The research proposal attempts to clarify why one reason for engaging in espionage does not exist in response to the multitude of other projects on insider threats and espionage offenders which do not confer with one another, all most as unique as the people who do it. The project compiles other results from past projects and then forms a baseline on behaviors, or those people whom engaged in espionage. The project will identify motivations and influences within each known subject from a multitude of reliable sources, within the public domain. Counterintelligence (CI) is then explored to show a comparison of what is known, from the evolution of catching and running spies to addressing the insider threat within their enterprise. It will show a dependence of the counterintelligence apparatus toward people who engage in espionage and presents some examples, latency of response how these can be assumed to be favorable toward the enterprise. Past examples are used to show policy changes and security updates based on a need to know a classification of information. CI demonstrates the learned tradecraft to locate persons within trusted positions of employment, from behavioral analysis and past established trends of employees. Other venues will be explored, locate subjects that would be an asset to the enterprise. In reverse thinking these methodologies are used to identity insider threats within their own enterprise.
ThriftBooks sells millions of used books at the lowest
everyday prices. We personally assess every book's quality and offer rare, out-of-print treasures. We
deliver the joy of reading in recyclable packaging with free standard shipping on US orders over $15.
ThriftBooks.com. Read more. Spend less.