CORPORATE ESPIONAGECORPORATE ESPIONAGECOUNTERMEASURESCOUNTERMEASURES
Daniel J. Benny, M.A., CPP, PCI, CCO, Daniel J. Benny, M.A., CPP, PCI, CCO, CLETCLET
Private Investigator & Security Private Investigator & Security ConsultantConsultant
Daniel J. Benny, M.A., CPP, PCI, CCO, Daniel J. Benny, M.A., CPP, PCI, CCO, CLETCLET
Private Investigator & Security Private Investigator & Security ConsultantConsultant
3823 Locust Lane3823 Locust LaneHarrisburg, Pennsylvania 17109-3917Harrisburg, Pennsylvania 17109-3917
Office: 717 540-9236Office: 717 540-9236Cell: 717 574-9273Cell: 717 [email protected]@aol.com
http://hometown.aol.com/djbennypihttp://hometown.aol.com/djbennypi
President Ronald President Ronald ReganRegan
Espionage is not a game; it’s a struggle we must win if Espionage is not a game; it’s a struggle we must win if we are to protect our freedom and ourwe are to protect our freedom and our way of life."way of life."
These words spoken by President Ronald Regan during These words spoken by President Ronald Regan during a November 30, 1985 radio speech may not seem a November 30, 1985 radio speech may not seem relevant today since the "cold war," has been won. relevant today since the "cold war," has been won. However, in the world of corporate espionage, foreign However, in the world of corporate espionage, foreign intelligence and terrorism, it is never over. intelligence and terrorism, it is never over.
The Future of EspionageThe Future of Espionage
The Future Ain’t The Future Ain’t What It Used To BeWhat It Used To Be
Yogi BerraYogi Berra
Corporate EspionageCorporate Espionage
Theft of trade secrets or Theft of trade secrets or economic espionage is a economic espionage is a
federal criminal offense as federal criminal offense as defined by thedefined by the
Economic Espionage Act of Economic Espionage Act of 19961996..
((Title 18 UCS 1831Title 18 UCS 1831))
The Espionage ThreatThe Espionage Threat
Sources of InformationSources of Information
DocumentsDocumentsDraft DocumentsDraft Documents
Working or Scrap PaperWorking or Scrap PaperComputer Based InformationComputer Based InformationPhotographs – Maps - ChartsPhotographs – Maps - Charts
The Espionage ThreatThe Espionage Threat
Sources of InformationSources of Information
Internal CorrespondenceInternal Correspondence
Legal and Regulatory FilingsLegal and Regulatory Filings
Open Source InformationOpen Source Information
Company Web and Company Web and PublicationsPublications
The Espionage ThreatThe Espionage Threat
Sources of InformationSources of Information
Formal MeetingFormal Meeting
Conferences and Trade Conferences and Trade ShowsShows
Casual ConservationsCasual Conservations
The Espionage ThreatThe Espionage ThreatEmployees Who AreEmployees Who Are
In Need of MoneyIn Need of MoneySeeking Sex - LoveSeeking Sex - Love
DisgruntledDisgruntledThrill SeekersThrill Seekers
ActivistsActivistsIdeologuesIdeologues
Departing or FormerDeparting or Former
The Espionage ThreatThe Espionage ThreatCompetitorsCompetitors
United States CompetitorsUnited States Competitors
Foreign CompetitorsForeign Competitors
The Espionage ThreatThe Espionage ThreatForeign Intelligence Foreign Intelligence
AgenciesAgenciesHostile NationsHostile Nations
RussiaRussia
ChinaChina
North North KoreaKorea
CubaCuba
IranIran
The Espionage Threat The Espionage Threat Foreign Intelligence Foreign Intelligence
AgenciesAgencies Friendly Nations Friendly Nations
FranceFrance
GermanyGermany
JapanJapan
IsraelIsrael
The Espionage Threat The Espionage Threat
Third World CountriesThird World Countries
Organized CrimeOrganized Crime
HackersHackers
The Espionage ThreatThe Espionage ThreatCountermeasuresCountermeasures
You Must Conduct A You Must Conduct A
Threat Assessment to Threat Assessment to DetermineDetermine
Risk External / InternalRisk External / Internal
Flaws In Your SecurityFlaws In Your Security
The Espionage ThreatThe Espionage ThreatCountermeasuresCountermeasures
Policies and ProceduresPolicies and Procedures
In Writing and Easy to UnderstandIn Writing and Easy to UnderstandDisseminatedDisseminated
Reviewed and UpdatedReviewed and UpdatedAnnually or When NeededAnnually or When Needed
The Espionage ThreatThe Espionage ThreatCountermeasuresCountermeasures
Assets ProtectionAssets Protection
PeoplePeople
InformationInformation
PropertyProperty
The Espionage ThreatThe Espionage ThreatCountermeasuresCountermeasures
Loss PreventionLoss Prevention
Countermeasures to prevent Countermeasures to prevent losses from occurring and to losses from occurring and to limit unpreventable losses. limit unpreventable losses.
The Espionage ThreatThe Espionage ThreatCountermeasuresCountermeasures
Astor’s Law of Loss PreventionAstor’s Law of Loss Prevention
Shortages Rise to the Level of Their Shortages Rise to the Level of Their Budget.Budget.
