Ray Semko recommends the following resources as discussed in his briefings:
DOD 2021 Report on Military and Security Developments Involving the People’s Republic of China, (DOD, June 3, 2021)
2020 China Military Power Report (DOD)
Threats to the U.S. Research Enterprise: China’s Talent Recruitment Plans (US Senate, 18 Nov 19)
Worldwide Threat Assessment of the US Intelligence Community (DNI, 29 Jan 19)
China Military Power (DIA, Jan 2019)
US National Security Strategy (2017)
Insider Threat Guide: A COMPENDIUM OF BEST PRACTICES TO ACCOMPANY THE NATIONAL INSIDER THREAT MINIMUM STANDARDS (DNI/NCSC, 2017)
Protect Your Organization from the Inside Out (DNI/NCSC, 2016)
Targeting US Technologies Summary (Apr 2018)
Targeting US Technologies: A Trend Analysis of Cleared Industry Reporting (DSS, 2017) | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008
2017 Security Awareness Report (SANS)
2017 Worldwide Threat Assessment (DNI) | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010
Jihadi Operations Security (MEMRI)
Islamic Jihadists have security awareness information and training too:
“We present you this modest work for lone wolf mujahideen and small cells of brothers who want to bring victory to this religion. This is originally a series of lectures in 30 parts about safety & security in Jihadi work, entitled ‘Dawrat al-Amn wa Al-Mujhabaraat‘ [Security and Intelligence Course]. It was initially meant for mujahideen groups and not lone wolves, but we have tried to adapt it and pick what’s important and leave what’s not relevant for an individual mujahid and small groups. No doubt that today, at the era of the lone wolves, brothers in the West need to know some important things about safety in order to ensure success in their operations.”
The guide contains 12 chapters: “Definition of security, its importance and its obligation to Islam”;” general security guidelines”; “Homeland Security-Cell Security”; Online Security-Encryption”; “The Safehouse”; “Conferences & Meetings”; “Travel & Transport Security”; “Money & Weapons Security”; “Surveillance”; “The Cover”; “Social Engineering”; and “Special Operations & Inspection”.
Economic Espionage Videos, Reports (FBI)
US National Security Strategy (White House, 2015)
US National Intelligence Strategy (DNI, 2014)
Net Losses: Estimating the Global Cost of Cybercrime; Economic Impact of Cybercrime II (CSIS/Intel/McAfee, June 2014)
Internal Review of the Washington Navy Yard Shooting: A Report to the Secretary of Defense (DOD, 20 Nov 2013)
Quadrennial Defense Review (DOD, 2014)
DOD Encyclopedia of Ethical Failure (July 2013)
True Psychology of the Insider Spy/Ten Life Stages of the Insider Spy (David L. Charney, MD)
Administration’s Strategy on Mitigating the Theft of U.S. Trade Secrets (White House, Feb 2013)
Foreign Spies Stealing US Economic Secrets in Cyberspace: Report to Congress on Foreign Economic Collection and Industrial Espionage, 2009-2011 (DNI/NCIX, October 2011)
The Insider Threat (FBI brochure)
Employee’s Guide to Security Responsibilities
Common Sense Guide to Prevention and Detection of Insider Threats (CERT, 2012)
Executive Order 13587 — Structural Reforms to Improve the Security of Classified Networks and the Responsible Sharing and Safeguarding of Classified Information (White House)
The National Counterintelligence Strategy of the United States (DNI/NCIX, 2009)
Traveling Overseas with Mobile Phones, Laptops, PDAs, and Other Electronic Devices (DNI/NCIX)
“Cyber Espionage and the Theft of U.S. Intellectual Property and Technology,” Testimony of Larry M. Wortzel before the House of Representatives Committee on Energy and Commerce Subcommittee on Oversight and Investigations (9 July 2013)
Annual Report to Congress on Military and Security Developments Involving the People’s Republic of China (DOD, 2013)
APT1: Exposing One of China’s Cyber Espionage Units (Mandiant, Feb 2013)
Investigative Report on the U.S. National Security Issues Posed by Chinese Telecommunications Companies Huawei and ZTE: (HPSCI, October 8, 2012)
U.S.-China Economic and Security Review Commission
DOD Encyclopedia of Ethical Failure (July 2013)
Wastebook 2012 (Sen. Coburn, 2012)
Department of Everything: Department of Defense Spending That Has Little to Do With National Security (Sen. Coburn, 2012)
Safety at Any Price: Assessing the Impact of Homeland Security Spending in U.S. Cities (Sen. Coburn, 2012)
The Dawn of Islamic Literalism: Rise of the Crescent Moon by Joseph A. Butta
America the Vulnerable: Inside the New Threat Matrix of Digital Espionage, Crime, and Warfare by Joel Brenner
Unrestricted Warfare: China’s Master Plan to Destroy Americaby Qiao Liang and Wang Xiangsui
Capturing Jonathan Pollard: How One of the Most Notorious Spies in American History Was Brought to Justiceby Ronald J. Olive
True Believer: Inside the Investigation and Capture of Ana Montes, Cuba’s Master Spy by Scott W. Carmichael
Tiger Trap: America’s Secret Spy War with China by David Wise
Death by China: Confronting the Dragon – A Global Call to Action by Peter W. Navarro and Greg Autry
The China Threat: How the People’s Republic Targets America by Bill Gertz
The Real War Against America by Brett Kingstone
One Second After by William R. Forstchen
Security Educator
Public Speaker
Motivator
National Security Expert
“On a scale of 1 to 10, this DICE briefing was a 20!”–Corporate CEO