Employees' Guide to Security Responsibilities

Foreign Threats
To Protected Information

Who's Doing What to Whom?
Espionage against S&T targets. Illegal technology transfer. Computer attacks. National Security Threat List.  Militarily Critical Technologies List. Economic Espionage Act of 1996.

How Do I Know When I'm Being Targeted and Assessed?
Recognizing the spotting - assessment - recruitment process used by all intelligence services. Who is most likely to be targeted.

Getting Information Out of Honest People Like Me
Methods of operation. Elicitation. Short-term foreign visitors. Long-term foreign visitors. Unsolicited requests. Open source collection. False pretenses. Theft and dumpster diving.

Risks During Foreign Travel
Country threat updates. Security and safety recommendations. Avoiding/recognizing intelligence interest. Contact with foreign relatives. Vulnerability to theft, bugging, communications intercept. Reporting security incidents. What to do if arrested.

Antiterrorism and Force Protection
Living and traveling outside the U.S. Defensive driving overseas. Package and letter bombs. Kidnapping and hostage survival guidelines. Hijacking survival guidelines. DOD Code of Conduct.

HOME      |      HELP

INFORMATIONCONDUCT | THREATS | TECH VULNERABILITYASSISTANCE
SPY STORIES | TREASON 101