Once your group has chosen a piece of critical technology( Choose- Information system technologies) , each student must prepare a counterintelligence threat assessment of 800–1,000 words about the group’s selected technology.
Such as the use of infiltration within a given entity or agency
Surveillance to include but no limited to wiretap, photography, listening devices/ bugs within organization
Phishing – or use of vague questioning to personnel in an attempt to acquire critical data
Spying or other forms of espionage
What methods and techniques are used in counterintelligence collection? Explain.
What are common sources for counterintelligence? Explain.