Results 71 to 80 of about 10,273 (209)
The impact of the “Red Scare” and the “Palmer Raids” on FBI policy in the 1920s
The article highlights the changes in the policy of the US Federal Bureau of Investigation (until 1935 – Bureau of Investigation). The condemnation of the “Palmer Raids” in mass media and the ensuing negative reaction of the Congress forced the Bureau’s ...
Levin Yaroslav Alexandrovich
doaj
Ecoterrorism and cyberattacks vs. Critical infrastructure: Counterintelligence and security aspects [PDF]
Critical infrastructure encompasses systems and resources essential to the functioning of the state and its protection consequently stands at the pinnacle of counterintelligence and security priorities.
Živaljević Dragan, Gavrić Nevena
doaj +1 more source
The ISCIP Analyst, Volume IV, Issue 8 [PDF]
This repository item contains a single issue of The ISCIP Analyst, an analytical review journal published from 1996 to 2010 by the Boston University Institute for the Study of Conflict, Ideology, and ...
Cavan, Susan +8 more
core
Invulnerable – Informed about Vulnerabilities! [PDF]
A hostile intelligence entity is trying to identify or create behavioural vulnerabilities – professional dissatisfaction, unrealistic expectations, gambling, spending/borrowing beyond means, expensive lifestyle, financial difficulties, so as to exploit ...
Florin BUȘTIUC
doaj
Counterintelligence disinformation operation
The article examines the mechanisms for the implementation of one of the main methods in the counter-intelligence activity, which aims to create favorable conditions for successfully countering the intelligence approaches of foreign special services. The essence of the disinformation, the particularities of the operations of this kind by the counter ...
openaire +1 more source
Intelligence Whistleblower Protections: In Brief [PDF]
Intelligence whistleblowers are generally Intelligence Community (IC) employees or contractors who bring to light allegations of agency wrongdoings by, for example, disclosing information on such wrongdoings to congressional intelligence committees. Such
Berry, Rodney M
core +2 more sources
A Worst Practices Guide to Insider Threats: Lessons from Past Mistakes [PDF]
Insider threats are perhaps the most serious challenges that nuclear security systems face. All of the cases of theft of nuclear materials where the circumstances of the theft are known were perpetrated either by insiders or with the help of insiders ...
Matthew Bunn, Scott D. Sagan
core
Shielding Against Social Engineering Threats: A Counterintelligence Approach
In an increasingly networked global context, commercial counterintelligence units and competitive intelligence experts must deal with sophisticated social engineering threats that exploit human psychology rather than technological shortcomings.
Anastasios-Nikolaos KANELLOPOULOS
doaj +1 more source
Facing cyberthreats in a crisis and post-crisis era: Rethinking security services response strategy. [PDF]
Guitton MJ, Fréchette J.
europepmc +1 more source
The Disinformation Activities of the KGB of Lithuanian SSR and Protection of Secrets in 1954–1991
Competition between the USA and USSR during the Cold War was concurrent with spying and protection of secrets. Those targets were implemented by various measures. Disinformation was an exceptionally important method among them.
Kristina Burinskaitė
doaj +1 more source

