Who's
Doing What to Whom?
Economic collection and industrial espionage. Illegal technology transfer.
Computer crime. National Security Threat List. Militarily Critical Technologies
List. Economic Espionage Act of 1996.
How Do I Know When I'm Being
Targeted and Assessed?
Recognizing the spotting - assessment - recruitment process used
by all intelligence services. Who is most likely to be targeted.
Getting Information Out of Honest People
Like Me
Elicitation. Unsolicited requests. False pretenses. Short-term foreign
visitors. Long-term foreign visitors. Joint ventures/foreign acquisitions. Open source
collection. Theft and dumpster diving.
Risks During Foreign Travel
Country threat updates. Security and safety recommendations.
Avoiding/recognizing intelligence interest. Contact with foreign relatives. Vulnerability
to theft, bugging, communications intercept. Reporting security incidents. What to do if arrested.
Antiterrorism
and Force Protection
Living and traveling outside the U.S. Defensive driving overseas. Package
and letter bombs. Kidnapping and hostage survival guidelines. Hijacking
survival guidelines. DOD Code of Conduct.
|