Secret Service 2

Last updated
Secret Service 2: Security Breach
Developer(s) 4D Rulers
Publisher(s) Activision Value
Engine AMP II Game Engine
Platform(s) Windows XP
Release2003
Genre(s) FPS
Mode(s) Single player

Secret Service 2: Security Breach is a computer game created by 4D Rulers and published by Activision Value. It puts the player in the position of a member of the secret service whose purpose is to defend the President. It is a sequel to Secret Service (2001).

Contents

Story

The security of the President and the nation rests squarely on the player's shoulders. As a new recruit on the rise, they will be faced with many life-threatening situations. Relying on their instincts and training, they must detect threats and stop terrorist actions before they can become a reality. It's their responsibility to deal with the "bad guys", protect the good guys and the overall well-being of their country.

Features

Related Research Articles

National Security Agency U.S. signals intelligence organization

The National Security Agency (NSA) is a national-level intelligence agency of the United States Department of Defense, under the authority of the Director of National Intelligence (DNI). The NSA is responsible for global monitoring, collection, and processing of information and data for foreign and domestic intelligence and counterintelligence purposes, specializing in a discipline known as signals intelligence (SIGINT). The NSA is also tasked with the protection of U.S. communications networks and information systems. The NSA relies on a variety of measures to accomplish its mission, the majority of which are clandestine. The existence of the NSA was not revealed until 1975. The NSA has roughly 32,000 employees.

Ubiquitous computing is a concept in software engineering, hardware engineering and computer science where computing is made to appear anytime and everywhere. In contrast to desktop computing, ubiquitous computing can occur using any device, in any location, and in any format. A user interacts with the computer, which can exist in many different forms, including laptop computers, tablets, smart phones and terminals in everyday objects such as a refrigerator or a pair of glasses. The underlying technologies to support ubiquitous computing include Internet, advanced middleware, operating system, mobile code, sensors, microprocessors, new I/O and user interfaces, computer networks, mobile protocols, location and positioning, and new materials.

Security Degree of resistance to, or protection from, harm

Security is protection from, or resilience against, potential harm caused by others, by restraining the freedom of others to act. Beneficiaries of security may be of persons and social groups, objects and institutions, ecosystems or any other entity or phenomenon vulnerable to unwanted change.

United States Secret Service Federal US law enforcement agency

The United States Secret Service is a federal law enforcement agency under the Department of Homeland Security charged with conducting criminal investigations and protecting U.S. political leaders, their families, and visiting heads of state or government. Until 2003, the Secret Service was part of the Department of the Treasury, as the agency was founded in 1865 to combat the then-widespread counterfeiting of U.S. currency.

MI5 British domestic intelligence agency

The Security Service, also known as MI5, is the United Kingdom's domestic counter-intelligence and security agency and is part of its intelligence machinery alongside the Secret Intelligence Service (MI6), Government Communications Headquarters (GCHQ), and Defence Intelligence (DI). MI5 is directed by the Joint Intelligence Committee (JIC), and the service is bound by the Security Service Act 1989. The service is directed to protect British parliamentary democracy and economic interests and to counter terrorism and espionage within the United Kingdom (UK).

Nuclear terrorism Terrorism involving nuclear material or weapons

Nuclear terrorism refers to any person or persons detonating a nuclear weapon as an act of terrorism. Some definitions of nuclear terrorism include the sabotage of a nuclear facility and/or the detonation of a radiological device, colloquially termed a dirty bomb, but consensus is lacking. In legal terms, nuclear terrorism is an offense committed if a person unlawfully and intentionally "uses in any way radioactive material … with the intent to cause death or serious bodily injury; or with the intent to cause substantial damage to property or to the environment; or with the intent to compel a natural or legal person, an international organization or a State to do or refrain from doing an act", according to the 2005 United Nations International Convention for the Suppression of Acts of Nuclear Terrorism.

Counterintelligence Offensive measures using enemy information

Counterintelligence is an activity aimed at protecting an agency's intelligence program from an opposition's intelligence service. It includes gathering information and conducting activities to prevent espionage, sabotage, assassinations or other intelligence activities conducted by, for, or on behalf of foreign powers, organizations or persons.

SHISH

The State Intelligence Service, commonly known by its acronym SHISH, is the primary intelligence agency of Albania. It was preceded by SHIK.

Federal Security Service Principal security agency of Russia (FSB)

The Federal Security Service of the Russian Federation is the principal security agency of Russia and the main successor agency to the Soviet Union's KGB; its immediate predecessor was the Federal Counterintelligence Service (FSK) which was reorganized into the FSB in 1995. The three major structural successor components of the former KGB that remain administratively independent of the FSB are the Foreign Intelligence Service (SVR), the Federal Protective Service (FSO), and the Main Directorate of Special Programs of the President of the Russian Federation (GUSP).

Multilevel security or multiple levels of security (MLS) is the application of a computer system to process information with incompatible classifications, permit access by users with different security clearances and needs-to-know, and prevent users from obtaining access to information for which they lack authorization. There are two contexts for the use of multilevel security. One is to refer to a system that is adequate to protect itself from subversion and has robust mechanisms to separate information domains, that is, trustworthy. Another context is to refer to an application of a computer that will require the computer to be strong enough to protect itself from subversion and possess adequate mechanisms to separate information domains, that is, a system we must trust. This distinction is important because systems that need to be trusted are not necessarily trustworthy.

Bureau of Diplomatic Security U.S. State Department security and law enforcement division

The Bureau of Diplomatic Security, commonly known as Diplomatic Security (DS), is the security branch of the United States Department of State. It conducts international investigations, threat analysis, cyber security, counterterrorism, and protection of people, property, and information. Its mission is to provide a safe and secure environment for officials to execute the foreign policy of the United States.

A first-person shooter engine is a video game engine specialized for simulating 3D environments for use in a first-person shooter video game. First-person refers to the view where the players see the world from the eyes of their characters. Shooter refers to games which revolve primarily around wielding firearms and killing other entities in the game world, either non-player characters or other players.

Ronald Kessler American journalist and non-fiction author

Ronald Borek Kessler is an American journalist and author of 21 non-fiction books about the White House, U.S. Secret Service, FBI, and CIA.

Architecture of Windows NT Overview of the architecture of the Microsoft Windows NT line of operating systems

The architecture of Windows NT, a line of operating systems produced and sold by Microsoft, is a layered design that consists of two main components, user mode and kernel mode. It is a preemptive, reentrant multitasking operating system, which has been designed to work with uniprocessor and symmetrical multiprocessor (SMP)-based computers. To process input/output (I/O) requests, they use packet-driven I/O, which utilizes I/O request packets (IRPs) and asynchronous I/O. Starting with Windows XP, Microsoft began making 64-bit versions of Windows available; before this, there were only 32-bit versions of these operating systems.

The XTS-400 is a multilevel secure computer operating system. It is multiuser and multitasking that uses multilevel scheduling in processing data and information. It works in networked environments and supports Gigabit Ethernet and both IPv4 and IPv6.

<i>Secret Service</i> (2001 video game) 2001 video game

Secret Service is a budget-title first-person tactical shooter computer game released in 2001. The title's disclaimer states that it is in no way affiliated with or approved by the United States Secret Service.

The Department of Intelligence and Security (DRS) was the Algerian state intelligence service. Its existence dates back to the struggle for independence.

Chartered Institution of Building Services Engineers

The Chartered Institution of Building Services Engineers is an international professional engineering association based in London that represents building services engineers, also commonly known as mechanical and electrical engineers, architectural engineers, technical building services engineers, building engineers, or facilities and services planning engineers. It is a full member of the Construction Industry Council, and is consulted by government on matters relating to construction, engineering and sustainability. It is also licensed by the Engineering Council to assess candidates for inclusion on its Register of Professional Engineers.

Information exchange or information sharing means that people or other entities pass information from one to another. This could be done electronically or through certain systems. These are terms that can either refer to bidirectional information transfer in telecommunications and computer science or communication seen from a system-theoretic or information-theoretic point of view. As, "information," in this context invariably refers to (electronic) data that encodes and represents the information at hand, a broader treatment can be found under data exchange.

The State Committee for National Security is the national agency responsible for intelligence on counter terrorism and organised crime in Kyrgyzstan. In carrying out this task, it carries out both preventive and investigative measures against organized terrorism and crime. The chairman of the UKMK is a military officer and a member of the Security Council of Kyrgyzstan. It is currently based on 70 Erkindik Street, Bishkek.