IWS - The Information Warfare Site
News Watch Make a  donation to IWS - The Information Warfare Site Use it for navigation in case java scripts are disabled

Foreign Threats
To Protected Information

Who's Doing What to Whom?
Economic collection and industrial espionage. Illegal technology transfer. Computer crime. National Security Threat List.  Militarily Critical Technologies List. Economic Espionage Act of 1996.

How Do I Know When I'm Being Targeted and Assessed?
Recognizing the spotting - assessment - recruitment process used by all intelligence services. Who is most likely to be targeted.

Getting Information Out of Honest People Like Me
Elicitation. Unsolicited requests. False pretenses. Short-term foreign visitors. Long-term foreign visitors. Joint ventures/foreign acquisitions. Open source collection. Theft and dumpster diving.

Risks During Foreign Travel
Country threat updates. Security and safety recommendations. Avoiding/recognizing intelligence interest. Contact with foreign relatives. Vulnerability to theft, bugging, communications intercept. Reporting security incidents. Kidnapping and hijacking. What to do if arrested.

 

HOME      |      HELP

SECURITYTHREATS | TECH VULNERABILITYASSISTANCE | SPY STORIES | TREASON 101