Free Republic
Browse · Search
News/Activism
Topics · Post Article

To: 101stAirborneVet; right way right

Dept. of Defense Directive:

http://www.fas.org/irp/doddir/dod/d5205_02.pdf

4.3.1. Adversary intelligence collection threats include the exploitation of publicly available information often obtained through open networks and information on websites. These and other detectable unclassified activities are used to derive indicators of U.S. intentions, capabilities, operations, and activities.

A necessary condition for maintaining essential secrecy is protection of classified, as well as unclassified critical information. This protection ensures that, beyond the application of traditional security measures, the Department of Defense maintains a heightened awareness of potential threats.


49 posted on 02/24/2013 3:50:58 AM PST by panaxanax
[ Post Reply | Private Reply | To 21 | View Replies ]


To: panaxanax

Before the terrorists attack, their Internet chatter almost ceases. They have learned how to avoid the government’s surveillance.


73 posted on 02/24/2013 6:00:13 AM PST by gitmo ( If your theology doesn't become your biography it's useless.)
[ Post Reply | Private Reply | To 49 | View Replies ]

Free Republic
Browse · Search
News/Activism
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson