Examples of using Secure phone in English and their translations into Hebrew
{-}
-
Colloquial
-
Ecclesiastic
-
Computer
-
Programming
This is not a secure phone.
An insanely secure phone and somebody uses it to order pizza?
I'm calling from a secure phone.
Nearest secure phone above that?
At his residence on a secure phone line.
When I gave you a secure phone network, this wasn't what I had in mind.
Do you remember how to get to the secure phone?
This is a secure phone, isn't it?
Itineraries out of the country… secure phones.
If that's a secure phone, I need it.
David to all units, we are sending in a secure phone.
And on one of our secure phones no less.
Sloane's secure phone should be in his desk. Okay, Dixon, stand by.
Limit face-to-face meetings, use secure phone lines.
We have secure phone lines… Either way, I think we should do this now.
Spit it out, McGee. It's a secure phone, registered to the FBI.
In operations that take him around the globe, Ferris'next breath often depends on the voice at the other end of a secure phone line--CIA veteran Ed Hoffman.
I'm also getting you a secure phone and having a bank account set up in your name.
I called home to check messages, but I used the secure phone that you gave me.
Also, I need a secure phone line and electronic access to all police and school records.
Oh, and don't even think about trying to secure phone service or internet.
I'm sorry, Colonel, I'm not clear how Karzai's remarks could have been intended for adomestic audience when he was speaking on a secure phone to the President of the United States.
Syd, we need to get into Sloane's house.If we could copy the encryption key from his secure phone, we could crack the calls to gain access to his conversations.
Apparently, a short while after Ross left his position in the Obama administration,the White House made an unusual request to install a secure phone line in Ross' office at the Washington Institute.
The company now provides a holistic solution, combining a secured phone, unique operating system, encrypted communications, and threat detection and blocking, as well as centralized management embedded in the operating system and an option to establish a private secure network.
Tips for keeping your phone secure.
I gave her a secure sat phone.
Is the data on your phone secure?
Keep your phone secure with the fingerprint sensor.
My phone is secure. it's secure. .
