Across
- 2. Hidden entry point for agents and attackers.
- 5. Digital notebook for mission intel.
- 7. Spy proof your data with this.
- 10. Security layer that acts like a force field.
- 11. Agent's secure communication channel.
Down
- 1. Controlled access to classified files.
- 3. Command line for missions.
- 4. Security alerter from mission control.
- 6. First agent in the ITSS organization.
- 8. Mission Impossible version of turn it off and on again.
- 9. Encrypted message scrambling algorithm.
- 11. Double agent that looks safe.
