Techniques to detect, neutralize, and exploit technical surveillance technologies and hazards that permit the unauthorized access to or removal of information.
Sources:
CNSSI 4009-2015
from
DoDI 5240.05