov, V.A. Bogush, E.A. Senkovets, S.M. Zavadsky Belarusian State University…
Mink and sea otter are not only valuable fur.
Mink and Sea Otter are not only valuable fur. Mink and Sea Otter are not only valuable fur. MINK AND SEASPERD ARE NOT ONLY VALUABLE FUR V. Shelkov By a…
New information technology: “steganographic fingerprinting”.
New information technology: “steganographic fingerprinting”.. New information technology: “steganographic fingerprinting”. UKOV Vyacheslav Sergeevich, Candidate of Technical Sciences NEW INFORMATION TECHNOLOGY: “STEGANOGRAPHIC FINGERPRINTING” The article is a continuation of a…
New development.
New development. New development New development The universal digital linear path (UDLP) equipment and the primary multiplexer BUS-ZO are new products in the field of telecommunications equipment from Izhevsk Radio…
New horizons in wireless telephony.
New horizons in wireless telephony. New horizons in wireless telephony New horizons in wireless telephony How to organize communication in cases when it is necessary to maintain constant contact with…
New radio stations for secure communication.
New radio stations for secure communication. New radio stations for secure communication New radio stations for secure communication Since the end of the Cold War, the Department of Defense and…
Does a bank need a lie detector?
Does the bank need a “Lie Detector”?. Does the bank need a «Lie Detector»? Gamza V.A., candidate of legal and economic sciences, Chairman of the Board of Directors of Agrokhimbank…
Detection of metal objects in building structures.
Detection of metal objects in building structures. Detection of metal objects in building structures Kargashin Viktor Leonidovich Candidate of Technical Sciences Kolyada Sergey EgorovichMitrokhin Sergey Ivanovich Detection of metal objects…
Detection of explosives by analysis of their vapors and particles.
Detection of explosives by analyzing their vapors and particles. Vandyshev Boris Alekseevich, Candidate of Technical Sciences DETECTION OF EXPLOSIVES BY ANALYZING THEIR VAPORS AND PARTICLES Terrorism using explosives (HE) has…
Detection of explosive objects: hardware for anti-terrorist services.
Detection of explosive objects: hardware for anti-terrorist services. Detection of explosive objects: hardware for anti-terrorist services. Detection of explosive objects: hardware for anti-terrorist services. A. V. Kikhtenko, K. V. Eliseev…
Generalization of the practice of using the capabilities of the polygraph in the investigation of crimes.
Summary of the practice of using the capabilities of a polygraph in investigating crimes. Appendix to the letter of the Prosecutor General's Office of Russia (outgoing No. 28-15-05 dated 02/14/2006)…
Equipment, tools and devices for manual demining.
Equipment, tools and devices for manual demining. Petrenko Evgeny Sergeevich EQUIPMENT, TOOLS AND DEVICES FOR MANUAL DEMINING Various tools, devices and improvised materials can be used to perform work on…
Justification of tactical and technical requirements for radio signal detection systems.
Justification of tactical and technical requirements for radio signal detection systems. Justification of tactical and technical requirements for radio signal detection systems. Kargashin Viktor Leonidovich Candidate of Technical Sciences Justification…
PROCESSING OF IMAGES OF LUMINESCENT OBJECTS IN FORENSIC TECHNICAL EXAMINATION OF DOCUMENTS.
PROCESSING IMAGES OF LUMINESCENT OBJECTS IN FORENSIC EXAMINATION OF DOCUMENTS. KORNYSHEV Nikolay Petrovich, Candidate of Technical Sciences, Associate Professor Source: Magazine «Special Equipment» № 1 2007 In technical and forensic…
Review of several implementations of information destruction from magnetic media.
Review of several implementations of information destruction from magnetic media.. Review of several implementations of information destruction from magnetic media. A review of several implementations of information destruction from magnetic…
Review of the Russian market of devices that detect wiretapping of telephone conversations.
Overview of the Russian market of devices that detect wiretapping of telephone conversations. Overview of the Russian market of devices that detect wiretapping of telephone conversations. Overview of the Russian…
Overview of nonlinear location technology.
Overview of nonlinear location technology.. Thomas JONES OVERVIEW OF NONLINEAR LOCATION TECHNOLOGY Currently, there is a serious discussion among information security experts about the optimal characteristics of nonlinear locators. The…
On the use of relative prosodic and spectral characteristics in the task of forensic identification of a person by spoken speech.
On the use of relative prosodic and spectral characteristics in the task of forensic identification of a person by spoken speech. Kaganov A.Sh. Russian Federal Center for Forensic Examinations (the…
On the use of X-rays to detect fingerprints.
On the use of X-rays to detect fingerprints. On the use of X-rays to detect fingerprints Vadim Antoninovich Shelkov On the use of X-rays to detect fingerprints Source: magazine «Special…
On the study of the law of decrease of the electromagnetic field in real operating conditions.
On the study of the law of decrease of the electromagnetic field in real operating conditions.. On the study of the law of decrease of the electromagnetic field in real…
ASSESSMENT OF THE POSSIBILITY OF CREATING MEANS OF ACTIVE PROTECTION OF WATER AREAS BASED ON THE USE OF THE ELECTROHYDRAULIC EFFECT.
ASSESSMENT OF THE POSSIBILITY OF CREATING MEANS OF ACTIVE PROTECTION OF WATER AREAS BASED ON THE USE OF THE ELECTROHYDRAULIC EFFECT. ASSESSMENT OF THE POSSIBILITY OF CREATING MEANS OF ACTIVE…
Operational psychodiagnostics of personality during psychophysiological research using a polygraph.
#Operational psychodiagnostics Operational psychodiagnostics of personality during a psychophysiological study using a polygraph. The need to quickly navigate the psychological characteristics of a person is one of the most difficult…
Operational sound recording..
Quick sound recording.. Quick sound recording. Quick sound recording. A TAPE RECORDER IS A TOOL FOR EVERYDAY USE. The activities of a modern employee of state law enforcement agencies or…
Description of the experiment on testing the device for destroying information on magnetic media “Stek.
Description of the experiment to test the device for destroying information on magnetic media “Stek. Description of the experiment to test the device for destroying information on magnetic media “Stek.…
Description of the signs of authenticity of the 2004 modification of the Bank of Russia banknotes
Description of the authenticity features of the Bank of Russia banknotes of the 2004 modification. Description of the authenticity features of the Bank of Russia banknotes of the 2004 modification.…
Detection of illegal connections to networks.
Detection of illegal connections to networks. Detection of illegal connections to networks Detection of illegal connections to networks In the previous issue of our magazine we already wrote about methods…
Determination of parameters of vibroacoustic noise reduction systems.
Determination of parameters of vibroacoustic noise suppression systems. Determination of parameters of vibroacoustic noise suppression systems. Tests were carried out by the Engineering and Commercial Multidisciplinary Center (ECMC-1) 1. Purpose…
Determination of the maximum value of a dangerous signal induced by a personal computer and a local area network into the power supply network.
Determination of the maximum value of a dangerous signal induced by a personal computer and a local area network into the power supply network. Determination of the maximum value of…
Polygraph testing and its scientific basis.
#Polygraph Polygraph survey and its natural scientific foundations. Polygraph survey and its natural scientific foundations Kholodny Yu. I.., Doctor of Law, Candidate of Psychological Sciences, Head of Department, Institute of…
Organization of confidential office work.
Organization of confidential office work. Organization of confidential office work. Organization of confidential office work. V. Pankratyev Source — As a rule, the least attention is paid to the organization…
PRINCIPLES OF TAKING INTO ACCOUNT THE KEY CHARACTERISTICS OF RADIATION MONITORING DEVICES WHEN DECISION-MAKING ON THE POSSIBILITY OF THEIR USE FOR DETECTING RADIOACTIVE MATERIALS AT THE STATE BORDER.
BASICS OF ACCOUNTING FOR KEY CHARACTERISTICS OF RADIATION MONITORING INSTRUMENTS WHEN DECISION-MAKING ON THE POSSIBILITY OF THEIR USE TO DETECT RADIOACTIVE MATERIALS AT THE STATE BORDER.. BASICS OF ACCOUNTING FOR…
Basic elements of protection of genuine banknotes.
Key security features of genuine banknotes.. Key security features of genuine banknotes. Key security features of genuine banknotes. Shaposhnikov Yu.I. Paper Banknotes are printed on high-quality durable paper specially designed…
The main signs of authenticity of US dollars.
The main signs of authenticity of US dollars.. The main signs of authenticity of US dollars. The main signs of authenticity of US dollars. Source: Banknotes called dollars first appeared…
The main difficulties and problems of using a polygraph in law enforcement and personnel work and recommended ways to overcome them.
The main difficulties and problems of using a polygraph in law enforcement and personnel work and recommended ways to overcome them. The use of a polygraph in law enforcement and…
FEATURES OF CONSTRUCTION OF PEDESTRIAN RADIATION MONITORS..
FEATURES OF CONSTRUCTION OF PEDESTRIAN RADIATION MONITORS.. FEATURES OF CONSTRUCTION OF PEDESTRIAN RADIATION MONITORS. RUDNICHENKO Valery Alexandrovich FEATURES OF CONSTRUCTION OF PEDESTRIAN RADIATION MONITORS Currently, many areas of human practical…
Features of the selection of measuring instruments for automated software and hardware complexes for the study of PEMIN.
