Computer and Other
Technical Vulnerabilities

Computer Vulnerabilities
Threats to computer security, how hackers work, and how we unintentionally make it easy for them. Passwords, "social engineering," case studies, using the Internet securely, e-mail, viruses, security of hard drives, theft of laptop computers.

Intercepting Your Communications
Telephones, fax machines, cell phones, cordless phones, answering machines, voice mail, intercoms and baby monitors, countermeasures.

Bugs and Other Eavesdropping Devices
Eavesdropping threat. Methods of eavesdropping. Detecting and Preventing Eavesdropping.

HOME    |    HELP

INFORMATIONCONDUCT | THREATS  | TECH VULNERABILITYASSISTANCE
SPY STORIES  | TREASON 101

United States Department of Agriculture | Departmental Management | PDSD Homepage

United States Department of Agriculture
Personnel and Document Security Division
1400 Independence Ave. SW, Washington, D.C. 20250-9305
Telephone: (202) 720-PDSD (7373), Fax: (202) 720-7708
Send us your comments:
pdsd@usda.gov

USDA Privacy Policy | Accessibility Statement