Foreign Threats
To Protected Information

Who's Doing What to Whom?
Economic and industrial espionage, illegal technology transfer, cyber espionage, national security threat list. Militarily Critical Technologies List. Economic Espionage Act of 1996.

How Do I Know When I'm Being Targeted and Assessed?
Recognizing the spotting - assessment - recruitment process used by all intelligence services. Who is most likely to be targeted.

Getting Information Out of Honest People Like Me
Methods of operation, unsolicited direct requests, short-term foreign visitors, long-term foreign visitors, front companies, false pretenses, elicitation, collection from open sources, theft and dumpster diving, American travelers abroad.

Risks During Foreign Travel
Country threat updates, security and safety recommendations, avoiding/recognizing intelligence interest, contact with foreign relatives. Vulnerability to theft, bugging, communications intercept. Reporting security incidents, what to do if arrested.

Antiterrorism and Force Protection
Living and traveling outside the U.S., defensive driving overseas, package and letter bombs, kidnapping and hostage survival guidelines, hijacking survival guidelines. Guidelines for captured military personnel.
 

HOME      |      HELP
INFORMATIONCONDUCT | THREATS | TECH VULNERABILITYASSISTANCE
ESPIONAGE 101  | TERRORISM 101