Reports

Ray Semko recommends the following resources as discussed in his briefings:

Security Executive Agent Directive Five: Collection, Use, and Retention of Publicly Available Social Media Information in Personnel Security Background Investigations and Adjudications (DNI, 12 May 2016)

2017 Worldwide Threat Assessment (DNI)

2017  Security Awareness Report (SANS)

Jihadi Operations Security (MEMRI)
Islamic Jihadists have security awareness information and training too:

“We present you this modest work for lone wolf mujahideen and small cells of brothers who want to bring victory to this religion. This is originally a series of lectures in 30 parts about safety & security in Jihadi work, entitled ‘Dawrat al-Amn wa Al-Mujhabaraat‘ [Security and Intelligence Course]. It was initially meant for mujahideen groups and not lone wolves, but we have tried to adapt it and pick what’s important and leave what’s not relevant for an individual mujahid and small groups. No doubt that today, at the era of the lone wolves, brothers in the West need to know some important things about safety in order to ensure success in their operations.

The guide contains 12 chapters: “Definition of security, its importance and its obligation to Islam”;” general security guidelines”; “Homeland Security-Cell Security”; Online Security-Encryption”; “The Safehouse”; “Conferences & Meetings”; “Travel & Transport Security”; “Money & Weapons Security”; “Surveillance”; “The Cover”; “Social Engineering”; and “Special Operations & Inspection”.

Economic Espionage Videos, Reports (FBI)

US National Security Strategy (White House, 2015)

US National Intelligence Strategy (DNI, 2014)

Targeting US Technologies: A Trend Analysis of Cleared Industry Reporting (DSS, 2015)

Net Losses: Estimating the Global Cost of Cybercrime; Economic Impact of Cybercrime II (CSIS/Intel/McAfee, June 2014)

Internal Review of the Washington Navy Yard Shooting: A Report to the Secretary of Defense (DOD, 20 Nov 2013)

Quadrennial Defense Review (DOD, 2014)

DOD Encyclopedia of Ethical Failure (July 2013)

True Psychology of the Insider Spy/Ten Life Stages of the Insider Spy (David L. Charney, MD)

Administration’s Strategy on Mitigating the Theft of U.S. Trade Secrets (White House, Feb 2013)

Foreign Spies Stealing US Economic Secrets in Cyberspace: Report to Congress on Foreign Economic Collection and Industrial Espionage, 2009-2011 (DNI/NCIX, October 2011)

The Insider Threat (FBI brochure)

Employee’s Guide to Security Responsibilities

Common Sense Guide to Prevention and Detection of Insider Threats (CERT, 2012)

Executive Order 13587 — Structural Reforms to Improve the Security of Classified Networks and the Responsible Sharing and Safeguarding of Classified Information (White House)

The National Counterintelligence Strategy of the United States (DNI/NCIX, 2009)

Traveling Overseas with Mobile Phones, Laptops, PDAs, and Other Electronic Devices (DNI/NCIX)

PERSEREC Reports

DSS

FBI

CHINA

Cyber Espionage and the Theft of U.S. Intellectual Property and Technology,” Testimony of Larry M. Wortzel before the House of Representatives Committee on Energy and Commerce Subcommittee on Oversight and Investigations (9 July 2013)

Annual Report to Congress on Military and Security Developments Involving the People’s Republic of China (DOD, 2013)

APT1: Exposing One of China’s Cyber Espionage Units (Mandiant, Feb 2013)

Investigative Report on the U.S. National Security Issues Posed by Chinese Telecommunications Companies Huawei and ZTE: (HPSCI, October 8, 2012)

U.S.-China Economic and Security Review Commission

WASTE, FRAUD & ABUSE

DOD Encyclopedia of Ethical Failure (July 2013)

Wastebook 2012 (Sen. Coburn, 2012)

Department of Everything: Department of Defense Spending That Has Little to Do With National Security (Sen. Coburn, 2012)

Safety at Any Price: Assessing the Impact of Homeland Security Spending in U.S. Cities (Sen. Coburn, 2012)

BOOKS:

The Dawn of Islamic Literalism: Rise of the Crescent Moon by Joseph A. Butta

America the Vulnerable: Inside the New Threat Matrix of Digital Espionage, Crime, and Warfare by Joel Brenner

Unrestricted Warfare: China’s Master Plan to Destroy Americaby Qiao Liang and Wang Xiangsui

Triple Cross: How bin Laden’s Master Spy Penetrated the CIA, the Green Berets, and the FBI–and Why Patrick Fitzgerald Failed to Stop Him by Peter Lance

Capturing Jonathan Pollard: How One of the Most Notorious Spies in American History Was Brought to Justiceby Ronald J. Olive

True Believer: Inside the Investigation and Capture of Ana Montes, Cuba’s Master Spy by Scott W. Carmichael

Tiger Trap: America’s Secret Spy War with China by David Wise

Death by China: Confronting the Dragon – A Global Call to Action by Peter W. Navarro and Greg Autry

The China Threat: How the People’s Republic Targets America by Bill Gertz

The Real War Against America by Brett Kingstone

One Second After by William R. Forstchen