Ray Semko recommends the following resources as discussed in his briefings:
Threats to the U.S. Research Enterprise: China’s Talent Recruitment Plans (US Senate, 18 Nov 19)
Worldwide Threat Assessment of the US Intelligence Community (DNI, 29 Jan 19)
China Military Power (DIA, Jan 2019)
US National Security Strategy (2017)
Insider Threat Guide: A COMPENDIUM OF BEST PRACTICES TO ACCOMPANY THE NATIONAL INSIDER THREAT MINIMUM STANDARDS (DNI/NCSC, 2017)
Protect Your Organization from the Inside Out (DNI/NCSC, 2016)
Targeting US Technologies Summary (Apr 2018)
Targeting US Technologies: A Trend Analysis of Cleared Industry Reporting (DSS, 2017)
2017 Security Awareness Report (SANS)
2017 Worldwide Threat Assessment (DNI)
Jihadi Operations Security (MEMRI)
Islamic Jihadists have security awareness information and training too:
“We present you this modest work for lone wolf mujahideen and small cells of brothers who want to bring victory to this religion. This is originally a series of lectures in 30 parts about safety & security in Jihadi work, entitled ‘Dawrat al-Amn wa Al-Mujhabaraat‘ [Security and Intelligence Course]. It was initially meant for mujahideen groups and not lone wolves, but we have tried to adapt it and pick what’s important and leave what’s not relevant for an individual mujahid and small groups. No doubt that today, at the era of the lone wolves, brothers in the West need to know some important things about safety in order to ensure success in their operations.”
The guide contains 12 chapters: “Definition of security, its importance and its obligation to Islam”;” general security guidelines”; “Homeland Security-Cell Security”; Online Security-Encryption”; “The Safehouse”; “Conferences & Meetings”; “Travel & Transport Security”; “Money & Weapons Security”; “Surveillance”; “The Cover”; “Social Engineering”; and “Special Operations & Inspection”.
Economic Espionage Videos, Reports (FBI)
US National Security Strategy (White House, 2015)
US National Intelligence Strategy (DNI, 2014)
Net Losses: Estimating the Global Cost of Cybercrime; Economic Impact of Cybercrime II (CSIS/Intel/McAfee, June 2014)
Internal Review of the Washington Navy Yard Shooting: A Report to the Secretary of Defense (DOD, 20 Nov 2013)
Quadrennial Defense Review (DOD, 2014)
DOD Encyclopedia of Ethical Failure (July 2013)
True Psychology of the Insider Spy/Ten Life Stages of the Insider Spy (David L. Charney, MD)
Administration’s Strategy on Mitigating the Theft of U.S. Trade Secrets (White House, Feb 2013)
Foreign Spies Stealing US Economic Secrets in Cyberspace: Report to Congress on Foreign Economic Collection and Industrial Espionage, 2009-2011 (DNI/NCIX, October 2011)
The Insider Threat (FBI brochure)
Employee’s Guide to Security Responsibilities
Common Sense Guide to Prevention and Detection of Insider Threats (CERT, 2012)
Executive Order 13587 — Structural Reforms to Improve the Security of Classified Networks and the Responsible Sharing and Safeguarding of Classified Information (White House)
The National Counterintelligence Strategy of the United States (DNI/NCIX, 2009)
Traveling Overseas with Mobile Phones, Laptops, PDAs, and Other Electronic Devices (DNI/NCIX)
PERSEREC Reports
- Allegiance in a Time of Globalization
- Changes in Espionage by Americans: 1947-2007
- Espionage Cases, 1975-2008
- Ten Tales of Betrayal: The Threat to Corporate Infrastructures by Information Technology Insiders Analysis and Observations
- Technological, Social, and Economic Trends That Are Increasing U.S. Vulnerability to Insider Espionage
- Identifying Personality Disorders that are Security Risks: Field Test Results
- Cyberculture and Personnel Security: Report I — Orientation,Concerns, and Needs
- Cyberculture and Personnel Security: Report II — Ethnographic Analysis of Second Life
- Insider Risk Evaluation and Audit
- Reporting of Counterintelligence and Security Indicators by Supervisors and Coworkers
- Improving Supervisor and Coworker Reporting of Information of Security Concern
- Developing a Cybervetting Strategy for Law Enforcement
- More PERSEREC reports
DSS
- 2014 DSS Vulnerability Assessment Rating Matrix Vulnerabilities and NISP Enhancement Categories
- Counterintelligence Reports
- Counterintelligence Brochures
- Counterintelligence Training Materials
- Reporting Suspicious Contacts
FBI
- Elicitation Techniques
- The Insider Threat
- Internet Social Networking Risks
- Key to U.S. Student Safety Abroad
- Colleges/Universities Targeted
- Safety Tips for U.S. Students Traveling Abroad
- Safety Tips for U.S. Business Travelers Abroad
- For Businesses: Risks & Mitigations of Visitors
CHINA
“Cyber Espionage and the Theft of U.S. Intellectual Property and Technology,” Testimony of Larry M. Wortzel before the House of Representatives Committee on Energy and Commerce Subcommittee on Oversight and Investigations (9 July 2013)
Annual Report to Congress on Military and Security Developments Involving the People’s Republic of China (DOD, 2013)
APT1: Exposing One of China’s Cyber Espionage Units (Mandiant, Feb 2013)
Investigative Report on the U.S. National Security Issues Posed by Chinese Telecommunications Companies Huawei and ZTE: (HPSCI, October 8, 2012)
U.S.-China Economic and Security Review Commission
- Report on Cyber Warfare and Espionage: “Capability of the People’s Republic of China to Conduct Cyber Warfare and Computer Network Exploitation.”
- 2010 Annual Report to Congress
- USCC Hearings
WASTE, FRAUD & ABUSE
DOD Encyclopedia of Ethical Failure (July 2013)
Wastebook 2012 (Sen. Coburn, 2012)
Department of Everything: Department of Defense Spending That Has Little to Do With National Security (Sen. Coburn, 2012)
Safety at Any Price: Assessing the Impact of Homeland Security Spending in U.S. Cities (Sen. Coburn, 2012)
BOOKS:
The Dawn of Islamic Literalism: Rise of the Crescent Moon by Joseph A. Butta
America the Vulnerable: Inside the New Threat Matrix of Digital Espionage, Crime, and Warfare by Joel Brenner
Unrestricted Warfare: China’s Master Plan to Destroy Americaby Qiao Liang and Wang Xiangsui
Capturing Jonathan Pollard: How One of the Most Notorious Spies in American History Was Brought to Justiceby Ronald J. Olive
True Believer: Inside the Investigation and Capture of Ana Montes, Cuba’s Master Spy by Scott W. Carmichael
Tiger Trap: America’s Secret Spy War with China by David Wise
Death by China: Confronting the Dragon – A Global Call to Action by Peter W. Navarro and Greg Autry
The China Threat: How the People’s Republic Targets America by Bill Gertz
The Real War Against America by Brett Kingstone
One Second After by William R. Forstchen