61 Bilder zum Thema "Spionageabwehr" bei ClipDealer

Medien sortieren nach     Gehe zu Seite:    
« Vorherige  1  2  
Two Faced
Counterintelligence - Dictonary Definition
Spy Rappelling with Suitcase
AI software on laptop used by American domestic security services to prevent terrorism. Artificial intelligence technology enhancing Patriot Act surveillance procedures against USA enemies, camera B
Purification of personnel from spies and moles. Lustration. Industrial and corporate espionage. Increased security and privacy. Opening the network of enemy agents and informers.
Mossad operative analyzing surveillance data during global warfare, standing isolated over Israel flag background. Intelligence agent completes mission during World War 3 geopolitical operation
American programmer combating enemy bot accounts on social media with AI technology. Technician working for USA CIA agency building artificial intelligence algorithms to detect fake news, camera A
Ex KGB soviet agent combating organized crime and terrorism using detection system on laptop. Russia FSB officer protecting national sovereignty by tracking Chechen separatist terrorist
Military dispatcher using headphones microphone, offering info to infantry units fighting on front lines. Army expert providing intel for troops, coordinating mission activities, camera A
FBI Emblem at Headquarters
Israeli military dispatcher using headphones microphone, offering information to commanders fighting on front lines. Mossad agent providing intel for troops, isolated over Israel flag
Military officer using augmented reality tracking tech to gain info helpful against enemies. Army expert using AR hologram to gain intel helping troops, coordinating mission activities, camera A
Intelligence corps expert in military HQ base gathering information on enemy troops. Officer arriving at work in base of operations, starting assessment of enemy vulnerabilities, tracking, camera B
Tired military officer receiving intel folder on enemy, feeling fatigued. Overworked army specialist feeling exhausted while reading mission case file to collect data on opponents strategy, camera A
Secret intelligence agent doing saluting hand gesture towards North Korea flag in war room, showing respect. Special operations spy with mask serving country, doing honoring gesturing, camera A
Federal Bureau of Investigation Building
Find the intruder in the group. Convict the culprit. Find patient zero. Chosen candidate. Persona non grata. Search for hostile agents. Clear the company from corporate spies.
Conceptual text with blur thumb print
Team of military officers in command center look at intel folder files on enemy battle formation. Intelligence corps colleagues read mission case file to collect data on opponents strategy, camera B
Army officers doing brainstorming in command center, looking at intel folder files. Intelligence corps experts read mission case paperwork to be informed on data on opponents strategy, camera A
Team of military officers using tracking equipment to gain info helpful against enemies. Teamworking army colleagues trying to gain intel helping troops, coordinating mission activities, camera B
Mockup tablet used by North Korean state security services to coordinate terrorism attacks. Isolated screen device used by Pyongyang regime to control border, isolated over North Korea flag, camera B
Military officers look at intel folder files on enemy battle formation, comparing with radar images. Army specialists looking at mission case file and equipment screens, camera B
Male Spy Aiming Handgun While Rappelling
Chinese military intelligence officer collecting information to assist commanders fighting on front lines during war. Counterintelligence agent providing guidance and direction for troops
Soldier in military HQ base doing brainstorming with coworker, gathering information on enemy troops. Teamworking officers using tracking software to do assessment of enemy vulnerabilities, camera A
American programmer combating enemy bot accounts on social media with AI technology. Technician working for USA CIA agency building artificial intelligence algorithms to detect fake news, camera B
AI software on laptop used by European Union member states security services to prevent terrorism. Artificial intelligence tech used by Europe countries to defend, isolated over EU flag, camera B
Spy Rappelling and Aiming Gun
AI software on laptop used by European Union member states security services to prevent terrorism. Artificial intelligence tech used by Europe countries to defend, isolated over EU flag, camera A
Mockup tablet used by North Korean state security services to coordinate terrorism attacks. Isolated screen device used by Pyongyang regime to control border, isolated over North Korea flag, camera A
Isolated screen laptop in Pyongyang intelligence command center used by dictatorship party to run security protocols against NATO and South Korea enemies, isolated over North Korea flag, camera A
North Korean spy taking out intel document from suitcase to identify key targets during border conflict. Pyongyang regime intelligence agency operator reading mission summary files, camera B
Tired military officer receiving intel folder on enemy, feeling fatigued. Overworked army specialist feeling exhausted while reading mission case file to collect data on opponents strategy, camera B
Military officer in command post receiving intel folder files on enemy battle formation. Intelligence specialist reading mission case file to collect data on opponents strategy, camera B
FBI Building
Collecting Customer Identity
Mossad operative dispatcher talks in headphones mic, relaying surveillance data, standing isolated over Israel flag. Incognito intelligence operative completes mission during geopolitical operation
AI software on laptop used by Chinese developer to commit cyberterrorism. Artificial intelligence tech used by expert to hack countries during global digital warfare, isolated over China flag
Army operative in command center analyzing surveillance data during global warfare. Intelligence agent in base of operations completes mission during World War 3 geopolitical operation, camera B
Spy Rappelling with Suitcase
Examine the participant for competence and loyalty. Clear the ranks of the company from corporate spies. The culprit of the data leak. Search for hostile agents. Select to hire. Dismissal.
Mossad operator wearing mask to remain anonymous standing proud in front of Israel flag, feeling pride in serving country. Israeli secret agent in command room crossing arms, camera B
Laptop in European Union command center used by counterterrorism department to run security protocols against propaganda bots trying to destabilize democracy, isolated over EU flag, camera B
Military officer making telephone call to relay enemy info gained using tracking equipment. Army specialist talking on phone, giving intel helping troops, coordinating mission activities, camera A
Military officer using tracking software to be able to offer info to front lines commander. Army expert doing reconnaissance to gain intel helping troops, coordinating mission activities, camera B
Special forces professional in military HQ base gathering information on enemy troops. Officer using monitoring equipment in base of operations to do assessment of enemy vulnerabilities, camera B
Soldier doing patriotic duty in military HQ base, gathering information on enemy troops. Officer using high tech monitoring gear to do assessment of enemy vulnerabilities, camera B
Protection against industrial espionage. Protect technologies sensitive to national security from competitors and foreign intelligence services. Secure environment, monitoring and securing systems.
AI technology used by European Union alliance to combat illegal bot accounts on social media. Artificial intelligence algorithms detecting fake news running on laptop in EU command center, camera B

« Vorherige  1  2