Counterintelligence

0 comments

409

Insider threats come from individuals who operate inside friendly intelligence and national security organizations who purposefully set out to cause disruption, destruction, and commit crimes to those ends. Please read Insider Threat IPT and Solving Insider Threat in the Course Materials Folder. Using the web or the online library choose a high-profile case of insider threat (cyber, intelligence, military) and draft a summary of the case highlighting successes or failures of analysis in bringing resolution to the case. What analysis methods can you discern? What do think could have been done differently to improve the analysis?

410

Define Information Security (INFOSEC) and Communications Security (COMSEC) within the tenets of defensive counterintelligence.

Discuss three examples of each within the realm of corporate/business or private counterintelligence. How might utilizing these measures help prevent theft of corporate secrets and tradecraft or private data?

Use examples from well-known corporate competitive rivalries as portrayed in our video this week.

Make sure to include information from our required material for the week in your discussion.

Video: https://www.youtube.com/watch?v=T-8mKTAkYa4

Please place each title number in a separate word document. Reading materials will be attached. All work should be cited. Two or more reference is recommended.

About the Author

Follow me


{"email":"Email address invalid","url":"Website address invalid","required":"Required field missing"}