Security Awareness in the 1980s: Feature Articles from the Security Awareness Bulletin, 1981 to 1989Produced by the Security Awareness Division, Educational Programs Department, Department of Defense Security Institute, 1989 - 205 страница |
Друга издања - Прикажи све
Чести термини и фразе
access to classified activities American arrested Arthur Walker attempted Bell Cavanagh clas classified documents classified information classified material cleared employees co-workers communications compromise computer security Confidential continuing evaluation counterintelligence court damage diplomatic disclosure docu East German electronic Embassy espionage facility foreign Harper hostile intelligence services intel intelligence officers intelligence threat Investigative Service involved Jane's Jane's Defence Weekly Jerry Whitworth John Walker ligence ment military Morison motivated national security Naval NISC operations password photographs posters potential problems protection recent recruitment requirements Secret clearance Security Awareness security clearance security officer security program security violations sensitive sentenced ship sified Soviet intelligence Soviet Union supervisor surveillance target technical Thomas Cavanagh tion Top Secret U.S. Government U.S. intelligence U.S. Navy unauthorized unclassified United users VSE Corporation vulnerability Warsaw Pact Washington Post Whitworth Zacharski
Популарни одломци
Страница 88 - That (a) whoever, for the purpose of obtaining information respecting the national defense with intent or reason to believe that the information to be obtained is to be used to the injury of the United States, or to the advantage of any foreign nation...
Страница 88 - ... information relating to the national defense which information the possessor has reason to believe could be used to the injury of the United States or to the advantage of any foreign nation...
Страница 39 - Over 3,500 specific collection requirements for hardware and documents were satisfied for the 12 industrial ministries for just the 10th Five- Year Plan (197680). About 50 percent of more than 30,000 pieces of Western one-of-a-kind military and dual-use hardware and about 20 percent of over 400,000 technical documents collected worldwide in response to these requirements were used to improve the technical performance of very large numbers of Soviet military equipment and weapon systems.
Страница 37 - Among the increasingly intricate arsenals across the world, intelligence is an essential weapon, perhaps the most important. But it is, being secret, the most dangerous. Safeguards to prevent its abuse must be devised, revised, and rigidly applied. But, as in all enterprise, the character and wisdom of those to whom it is entrusted will be decisive. In the integrity of that guardianship lies the hope of free people to endure and prevail.
Страница 128 - Hungary, Iran, Iraq, Kampuchea (formerly Cambodia), Laos, Libya, Mongolian People's Republic (Outer Mongolia), Nicaragua, North Korea, People's Republic of China (including Tibet), Poland, Rumania, South Yemen, Syria, Union of Soviet Socialist Republics (USSR) (includes Estonia, Latvia, Lithuania, and all other constituent republics, Kurile Islands and South Sakhalin (Karafuto)), Vietnam, and Yugoslavia...
Страница 24 - We have clear signals of dramatic Soviet gains in all areas of naval warfare, which must now be interpreted in light of the Walker conspiracy.
Страница 46 - But it is, by and large, a •test-book" case which confirms many of the long-standing precepts of counterintelligence, as well as patterns derived from recent espionage cases. Financial gain was Bell's primary motivaton. This is typical of most recent cases, and his testimony was quite clear on the point. Politics or ideology did not play a part: Q: You are not, in other words, a secret Polish patriot? A: No I am not. The motivation was primarily mercenary. "Mr. Zacharski had found a fool that needed...
Страница 26 - At the time of original classification, the original classification authority may exempt from declassification within 10 years specific information, the unauthorized disclosure of which could reasonably be expected to cause damage...
Страница 30 - It is difficult for me, even in the so-called "year of the spy," to conceive of a greater harm to national security than that caused by the defendant...
Страница 128 - ... non-Defense activities. (2) Communist countries. As used In this section, Communist countries are Albania, Bulgaria, Chinese Peoples Republic (Communist China) (including Tibet), Cuba, Czechoslovakia, Democratic Peoples Republic of Korea (North Korea) , Democratic Republic of Vietnam (North Vietnam), German Democratic Republic (GDR) (East Germany, including the Soviet Sector of Berlin), Hungary, Mongolian Peoples Republic (Outer Mongolia), Poland, Rumania, Union of Soviet Socialist Republics...