CORPORATE ESPIONAGE

Document Sample
CORPORATE ESPIONAGE Powered By Docstoc
					CORPORATE ESPIONAGE COUNTERMEASURES
Daniel J. Benny, M.A., CPP, PCI, CCO, CLET Private Investigator & Security Consultant

Daniel J. Benny, M.A., CPP, PCI, CCO, CLET Private Investigator & Security Consultant
3823 Locust Lane Harrisburg, Pennsylvania 17109-3917 Office: 717 540-9236 Cell: 717 574-9273 DJBennyPI@aol.com http://hometown.aol.com/djbennypi

President Ronald Regan
Espionage is not a game; it’s a struggle we must win if we are to protect our freedom and our way of life."
These words spoken by President Ronald Regan during a November 30, 1985 radio speech may not seem relevant today since the "cold war," has been won. However, in the world of corporate espionage, foreign intelligence and terrorism, it is never over.

The Future of Espionage

The Future Ain’t What It Used To Be Yogi Berra

Corporate Espionage
Theft of trade secrets or economic espionage is a federal criminal offense as defined by the

Economic Espionage Act of 1996. (Title 18 UCS 1831)

The Espionage Threat
Sources of Information Documents Draft Documents Working or Scrap Paper Computer Based Information Photographs – Maps - Charts

The Espionage Threat
Sources of Information Internal Correspondence Legal and Regulatory Filings Open Source Information Company Web and Publications

The Espionage Threat Sources of Information
Formal Meeting Conferences and Trade Shows Casual Conservations

The Espionage Threat Employees Who Are
In Need of Money Seeking Sex - Love Disgruntled Thrill Seekers Activists Ideologues Departing or Former

The Espionage Threat Competitors
United States Competitors Foreign Competitors

The Espionage Threat Foreign Intelligence Agencies Hostile Nations
Russia China North Korea Cuba Iran

The Espionage Threat Foreign Intelligence Agencies Friendly Nations
France Germany Japan Israel

The Espionage Threat

Third World Countries Organized Crime Hackers

The Espionage Threat

Terrorist Organizations

The Espionage Threat Countermeasures
You Must Conduct A Threat Assessment to Determine Risk External / Internal Flaws In Your Security

The Espionage Threat Countermeasures
Policies and Procedures

In Writing and Easy to Understand Disseminated Reviewed and Updated Annually or When Needed

The Espionage Threat Countermeasures
Assets Protection

People Information Property

The Espionage Threat Countermeasures
Loss Prevention Countermeasures to prevent losses from occurring and to limit unpreventable losses.

The Espionage Threat Countermeasures
Astor’s Law of Loss Prevention
Shortages Rise to the Level of Their Budget.

The Improbable is Ignored and Becomes Probable
Person’s Opportunity to Steal Varies with His Apparent Trust

The Espionage Threat Countermeasures
Astor’s Law of Loss Prevention
Effective Loss Prevention is Always Preceded by Extensive Losses

Any Loss Prevention Control Fails Only Upon Audit

The Espionage Threat Countermeasures
Human Resources
Proper Position Descriptions Pre-Employment Investigations Periodic Investigations Non –Disclosure/Competitive Agreements Effective Exit Interviews

The Espionage Threat Countermeasures
Awareness Training

Prevent Accidental Disclosures Predictability Conversations Reporting Contacts and Activity

The Espionage Threat Countermeasures
Security Force

Professional Staff Proper Staffing Professional Training

The Espionage Threat Countermeasures
Security Force Management Professional Security Director Experience-Education Professional Certifications CPP CCO

The Espionage Threat Countermeasures
Professional Certifications

Certified Protection Professional ( CPP ) ASIS International

The Espionage Threat Countermeasures
Professional Certifications

Certified Confidentially Officer ( CCO )
Business Espionage Controls & Countermeasures Association

The Espionage Threat Countermeasures
Physical Security
CPTED Barriers Access and Key Management IDS Fire Protection CCTV Security Containers Inventory Control

The Espionage Threat Countermeasures
Information Security

Marking All Protected Information Securing Protected Information Network Security

The Espionage Threat Countermeasures
Audits and Investigations
Regular Audits of All Areas Investigations of Losses Investigations of Violations of Policy

Recovery from an Espionage Threat
Economic Espionage Act of 1996. (Title 18 UCS 1831)
Theft of trade secrets or economic espionage is a federal criminal offense as defined by the Economic Espionage Act of 1996. It imposes up to a 15-year prison term and or a maximum $5000, 000.00 fines on any person and a $10 million fine on any organization that steals or destroys a trade secret of value with intent to benefit any foreign power.

Recovery from an Espionage Threat
Economic Espionage Act of 1996. (Title 18 UCS 1831)
The act imposes a 10 year prison term and or maximum $250,000.00 fine to any person and $5 million fine on any organization who knowingly steals or destroys any trade secret with intent to economically benefit anyone other than the owner and or injuries the owner of the trade secret. The act also allows the forfeiture to the U.S. government of proceeds or property derived from economic espionage and may require forfeiture of property used to commit economic espionage.

Recovery from an Espionage Threat
To Prosecute You Must Show The Information Has Value Monetary Hidden Adversary/Competitor

Recovery from an Espionage Threat
To Prosecute You Must Show The Information has been Protected Properly Marked for Protection Policies and Procedures Awareness Training

CORPORATE ESPIONAGE COUNTERMEASURES Review What is Corporate Espionage Sources of Information Threat Countermeasures Recovery from Threat

CORPORATE ESPIONAGE COUNTERMEASURES Questions