Search keywords: cyberharassment
Images found: 3
Images per page:
Images from Adobe Stock
Hacker Activity
Rootkit
Hacker
Vehicle Extraction SWAT officers securing a hostages vehicle while looking out for threats in a chaotic environment during an extraction.
Hacker Activity
Hacker Activity
Hacker Activity
Hacker
Hacker Activity
Using a Magnifying Glass A forensic expert examines the dusted fingerprint with a magnifying glass to inspect its details.
Cracking
Underpass Scene A police car entering a dark underpass with graffiti on the walls and shadows enhancing the sense of speed and excitement.
Whiteboard Brainstorming The officer standing before a whiteboard covered in sketches of the crime scene writing down observations in a notebook.
Hacker Activity
Weapons Loading An officer loading ammunition into a service rifle with additional weapons and equipment laid out on a nearby table.
Undercover Operation An illustration of a plainclothes detective disguised as a hacker blending in at a coffee shop while monitoring the suspect.
Hacker Activity
These descriptions provide a variety of visual elements that capture the essence of a suspect lineup at a police station.
Weapon Cleaning Supplies A table filled with cleaning supplies and tools for maintaining confied firearms showcasing responsible evidence management practices.
Hacker Activity
Window with Bars A closeup of a barred window at the end of the cell block highlighting the moonlight streaming through the bars and casting patterns on the floor.
Silhouette Reflection
Cracking
These descriptions can be used to create simple effective vector illustrations that depict the scene of an arrest.
These illustrations collectively emphasize the importance of careful and contaminationfree processes in evidence collection.
TwoWay Mirror Focus A closeup view of the twoway mirror reflecting the silhouettes of investigators while revealing an empty interrogation space.
Witness Expression A closeup of the witnesss face portraying concentration and determination as they carefully assess the suspects.
Weapons Ready Three officers standing in formation outside the entrance weapons raised and ready with a loud breach command echoed in the air.
Watchful Eyes A pair of binoculars focused on the getaway car from a nearby rooftop showcasing the tension of the chase.
Training Session A beginner forensic spet receives instruction from a mentor on how to effectively dust for fingerprints.
Vector Design Phone Virus Icon Style
Sketch Artist A forensic artist sketching the scene on a notepad with the sheetcovered body in view and investigators discussing in the background.
Wildflowers or Personal Items A table beside the victim holds personal items or mementos like wildflowers representing their story and struggles as they read.
Vector Design Phone Virus Icon Style
Reflective Moment The artist taking a moment to reflect looking thoughtfully at the drawing board contemplating the witnesss account.
Vector Design Phone Virus Icon Style
Vector Design Phone Virus Icon Style
Cybercrime icon in Flat Color Style With Outline. Simple Vector Design. Simple Vector Flat Icon
Cybercrime icon in Glyph Dual Color Style. Simple Vector Design. Simple Vector Glyph Icon
Surveillance Monitor A wallmounted monitor displaying the live feed of the evidence room enhancing security measures against unauthorized access.
Hacker Icon
Search and Clear Two officers entering a room with weapons drawn looking for threats and ensuring the area is clear of danger.
Search Team Arrival An officer signaling to a search team to approach the area while maintaining the perimeter with vibrant police tape.
Test Results Report A scientist reviewing a written report on test results showing positive or negative indicators for various toxins.
Bomb Icon
Secret Map A closeup of a prisoner studying a homemade map of the prison layout with escape routes highlighted in red.
Vector Design Phone Virus Icon Style
Toxicology Report An open folder displaying a forensic toxicology report with charts and graphs indicating substance levels alongside a laptop.
malware glyph icon
ransomware line icon
Silhouetted Figures with Briefcases Silhouetted figures exchange briefcases in a dark alley depicting potential illicit transactions that investigators are monitoring.
Roof Surveillance A drone positioned above a building roof focused on a window where suious activity is taking place inside.
Tactical Team The negotiator on the phone with a tactical team in the background dressed in uniforms preparing for action while the negotiator maintains a calm approach.
password glyph icon
DDoS glyph icon
spyware line icon
Reinforcements Arriving A vector showing reinforcements arriving at the scenemore officers and vehicles pulling into the prison yard to assist in riot control.
Scales and Weighing Equipment A section of the evidence room with scales and measuring tools for weighing substances clearly tagged for forensic use.
Cybercrime icon in Flat Color Style. Simple Vector Design. Simple Vector Flat Icon
hacker line icon
Tactical Formation A line of SWAT officers advancing in a tactical formation ready to breach an entrance as a cohesive unit.
Identity Theft Icon
Identity Theft Icon
Thief icon in Glyph Dual Color Style. Simple Vector Design. Simple Vector Glyph Icon
Thief icon in Glyph Style. Simple Vector Design. Simple Vector Glyph Icon
malware line icon
firewall line icon
data theft line icon
RealTime Investigation A detective on a stakeout using a laptop with facial recognition software open monitoring pedestrians for known offenders.
Team Briefing The criminal explaining the heist plan to a group of accomplices with the help of a projector displaying the target layout.
hacker Gradient icon
password line icon
Polygraph Machine A closeup of the polygraph machine with wires running to the suspects fingertips showing the readout chart indicating fluctuations.
Identity Theft Icon
Quotes from Witnesses Speech bubbles with quotes from witnesses are attached highlighting their observations and contributing to the overall investigation narrative.
cyber security icon sign vector
encryption line icon
data breach line icon
Safety Procedures Pathologists putting on face shields and masks as part of their safety protocols before starting the autopsy.
Safe Cracking A robber is depicted with tools working on cracking a combination safe surrounded by tered money and a floor map of the bank.
Testing Machine A hightech machine in a lab analyzing particles collected from evidence with a digital display showing readings.
Cybercrime icon in Glyph Dual Color Style. Simple Vector Design. Simple Vector Glyph Icon
Cybercrime icon in Glyph Dual Color Style. Simple Vector Design. Simple Vector Glyph Icon
hacker glyph icon
Scanning Process A stepbystep diagram depicting the process of placing a finger on the scanner capturing the print and sending it to a digital database.
Cybercrime icon in Glyph Style. Simple Vector Design. Simple Vector Glyph Icon
Cybercrime icon in Glyph Style. Simple Vector Design. Simple Vector Glyph Icon
hacker Solid icon
encryption glyph icon
data theft glyph icon
keypad skull glyph icon
phishing line icon
keypad skull line icon
Ransomware Threat: A lock on a computer screen, representing ransomware demands. Best for educating on ransomware attacks.
Ransomware Threat: A lock on a computer screen, representing ransomware demands. Best for educating on ransomware attacks.
Ransomware Threat: A lock on a computer screen, representing ransomware demands. Best for educating on ransomware attacks.
Ransomware Threat: A lock on a computer screen, representing ransomware demands. Best for educating on ransomware attacks.
Ransomware Threat: A lock on a computer screen, representing ransomware demands. Best for educating on ransomware attacks.
Phishing Scam Phone Call: A phone alert showing a phishing call. Ideal for educating on phone-based scams.
Phishing Scam Phone Call: A phone alert showing a phishing call. Ideal for educating on phone-based scams.
Next page
/ 10