Massachusetts Institute of Technology
Sign in Create Account

Videos tagged with security (69)

Document in a textile bag

Document in a textile bag

Letterlocking

Added 10 days ago | 00:00:27 | 58 views

Letterlocking: Blank Margin Lock

Letterlocking: Blank Margin Lock

Letterlocking

Added 10 days ago | 00:04:45 | 57 views

Russian Soldier World War II Triangle-Shaped Folded Letter, 1940s

Russian Soldier World War II Triang...

Letterlocking

Added 6 months ago | 00:00:22 | 3178 views

This letterlocking format was used exclusively by Russian Soldiers during World War II. Sealing the letter shut was forbidden. The format could be easily identified, opened by censors and reviewed, refolded and send forward to the intend...

Areg Danagoulian

Areg Danagoulian

Research Thumbnails

Added 8 months ago | 00:01:38 | 1270 views

Professor Areg Danagoulian is working on developing a monochromatic beam source that emits at a fixed energy level, making active scanning of cargo for the presence of fissionable, fissile, nuclear materials and devices faster and more...

Securing the Human: Online Video-Based Training

Securing the Human: Online Video-Ba...

Information Systems and Technology (IS&T)

Added 11 months ago | 00:03:35 | 1956 views

Computing devices are everywhere. We use them to communicate with each other, buy products, and manage our accounts. Because they’re so essential, it’s critical that we safeguard these devices and the information on them. To learn best...

R. Scott Kemp

R. Scott Kemp

Research Thumbnails

Added over 1 year ago | 00:01:11 | 1839 views

Professor R. Scott Kemp is looking at how to move past traditional technical modes of verification by using open source literature as a way to detect clandestine nuclear programs.

Cell Phone Skeleton Key

Cell Phone Skeleton Key

Class of 2011

Added almost 2 years ago | 00:03:04 | 1359 views

Kristina Bjoran '11 interviews Steven Bucci about cell phone security.

R. Scott Kemp

R. Scott Kemp

Research Thumbnails

Added almost 2 years ago | 00:00:33 | 1901 views

All engineering disciplines interact with society, but nuclear engineering is a special case, inexorably bound up with critical issues of our era: energy, the environment, and international security. Developing a deeper understanding of ...

MISTI MIT-Israel Safety and Security 2013

MISTI MIT-Israel Safety and Securit...

MISTI MIT-Israel Spring Training 2013

Added 2 years ago | 00:29:11 | 745 views

Overview of safety and security protocol for MIT-Israel students

Encrypting Sensitive Data: What You Need to Know

Encrypting Sensitive Data: What You...

Information Systems and Technology (IS&T)

Added over 2 years ago | 00:03:33 | 2434 views |

Does your laptop or desktop computer contain sensitive data, such as Social Security numbers, credit card numbers, protected health information, proprietary research data, or confidential legal data? If so, MIT policy and Massachusetts r...

Binvention - multi-compartment TSA security bin - 3rd place - ESD.40 Final Presentation

Binvention - multi-compartment TSA ...

SDM 2012 PDD Winning Presentations

Added over 2 years ago | 00:15:26 | 2319 views

This is the Final Presentation of the "Binvention" Team in the ESD.40 - Product Design and Development final class presentations given May 11, 2012.  This team placed 3rd in the class competition.

My Five Dinners with Ahmadinejad, featuring Jim Walsh PhD '00

My Five Dinners with Ahmadinejad, f...

MIT Alumni Association

Added almost 3 years ago | 00:32:45 | 5639 views

Jim Walsh PhD '00 is one of a small number of Americans who has traveled to North Korea and Iran for talks with officials about nuclear issues. A research associate in the MIT Security Studies Program, he is an international security exp...

← Previous 1 3 4 5 6