Counterintelligence

China Case Example: Chinese Cyber Hackers' Targeting of U.S. Aerospace and Military Intellectual Property

The FBI produced several resources for businesses, universities, and research institutions that provide an overview of the risks partners face from China and the steps they can to protect themselves from counterintelligence threats.

Read More…

China Case Example: Chinese Company's Exploitation of Collaboration to Steal Proprietary Product

The FBI produced several resources for businesses, universities, and research institutions that provide an overview of the risks partners face from China and the steps they can to protect themselves from counterintelligence threats.

Read More…

China Case Example: Chinese Citizen's Targeting of Former Employees to Acquire Chemical Refinement Process

The FBI produced several resources for businesses, universities, and research institutions that provide an overview of the risks partners face from China and the steps they can to protect themselves from counterintelligence threats.

Read More…

China Case Example: U.S. Superconductor Company Targeted for Trade Secrets

The FBI produced several resources for businesses, universities, and research institutions that provide an overview of the risks partners face from China and the steps they can to protect themselves from counterintelligence threats.

Read More…

China: The Risk to Academia

The FBI produced several resources for businesses, universities, and research institutions that provide an overview of the risks partners face from China and the steps they can to protect themselves from counterintelligence threats.

Read More…

China Case Example: Chinese Government-Sponsored Theft of U.S. Proprietary Insulation Technology

The FBI produced several resources for businesses, universities, and research institutions that provide an overview of the risks partners face from China and the steps they can to protect themselves from counterintelligence threats.

Read More…

China Case Example: Chinese Citizen's Theft of Weapons Technology for Chinese Employment Opportunity

The FBI produced several resources for businesses, universities, and research institutions that provide an overview of the risks partners face from China and the steps they can to protect themselves from counterintelligence threats.

Read More…

China Case Example: Chinese Military Hackers Target U.S. Businesses

The FBI produced several resources for businesses, universities, and research institutions that provide an overview of the risks partners face from China and the steps they can to protect themselves from counterintelligence threats.

Read More…

Executive Summary - China: The Risk to Corporate America

The FBI produced several resources for businesses, universities, and research institutions that provide an overview of the risks partners face from China and the steps they can to protect themselves from counterintelligence threats.

Read More…

China Case Example: Chinese Engineer's Targeting of Highly Sensitive Defense Materials

The FBI produced several resources for businesses, universities, and research institutions that provide an overview of the risks partners face from China and the steps they can to protect themselves from counterintelligence threats.

Read More…

China: The Risk to Corporate America

The FBI produced several resources for businesses, universities, and research institutions that provide an overview of the risks partners face from China and the steps they can to protect themselves from counterintelligence threats.

Read More…

Affidavit in Robert Hanssen Spy Case

Robert Philip Hanssen, a United States citizen, conspired with officers and agents of the Union of Soviet Socialist Republics and with its successor state, the Russian Federation, to commit espionage against the United States.

Read More…

Best Practices in Supply Chain Risk Management for the U.S. Government

The presence and influence of foreign governments, poor manufacturing and/or development practices, counterfeit products, tampering, theft, malicious software, etc., are examples of supply chain risks that must be mitigated.

Read More…

Safety and Security for the Business Professional Traveling Abroad

Instructions for business travelers to ensure the safety and security of themselves and their business information while traveling outside the United States.

Read More…

Safety and Security for U.S. Students Traveling Abroad

This brochure introduces students to threats they may face and provides tips on avoiding unsafe situations. Following these precautions will reduce their risk of encountering problems.

Read More…

The Key to U.S. Student Safety Overseas

The U.S. government seeks to generate awareness about risks that you could face overseas while studying abroad – including those from foreign intelligence services.

Read More…

Visitors: Risks & Mitigations

Details of potential security risks to your intellectual property or competitive edge. Avoid competitors squeezing past you in the economic race, and do not help thieves steal your information.

Read More…

Intellectual Property Protection: Safeguard Your Company’s Trade Secrets, Proprietary Information and Research

Protect the programs and systems that support what makes your company successful and unique. You or your company may be targeted; the best defense is preparing in advance.

Read More…

Internet Social Networking Risks

Internet-based social networking sites have created a revolution in social connectivity. However, con artists, criminals, and other dishonest actors are exploiting this capability for nefarious purposes.

Read More…

Economic Espionage: Protecting America’s Trade Secrets

The FBI estimates billions of U.S. dollars are lost to foreign competitors every year, who deliberately target economic intelligence in advanced technologies and flourishing U.S. industries.

Read More…

Elicitation Techniques

Elicitation is a technique used to collect information that is not readily available and do so without raising suspicion that specific facts are being sought.

Read More…

The Insider Threat: An Introduction to Detecting and Deterring an Insider Spy

This brochure serves as an introduction for managers and security personnel on how to detect an insider threat and provides tips on how to safeguard your company’s trade secrets.

Read More…