Submit Search
Upload
Scan 2014-12-13 0019
•
0 likes
•
136 views
James Atkinson
Follow
Report
Share
Report
Share
1 of 1
Download now
Download to read offline
Recommended
Scan 2014-12-13 0021
Scan 2014-12-13 0021
James Atkinson
Detection of Tracking Devices, Motor Vehicle Bugs, and other interesting things
Source2009 03.12.2009-vehcile bugs
Source2009 03.12.2009-vehcile bugs
James Atkinson
History of the HEXAGON series of spy satellites whereby the satellite exposed massive rolls of the file, and ejected cartridges by parachute, with the parachute being plucked out of the sky and pull in the back of a special plane. Dr. Land and Dr. Edgerton where the driving force behind this project.
Photography.history.invention..hexagon.final
Photography.history.invention..hexagon.final
James Atkinson
Director of Defense Trade Controls Presntation
Itar slides for_qaisc_5-27-09
Itar slides for_qaisc_5-27-09
James Atkinson
An Excellent PPT slide deck I created for teaching CPR at the Professional Level
Adult cpr & aed copy multimdi
Adult cpr & aed copy multimdi
James Atkinson
"Stop Being a Sheep" or a fairly simple method to properly combat terrorism on an international scale.
Crj 117 global war of terror.b
Crj 117 global war of terror.b
James Atkinson
FBI Vulnerability report on the counter CISCO issues, and the ECI level working relationship the U.S. Intelligencies have with CISCO for backdoor access.
Fbi cisco-om bbriefing2008.01.11 a
Fbi cisco-om bbriefing2008.01.11 a
James Atkinson
BBN Talk on Technical Counter-Intelligence
2009 05 18 sdp bbn talk
2009 05 18 sdp bbn talk
James Atkinson
Recommended
Scan 2014-12-13 0021
Scan 2014-12-13 0021
James Atkinson
Detection of Tracking Devices, Motor Vehicle Bugs, and other interesting things
Source2009 03.12.2009-vehcile bugs
Source2009 03.12.2009-vehcile bugs
James Atkinson
History of the HEXAGON series of spy satellites whereby the satellite exposed massive rolls of the file, and ejected cartridges by parachute, with the parachute being plucked out of the sky and pull in the back of a special plane. Dr. Land and Dr. Edgerton where the driving force behind this project.
Photography.history.invention..hexagon.final
Photography.history.invention..hexagon.final
James Atkinson
Director of Defense Trade Controls Presntation
Itar slides for_qaisc_5-27-09
Itar slides for_qaisc_5-27-09
James Atkinson
An Excellent PPT slide deck I created for teaching CPR at the Professional Level
Adult cpr & aed copy multimdi
Adult cpr & aed copy multimdi
James Atkinson
"Stop Being a Sheep" or a fairly simple method to properly combat terrorism on an international scale.
Crj 117 global war of terror.b
Crj 117 global war of terror.b
James Atkinson
FBI Vulnerability report on the counter CISCO issues, and the ECI level working relationship the U.S. Intelligencies have with CISCO for backdoor access.
Fbi cisco-om bbriefing2008.01.11 a
Fbi cisco-om bbriefing2008.01.11 a
James Atkinson
BBN Talk on Technical Counter-Intelligence
2009 05 18 sdp bbn talk
2009 05 18 sdp bbn talk
James Atkinson
Interest presentation about phone bugging, and how to detect it and how to trace it. A great wealth of detailed technical information.
Havard phone lecture-05.28.2009e-pruned
Havard phone lecture-05.28.2009e-pruned
James Atkinson
Non-Technical Issues in terms of positive findings during and after a bug sweep
Eri2006 what to do fter descovering
Eri2006 what to do fter descovering
James Atkinson
How to properly bug sweep an automobile
Eri2006 vehcile sweeps
Eri2006 vehcile sweeps
James Atkinson
How to document a TSCM or Bug Sweep
Eri2006 sweep documentation-2006
Eri2006 sweep documentation-2006
James Atkinson
ART AND PHOTOGRAPHY
Artof photography.feb2014.chapterpresentation
Artof photography.feb2014.chapterpresentation
James Atkinson
Gloucester Daily 03_27_03 copy
Gloucester Daily 03_27_03 copy
James Atkinson
Hearing Press Release
Hearing Press Release
James Atkinson
James Atkinson-Summary
James Atkinson-Summary
James Atkinson
Courtfiling_for_Kaushal_Niroula_in_Pro_Per_Babble_…-3
Courtfiling_for_Kaushal_Niroula_in_Pro_Per_Babble_…-3
James Atkinson
FullCommitteeTranscript-v2
FullCommitteeTranscript-v2
James Atkinson
Cummings Ltr to Allen 4-13-07
Cummings Ltr to Allen 4-13-07
James Atkinson
JamesAtkinsonwrittenTestimony
JamesAtkinsonwrittenTestimony
James Atkinson
James Atkinson
James Atkinson
James Atkinson
Completion and certification by i-Safe, in regards to computer security, online privacy and security, and edge between the online and off-line world, protection of intellectual property, dealing with anti-social online incident. Primary a certification on TEACHING other people how to handle these sort of problems or concerns.
i-Safe Certification
i-Safe Certification
James Atkinson
CertErate
CertErate
James Atkinson
Scan 2014-12-28 0022
Scan 2014-12-28 0022
James Atkinson
Two week intense Criminal Intelligence Analysis course to be able to convert raw information and data into well developed intelligence upon which inferences could be draw. I was the only non government employee in the room, and the bulk of the students were form he FBI, U.S. Secret Service, Mass. State Police, Attorney Generals Office, and other higher level law enforcement agencies.
