46 Bilder zum Thema "Counterintelligence" bei ClipDealer

Medien sortieren nach     Gehe zu Seite:    
« Vorherige  1  Nächste »
Two Faced
Counterintelligence - Dictonary Definition
Spy Rappelling with Suitcase
AI software on laptop used by American domestic security services to prevent terrorism. Artificial intelligence technology enhancing Patriot Act surveillance procedures against USA enemies, camera B
leaked US secret documents concept as an American intelligence leak of confidential and classified security breach in a 3D illustration style.
Purification of personnel from spies and moles. Lustration. Industrial and corporate espionage. Increased security and privacy. Opening the network of enemy agents and informers.
Ex KGB soviet agent combating organized crime and terrorism using detection system on laptop. Russia FSB officer protecting national sovereignty by tracking Chechen separatist terrorist
Team of military officers in command center look at intel folder files on enemy battle formation. Intelligence corps colleagues read mission case file to collect data on opponents strategy, camera A
Officer in command center responsible for Israel air defense relaying instructions to squadrons patrolling over borders. Military intelligence agency spy using laptop software to do monitoring
FBI Emblem at Headquarters
Israeli military dispatcher using headphones microphone, offering information to commanders fighting on front lines. Mossad agent providing intel for troops, isolated over Israel flag
Federal Bureau of Investigation Building
Find the intruder in the group. Convict the culprit. Find patient zero. Chosen candidate. Persona non grata. Search for hostile agents. Clear the company from corporate spies.
Conceptual text with blur thumb print
Officer in war room responsible for Israel air defense relaying instructions to squadrons patrolling over borders, close up. Military secret service operative using laptop software to do monitoring
Military dispatcher using headphones microphone, offering info to infantry units fighting on front lines. Army expert providing intel for troops, coordinating mission activities, camera B
Intelligence corps expert in military HQ base gathering information on enemy troops. Officer arriving at work in base of operations, starting assessment of enemy vulnerabilities, tracking, camera A
Male Spy Aiming Handgun While Rappelling
Special forces professional in military HQ base gathering information on enemy troops. Officer using monitoring equipment in base of operations to do assessment of enemy vulnerabilities, camera A
Military agents in war room look at intel folder files on enemy battle formation. Intelligence agency professionals read mission case file to collect data on opponents strategy, camera A
Air force officer and colleague performing tactical level surveillance in command post. Team of military specialists doing brainstorming, using radar equipment to look at assault zones, camera B
Israeli intelligence corps officer using target acquisition tech on laptop to detect enemy location. Mossad secret service agent isolated over Israel flag using satellite device
AI software on laptop used by European Union member states security services to prevent terrorism. Artificial intelligence tech used by Europe countries to defend, isolated over EU flag, camera A
Mockup tablet used by North Korean state security services to coordinate terrorism attacks. Isolated screen device used by Pyongyang regime to control border, isolated over North Korea flag, camera A
Spy Rappelling and Aiming Gun
Military officer using tracking software on laptop to gain info helpful against enemies. Army professional using notebook to gain intel helping troops, coordinating mission activities, camera B
Chinese CCP agent combating organized crime and terrorism using detection system on laptop. China intelligence department officer protecting national sovereignty by tracking terrorists
FBI Building
Collecting Customer Identity
Mossad operative dispatcher talks in headphones mic, relaying surveillance data, standing isolated over Israel flag. Incognito intelligence operative completes mission during geopolitical operation
Identity Search
Military officer in command post receiving telephone call while looking at intel files. Intelligence specialist reading opponents strategy mission case file and talking on phone, camera B
Military officer making telephone call to relay enemy info gained using tracking equipment. Army specialist talking on phone, giving intel helping troops, coordinating mission activities, camera B
FBI Headquarters Building
Spy Rappelling with Suitcase
Examine the participant for competence and loyalty. Clear the ranks of the company from corporate spies. The culprit of the data leak. Search for hostile agents. Select to hire. Dismissal.
Air force officer performing tactical level surveillance in command room using mockup screen. Military specialist using radar on chroma key gear to look at assault zones, camera A
Israeli counterterrorism division officer using target acquisition tech on laptop to detect enemy location. Mossad defense security agent isolated over Israel flag using satellite equipment
Protection against industrial espionage. Protect technologies sensitive to national security from competitors and foreign intelligence services. Secure environment, monitoring and securing systems.
Find and detain the suspect. Identification the suspect of a crime. Espionage. Counteracting intruders. Special services and law enforcement agencies fight crime. Preventing terrorist threats.
Soldier using tracking software on green screen laptop to gain info against enemies. Army expert using chroma key notebook to gain intel helping troops, coordinating mission activities, camera A
Background Search
Mossad operative dispatcher talks in headset, relaying surveillance data, standing isolated over Israel flag background. Counterintelligence agency spy completes mission during geopolitical operation
Conceptual text with blur thumb print
Smartphone with an unknown call, sunglasses and a flashlight lie on a black surface. Problems of anonymity and espionage using modern gadgets. Flatlay
AI software on laptop used by Chinese security service programmer to commit terrorism attacks. Artificial intelligence tech used by CCP government to hack neighbor countries, isolated over China flag

« Vorherige  1  Nächste »