Counterintelligence

Results: 519



#Item
191Computer security / Computer network security / Insider / Counterintelligence / Vulnerability / Threat / Cyberwarfare / Hacking / Espionage

ASIS F O U N D AT IO N C R I S P R E P O RT Connecting Research in Security to Practice Tackling the Insider Threat

Add to Reading List

Source URL: www.popcenter.org

Language: English - Date: 2012-03-21 09:25:37
192Classified information in the United States / United States government secrecy / Counter-intelligence / Intelligence analysis / Military intelligence / Special access program / Counterintelligence / SAP AG / Brief / National security / Espionage / Military science

Microsoft PowerPoint - SAP Required Briefings and De-Briefings

Add to Reading List

Source URL: www.cdse.edu

Language: English - Date: 2014-06-04 13:43:27
193Privacy of telecommunications / Intelligence analysis / United States Intelligence Community / Mass surveillance / Central Intelligence Agency / Declassification / Classified information / Counterintelligence / Public Interest Declassification Board / National security / Espionage / Security

.n[removed]Statutory and Administrative Law Glossary for U.S. Intelligence Law DAVID ALAN JORDAN

Add to Reading List

Source URL: upload.wikimedia.org

Language: English - Date: 2013-11-05 20:53:55
194Espionage / Crime prevention / Data security / Classified information in the United States / Security clearance / Special access program / Security guard / SAP AG / Counterintelligence / National security / Security / United States government secrecy

Chapter 3 Security Training and Briefings Section 1. Security Training and Briefings h. Specific procedures to report fraud, waste, and abuse.

Add to Reading List

Source URL: www.cdse.edu

Language: English - Date: 2014-06-04 13:55:43
195Counter-intelligence / International Spy Museum / Operation Spy / Spy / Counterintelligence / Covert operation / Espionage / Security / Military intelligence

Microsoft Word - Interactive Experience - Operation Spy Fact Sheet & FAQs

Add to Reading List

Source URL: spy-museum.s3.amazonaws.com

Language: English - Date: 2014-05-07 16:22:38
196Counter-intelligence / Intelligence analysis / Military intelligence / Computer security / Operations security / Asset / Counterintelligence / Vulnerability / Information security / Security / National security / Espionage

Transcript for Defining Operations Security (OPSEC) for Special Access Programs (SAPs) Webinar

Add to Reading List

Source URL: www.cdse.edu

Language: English - Date: 2014-03-05 15:03:06
197Data collection / Intelligence analysis / Military intelligence / Counterintelligence / Central Intelligence Agency / United States Intelligence Community / Director of National Intelligence / Federal Bureau of Investigation / United States House Permanent Select Committee on Intelligence / Espionage / National security / Counter-intelligence

42 USC 7144b NB: This unofficial compilation of the U.S. Code is current as of Jan. 4, 2012 (see http://www.law.cornell.edu/uscode/uscprint.html). TITLE 42 - THE PUBLIC HEALTH AND WELFARE CHAPTER 84 - DEPARTMENT OF ENERG

Add to Reading List

Source URL: www.law.cornell.edu

Language: English - Date: 2013-07-17 17:59:42
198Human intelligence / Intelligence / Email address / Counterintelligence / Advanced Linux Sound Architecture / Central Intelligence Agency / Espionage / National security / Data collection

ATZS-DOD-HT 12 March 2009 MEMORANDUM FOR ASOC Applicants SUBJECT: Advanced Source Operations Course Candidate Application Packet

Add to Reading List

Source URL: www.hqmc.marines.mil

Language: English - Date: 2012-08-15 09:18:42
199United States government secrecy / Cyberwarfare / Lie detection / Polygraph / Pseudoscience / Security clearance / Industrial espionage / Classified information / Counterintelligence / Espionage / National security / Security

EMPLOYEE Security CONNECTION A quarterly awareness briefing for defense industry and government employees

Add to Reading List

Source URL: www.ors.msstate.edu

Language: English - Date: 2009-07-16 09:13:43
200United States Department of Energy / Executive Schedule / Central Intelligence Agency / Politics of the United States / Military acquisition / Robert Joseph / Under Secretary of Defense for Acquisition /  Technology and Logistics / Government / Office of Intelligence and Counterintelligence / United States federal executive departments

National Nuclear Security Administration Act Updated February 10, 2014 Source: Title XXXII of the National Defense Authorization Act for Fiscal Year 2000, Pub. L[removed], as amended by the Energy and Water Development App

Add to Reading List

Source URL: nnsa.energy.gov

Language: English - Date: 2014-02-21 16:20:00
UPDATE