Across
- 2. Spy proof your data with this.
- 4. Mission Impossible version of turn it off and on again.
- 6. Security alerter from mission control.
- 8. First agent in the ITSS organization.
- 11. Agent's secure communication channel.
- 12. Controlled access to classified files.
Down
- 1. Hidden entry point for agents or attackers.
- 3. Command line for missions.
- 5. Double agent that looks safe.
- 7. Security layer that acts like a force field
- 9. Digital notebook for mission intel.
- 10. Encrypted message scrambling algorithm.
