Counterintelligence Vetting Techniques Compared across Multiple Domains

被引:0
|
作者
Mobley, Blake W. [1 ,2 ]
Wege, Carl Anthony [3 ]
机构
[1] Biotechnology Co, San Diego, CA 92121 USA
[2] Cent Intelligence Agcy, Langley, VA USA
[3] Coll Coastal Georgia, Polit Sci, Brunswick, GA USA
关键词
D O I
10.1080/08850607.2020.1836603
中图分类号
D81 [国际关系];
学科分类号
030207 ;
摘要
This discussion examines how security and counterintelligence vetting practices vary across domains and how this informs our understanding of counterintelligence disciplines. Organizations in each domain must ensure that persons admitted as insiders can be trusted with sensitive information and the organization's security. We look at some examples of counterintelligence vetting, seeking commonalities in vetting needs and practices between armed groups, corporations, and states. We compare, in depth, the vetting practices of Lebanese Hezbollah, the reconstituted Syrian intelligence services, the drug-trafficking group known as Los Zetas, and High-Value Technology Companies (HVTCs). The evident regularities and commonalities in counterintelligence vetting suggest cross-domain and cross-cultural targets for exploitation.
引用
收藏
页码:663 / 693
页数:31
相关论文
共 50 条
  • [1] Discovering Experts across Multiple Domains
    Pal, Aditya
    [J]. SIGIR 2015: PROCEEDINGS OF THE 38TH INTERNATIONAL ACM SIGIR CONFERENCE ON RESEARCH AND DEVELOPMENT IN INFORMATION RETRIEVAL, 2015, : 923 - 926
  • [2] Multiple feature interpretation across domains
    Sha, K
    Gurumoorthy, B
    [J]. COMPUTERS IN INDUSTRY, 2000, 42 (01) : 13 - 32
  • [3] Assessment of Expert Performance Compared Across Professional Domains
    Thomas, Rick P.
    Lawrence, Ashley
    [J]. JOURNAL OF APPLIED RESEARCH IN MEMORY AND COGNITION, 2018, 7 (02) : 167 - 176
  • [4] Secure Resource Provisioning Across Multiple Domains
    Mano, Toru
    Mizutani, Kimihiro
    Akashi, Osamu
    [J]. 2013 IFIP/IEEE INTERNATIONAL SYMPOSIUM ON INTEGRATED NETWORK MANAGEMENT (IM 2013), 2013, : 1129 - 1134
  • [5] Exploring Consumer Risk Across Multiple Domains
    Tumbat, Gulnur
    [J]. ADVANCES IN CONSUMER RESEARCH, VOL XXXVI, 2009, 36 : 926 - 927
  • [6] Scalable quality of service across multiple domains
    Cobb, JA
    [J]. COMPUTER COMMUNICATIONS, 2005, 28 (18) : 1997 - 2008
  • [7] Building Virtual Networks Across Multiple Domains
    Werle, Christoph
    Bless, Roland
    Papadimitriou, Panagiotis
    Houidi, Ines
    Louati, Wajdi
    Zeghlache, Djamal
    Mathy, Laurent
    [J]. ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2011, 41 (04) : 412 - 413
  • [8] University students’ conceptions of learning across multiple domains
    Claudio Vezzani
    Giulia Vettori
    Giuliana Pinto
    [J]. European Journal of Psychology of Education, 2018, 33 : 665 - 684
  • [9] Designing a large SOA across multiple security domains
    Alten, Alexander I.
    [J]. 2007 IEEE MILITARY COMMUNICATIONS CONFERENCE, VOLS 1-8, 2007, : 3661 - 3668
  • [10] Distributed policy framework across multiple Grid domains
    Ciaschini, Vincenzo
    Ferraro, Andrea
    Forti, Alberto
    Ghiselli, Antonia
    Venturi, Valerio
    Gianoli, Alberto
    Luppi, Eleonora
    Stagni, Federico
    Tomassetti, Luca
    [J]. 2007 IEEE NUCLEAR SCIENCE SYMPOSIUM CONFERENCE RECORD, VOLS 1-11, 2007, : 892 - 897