Features of choosing a measuring instrument for automated hardware and software complexes for studying PEMIN.. Features of choosing a measuring instrument for automated hardware and software complexes for studying PEMIN.…
Security features of the 1996 $100 bills.
Security features of 100-dollar bills of 1996. Security features of 100-dollar bills of 1996. Protection features of the 100-dollar bills of the 1996 model Source: Bills of 100 US dollars…
Caution! Radiation! Basic concepts, units of measurement, impact on humans..
Beware! Radiation! Basic concepts, units of measurement, impact on humans.. Beware! Radiation! Basic concepts, units of measurement, impact on humans. Beware! Radiation! Basic concepts, units of measurement, impact on humans.…
Domestic encryption standard.
Domestic encryption standard. Domestic encryption standard Domestic encryption standard S. Panasenko, &nb sp; &nb sp; &nb sp; &nb sp; Source: Peace and Security, No. 5,…
Security television system with expanded dynamic range in computer image recording mode.
Security television system with expanded dynamic range in computer image recording mode.. Security television system with expanded dynamic range in computer image recording mode. Security television system with dynamic range…
A captured militant reported about impending explosions in Moscow.
A captured militant reported impending explosions in Moscow.. A captured militant reported impending explosions in Moscow. A captured militant reported impending explosions in Moscow Source — «Komsomolskaya Pravda», May 11,…
ABOUT HIDDEN, SECRET, SIDE CHANNELS. AND NOT ONLY..
ABOUT HIDDEN, SECRET, SIDE CHANNELS. AND NOT ONLY.. ABOUT HIDDEN, SECRET, SIDE CHANNELS. AND NOT ONLY. ABOUT HIDDEN, SECRET, SIDE CHANNELS. AND NOT ONLY V.A. Galatenko (Doctor of Physical and…
On licensing of certain types of activities in the field of information security by the Federal Agency for Government Communications and Information under the President of the Russian Federation (memo for applicant enterprises).
On licensing of certain types of activities in the field of information security by the Federal Agency for Government Communications and Information under the President of the Russian Federation (memo…
About metal detectors.
About metal detectors. About metal detectors About metal detectors Metal detectors are electronic induction devices that allow you to detect metal objects in a neutral or weakly conductive environment, i.e.…
On rule-making in the field of technical protection of information and ensuring the uniformity of measurements.
On rule-making in the field of technical protection of information and ensuring the uniformity of measurements.. On rule-making in the field of technical protection of information and ensuring the uniformity…
On the results of testing X-ray inspection equipment.
On the results of testing X-ray inspection equipment. On the results of testing X-ray inspection equipment On the results of testing X-ray inspection equipment (XIE) 13.10.2006 On the results…
On the probability of breaking stream ciphers using the overlap method.
On the probability of breaking stream ciphers by the overlap method. On the probability of breaking stream ciphers by the overlap method On the probability of breaking stream ciphers by…
On amendments and additions to the special conditions for the acquisition of radio-electronic equipment and high-frequency devices.
On Amendments and Supplements to the Special Conditions for the Acquisition of Radio-Electronic Equipment and High-Frequency Devices. On Amendments and Supplements to the Special Conditions for the Acquisition of Radio-Electronic…
On the possibility of using an adaptive filter in an interference-type security system when detecting a moving underwater object.
On the possibility of using an adaptive filter in an interference-type security system when detecting a moving underwater object. On the possibility of using an adaptive filter in an interference-type…
On the possibility of using nuclear magnetic resonance to detect explosives on the human body.
On the possibility of using NQR to detect explosives on the human body. GRECHISHKIN Vadim Sergeevich, Doctor of Physical and Mathematical Sciences, Professor SHPILEVOI Andrey Alekseevich, Candidate of Physical and…
about protective films.
about protective films. about protective films And again about protective films The most economical solution When choosing the type of glazing, one of the main factors for the user, in…
Panoramic frequency range receivers.
Panoramic frequency range receivers. Panoramic frequency range receivers Panoramic frequency range receivers The most important tasks of ensuring the security of communications and telecommunications:— search for and detection of electromagnetic…
Password crackers.
Password crackers. Password crackers Password crackers User account database One of the main components of the Windows NT security system is the User Account Manager. It ensures interaction between other…
List of licensing centers in the field of information security as of April 1998.
List of licensing centers in the field of information security as of April 1998. List of licensing centers in the field of information security as of April 1998. List of…
List of enterprises and organizations that received licenses for activities in the field of information security as of April 1998.
List of enterprises and organizations that received licenses for activities in the field of information security as of April 1998. List of enterprises and organizations that received licenses for activities…
List of types of activities in the field of information security subject to licensing by FAPSI.
