60 Bilder zum Thema "Spionageabwehr" bei ClipDealer

Medien sortieren nach     Gehe zu Seite:    
« Vorherige  1  Nächste »
Two Faced
Counterintelligence - Dictonary Definition
Spy Rappelling with Suitcase
AI software on laptop used by American domestic security services to prevent terrorism. Artificial intelligence technology enhancing Patriot Act surveillance procedures against USA enemies, camera B
leaked US secret documents concept as an American intelligence leak of confidential and classified security breach in a 3D illustration style.
Purification of personnel from spies and moles. Lustration. Industrial and corporate espionage. Increased security and privacy. Opening the network of enemy agents and informers.
Ex KGB soviet agent combating organized crime and terrorism using detection system on laptop. Russia FSB officer protecting national sovereignty by tracking Chechen separatist terrorist
Officer in command center responsible for Israel air defense relaying instructions to squadrons patrolling over borders. Military intelligence agency spy using laptop software to do monitoring
Counterintelligence specialist in military HQ base gathering information on enemy troops. African american agent in base of operations doing assessment of enemy vulnerabilities, tracking, camera A
Team of military officers in command center look at intel folder files on enemy battle formation. Intelligence corps colleagues read mission case file to collect data on opponents strategy, camera A
Antenna on the roof of a building, receiving terrestrial television, transmitting coded messages, harmful radiation, 5G signal
FBI Emblem at Headquarters
Israeli military dispatcher using headphones microphone, offering information to commanders fighting on front lines. Mossad agent providing intel for troops, isolated over Israel flag
Antenna on the roof of a building, receiving terrestrial television, transmitting coded messages, harmful radiation, 5G signal
Antenna for receiving terrestrial television, radio, military device for eavesdropping
Federal Bureau of Investigation Building
Find the intruder in the group. Convict the culprit. Find patient zero. Chosen candidate. Persona non grata. Search for hostile agents. Clear the company from corporate spies.
Conceptual text with blur thumb print
Officer in war room responsible for Israel air defense relaying instructions to squadrons patrolling over borders, close up. Military secret service operative using laptop software to do monitoring
Intelligence corps expert in military HQ base gathering information on enemy troops. Officer arriving at work in base of operations, starting assessment of enemy vulnerabilities, tracking, camera A
Military dispatcher using headphones microphone, offering info to infantry units fighting on front lines. Army expert providing intel for troops, coordinating mission activities, camera B
Antenna on the roof of a building, receiving terrestrial television, transmitting coded messages, harmful radiation, 5G signal
Antenna on the roof of a building, receiving terrestrial television, transmitting coded messages, harmful radiation, 5G signal
Male Spy Aiming Handgun While Rappelling
Special forces professional in military HQ base gathering information on enemy troops. Officer using monitoring equipment in base of operations to do assessment of enemy vulnerabilities, camera A
Air force officer and colleague performing tactical level surveillance in command post. Team of military specialists doing brainstorming, using radar equipment to look at assault zones, camera A
Antenna on the roof of a building, receiving terrestrial television, transmitting coded messages, harmful radiation, 5G signal
Military agents in war room look at intel folder files on enemy battle formation. Intelligence agency professionals read mission case file to collect data on opponents strategy, camera A
Air force officer and colleague performing tactical level surveillance in command post. Team of military specialists doing brainstorming, using radar equipment to look at assault zones, camera B
Israeli intelligence corps officer using target acquisition tech on laptop to detect enemy location. Mossad secret service agent isolated over Israel flag using satellite device
Air force officer performing tactical level surveillance in command room using mockup screen. Military specialist using radar on chroma key gear to look at assault zones, camera B
AI software on laptop used by European Union member states security services to prevent terrorism. Artificial intelligence tech used by Europe countries to defend, isolated over EU flag, camera A
Mockup tablet used by North Korean state security services to coordinate terrorism attacks. Isolated screen device used by Pyongyang regime to control border, isolated over North Korea flag, camera A
Spy Rappelling and Aiming Gun
Military officer using tracking software on laptop to gain info helpful against enemies. Army professional using notebook to gain intel helping troops, coordinating mission activities, camera B
Chinese CCP agent combating organized crime and terrorism using detection system on laptop. China intelligence department officer protecting national sovereignty by tracking terrorists
FBI Building
Collecting Customer Identity
Mossad operative dispatcher talks in headphones mic, relaying surveillance data, standing isolated over Israel flag. Incognito intelligence operative completes mission during geopolitical operation
Identity Search
Military officer in command post receiving telephone call while looking at intel files. Intelligence specialist reading opponents strategy mission case file and talking on phone, camera B
Military officer making telephone call to relay enemy info gained using tracking equipment. Army specialist talking on phone, giving intel helping troops, coordinating mission activities, camera B
FBI Headquarters Building
Air force combat control agent performing tactical level surveillance in war room using laptop. Military expert in base of operations using radar on notebook to look at assault zones, camera A
Spy Rappelling with Suitcase
Examine the participant for competence and loyalty. Clear the ranks of the company from corporate spies. The culprit of the data leak. Search for hostile agents. Select to hire. Dismissal.
Mossad operator wearing mask to remain anonymous standing proud in front of Israel flag, feeling pride in serving country. Israeli secret agent in command room crossing arms, camera B
Air force officer performing tactical level surveillance in command room using mockup screen. Military specialist using radar on chroma key gear to look at assault zones, camera A
Israeli counterterrorism division officer using target acquisition tech on laptop to detect enemy location. Mossad defense security agent isolated over Israel flag using satellite equipment
Teamworking military agents look at intel folder files on enemy battle formation. Intelligence corps coworkers read mission case documents to collect data on opponents strategy, camera B

« Vorherige  1  Nächste »