Title: CORPORATE ESPIONAGE COUNTERMEASURES
1CORPORATE ESPIONAGECOUNTERMEASURES
- Daniel J. Benny, M.A., CPP, PCI, CCO, CLET
- Private Investigator Security Consultant
2Daniel J. Benny, M.A., CPP, PCI, CCO,
CLETPrivate Investigator Security Consultant
- 3823 Locust Lane
- Harrisburg, Pennsylvania 17109-3917
- Office 717 540-9236
- Cell 717 574-9273
- DJBennyPI_at_aol.com
- http//hometown.aol.com/djbennypi
3President Ronald Regan
- Espionage is not a game its a struggle we must
win if we are to protect our freedom and our way
of life." - These words spoken by President Ronald Regan
during a November 30, 1985 radio speech may not
seem relevant today since the "cold war," has
been won. However, in the world of corporate
espionage, foreign intelligence and terrorism, it
is never over.
4The Future of Espionage
- The Future Aint What It Used To Be
- Yogi Berra
5Corporate Espionage
- Theft of trade secrets or economic espionage is a
federal criminal offense as defined by the -
- Economic Espionage Act of 1996.
- (Title 18 UCS 1831)
6The Espionage Threat
- Sources of Information
- Documents
- Draft Documents
- Working or Scrap Paper
- Computer Based Information
- Photographs Maps - Charts
7The Espionage Threat
- Sources of Information
- Internal Correspondence
- Legal and Regulatory Filings
- Open Source Information
- Company Web and Publications
8The Espionage Threat
- Sources of Information
- Formal Meeting
- Conferences and Trade Shows
- Casual Conservations
9The Espionage ThreatEmployees Who Are
- In Need of Money
- Seeking Sex - Love
- Disgruntled
- Thrill Seekers
- Activists
- Ideologues
- Departing or Former
10The Espionage ThreatCompetitors
- United States Competitors
- Foreign Competitors
11The Espionage ThreatForeign Intelligence
AgenciesHostile Nations
- Russia
- China
- North Korea
- Cuba
- Iran
12The Espionage Threat Foreign Intelligence
Agencies Friendly Nations
- France
- Germany
- Japan
- Israel
13The Espionage Threat
- Third World Countries
- Organized Crime
- Hackers
14The Espionage Threat
15The Espionage ThreatCountermeasures
- You Must Conduct A
- Threat Assessment to Determine
- Risk External / Internal
- Flaws In Your Security
16The Espionage ThreatCountermeasures
- Policies and Procedures
- In Writing and Easy to Understand
- Disseminated
- Reviewed and Updated
- Annually or When Needed
17The Espionage ThreatCountermeasures
- Assets Protection
- People
- Information
- Property
18The Espionage ThreatCountermeasures
- Loss Prevention
- Countermeasures to prevent losses from occurring
and to limit unpreventable losses.
19The Espionage ThreatCountermeasures
- Astors Law of Loss Prevention
- Shortages Rise to the Level of Their Budget.
- The Improbable is Ignored and Becomes Probable
- Persons Opportunity to Steal
- Varies
- with His Apparent Trust
20The Espionage ThreatCountermeasures
- Astors Law of Loss Prevention
- Effective Loss Prevention is Always Preceded by
Extensive Losses - Any Loss Prevention Control Fails
- Only Upon Audit
21The Espionage ThreatCountermeasures
- Human Resources
- Proper Position Descriptions
- Pre-Employment Investigations
- Periodic Investigations
- Non Disclosure/Competitive Agreements
- Effective Exit Interviews
22The Espionage ThreatCountermeasures
- Awareness Training
- Prevent Accidental Disclosures
- Predictability
- Conversations
- Reporting Contacts and Activity
23The Espionage ThreatCountermeasures
- Security Force
- Professional Staff
- Proper Staffing
- Professional Training
24The Espionage ThreatCountermeasures
- Security Force Management
- Professional Security Director
- Experience-Education
- Professional Certifications
- CPP CCO
25The Espionage ThreatCountermeasures
- Professional Certifications
- Certified Protection Professional ( CPP )
- ASIS International
-
26The Espionage ThreatCountermeasures
- Professional Certifications
- Certified Confidentially Officer ( CCO )
- Business Espionage Controls
-
- Countermeasures Association
27The Espionage ThreatCountermeasures
- Physical Security
- CPTED
- Barriers
- Access and Key Management
- IDS
- Fire Protection
- CCTV
- Security Containers
- Inventory Control
28The Espionage ThreatCountermeasures
- Information Security
- Marking All Protected Information
- Securing Protected Information
- Network Security
29The Espionage ThreatCountermeasures
- Audits and Investigations
- Regular Audits of All Areas
- Investigations of Losses
- Investigations of
- Violations of Policy
30Recovery from anEspionage Threat
- Economic Espionage Act of 1996.
- (Title 18 UCS 1831)
- Theft of trade secrets or economic espionage is a
federal criminal offense as defined by the
Economic Espionage Act of 1996. - It imposes up to a 15-year prison term and or a
maximum 5000, 000.00 fines on any person and a
10 million fine on any organization that steals
or destroys a trade secret of value with intent
to benefit any foreign power.
31Recovery from anEspionage Threat
- Economic Espionage Act of 1996.
- (Title 18 UCS 1831)
- The act imposes a 10 year prison term and or
maximum 250,000.00 fine to any person and 5
million fine on any organization who knowingly
steals or destroys any trade secret with intent
to economically benefit anyone other than the
owner and or injuries the owner of the trade
secret. - The act also allows the forfeiture to the U.S.
government of proceeds or property derived from
economic espionage and may require forfeiture of
property used to commit economic espionage.
32Recovery from anEspionage Threat
- To Prosecute You Must Show
- The Information Has Value
- Monetary
- Hidden
- Adversary/Competitor
33Recovery from anEspionage Threat
- To Prosecute You Must Show
- The Information has been
- Protected
- Properly Marked for Protection
- Policies and Procedures
- Awareness Training
34CORPORATE ESPIONAGECOUNTERMEASURES
- Review
- What is Corporate Espionage
- Sources of Information
- Threat
- Countermeasures
- Recovery from Threat
35CORPORATE ESPIONAGECOUNTERMEASURESQuestions