Travel Reference
In-Depth Information
individual cleared to see it. Information of high levels of sensitivity must
be controlled in such a manner as to prevent them from being copied
and/or being removed from a secure area. These materials may be signed
out and then limited to use in an area that is monitored or devoid of any
copy equipment. Problems arise when a trusted employee manages to take
a document and secrete it on his or her person, or use a miniature camera
to photograph the document. Before you dismiss this idea as being overly
paranoid, consider how valuable some internal company correspondence
may be to the right person. This type of activity is happening every day,
often with negative results to the company that has been victimized. If
individuals are working with documents of the highest security classifica-
tion, there should be precautions in place to prevent the intentional
removal or copying of such documents. Physical searches may be the only
way to ensure that documents of great sensitivity don't get taken outside
of the secure environment.
ELECTRONIC SURVEILLANCE COUNTERMEASURES
As we mentioned before, there are many ways to use technology to
remotely obtain information from your subject. Imagine this. You are the
president of a corporation preparing a final bid on a government contract
worth hundreds of millions of dollars. What would a copy of this document
be worth to your closest competitor for the contract? Now look out your
window and see if there are any office buildings nearby that have offices
slightly higher than your own. Don't just look next door. Can you see any
in a straight line of sight? If the answer is yes and if you do not have mir-
rored or heavily colored window glass, then someone can look into your
office and see what you are reading, what's on your computer screen, or
what you left out on your desk. There is a reason that the Pentagon has
painted windows.
It is also a relatively simple matter to plant a transmitter, or “bug,” in
an area. Although such devices are small and have a finite range, they may
be used to compromise your private conversations. Several years ago
police observed an individual using an earpiece outside the State Depart-
ment in Washington. He was stopped and identified as a Russian national,
and it was quickly discovered that he was listening to a bug that had been
placed in a State Department conference room. Since that room had been
Search WWH ::




Custom Search