Techniques to detect, neutralize, and exploit technical surveillance technologies and hazards that permit the unauthorized access to or removal of information.
Source(s):
CNSSI 4009-2015
DoDI 5240.05