List of activities in the field of information security subject to licensing by FAPSI. List of activities in the field of information security subject to licensing by FAPSI LIST OF…
Polygraph and the law.
Recently, a large number of articles have appeared in the press about the use of a polygraph (lie detector) in commercial structures in Russia. The authors cite successful and entertaining…
Polygraph and the law: it’s time to resolve issues of legal regulation.
Polygraph and the law: it's time to resolve issues of legal regulation. POLYGRAPH AND THE LAW: Olga Belyushina, All-Russian Research Institute of the Ministry of Internal Affairs of Russia Recently,…
Purchase of night vision device.
Buying a night vision device. Buying a night vision device Buying a night vision device (some recommendations for the buyer) or «Looking into the darkness. Night vision devices» Magazine «Gun.…
Search for electronic devices for interception of information using electromagnetic field indicators.
Search for electronic devices for intercepting information using electromagnetic field indicators. Search for electronic devices for intercepting information using electromagnetic field indicators. Anatoly Anatolyevich KHOREV, Doctor of Technical Sciences, Professor…
Search for stable features of digital voice recorders.
Search for stable features of digital voice recorders.. Search for stable features of digital voice recorders. Ivanov I.L. Search for stable features of digital voice recorders. The widespread use of…
Buying a Night Vision Device. Buyer's Guide..
Buying a night vision device. Recommendations for buyers.. Buying a night vision device. Recommendations for buyers. Buying a night vision device. Recommendations for buyers Source: http://nightvision.ru Choosing and purchasing a…
US Cryptography Policy.
US Cryptography Policy. US Cryptography Policy International Security Review. — 1997 . — January/February. — P. 11-14. US Cryptography Policy Public key cryptography, which appeared in 1970, has radically changed…
Suppression of voice recorders – possibilities and practical application.
#Suppression of voice recorders Suppression of voice recorders — possibilities and practical application. Iskhakov Boris Simukovich Kargashin Viktor Leonidovich, Candidate of Technical Sciences Yudin Leonid Mikhailovich, Candidate of Technical Sciences…
A promising dual-band antenna-feeder device for a mobile VHF radio communications radio center.
Promising dual-band antenna-feeder device for a radio center of mobile VHF radio communications.. Promising dual-band antenna-feeder device for a radio center of mobile VHF radio communications. KOSTYCHEV Alexander Nikolaevich, KRYUCHKOV…
PEDESTRIAN RADIATION MONITORS.
PEDESTRIAN RADIATION MONITORS. PEDESTRIAN RADIATION MONITORS PEDESTRIAN RADIATION MONITORS V. Rudnichenko, S. Zvezhinsky Modern Security Technologies No. 3, 2007 Currently, radioactive substances (RS), which are sources of ionizing radiation, are…
Security subsystem in Windows NT.
Security subsystem in Windows NT. Security subsystem in Windows NT Security subsystem in Windows NT The article introduces readers to the possibilities of information protection in the Windows NT operating…
Subsurface location: new possibilities.
Subsurface location: new possibilities. Subsurface location: new possibilities. Skrebnev V.I. SUBSURFACE LOCATION: NEW POSSIBILITIES The article is reprinted from the journal «Special Equipment», No. 1, 1998. The human desire to…
Search technical means based on introscopy methods. Acoustic search systems.
Search technical means based on introscopy methods. Acoustic search systems. Alexey Vasilyevich Kovalev, Doctor of Technical Sciences SEARCH TECHNICAL MEANS BASED ON INTROSCOPY METHODS.ACOUSTIC SEARCH SYSTEMS. The classical solution…
Prospects for the application of nuclear methods for detecting explosives.
Prospects for the application of nuclear methods for detecting explosives. Prospects for the application of nuclear methods for detecting explosives. Aviation Week & Space Technology.- 1996 .- 145, No. 15…
Perimeter TSO: selection features.
Perimeter TSO. The variety of types and industrial samples of perimeter technical detection equipment poses the question of their correct selection to the facility management and security services based on…
Revision of US information security policy.
Revision of US Information Security Policy. Revision of US Information Security Policy. National Defense.- 1994 .- December.- P. 24, 25. Revision of US Information Security Policy. The Security Policy Board,…
Perimeter detection tools: specifics of quality assurance.
#Perimeter detection tools Perimeter detection tools: specifics of quality assurance Technical detection tools (TDS) are devices designed to detect the intrusion of a person or other unregulated object into a…
F-5000 Perimeter Intrusion Detection System.
Perimeter intrusion detection system F-5000. Perimeter Intrusion Detection System F-5000 Securitech.— 1995 .— Reference Index 64. Perimeter Intrusion Detection System F-5000 The fiber-optic perimeter intrusion detection system F-5000 was developed…
School of Security.
