Who's Doing What to Whom?
Espionage
against S&T targets. Illegal
technology transfer. Computer
attacks. National Security Threat
List. Militarily Critical
Technologies List. Economic
Espionage Act of 1996.
How Do I Know When I'm Being Targeted
and Assessed?
Recognizing the
spotting - assessment - recruitment process used by all intelligence services. Who is most likely to be targeted?
Getting
Information Out of Honest People Like Me
Methods of
operation. Elicitation. Short-term foreign visitors. Long-term foreign visitors. Unsolicited requests. Open source collection. False pretenses. Theft and dumpster diving.
Risks During Foreign Travel
Country threat
updates. Security and safety
recommendations. Avoiding/recognizing
intelligence interest. Contact
with foreign relatives. Vulnerability
to theft, bugging, communications intercept. Reporting security incidents. What to do if arrested.
Antiterrorism and Force Protection
Living and traveling outside the U.S. Defensive driving overseas. Package and letter bombs. Kidnapping and hostage survival
guidelines. Hijacking survival
guidelines. DOD Code of Conduct.
|