Criminal Intelligence Analsysis
Criminal Intelligence Analsysis
James Atkinson
Financial Manipulation Analysis course to be able to track money laundering activities, the hiding of assets and resources by organized crime, corrupt politicians, narcotics distributors, rackets, gambling, and other forms of large scale financial crimes. I was the only civilian in the classroom with most of the other students coming from federal law enforcement agencies. A lot of state gaming commission students.
Financial Manipulation Analysis
Financial Manipulation Analysis
James Atkinson
Course of the essential modalities use to find eavesdropping systems that radiate signals over he airwaves, to a remove listening post.
Electronic Countermeasures II
Electronic Countermeasures II
James Atkinson
Technical Intelligence Operations
Technical Intelligence Operations
James Atkinson
More Related Content
More from James Atkinson
Interest presentation about phone bugging, and how to detect it and how to trace it. A great wealth of detailed technical information.
Havard phone lecture-05.28.2009e-pruned
Havard phone lecture-05.28.2009e-pruned
James Atkinson
Non-Technical Issues in terms of positive findings during and after a bug sweep
Eri2006 what to do fter descovering
Eri2006 what to do fter descovering
James Atkinson
How to properly bug sweep an automobile
Eri2006 vehcile sweeps
Eri2006 vehcile sweeps
James Atkinson
How to document a TSCM or Bug Sweep
Eri2006 sweep documentation-2006
Eri2006 sweep documentation-2006
James Atkinson
ART AND PHOTOGRAPHY
Artof photography.feb2014.chapterpresentation
Artof photography.feb2014.chapterpresentation
James Atkinson
Gloucester Daily 03_27_03 copy
Gloucester Daily 03_27_03 copy
James Atkinson
Hearing Press Release
Hearing Press Release
James Atkinson
James Atkinson-Summary
James Atkinson-Summary
James Atkinson
Courtfiling_for_Kaushal_Niroula_in_Pro_Per_Babble_…-3
Courtfiling_for_Kaushal_Niroula_in_Pro_Per_Babble_…-3
James Atkinson
FullCommitteeTranscript-v2
FullCommitteeTranscript-v2
James Atkinson
Cummings Ltr to Allen 4-13-07
Cummings Ltr to Allen 4-13-07
James Atkinson
JamesAtkinsonwrittenTestimony
JamesAtkinsonwrittenTestimony
James Atkinson
James Atkinson
James Atkinson
James Atkinson
Completion and certification by i-Safe, in regards to computer security, online privacy and security, and edge between the online and off-line world, protection of intellectual property, dealing with anti-social online incident. Primary a certification on TEACHING other people how to handle these sort of problems or concerns.
i-Safe Certification
i-Safe Certification
James Atkinson
CertErate
CertErate
James Atkinson
Scan 2014-12-28 0022
Scan 2014-12-28 0022
James Atkinson
Two week intense Criminal Intelligence Analysis course to be able to convert raw information and data into well developed intelligence upon which inferences could be draw. I was the only non government employee in the room, and the bulk of the students were form he FBI, U.S. Secret Service, Mass. State Police, Attorney Generals Office, and other higher level law enforcement agencies.
Criminal Intelligence Analsysis
Criminal Intelligence Analsysis
James Atkinson
Financial Manipulation Analysis course to be able to track money laundering activities, the hiding of assets and resources by organized crime, corrupt politicians, narcotics distributors, rackets, gambling, and other forms of large scale financial crimes. I was the only civilian in the classroom with most of the other students coming from federal law enforcement agencies. A lot of state gaming commission students.
Financial Manipulation Analysis
Financial Manipulation Analysis
James Atkinson
Course of the essential modalities use to find eavesdropping systems that radiate signals over he airwaves, to a remove listening post.
Electronic Countermeasures II
Electronic Countermeasures II
James Atkinson
Technical Intelligence Operations
Technical Intelligence Operations
James Atkinson
More from James Atkinson
(20)
Havard phone lecture-05.28.2009e-pruned
Havard phone lecture-05.28.2009e-pruned
Eri2006 what to do fter descovering
Eri2006 what to do fter descovering
Eri2006 vehcile sweeps
Eri2006 vehcile sweeps
Eri2006 sweep documentation-2006
Eri2006 sweep documentation-2006
Artof photography.feb2014.chapterpresentation
Artof photography.feb2014.chapterpresentation
Gloucester Daily 03_27_03 copy
Gloucester Daily 03_27_03 copy
Hearing Press Release
Hearing Press Release
James Atkinson-Summary
James Atkinson-Summary
Courtfiling_for_Kaushal_Niroula_in_Pro_Per_Babble_…-3
Courtfiling_for_Kaushal_Niroula_in_Pro_Per_Babble_…-3
FullCommitteeTranscript-v2
FullCommitteeTranscript-v2
Cummings Ltr to Allen 4-13-07
Cummings Ltr to Allen 4-13-07
JamesAtkinsonwrittenTestimony
JamesAtkinsonwrittenTestimony
James Atkinson
James Atkinson
i-Safe Certification
i-Safe Certification
CertErate
CertErate
Scan 2014-12-28 0022
Scan 2014-12-28 0022
Criminal Intelligence Analsysis
Criminal Intelligence Analsysis
Financial Manipulation Analysis
Financial Manipulation Analysis
Electronic Countermeasures II
Electronic Countermeasures II
Technical Intelligence Operations
Technical Intelligence Operations
Download now