This is a graphic for ANSIR
This is a graphic for Reducing Vulnerabilities
This is a graphic of a blue faded line
This is a graphic link to ANSIR Advisories
This is a graphic for Vulnerabilites
This is a graphic link to Espionage Techniques
This is a graphic link to National Security List
This is a graphic link to ANSIR Homepage
This is a graphic link to FBI Homepage
There are practices you and personnel in your organization can use to reduce the potential of becoming involved in a terrorist incident or becoming an intelligence target. Awareness that you may be a target is fundamental to countering any technique. For example, when traveling abroad, minimize the profile which advertises you are from the United States. Do not wear clothing which clearly sets you out as an American. Do not carry a briefcase, pen or notepad marked with your organization's logo. Carry your laptop computer in a case which does not look like a conventional laptop case and keep the hard drive and floppy disks on your person rather than in your hotel room.

Ensure that you and the personnel in your organization can distinguish between the honest inquirer and the "social engineer" who should be referred to security. Make your personnel aware of potential triggers for terrorist activity, such as anniversary dates significant to terrorists as well as current warnings issued by terrorist organizations deemed credible by the FBI can reduce vulnerability.

The threat to computer and telecommunication systems has increased dramatically in recent years. This threat takes on a variety of forms and comes from adversarial organizations to disgruntled employees and teenage hackers. Timely notification of the latest intrusion techniques and the latest virus detected "in the wild" can give you an edge in protecting your systems.

INTELLIGENCE AND TERRORIST VULNERABILITIES

Anyone can be vulnerable to intelligence collection activities or terrorist attack.
Classified U.S. Government information is sought by intelligence services of nations who view themselves as adversaries. The secrets of the American economy have also become attractive targets of intelligence services because the cost of economic espionage is cheaper than research and development. Intelligence services are extraordinarily sophisticated and have substantial resources to carry out their missions. They train their personnel to acquire information clandestinely so their targets do not know it has been compromised. Once a nation or corporation believes its secrets have been compromised, it makes changes to minimize damage; therefore, intelligence services conceal their operations to maximize their efforts.

While public acts of violence are used by terrorists to attempt to coerce governments, the activities conducted by terrorist organizations up to the time of the attack are done clandestinely. Terrorist organizations usually lack the sophistication and training of an intelligence service; however, some have received both training and funding from state sponsors and can conduct operations with sufficient effectiveness to cause tragic results.

How do you know whether you or your organization are susceptible to the scrutiny and attack of these adversarial organizations? And how do you reduce these vulnerabilities? Any U.S. person, corporation or institution with access to information that is restricted can be a target of an intelligence service. In today's world, any U.S. person, corporation or institution is a potential target of a terrorist attack anywhere in the world. Because these adversarial organizations carry out their activities clandestinely, the likelihood of knowing you are being actively targeted is remote. However, a key to reducing vulnerability is knowing and countering common techniques used by adversarial organizations which can minimize or even eliminate their opportunity for success. If adversarial organizations believe the effort is too great or the risk is too high, they will look for another target.