Who's Doing What to Whom?
Economic and industrial espionage, illegal
technology transfer, cyber espionage, national security threat list.
Militarily Critical Technologies List. Economic Espionage Act of 1996.
How Do I
Know When I'm Being Targeted and Assessed?
Recognizing the spotting - assessment - recruitment
process used by all intelligence services. Who is most likely to be
targeted.
Getting
Information Out of Honest People Like Me
Methods of operation, unsolicited direct requests, short-term
foreign visitors, long-term foreign visitors, front companies, false
pretenses, elicitation, collection from open sources, theft and dumpster
diving, American travelers abroad.
Risks During Foreign Travel
Country threat updates, security and safety recommendations,
avoiding/recognizing intelligence interest, contact with foreign relatives.
Vulnerability to theft, bugging, communications intercept. Reporting
security incidents, what to do if arrested.
Antiterrorism and Force Protection
Living and traveling outside the U.S., defensive driving overseas, package
and letter bombs, kidnapping and hostage survival guidelines, hijacking
survival guidelines. Guidelines for captured military personnel.
|