Results 71 to 80 of about 10,273 (209)

The impact of the “Red Scare” and the “Palmer Raids” on FBI policy in the 1920s

open access: yesStudia Humanitatis, 2020
The article highlights the changes in the policy of the US Federal Bureau of Investigation (until 1935 – Bureau of Investigation). The condemnation of the “Palmer Raids” in mass media and the ensuing negative reaction of the Congress forced the Bureau’s ...
Levin Yaroslav Alexandrovich
doaj  

Ecoterrorism and cyberattacks vs. Critical infrastructure: Counterintelligence and security aspects [PDF]

open access: yesNBP: Nauka, bezbednost, policija
Critical infrastructure encompasses systems and resources essential to the functioning of the state and its protection consequently stands at the pinnacle of counterintelligence and security priorities.
Živaljević Dragan, Gavrić Nevena
doaj   +1 more source

The ISCIP Analyst, Volume IV, Issue 8 [PDF]

open access: yes, 1999
This repository item contains a single issue of The ISCIP Analyst, an analytical review journal published from 1996 to 2010 by the Boston University Institute for the Study of Conflict, Ideology, and ...
Cavan, Susan   +8 more
core  

Invulnerable – Informed about Vulnerabilities! [PDF]

open access: yesRomanian Intelligence Studies Review, 2023
A hostile intelligence entity is trying to identify or create behavioural vulnerabilities – professional dissatisfaction, unrealistic expectations, gambling, spending/borrowing beyond means, expensive lifestyle, financial difficulties, so as to exploit ...
Florin BUȘTIUC
doaj  

Counterintelligence disinformation operation

open access: yes, 2021
The article examines the mechanisms for the implementation of one of the main methods in the counter-intelligence activity, which aims to create favorable conditions for successfully countering the intelligence approaches of foreign special services. The essence of the disinformation, the particularities of the operations of this kind by the counter ...
openaire   +1 more source

Intelligence Whistleblower Protections: In Brief [PDF]

open access: yes, 2014
Intelligence whistleblowers are generally Intelligence Community (IC) employees or contractors who bring to light allegations of agency wrongdoings by, for example, disclosing information on such wrongdoings to congressional intelligence committees. Such
Berry, Rodney M
core   +2 more sources

A Worst Practices Guide to Insider Threats: Lessons from Past Mistakes [PDF]

open access: yes, 2014
Insider threats are perhaps the most serious challenges that nuclear security systems face. All of the cases of theft of nuclear materials where the circumstances of the theft are known were perpetrated either by insiders or with the help of insiders ...
Matthew Bunn, Scott D. Sagan
core  

Shielding Against Social Engineering Threats: A Counterintelligence Approach

open access: yesBulletin of "Carol I" National Defense University
In an increasingly networked global context, commercial counterintelligence units and competitive intelligence experts must deal with sophisticated social engineering threats that exploit human psychology rather than technological shortcomings.
Anastasios-Nikolaos KANELLOPOULOS
doaj   +1 more source

The Disinformation Activities of the KGB of Lithuanian SSR and Protection of Secrets in 1954–1991

open access: yesGenocidas ir Rezistencija, 2007
Competition between the USA and USSR during the Cold War was concurrent with spying and protection of secrets. Those targets were implemented by various measures. Disinformation was an exceptionally important method among them.
Kristina Burinskaitė
doaj   +1 more source

Home - About - Disclaimer - Privacy