Security School. «A specialist is like a gumboil: his completeness is one-sided.» Kozma Prutkov The security systems market, perhaps like no other, requires specialists to have knowledge from a wide…
Regulations on the certification of information technology objects according to information security requirements.
Regulations on the certification of information technology objects according to information security requirements. Regulations on the certification of information technology objects according to information security requirements. «APPROVED» By the Chairman…
Regulations on the accreditation of testing laboratories and bodies for certification of information security tools according to information security requirements.
Regulations on the accreditation of testing laboratories and bodies for certification of information security tools according to information security requirements. Regulations on the accreditation of testing laboratories and bodies for…
Regulation on state licensing of activities in the field of information security. Part 2
Regulations on state licensing of activities in the field of information security. Part 1 Appendix 1 LIST TYPES OF ACTIVITIES OF ENTERPRISES IN THE FIELD OF INFORMATION SECURITY SUBJECT TO…
Regulation on State Licensing of Activities in the Field of Information Security. Part 1
Regulations on State Licensing of Activities in the Field of Information Security. Approved by the Decision of the State Technical Commission under the President of the Russian Federation and the…
Regulation on the Interdepartmental Commission of the Security Council of the Russian Federation on Information Security.
Regulations on the Interdepartmental Commission of the Security Council of the Russian Federation on Information Security. Regulations on the Interdepartmental Commission of the Security Council of the Russian Federation on…
Regulation on the Interdepartmental Commission of the Security Council of the Russian Federation for the Protection of Citizens' Rights and Public Safety, the Fight against Crime and Corruption.
Regulations on the Interdepartmental Commission of the Security Council of the Russian Federation for the Protection of Citizens' Rights and Public Safety, the Fight against Crime and Corruption. Regulations on…
Regulations on the procedure for the manufacture, import into the Russian Federation and use on the territory of the Russian Federation of radio-electronic equipment (high-frequency devices) (approved by RF Government Resolution No. 643 of June 5, 1994).
Regulations on the procedure for the manufacture, import into the Russian Federation and use on the territory of the Russian Federation of radio-electronic means (high-frequency devices) (approved by RF Government…
Regulation on certification of information security tools according to information security requirements.
Regulation on the certification of information security tools according to information security requirements.. Regulation on the certification of information security tools according to information security requirements. Put into effect by…
REGULATIONS on the import into the Russian Federation and export from the Russian Federation of special technical means intended for the covert acquisition of information.
REGULATION on the import into the Russian Federation and export from the Russian Federation of special technical means intended for covert acquisition of information. REGULATION on the import into the…
Regulations on certification of information technology objects according to requirements.
Regulations on certification of informatization objects according to requirements. Regulations on certification of informatization objects according to requirements. APPROVED BY Chairman of the State Technical Commission under the President of…
Interference suppression products. Recommendations for selection and use.
Noise suppression products. recommendations for selection and use. Noise suppression products. recommendations for selection and use. Blandova Ekaterina Sergeevna, Doctor of Technical Sciences NOISE SUPPRESSION PRODUCTS. RECOMMENDATIONS FOR SELECTION AND…
The last argument.
The last argument. The last argument. The last «argument». A sedative by force. A police baton cannot be clearly classified. Its use does not involve causing significant harm to a…
The last chance to prove innocence. Psychophysiological examination using a polygraph has the right to exist.
The last chance to prove innocence. Psychophysiological examination using a polygraph has the right to exist. In modern investigative and judicial practice, forensic psychophysiological examination using a polygraph has been…
Resolution of the Government of the Russian Federation of July 17, 1996 No. 832 On approval of special conditions for the acquisition of radio-electronic equipment and high-frequency devices.
RF Government Resolution of July 17, 1996 No. 832 On Approval of Special Conditions for the Acquisition of Radio-Electronic Equipment and High-Frequency Devices. RF Government Resolution of July 17, 1996…
Resolution of the Government of the Russian Federation of December 24, 1994 No. 1418 On licensing of certain types of activities.
Resolution of the Government of the Russian Federation of December 24, 1994 N 1418 On licensing of certain types of activities. RF Government Resolution of December 24, 1994 N 1418…
Resolution of the Government of the Russian Federation of August 2, 1997 No. 973 On approval of the Regulation on preparation for the transfer of information constituting a state secret to other states.
Resolution of the Government of the Russian Federation of August 2, 1997 N 973 On approval of the Regulation on preparation for the transfer of information constituting a state secret…
Resolution of the Government of the Russian Federation of September 4, 1995 No. 870 On approval of the Rules for classifying information constituting a state secret as belonging to various levels of secrecy.
Resolution of the Government of the Russian Federation of September 4, 1995 N 870 On approval of the Rules for classifying information constituting a state secret to various degrees of…
Resolution of the Government of the Russian Federation On licensing the activities of enterprises, institutions and organizations in carrying out work related to the use of information constituting a state secret, the creation of means of information protection…..
Resolution of the Government of the Russian Federation On licensing the activities of enterprises, institutions and organizations to carry out work related to the use of information constituting a state…
Resolution of the Supreme Court of the Russian Federation of March 13, 1992 No. 2507-1 On the procedure for introducing the Law of the Russian Federation On operational-search activities in the Russian Federation.
Resolution of the Supreme Court of the Russian Federation of March 13, 1992 N 2507-1 On the procedure for introducing the law of the Russian Federation On operational-search activities in…
Resolution of the Supreme Court of the Russian Federation of February 19, 1993 No. 4525-1 On the introduction of the Law of the Russian Federation On federal bodies of government communications and information.
Resolution of the Supreme Court of the Russian Federation of February 19, 1993 N 4525-1 On the entry into force of the Law of the Russian Federation On federal bodies…
Resolution of the Supreme Court of the Russian Federation of July 21, 1993 No. 5486-1 On the procedure for introducing the Law of the Russian Federation On State Secrets.
Resolution of the Supreme Court of the Russian Federation of July 21, 1993 N 5486-1 On the procedure for putting into effect the Law of the Russian Federation On State…
Resolution of the Supreme Court of the Russian Federation of March 5, 1992 No. 2446/1-1 On the introduction of the Law of the Russian Federation On Security.
Resolution of the Supreme Court of the Russian Federation of March 5, 1992 N 2446/1-1 On the entry into force of the Law of the Russian Federation On Security. Resolution…
Improving the efficiency of night vision device development.
Increasing the efficiency of night vision device development.. Increasing the efficiency of night vision device development. VOLKOV Viktor Genrikhovich, PhD in Engineering, Associate Professor INCREASING THE EFFICIENCY OF NIGHT VISION…
Improving the efficiency of detecting dangerous signals using the OSCOR device based on the mapping method and peak spectrum analysis.
Improving the efficiency of detecting dangerous signals using the OSCOR device based on the mapping method and peak spectrum analysis. Improving the efficiency of detecting dangerous signals with the OSCOR…
INCREASING THE REDUNDANCY OF INFORMATION FIELDS OF ADAPTIVE CLASSIFIERS OF THE INFORMATION SECURITY SYSTEM.
INCREASING THE REDUNDANCY OF INFORMATION FIELDS OF ADAPTIVE CLASSIFIERS OF THE INFORMATION SECURITY SYSTEM.. INCREASING THE REDUNDANCY OF INFORMATION FIELDS OF ADAPTIVE CLASSIFIERS OF THE INFORMATION SECURITY SYSTEM. NESTERUK Gennady…
Practical implementation of absorption spectroscopy technology in a device for detecting trace amounts of explosives on objects.
Practical implementation of absorption spectroscopy technology in a device for detecting trace amounts of explosives on objects. Practical implementation of absorption spectroscopy technology in a device for detecting trace amounts…
Practical implementation of the Law on State Secrets.
Practical implementation of the law On state secrets. Practical implementation of the law On state secrets PRACTICAL IMPLEMENTATION OF THE LAW «ON STATE SECRETS» A.A. Grigoriev The Law «On State…
Private investigation practice in the UK.
Private Investigation Practice in the UK. Private Investigation Practice in the UK Private Investigation Practice in the UK Professional private investigators are considered to play a significant role in English…
Government of the Russian Federation. Resolution of July 29, 1998 No. 854.
Government of the Russian Federation. Resolution of July 29, 1998 N 854. Government of the Russian Federation. Resolution of July 29, 1998 N 854 GOVERNMENT OF THE RUSSIAN FEDERATION RESOLUTION…
Legal aspects of information security.
Legal aspects of information security. Legal aspects of information security Legal aspects of information security The tasks of building a civil society in Russia as an information society, the increasing…
Legal aspects of using a polygraph when working with personnel.
Legal aspects of using a polygraph when working with personnel. Polygraph surveys (often incorrectly called a «lie detector») are gradually being introduced in a number of federal government agencies as…
Legal aspects of the use of chemical traps.
Legal aspects of using chemical traps. Legal aspects of using chemical traps. Legal aspects of using chemical traps. V. Pogulyaev Information protection. Confidential No. 3, 2004 The use of chemicals…
Night vision devices: history of generations..
Night vision devices: history of generations.. Night vision devices: history of generations. Salikov Vyacheslav Lvovich NIGHT VISION DEVICES: HISTORY OF GENERATIONS The imperfection of one's own nature, compensated by the…
New generation night vision devices..