The Improbable is Ignored and Becomes The Improbable is Ignored and Becomes ProbableProbable
Person’s Opportunity to Steal Person’s Opportunity to Steal VariesVaries
with His Apparent Trustwith His Apparent Trust
The Espionage ThreatThe Espionage ThreatCountermeasuresCountermeasures
Astor’s Law of Loss PreventionAstor’s Law of Loss Prevention
Effective Loss Prevention is Effective Loss Prevention is Always Preceded by Extensive Always Preceded by Extensive
LossesLosses
Any Loss Prevention Control Fails Any Loss Prevention Control Fails
Only Upon AuditOnly Upon Audit
The Espionage ThreatThe Espionage ThreatCountermeasuresCountermeasures
Human ResourcesHuman Resources
Proper Position DescriptionsProper Position DescriptionsPre-Employment InvestigationsPre-Employment Investigations
Periodic InvestigationsPeriodic InvestigationsNon –Disclosure/Competitive Non –Disclosure/Competitive
AgreementsAgreementsEffective Exit InterviewsEffective Exit Interviews
The Espionage ThreatThe Espionage ThreatCountermeasuresCountermeasures
Awareness TrainingAwareness Training
Prevent Accidental DisclosuresPrevent Accidental DisclosuresPredictabilityPredictabilityConversationsConversations
Reporting Contacts and ActivityReporting Contacts and Activity
The Espionage ThreatThe Espionage ThreatCountermeasuresCountermeasures
Security ForceSecurity Force
Professional StaffProfessional StaffProper StaffingProper Staffing
Professional TrainingProfessional Training
The Espionage ThreatThe Espionage ThreatCountermeasuresCountermeasures
Security Force ManagementSecurity Force Management
Professional Security Professional Security DirectorDirector
Experience-EducationExperience-EducationProfessional Certifications Professional Certifications
CPP CCO CPP CCO
The Espionage ThreatThe Espionage ThreatCountermeasuresCountermeasures
Professional CertificationsProfessional Certifications
Certified Protection Professional Certified Protection Professional ( CPP )( CPP )
ASIS InternationalASIS International
The Espionage ThreatThe Espionage ThreatCountermeasuresCountermeasures
Professional CertificationsProfessional Certifications
Certified Confidentially Officer ( CCO )Certified Confidentially Officer ( CCO )
Business Espionage ControlsBusiness Espionage Controls &&
Countermeasures AssociationCountermeasures Association
The Espionage ThreatThe Espionage ThreatCountermeasuresCountermeasures
Physical SecurityPhysical Security
CPTED CPTED BarriersBarriers
Access and Key ManagementAccess and Key ManagementIDS IDS
Fire ProtectionFire ProtectionCCTVCCTV
Security ContainersSecurity ContainersInventory ControlInventory Control
The Espionage ThreatThe Espionage ThreatCountermeasuresCountermeasures
Information SecurityInformation Security
Marking All Protected Marking All Protected InformationInformation
Securing Protected Securing Protected InformationInformation
Network SecurityNetwork Security
The Espionage ThreatThe Espionage ThreatCountermeasuresCountermeasures
Audits and Audits and InvestigationsInvestigations
Regular Audits of All Regular Audits of All AreasAreas
Investigations of Investigations of LossesLosses
Investigations of Investigations of Violations of PolicyViolations of Policy
Recovery from anRecovery from anEspionage ThreatEspionage Threat
Economic Espionage Act of 1996Economic Espionage Act of 1996.. ((Title 18 UCS 1831Title 18 UCS 1831))
Theft of trade secrets or economic espionage Theft of trade secrets or economic espionage is a federal criminal offense as defined by the is a federal criminal offense as defined by the
Economic Espionage Act of 1996Economic Espionage Act of 1996. .
It imposes up to a 15-year prison term and It imposes up to a 15-year prison term and or a maximum $5000, 000.00 fines on any or a maximum $5000, 000.00 fines on any
person and a $10 million fine on any person and a $10 million fine on any organization that steals or destroys a trade organization that steals or destroys a trade secret of value with intent to benefit any secret of value with intent to benefit any
foreign powerforeign power. .
Recovery from anRecovery from anEspionageEspionage Threat Threat
Economic Espionage Act of 1996Economic Espionage Act of 1996.. ((Title 18 UCS 1831Title 18 UCS 1831))
The act imposes a 10 year prison term and or The act imposes a 10 year prison term and or maximum $250,000.00 fine to any person maximum $250,000.00 fine to any person
and $5 million fine on any organization who and $5 million fine on any organization who knowingly steals or destroys any trade secret knowingly steals or destroys any trade secret
with intent to economically benefit anyone with intent to economically benefit anyone other than the owner and or injuries the other than the owner and or injuries the
owner of the trade secret. owner of the trade secret. The act also allows the forfeiture to the U.S. The act also allows the forfeiture to the U.S. government of proceeds or property derived government of proceeds or property derived from economic espionage and may require from economic espionage and may require
forfeiture of property used to commit forfeiture of property used to commit economic espionage.economic espionage.
Recovery from anRecovery from anEspionage ThreatEspionage Threat
To Prosecute You Must Show To Prosecute You Must Show
The Information Has ValueThe Information Has Value
MonetaryMonetary
HiddenHidden
Adversary/CompetitorAdversary/Competitor
Recovery from anRecovery from anEspionage ThreatEspionage Threat
To Prosecute You Must Show To Prosecute You Must Show The Information has beenThe Information has been
ProtectedProtectedProperly Marked for ProtectionProperly Marked for Protection
Policies and ProceduresPolicies and ProceduresAwareness TrainingAwareness Training
CORPORATE ESPIONAGECORPORATE ESPIONAGECOUNTERMEASURESCOUNTERMEASURES
ReviewReviewWhat is Corporate EspionageWhat is Corporate Espionage
Sources of InformationSources of InformationThreatThreat
CountermeasuresCountermeasuresRecovery from ThreatRecovery from Threat
Top Related