Counterintelligence theory and practice. ([2019])
- Record Type:
- Book
- Title:
- Counterintelligence theory and practice. ([2019])
- Main Title:
- Counterintelligence theory and practice
- Further Information:
- Note: Hank Prunckun.
- Authors:
- Prunckun, Hank, 1954-
- Contents:
- Cover; Counterintelligence Theory and Practice; Series page; Counterintelligence Theory and Practice; Copyright page; Contents; Preface; About the Study Questions; Key Concepts to Note; Chapter 1; Challenges for Counterintelligence; Selected Historical Lessons; Some Concluding Thoughts; Review of Key Words and Phrases; Study Questions; Learning Activity; Notes; Chapter 2; Fundamentals of Counterintelligence; Intelligence Quadrangle; Role of Security in Intelligence; Anatomy of Counterintelligence; Taxonomy of Counterintelligence; Typology of Counterintelligence Review of Key Words and PhrasesStudy Questions; Learning Activity; Notes; Chapter 3; Counterintelligence Theory; Background; Rationale for Developing a Theory; Context; Theory Construction; Theory of Counterintelligence; Conclusions; Review of Key Words and Phrases; Study Questions; Learning Activity; Notes; Chapter 4; Tenets of Defensive Counterintelligence; Tenets of Defensive Counterintelligence; Review of Key Words and Phrases; Study Questions; Learning Activity; Notes; Chapter 5; Defensive Counterintelligence Planning; Rationale for Planning; Identify Sensitive Information Threat AnalysisVulnerability Analysis; Risk Analysis; Review of Key Words and Phrases; Study Questions; Learning Activity; Notes; Chapter 6; Defensive Counterintelligence: Physical Security; Barrier Controls; Doors; Entry and Exit Control; Windows; Secure Containment; Security Lighting; Closed-Circuit Television; Intruder Detection Systems;Cover; Counterintelligence Theory and Practice; Series page; Counterintelligence Theory and Practice; Copyright page; Contents; Preface; About the Study Questions; Key Concepts to Note; Chapter 1; Challenges for Counterintelligence; Selected Historical Lessons; Some Concluding Thoughts; Review of Key Words and Phrases; Study Questions; Learning Activity; Notes; Chapter 2; Fundamentals of Counterintelligence; Intelligence Quadrangle; Role of Security in Intelligence; Anatomy of Counterintelligence; Taxonomy of Counterintelligence; Typology of Counterintelligence Review of Key Words and PhrasesStudy Questions; Learning Activity; Notes; Chapter 3; Counterintelligence Theory; Background; Rationale for Developing a Theory; Context; Theory Construction; Theory of Counterintelligence; Conclusions; Review of Key Words and Phrases; Study Questions; Learning Activity; Notes; Chapter 4; Tenets of Defensive Counterintelligence; Tenets of Defensive Counterintelligence; Review of Key Words and Phrases; Study Questions; Learning Activity; Notes; Chapter 5; Defensive Counterintelligence Planning; Rationale for Planning; Identify Sensitive Information Threat AnalysisVulnerability Analysis; Risk Analysis; Review of Key Words and Phrases; Study Questions; Learning Activity; Notes; Chapter 6; Defensive Counterintelligence: Physical Security; Barrier Controls; Doors; Entry and Exit Control; Windows; Secure Containment; Security Lighting; Closed-Circuit Television; Intruder Detection Systems; Drone Defense; Computer Physical Security; Guarding Services; Sensitive Compartmented Information Facility; Safe Houses; Crime Prevention through Environmental Design; Review of Key Words and Phrases; Study Questions; Learning Activity; Notes; Chapter 7 Defensive Counterintelligence: Personnel SecurityCentral Pillar of Personnel Security; Types of Harmful Disclosure; Hiring Practices; Nondisclosure Agreement; Background Investigations; Key Security Obligations of Employees; Practices to Guard Against; Review of Key Words and Phrases; Study Questions; Learning Activity; Notes; Chapter 8; Defensive Counterintelligence: Information Security; Information Security Defined; Classifying Information; Types of Data Requiring Protection; Five Basic Classification Levels; Code Names; Compartmentalization of Information; Handling Sensitive Information Accounting PracticesAdvertisements; Meetings, Conferences, and Conversations; Reverse Engineering; Clear Desk Policy; Document Storage; When Writing Leaves an Impression; Cloud Computing; E-mail Discretion; Authorized Document Reproduction; Unauthorized Document Reproduction; Document Safeguards During Use; Document Disposal; Waste Disposal; Carriage of Classified Documents; Trademarks, Patents, and Copyrights; Common Law Protection; Legislative Protection; Review of Key Words and Phrases; Study Questions; Learning Activity; Notes; Chapter 9 … (more)
- Edition:
- Second edition
- Publisher Details:
- Lanham : Rowman & Littlefield
- Publication Date:
- 2019
- Extent:
- 1 online resource (xvi, 254 pages)
- Subjects:
- 327.1201
Intelligence service
Intelligence service
POLITICAL SCIENCE / Government / International
POLITICAL SCIENCE / International Relations / General
Electronic books - Languages:
- English
- ISBNs:
- 9781786606891
1786606895 - Related ISBNs:
- 9781786606877
- Notes:
- Note: Includes bibliographical references and index.
Note: Description based on online resource; title from digital title page (viewed on February 18, 2019). - Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.375596
- Ingest File:
- 02_356.xml