Counterintelligence
China Case Example: Chinese Cyber Hackers' Targeting of U.S. Aerospace and Military Intellectual Property
The FBI produced several resources for businesses, universities, and research institutions that provide an overview of the risks partners face from China and the steps they can to protect themselves from counterintelligence threats.
China Case Example: Chinese Company's Exploitation of Collaboration to Steal Proprietary Product
The FBI produced several resources for businesses, universities, and research institutions that provide an overview of the risks partners face from China and the steps they can to protect themselves from counterintelligence threats.
China Case Example: Chinese Citizen's Targeting of Former Employees to Acquire Chemical Refinement Process
The FBI produced several resources for businesses, universities, and research institutions that provide an overview of the risks partners face from China and the steps they can to protect themselves from counterintelligence threats.
China Case Example: U.S. Superconductor Company Targeted for Trade Secrets
The FBI produced several resources for businesses, universities, and research institutions that provide an overview of the risks partners face from China and the steps they can to protect themselves from counterintelligence threats.
China: The Risk to Academia
The FBI produced several resources for businesses, universities, and research institutions that provide an overview of the risks partners face from China and the steps they can to protect themselves from counterintelligence threats.
China Case Example: Chinese Government-Sponsored Theft of U.S. Proprietary Insulation Technology
The FBI produced several resources for businesses, universities, and research institutions that provide an overview of the risks partners face from China and the steps they can to protect themselves from counterintelligence threats.
China Case Example: Chinese Citizen's Theft of Weapons Technology for Chinese Employment Opportunity
The FBI produced several resources for businesses, universities, and research institutions that provide an overview of the risks partners face from China and the steps they can to protect themselves from counterintelligence threats.
China Case Example: Chinese Military Hackers Target U.S. Businesses
The FBI produced several resources for businesses, universities, and research institutions that provide an overview of the risks partners face from China and the steps they can to protect themselves from counterintelligence threats.
Executive Summary - China: The Risk to Corporate America
The FBI produced several resources for businesses, universities, and research institutions that provide an overview of the risks partners face from China and the steps they can to protect themselves from counterintelligence threats.
China Case Example: Chinese Engineer's Targeting of Highly Sensitive Defense Materials
The FBI produced several resources for businesses, universities, and research institutions that provide an overview of the risks partners face from China and the steps they can to protect themselves from counterintelligence threats.
China: The Risk to Corporate America
The FBI produced several resources for businesses, universities, and research institutions that provide an overview of the risks partners face from China and the steps they can to protect themselves from counterintelligence threats.
Affidavit in Robert Hanssen Spy Case
Robert Philip Hanssen, a United States citizen, conspired with officers and agents of the Union of Soviet Socialist Republics and with its successor state, the Russian Federation, to commit espionage against the United States.
Best Practices in Supply Chain Risk Management for the U.S. Government
The presence and influence of foreign governments, poor manufacturing and/or development practices, counterfeit products, tampering, theft, malicious software, etc., are examples of supply chain risks that must be mitigated.
Safety and Security for the Business Professional Traveling Abroad
Instructions for business travelers to ensure the safety and security of themselves and their business information while traveling outside the United States.
Safety and Security for U.S. Students Traveling Abroad
This brochure introduces students to threats they may face and provides tips on avoiding unsafe situations. Following these precautions will reduce their risk of encountering problems.
The Key to U.S. Student Safety Overseas
The U.S. government seeks to generate awareness about risks that you could face overseas while studying abroad – including those from foreign intelligence services.
Visitors: Risks & Mitigations
Details of potential security risks to your intellectual property or competitive edge. Avoid competitors squeezing past you in the economic race, and do not help thieves steal your information.
Intellectual Property Protection: Safeguard Your Company’s Trade Secrets, Proprietary Information and Research
Protect the programs and systems that support what makes your company successful and unique. You or your company may be targeted; the best defense is preparing in advance.
Internet Social Networking Risks
Internet-based social networking sites have created a revolution in social connectivity. However, con artists, criminals, and other dishonest actors are exploiting this capability for nefarious purposes.
Economic Espionage: Protecting America’s Trade Secrets
The FBI estimates billions of U.S. dollars are lost to foreign competitors every year, who deliberately target economic intelligence in advanced technologies and flourishing U.S. industries.
Elicitation Techniques
Elicitation is a technique used to collect information that is not readily available and do so without raising suspicion that specific facts are being sought.
The Insider Threat: An Introduction to Detecting and Deterring an Insider Spy
This brochure serves as an introduction for managers and security personnel on how to detect an insider threat and provides tips on how to safeguard your company’s trade secrets.