Who's Doing What to Whom?
Espionage against S&T targets. Illegal
technology transfer. Computer attacks. National Security Threat List.
Militarily Critical Technologies List. Economic Espionage Act of 1996.
How Do I Know When I'm Being
Targeted and Assessed?
Recognizing the spotting - assessment - recruitment process used
by all intelligence services. Who is most likely to be targeted.
Getting Information Out of Honest People
Like Me
Methods of operation. Elicitation. Short-term foreign
visitors. Long-term foreign visitors. Unsolicited requests. Open source
collection. False pretenses. Theft and dumpster diving.
Risks During Foreign Travel
Country threat updates. Security and safety recommendations.
Avoiding/recognizing intelligence interest. Contact with foreign relatives. Vulnerability
to theft, bugging, communications intercept. Reporting security incidents. What to do if arrested.
Antiterrorism
and Force Protection
Living and traveling outside the U.S. Defensive driving overseas. Package
and letter bombs. Kidnapping and hostage survival guidelines. Hijacking
survival guidelines. DOD Code of Conduct.
|