Once your group has chosen a piece of critical technology( Choose- Information system technologies) , each student must prepare a counterintelligence threat assessment of 800–1,000 words about the group’s selected technology.

Such as the use of infiltration within a given entity or agency
Surveillance to include but no limited to wiretap, photography, listening devices/ bugs within organization
Phishing – or use of vague questioning to personnel in an attempt to acquire critical data
Spying or other forms of espionage

What methods and techniques are used in counterintelligence collection? Explain.
What are common sources for counterintelligence? Explain.


    Customer Area

    Make your order right away

    Confidentiality and privacy guaranteed

    satisfaction guaranteed