Table of Contents Toggle Night vision in Hitler's armyNight vision on tanksThe war in Ukraine – the fourth pillar of defense: night visionWestern countries’ night vision for UkrainePrivate night vision devices in the Ukrainian militaryUS Army: "The night belongs to us"The end of US night ...

Table of Contents Toggle 5 psychological profiles of cheating guysConvenient cowardThe calculating narcissistMommy’s immature sonCharming playboyA born rebelMen who cheat most often - trendsWife’s keeperX9-year-oldService or trade workerHigh certaintyFan of tattoos or facial hairPsychophysical predisposition to infidelity - summary They can come up with millions ...

Table of Contents Toggle US-China diplomatic crisisBalloon affairSpace intelligence or weather observation?Global spy programmeUFOs over America and CanadaWhat is a UFO?White House positionThe Pentagon’s roleWar on balloonsMysterious objects in the sky – expert analysisUFOs and spy balloons – FAQsWhat are spy balloons?What are the disadvantages ...

Table of Contents Toggle A game of prestige and money – why do F1 teams spy on rivals?"Spygate" or the biggest spy scandal in the history of sportA legal way to eavesdrop on Formula 1 teamsRed Bull, Ferrari or Mercedes, painted in your colours? Copying ...

Table of Contents Toggle What is deepfake?Black PR of deepfakesFrom Reddit to TiktokThreats beyond the borders of cyberspaceHow to detect a deepfake? Experts at the World Economic Forum are sounding the alarm: deepfake technology is spreading at a dizzying pace. The estimated number of fake ...

Table of Contents Toggle The condition of Russia's intelligence servicesLarge-scale intelligence operationsIdentity of illegals - who are Russian spies?Pavel Buczka – a reserve general in the Slovak defense ministrySergei Vladimirovich Cherkasov – trainee at the Hague TribunalOlga Kolobova – a businesswoman at the NATO command ...

Table of Contents Toggle Required two-factor authentication vs. online securitySecurity questions - effectivenessWhy are security questions not always secure?Security question - good practicesSecurity questions - FAQWhat is two-factor authentication?What is a security question?Is two-step verification secure? You enable two-factor authentication when logging in, or you ...

Table of Contents Toggle Children of political youth at the service of the KGB, or how the Russians installed a wiretap in the American embassyElectronic music genius in a Gulag laboratory"The Thing" - a precursor to RFID technologyMutual espionage and confrontationModern wireless wiretapsThe Thing/The Great ...

Table of Contents Toggle What do Soviet physicists and American technology have in common? History of stealth technologyInvisible camouflage - stealth technology in practiceThe first stealth aircraftThe high price of invisibility – limitationsStealth technology - FAQHow does radar work?What is stealth technology based on?Who invented ...

Table of Contents Toggle "My wife is cheating on me" - when to wiretap her phone?Discreet eavesdropping on the wife's phone - what is it?How to set up a wiretap on your wife's phone? 3 easy stepsWife under control. What are the benefits of phone ...

error: Content is protected !!