Word: interceptive
(lookup in dictionary)
(lookup stats)
Dates: all
Sort By: most recent first
(reverse)
That's what she did in the third period at UNH Dec. 6 in the game that gave Harvard the No. 1 national ranking for the first time in school history. With 6:33 left in regulation and the Wildcats leading 2-1, Shewchuk came out of nowhere to intercept a UNH pass at the blue line...
...because once a ticket is used, the carrier can demand payment from the agency, even for stolen tickets. The agents say the airlines could thwart these crimes by using scanners capable of detecting tickets that have been reported stolen. Such technology would have enabled Hawaiian Airlines, for example, to intercept two passengers who flew from Honolulu to Maui last year with stolen first-class tickets on a plane that had no first-class section...
...called Mixmaster. (Whistle blowers against government or corporate abuses, for instance, like this as do people who want to discuss sexual abuse.) It encrypts your mail, chunks it up and sends it out through a chain of "remailers"--computers that forward mail to other computers, making it impossible to intercept and trace back. Note, though, that you can't receive replies. By summer, Cottrell hopes to improve the service with something called a Nym (for pseudonym) Server that allows you to maintain untraceable, two-way e-mail under multiple aliases. The anonymous Web browser and Mixmaster are available for free...
...solution: an automated system that did not put people at risk. The NSA has a team of covert operatives who work with agents in the CIA's Science and Technology Directorate to manufacture the highly sophisticated ground scanners and signal interceptors that the U.S. plants in foreign countries. To intercept signals, the NSA and S&T teams developed miniaturized monitors that are concealed in everyday objects such as lamps, phones, signposts, building gutters and commercial electric equipment. The CIA even has its own secret factory, which produces microbatteries no bigger than fingernail clippings to power the devices. For the Baghdad...
Thus, although various computers on the Internet can still intercept the information you are transmitting, the encrypted nature of this information renders it meaningless. Attempts to decrypt the information, by anyone but the intended receiver, involves the commitment of years of computer time, frequently more years than the average human lifepan...