New generation night vision devices.. New generation night vision devices. VOLKOV Viktor Genrikhovich, Candidate of Technical Sciences, Associate Professor NEW GENERATION NIGHT VISION DEVICES Night vision devices (NVD) are designed…
Charge-coupled devices. Design and basic principles of operation. Article updated 23.04 in 2023.
Charge-coupled devices. Design and basic operating principles. Sergey Ivanovich Neizvestny Oleg Yuryevich Nikulin CHARGE-COUPLED DEVICES. DESIGN AND BASIC OPERATING PRINCIPLES. Source: «Special Equipment» magazine History of development Charge-coupled devices (CCD)…
FAPSI Order N 158..
FAPSI Order No. 158.. FAPSI Order No. 158. FAPSI Order On approval of the Regulation on the procedure for the development, production, sale and use of cryptographic information protection tools…
Order of the People's Commissar of Internal Affairs of the USSR No. 7658 for 1938.
Order of the People's Commissar of Internal Affairs of the USSR No. 7658 for 1938. Order of the People's Commissar of Internal Affairs of the USSR No. 7658 for 1938…
Application of DNAR for detection of explosives.
Application of DYAKR for detection of explosives.. Application of DYAKR for detection of explosives. GRECHISHKIN Vadim Sergeevich, Doctor of Physical and Mathematical Sciences, Professor, SHPILEVOI Andrey Alekseevich, Candidate of Physical…
The use of metallized fabrics of the METACRON series for protection against electromagnetic radiation.
Application of metallized fabrics of the METACRON series for protection against electromagnetic radiation. Application of metallized fabrics of the METACRON series for protection against electromagnetic radiation. Application of metallized fabrics…
Application of the dimensional ontology method in selecting means of technical protection of information from unauthorized access.
Application of the dimensional ontology method in selecting means of technical protection of information from unauthorized access. Application of the dimensional ontology method in selecting means of technical protection of…
Application of satellite radio navigation methods to create systems and complexes of technical means for determining the location of moving objects.
Application of satellite radio navigation methods to create systems and complexes of technical means for determining the location of moving objects.. Application of satellite radio navigation methods to create systems…
Use of a polygraph in ensuring the security of a commercial bank.
Using a polygraph to ensure the security of a commercial bank. The development of market relations in Russia and the emergence of commercial enterprises of various forms of ownership have…
Use of the polygraph in Poland.
The use of the polygraph in Poland. Attention to the applied use of the polygraph appeared in Poland before the Second World War, when this device was purchased by the…
The use of the polygraph in Russia: order must be restored.
Use of the polygraph in Russia In December 1994, the Ministry of Internal Affairs of Russia officially put the method of interrogation using a polygraph (hereinafter — IIP) into service…
Application of psychophysiological method of lie detection in Japan.
Application of psychophysiological method of lie detection in Japan. Application of psychophysiological method of lie detection in Japan Yu. I. Kholodny Doctor of Law, Candidate of Psychological Sciences (Bauman Moscow…
Application of vector signal analyzers in radio monitoring systems.
Application of vector signal analyzers in radio monitoring systems.. Application of vector signal analyzers in radio monitoring systems. SILANTIEV Vladimir Anatolyevich, Candidate of Technical Sciences USE OF VECTOR SIGNAL ANALYZERS…
The principles of operation of the GPS system and its use.
GPS system operation principles and its use. GPS system operation principles and its use. GPS system operation principles and its use. S. Markov, KNUSA. Introduction. Modern approaches to the creation…
Signs of authenticity of banknotes and determination of the method of production of counterfeit banknotes.
Signs of authenticity of banknotes and determination of the method of manufacturing counterfeit banknotes.. Signs of authenticity of banknotes and determination of the method of manufacturing counterfeit banknotes. Signs of…
Signs that you may be being eavesdropped on.
Signs that you may be being eavesdropped. Signs that you may be being eavesdropped James M. Atkinson, Granite Island Group Signs that you may be being eavesdropped Obvious warning signs…
Problems of combating radio-controlled explosive devices.
Problems of combating radio-controlled explosive devices.. Problems of combating radio-controlled explosive devices. ISKHAKOV Boris Simukovich, KARGASHIN Viktor Leonidovich, Candidate of Technical Sciences YUDIN Leonid Mikhailovich, Candidate of Technical Sciences PROBLEMS…
Problems with the use of alarm systems in the UK.
Problems of using alarm systems in the UK. Problems of using alarm systems in the UK. International Security Review.- 1995 .- The alarm Special issue.- P. 5, 6. Problems of…
Problems and solutions to the problem of detecting modern voice recorders.
