The Counter-Espionage forBusiness Travelers Course
Receive similar training that a counterintelligence officer would receive before deploying overseas.
Date: Friday, November 22, 2019
Location: Vienna, VA
Venue: Hilton Garden Inn - Tysons Corner
Fees: $1495, space permitting
The Counter-Espionage for Business Travelers is the solution for protecting your organization's secrets
According to an annual Congressional report on espionage, "the United States private sector is seen as an irresistible 'soft target' for foreign intelligence collectors."
As today's business environment has become globally interconnected, foreign intelligence activities have extended beyond traditional targets in the Intelligence Community and other US national security structures. Hostile intelligence services, as well as private collectors, now target a wide variety of unclassified/classified information and technologies in a range of sectors. Although cyber threats are increasingly pervasive, most collectors still employ more traditional espionage practices when targeting international business travelers.
The most valuable commodity I know of is information.
Our In-depth Counter Espionage Tactics
Unfortunately, most business travelers are untrained, and thus unprepared, to handle even the most common espionage tactics, such as:
Hotel/Office Covert Intrusions
Train in beautiful Sarasota, FL
Train in beautiful Sarasota, Florida at the historic Powel Crosley Estate. Conveniently located just two-minutes away from Sarasota-Bradenton International Airport. While in town, be sure to check out America’s #1 rated beach, Siesta Key Beach!
This highly informative course will open your employees' eyes to how vulnerable intellectual property actually is while traveling, and the lengths to which others will go to undercut your organization.Economic vs. Industrial Espionage Foreign Intelligence Collection Methods How to Recognize Elicitation and Recruiting Techniques Operational Security (OPSEC) Awareness Communication Security (COMSEC) Awareness Data Attack and Intrusion Methodologies How to become an "Invisible Traveler" Surveillance Detection Techniques Plus much more…