Across
- 2. For additional information & literature about elicitation & the recruitment cycle & to learn how you can protect yourself & the information you carry while on foreign travel, contact your _____
- 8. While traveling remember that you are subject to the local _____
- 9. An effort in which a seemingly normal conversation is contrived to extract information about individuals, their work, and their colleagues
- 11. To help the U.S. Embassy contact you in an emergency, enroll in this program on the U.S. Dept. of State travel site
- 12. Avoid establishing __________
- 13. The acquisition of trade secrets from business competitors
- 15. A post-travel ____________ allows security personnel to learn from your experiences while on travel
- 16. You are a potential target if you have access to this type of information
- 17. Foreign entities target information related to your organization's __
- 19. An industrial espionage tactic
- 21. Foreign police & intelligence services may detain persons for many reasons, including simple __________
Down
- 1. Information gathered & activities conducted to identify, deceive, exploit, disrupt or protect against espionage, sabotage, & other intelligence activities
- 3. A type of information highly sought after by foreign entities
- 4. One of the biggest threats facing travelers
- 5. Foreign travel increases the risk of foreign intelligence ______
- 6. One of the most dangerous locations anyone can use to check and send email
- 7. First line of defense in protecting classified information & defense technologies
- 10. A method used by foreign intelligence services to obtain info from U.S. travelers
- 11. Report _________ activity upon return from your trip
- 14. Be ______
- 18. Have contact information for DoS, passport replacement, company/security POC, and _______
- 20. _______ travel outside the U.S. must be coordinated with the Export Control Officer