Problems and solutions to the problem of detecting modern voice recorders.. Problems and solutions to the problem of detecting modern voice recorders. Problems and solutions to the problem of detecting…
Problems of detection and identification of radio signals of means of covert information control. Part 2.
Problems of detection and identification of radio signals of covert information control means. Part 2.. Problems of detection and identification of radio signals of covert information control means Kargashin Viktor…
Problems of using non-lethal weapons.
Problems of using non-lethal weapons. Problems of using non-lethal weapons. Jane's Defence Weekly.- 1996 .- 25, №10.-P. 6; № 13 .- P. 6. Jane's Defence Contracts.- 1996 .- November.- P.…
Design and manufacture of highly mobile special-purpose robots using modern CAD systems.
Design and manufacture of highly passable special-purpose mobile robots using modern CAD systems.. Design and manufacture of highly passable special-purpose mobile robots using modern CAD systems. Design and manufacture of…
Parabens Device Seizure portable device expertise program.
Parabens Device Seizure portable device examination program. Parabens Device Seizure portable device examination program Parabens portable device examination program Device Seizure» Parabens Device Seizure main window. Digital forensics has taken…
Counteraction to explosive devices with radio fuses.
Counteraction to explosive devices with radio fuses. Counteraction to explosive devices with radio fuses According to statistics, in the vast majority of cases, explosive devices (ED) with radio fuses (RF)…
Radio headsets for special applications of portable short-range VHF radio communications.
Radio headsets for special applications of portable short-range VHF radio communications. Radio headsets for special applications of portable short-range VHF radio communications. Radio headsets for special applications of portable short-range…
Ground surveillance radar station.
Ground surveillance radar. Ground surveillance radar VINITI, 1996 Ground surveillance radar Ground surveillance radar EL/M-2140 by Eita Electronics Industries— is a wide-band radar that automatically detects armored vehicles, light vehicles…
Radiometer for detection of alpha-emitting aerosols in indoor air.
Radiometer for detecting alpha-emitting aerosols in indoor air.. Radiometer for detecting alpha-emitting aerosols in indoor air. TIKHONOV Andrey Anatolyevich RADIOMETER FOR DETECTING ALPHA-EMITTING AEROSOLS IN INDOOR AIR Traditionally, when the…
IPSA 2 radio transmitter connected to a telephone line.
IPSA 2 radio transmitter connected to a telephone line. IPSA 2 radio transmitter connected to a telephone line. VINITI, 1996 IPSA 2 radio transmitter connected to a telephone line. IPSA…
Radio detonators.
Radio fuses. Recently, when carrying out terrorist acts in populated areas using explosive devices, devices equipped with radio fuses are becoming increasingly widespread. This trend is due to the fact…
Prices for TSCM services provided by Granite Island Group.
Prices for TSCM services provided by Granite Island Group. Prices for TSCM services provided by Granite Island Group James M. Atkinson, Granite Island Group Prices for TSCM services provided by…
Order of the Government of the Russian Federation of February 28, 1996 No. 286-r.
Order of the Government of the Russian Federation of February 28, 1996 N 286-r. Order of the Government of the Russian Federation of February 28, 1996 N 286-r Order of…
DEVELOPMENT, PRODUCTION AND SUPPLY OF INTELLIGENCE TECHNICAL MEANS. Part 2.
Principles of upgrading computers for harsh operating conditions Until recently, it was considered common practice when preparing technical specifications for military equipment to assume that it could operate in all…
Development of a system for protecting confidential information.
Development of a system for protecting confidential information.. Development of a system for protecting confidential information. Development of a system for protecting confidential information Stolyarov Nikolay Vladimirovich Source— security.meganet.md Disclosure…
Intelligence at the Service of Your Enterprise Part 1
Intelligence at the service of your enterprise. 1. INFORMATION — MATERIAL OF OUR EPOCH Information is everywhere Imagine.. 7:30 in the morning. Jean Martin wakes up to the sound of…
Recommendations for assessing the security of confidential information from leakage due to EMI.
Recommendations for assessing the security of confidential information from leakage due to PEMI.. Recommendations for assessing the security of confidential information from leakage due to PEMI. Recommendations for assessing the…
Controlix Vision X-ray system for inspection of baggage and small items.
Controlix Vision X-ray system for baggage and small cargo screening. Controlix Vision X-ray system for baggage and small cargo screening Controlix Vision X-ray system for baggage and small cargo screening…
SCRF solution according to the DECT standard.
State Commission on Radio Frequencies (SCRF) decision on the DECT standard. State Commission on Radio Frequencies (SCRF) decision on the DECT standard State Commission on Radio Frequencies (SCRF) decision on…