Direct, unsolicited requests for U.S. defense industry program information or other proprietary S&T information is the most frequently reported foreign collection activity against defense industry. The requests may be faxed, mailed, e-mailed, or communicated by phone. This procedure is so popular because it is low cost, low risk, and often works.1
Unsolicited requests are often directed to individual employees by name, rather than to corporate marketing departments. There are two reasons for this. First, individuals are more likely to be unaware of or not care about company or organizational policy in responding to such requests. Second, the purpose may not be to actually collect information. The purpose may be a preliminary screening to identify those who are willing to be helpful by responding to such a request. The few who respond may then be targeted and assessed further by other means.
Various ploys are used to increase the likelihood of an initial response. For example:
Many companies label an unsolicited request as suspicious when the information requested is on the Militarily Critical Technology List or is covered under the International Traffic in Arms Regulations (ITAR) and would require a license for export.
|<-- Prev||Next -->|
|SECURITY BRIEFING TABLE OF CONTENTS|