Example: tourism industry

In most countries, you have no expectation Safety and Security

During Your Stay Department of Justice Federal Bureau of Investigation Beware that your Do not use non-company computers to log conversations may not be into your company's network. Always consider private or secure. Unlike any information conveyed through a non-company the United States, most other computer to be compromised, even if encrypted. The willingness of US scientists and scholars to engage countries do not have legal restrictions against technical in academic exchange make US travelers particularly Cyber criminals from numerous countries buy and sell surveillance. Most foreign stolen financial information including credit card data vulnerable not only to standard electronic monitoring Security services have various and login credentials (user names and passwords).

visitors to identify persons of potential intelligence interest. They also have well established contacts with hotels and common hosts that can assist in various forms ... Additional travel security tips and country threat assessments are available from the FBI upon request.

Tags:

  Tips, Visitors

Information

Domain:

Source:

Link to this page:

Please notify us if you found a problem with this document:

Other abuse

Transcription of In most countries, you have no expectation Safety and Security

1 During Your Stay Department of Justice Federal Bureau of Investigation Beware that your Do not use non-company computers to log conversations may not be into your company's network. Always consider private or secure. Unlike any information conveyed through a non-company the United States, most other computer to be compromised, even if encrypted. The willingness of US scientists and scholars to engage countries do not have legal restrictions against technical in academic exchange make US travelers particularly Cyber criminals from numerous countries buy and sell surveillance. Most foreign stolen financial information including credit card data vulnerable not only to standard electronic monitoring Security services have various and login credentials (user names and passwords).

2 Devices installed in hotel rooms or conference centers . means of screening incoming visitors to identify persons of but also to simple approaches by foreigners trained potential intelligence interest. Do not allow foreign electronic storage devices to to ask the right questions. Annual Report to Congress on They also have well established contacts with hotels be connected to your computer or phone. They Foreign Economic Collection and Industrial Espionage, 2003. and common hosts that can assist in various forms may contain malware or automatically copy your of monitoring you. Electronic eavesdropping has stored electronic data. Do not use thumb drives given been reported on airlines, in hotel rooms, taxis, and to you they may be compromised.

3 Meeting rooms. In most countries, you have no expectation Safety and Security of privacy in Internet cafes, hotels, airplanes, Business and government travelers have reported offices, or public spaces. All information you send their hotel rooms and belongings were searched while they were away. Sometimes there was no effort electronically can be intercepted, especially wireless to conceal the search. communications. If information might be valuable to another government, company or group, you should for the Business Professional Traveling Abroad assume that it will be intercepted and retained. Do not leave electronic devices unattended. Do Security services and criminals can track your not transport them (or anything valuable) in your movements using your mobile phone and can turn on Business travelers checked baggage.

4 Shield passwords from view. Avoid Wi-Fi networks if you can. In some countries the microphone in your device even when you think it You or your firm may should take measures is turned off. they are controlled by Security services; in all cases be a target of a foreign to ensure not only they are insecure. During the Beijing Olympics, hotels were required to install software so law enforcement could monitor country's efforts to the Safety and Clear your Internet browser after each use: delete history files, caches, cookies, and temporary internet files. the Internet activity of hotel guests. obtain information or Security of themselves If your phone or laptop is stolen, report it Beware of phishing.

5 Foreign Security services and technologies in order but also their immediately to the local US Embassy or Consulate. criminals are adept at pretending to be someone you trust in order to obtain personal or sensitive information. to increase their market business information share, build their while traveling economies, or modernize outside the Upon Your Return Review your system access with your company's Change all your passwords including your voicemail their militaries. Targeting United States. Information Security Officer. Access that is not and check electronic devices for malware. methods include luggage accounted for should be investigated.

6 Report any unusual circumstances or noteworthy searches, extensive It is not uncommon for foreigners to contact you incidents to your Security officer and to the FBI. after your return. The FBI may be able to help you Notifying the FBI will help ensure that future travel questioning, and determine if these contacts pose any risk to you or your company. advisories take into consideration the circumstances and incidents you encountered. unnecessary inspection Additional travel Security tips and country threat assessments are available from the FBI upon request. and downloading of Your local FBI office #: information from laptop computers. Overseas Security Advisory Council: Good Security habits will help protect you and your company.

7 Corporate espionage is an increasingly serious Critical business information may include: threat for a business traveler. The perpetrator During Your Stay wCustomer data wPhone directories may be a competitor, opportunist, or foreign Protect your passport! Theft of American tourist Beware of new acquaintances who probe for wEmployee data wComputer access passports is on the rise. It is recommended that you information about you or who attempt to get you intelligence officer. In many countries, domestic protocols carry your passport in a front pants pocket or in a involved in what could become a compromising situation. corporations collect competitive intelligence wVendor information pouch hidden in your clothes, and that it remain with wComputer network you at all times.

8 Some hotels require you to leave it Avoid civil disturbances and obey local laws. If with the help and support of their government. wPricing strategies design at the desk during your stay and they may use it to you come upon a demonstration or rally, be careful; in To mitigate this risk, your organization's critical register you with the local police--a routine policy. Ask the confusion you could be arrested or detained even wProprietary formulas wAcquisition strategies information and technologies should not reside and processes for a receipt and be sure to retrieve your passport though you are a bystander. Be mindful that in many wMarketing strategies before continuing your trip.

9 If your passport is lost or countries, it is prohibited to speak derogatorily of the on any hard copy or electronic device you take stolen, report the situation immediately to the nearest government and its leaders. It may be illegal to take wTechnical components unless it is absolutely necessary, and if so, then and plans wInvestment data US Embassy or Consulate. photographs of train stations, government buildings, religious symbols, and military installations. you must safeguard the physical access to the wCorporate strategies wNegotiation strategies Be courteous and cooperative when processing information by using encryption and keeping the through customs.

10 Do not leave your bags Avoid any actions that are illegal, improper or wCorporate financial data wPasswords (computer, unattended. Stay alert. indiscreet. Avoid offers of sexual companionship; it material on your person at all times. Hotel safes phone, accounts) may lead to a room raid, photography, and blackmail. are not adequate protection. Use authorized taxis. You could be overcharged, Do not attempt to keep up with your hosts in social robbed or kidnapped when using gypsy taxis. drinking. Do not engage in black market activities. Do Before You Go not sell your possessions. Do not bring in or purchase Do not invite strangers into your room.


Related search queries