CORPORATE ESPIONAGE COUNTERMEASURES - PowerPoint PPT Presentation

1 / 35
About This Presentation
Title:

CORPORATE ESPIONAGE COUNTERMEASURES

Description:

... ASIS International The Espionage Threat Countermeasures The Espionage Threat Countermeasures Physical Security CPTED Barriers Access and Key Management ... – PowerPoint PPT presentation

Number of Views:156
Avg rating:3.0/5.0
Slides: 36
Provided by: Danie155
Category:

less

Transcript and Presenter's Notes

Title: CORPORATE ESPIONAGE COUNTERMEASURES


1
CORPORATE ESPIONAGECOUNTERMEASURES
  • Daniel J. Benny, M.A., CPP, PCI, CCO, CLET
  • Private Investigator Security Consultant

2
Daniel J. Benny, M.A., CPP, PCI, CCO,
CLETPrivate Investigator Security Consultant
  • 3823 Locust Lane
  • Harrisburg, Pennsylvania 17109-3917
  • Office 717 540-9236
  • Cell 717 574-9273
  • DJBennyPI_at_aol.com
  • http//hometown.aol.com/djbennypi

3
President Ronald Regan
  • Espionage is not a game its a struggle we must
    win if we are to protect our freedom and our way
    of life."
  • These words spoken by President Ronald Regan
    during a November 30, 1985 radio speech may not
    seem relevant today since the "cold war," has
    been won. However, in the world of corporate
    espionage, foreign intelligence and terrorism, it
    is never over.

4
The Future of Espionage
  • The Future Aint What It Used To Be
  • Yogi Berra

5
Corporate Espionage
  • Theft of trade secrets or economic espionage is a
    federal criminal offense as defined by the
  • Economic Espionage Act of 1996.
  • (Title 18 UCS 1831)

6
The Espionage Threat
  • Sources of Information
  • Documents
  • Draft Documents
  • Working or Scrap Paper
  • Computer Based Information
  • Photographs Maps - Charts

7
The Espionage Threat
  • Sources of Information
  • Internal Correspondence
  • Legal and Regulatory Filings
  • Open Source Information
  • Company Web and Publications

8
The Espionage Threat
  • Sources of Information
  • Formal Meeting
  • Conferences and Trade Shows
  • Casual Conservations

9
The Espionage ThreatEmployees Who Are
  • In Need of Money
  • Seeking Sex - Love
  • Disgruntled
  • Thrill Seekers
  • Activists
  • Ideologues
  • Departing or Former

10
The Espionage ThreatCompetitors
  • United States Competitors
  • Foreign Competitors

11
The Espionage ThreatForeign Intelligence
AgenciesHostile Nations
  • Russia
  • China
  • North Korea
  • Cuba
  • Iran

12
The Espionage Threat Foreign Intelligence
Agencies Friendly Nations
  • France
  • Germany
  • Japan
  • Israel

13
The Espionage Threat
  • Third World Countries
  • Organized Crime
  • Hackers

14
The Espionage Threat
  • Terrorist Organizations

15
The Espionage ThreatCountermeasures
  • You Must Conduct A
  • Threat Assessment to Determine
  • Risk External / Internal
  • Flaws In Your Security

16
The Espionage ThreatCountermeasures
  • Policies and Procedures
  • In Writing and Easy to Understand
  • Disseminated
  • Reviewed and Updated
  • Annually or When Needed

17
The Espionage ThreatCountermeasures
  • Assets Protection
  • People
  • Information
  • Property

18
The Espionage ThreatCountermeasures
  • Loss Prevention
  • Countermeasures to prevent losses from occurring
    and to limit unpreventable losses.

19
The Espionage ThreatCountermeasures
  • Astors Law of Loss Prevention
  • Shortages Rise to the Level of Their Budget.
  • The Improbable is Ignored and Becomes Probable
  • Persons Opportunity to Steal
  • Varies
  • with His Apparent Trust

20
The Espionage ThreatCountermeasures
  • Astors Law of Loss Prevention
  • Effective Loss Prevention is Always Preceded by
    Extensive Losses
  • Any Loss Prevention Control Fails
  • Only Upon Audit

21
The Espionage ThreatCountermeasures
  • Human Resources
  • Proper Position Descriptions
  • Pre-Employment Investigations
  • Periodic Investigations
  • Non Disclosure/Competitive Agreements
  • Effective Exit Interviews

22
The Espionage ThreatCountermeasures
  • Awareness Training
  • Prevent Accidental Disclosures
  • Predictability
  • Conversations
  • Reporting Contacts and Activity

23
The Espionage ThreatCountermeasures
  • Security Force
  • Professional Staff
  • Proper Staffing
  • Professional Training

24
The Espionage ThreatCountermeasures
  • Security Force Management
  • Professional Security Director
  • Experience-Education
  • Professional Certifications
  • CPP CCO

25
The Espionage ThreatCountermeasures
  • Professional Certifications
  • Certified Protection Professional ( CPP )
  • ASIS International

26
The Espionage ThreatCountermeasures
  • Professional Certifications
  • Certified Confidentially Officer ( CCO )
  • Business Espionage Controls
  • Countermeasures Association

27
The Espionage ThreatCountermeasures
  • Physical Security
  • CPTED
  • Barriers
  • Access and Key Management
  • IDS
  • Fire Protection
  • CCTV
  • Security Containers
  • Inventory Control

28
The Espionage ThreatCountermeasures
  • Information Security
  • Marking All Protected Information
  • Securing Protected Information
  • Network Security

29
The Espionage ThreatCountermeasures
  • Audits and Investigations
  • Regular Audits of All Areas
  • Investigations of Losses
  • Investigations of
  • Violations of Policy

30
Recovery from anEspionage Threat
  • Economic Espionage Act of 1996.
  • (Title 18 UCS 1831)
  • Theft of trade secrets or economic espionage is a
    federal criminal offense as defined by the
    Economic Espionage Act of 1996.
  • It imposes up to a 15-year prison term and or a
    maximum 5000, 000.00 fines on any person and a
    10 million fine on any organization that steals
    or destroys a trade secret of value with intent
    to benefit any foreign power.

31
Recovery from anEspionage Threat
  • Economic Espionage Act of 1996.
  • (Title 18 UCS 1831)
  • The act imposes a 10 year prison term and or
    maximum 250,000.00 fine to any person and 5
    million fine on any organization who knowingly
    steals or destroys any trade secret with intent
    to economically benefit anyone other than the
    owner and or injuries the owner of the trade
    secret.
  • The act also allows the forfeiture to the U.S.
    government of proceeds or property derived from
    economic espionage and may require forfeiture of
    property used to commit economic espionage.

32
Recovery from anEspionage Threat
  • To Prosecute You Must Show
  • The Information Has Value
  • Monetary
  • Hidden
  • Adversary/Competitor

33
Recovery from anEspionage Threat
  • To Prosecute You Must Show
  • The Information has been
  • Protected
  • Properly Marked for Protection
  • Policies and Procedures
  • Awareness Training

34
CORPORATE ESPIONAGECOUNTERMEASURES
  • Review
  • What is Corporate Espionage
  • Sources of Information
  • Threat
  • Countermeasures
  • Recovery from Threat

35
CORPORATE ESPIONAGECOUNTERMEASURESQuestions
Write a Comment
User Comments (0)
About PowerShow.com