Protecting Critical Information & Technology: Fourth National Operations Security Conference Proceedings

Front Cover
DIANE Publishing, Jun 1, 1997 - Computers - 667 pages
0 Reviews
Partial contents: plenary sessions (intellectual property & national security; technology transfer; economic espionage); workshops (establishing an OPSEC program); acquisition/treaties (arms control synergism; on-site inspection); counterintelligence/ intelligence (Chinese security & economic interests; enviro- terrorism); counterintelligence/law enforcement (counter-narcotics); economics (Japanese business intelligence; protecting trade secrets); general issues (computer crime; literature intelligence; FOIA requests; deception & cognition); technology (semiconductor industry; unclassified technology; call diversion).
 

What people are saying - Write a review

We haven't found any reviews in the usual places.

Contents

Common terms and phrases

Popular passages

Page 327 - Trade secret" means information, including a formula, pattern, compilation, program, device, method, technique, or process, that: (i) derives independent economic value, actual or potential, from not being generally known to, and not being readily ascertainable by proper means by, other persons who can obtain economic value from its disclosure or use, and (ii) is the subject of efforts that are reasonable under the circumstances to maintain its secrecy.
Page 290 - Counterintelligence means information gathered and activities conducted to protect against espionage, other intelligence activities, sabotage, or assassinations conducted for or on behalf of foreign powers, organizations or persons, or international terrorist activities, but not including personnel, physical, document or communications security programs.
Page 327 - Act, adopted in many states, defines a trade secret as: "information, including a formula, pattern, compilation, program, device, method, technique, or process, that (1) derives independent economic value, actual or potential, from not being generally known to, and not being readily ascertainable by proper means by, other persons who can obtain economic value from its disclosure or use and (2) is the subject of efforts that are reasonable under the circumstances to maintain its secrecy.
Page 600 - TCB interface is well-defined and the TCB design and implementation enable it to be subjected to more thorough testing and more complete review. Authentication mechanisms are strengthened, trusted facility management is provided in the form of support for system administrator and operator functions, and stringent configuration management controls are imposed. The system is relatively resistant to penetration. Class (B3...
Page 10 - The preeminent threat to US national security now lies in the economic sphere We must, then, redefine "national security...
Page 600 - In class (B2) systems, the TCB is based on a clearly defined and documented formal security policy model that requires the discretionary and mandatory access control enforcement found in class (Bl) systems be extended to all subjects and objects in the ADP system.
Page 662 - Defense: authority to withhold from public disclosure certain technical data (a) Notwithstanding any other provision of law, the Secretary of Defense may withhold from public disclosure any technical data with military or space application in the possession of, or under the control of, the Department of Defense, if such data may not be exported lawfully outside the United States without an approval, authorization, or license under the Export Administration Act of 1979 (50 USC App. 2401-2420) or the...
Page 12 - American ownership of the corporation is profoundly less relevant to America's economic future than the skills, training, and knowledge commanded by American workers - workers who are increasingly employed within the United States by foreign-owned corporations. So who is us? The answer is, the American work force, the American people, but not particularly the American corporation.
Page 286 - classified information' means information which, at the time of a violation of this section, is, for reasons of national security, specifically designated by a United States Government Agency for limited or restricted dissemination or distribution; "The terms 'code,' 'cipher,
Page 252 - We have it in our power to begin the world over again. A situation, similar to the present, hath not happened since the days of Noah until now. The birthday of a new world is at hand...

Bibliographic information