TITLE

An Open-Source Overview of the Technical Intelligence Collection Threat in Asia

AUTHOR(S)
Wilson, Wade C.
PUB. DATE
April 2004
SOURCE
Military Intelligence Professional Bulletin;Apr-Jun2004, Vol. 30 Issue 2, p21
SOURCE TYPE
Periodical
DOC. TYPE
Article
ABSTRACT
Highlights some of the open-source data on technical intelligence threat (TECHINT) facing government employees and civilian travelers in Asia. Overview of the nature of the threat; Information on countries that have collection program for economic espionage or political security; Information on the TECHINT collection equipment and Asia-specific TECHINT collection.
ACCESSION #
14165403

 

Related Articles

  • IS ESPIONAGE NECESSARY FOR OUR SECURITY? Scoville Jr., Herbert // Foreign Affairs;Apr1976, Vol. 54 Issue 3, p482 

    This article discusses whether or not espionage or counterintelligence operations is necessary for the national security in the United States. Before making a decision on this score, the importance of covert operations to the U.S. security should be evaluated and balanced against their risks....

  • The backstage of the Russian espionage activities on the Romanian territory, at the beginning of the XXth century. LUCINESCU, Ioan Codruţ // Romanian Intelligence Studies Review / Revista Romana de Studii ;Jun2014, Issue 11, p113 

    Unlike the successor Soviet regime, imperial Russia's expansionist ambitions were not global, as the Empire's only aim was to occupy the Balkans and the nearby Straits. Since 1878, Romania represented a serious obstacle in achieving these goals, which is why Russian authorities „sought to...

  • Un nuevo enfoque legal de la Inteligencia Competitiva. Cussac, José L. González; Hinojar, Beatriz Larriba // Inteligencia y Seguridad: Revista de Análisis y Prospectiva;Jun-Nov2010, Issue 8, p39 

    En el contexto socio-económico global actual la necesidad de obtener y controlar la información sobre parámetros estratégicos esenciales (el entorno competitivo en el que se lleva a cabo la actividad empresarial, la gestión del riesgo del país y la defensa, y su potencial...

  • THE PATRIOT. Collins, Lance; Reed, Warren // Bulletin with Newsweek;9/6/2005, Vol. 123 Issue 6486, p28 

    This article explains why spy services in Australia have gone wrong. The security of any country depends not only on the competence of its intelligence agents but their willingness to report honestly to their political masters. Government ministers are responsible for the efficacy of the...

  • In Castro's Service. Miller, John J. // National Review;11/5/2001, Vol. 53 Issue 21, p45 

    This article focuses on various espionage activities conducted by Cuba against the United States. Agents of the U.S. Federal Bureau of Investigation (FBI) last May sneaked into the apartment of Ana Montes and checked the hard drive of a laptop computer she kept there. They found sequences...

  • PLACE AND ROLE OF INTELLIGENCE IN THE ERA OF GLOBALIZATION. DAMIAN, Valentin // Journal of Criminal Investigation;2012, Vol. 5 Issue 1, p38 

    Claude SilberzahnIntelligence and counterintelligence remains still the most important branches of activity in any state, this activity is carried and driven exclusively by specialized institutions, with legal status and public representation. Democracies must recognize this status and the...

  • TERRORISTS AND SPIES. Laqueur, Walter // New Republic;7/29/85, Vol. 193 Issue 5, p20 

    Focuses on the persistence of species of contemporary terrorism and espionage. Exploration of the manifestations of terrorism; Impact of foreign espionage on the national security of the U.S.; Assessment of the absurd proliferation of security clearances; Need for effective counterintelligence...

  • New allies privy to NATO secrets. Jordan, Michael J. // Christian Science Monitor;3/24/99, Vol. 91 Issue 81, p5 

    Discusses the effects of the admission of Hungary, Poland, and the Czech Republic into the North Atlantic Treaty Organization (NATO) on secret intelligence matters. Concerns that the new members will share sensitive information with hostile countries, such as Russia; Recent NATO intelligence...

  • Dems can't be trusted with security.  // Indianapolis Business Journal;2/6/2006, Vol. 26 Issue 49, p5B 

    The article focuses on the spying program of the U.S. National Security Agency (NSA's) inside and outside the U.S. The most innocent-sounding target of the NSA's spying cited by the Treason Times was an Iranian-American doctor in the South who came under suspicion because of what one official...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics