corporate espionage countermeasures daniel j. benny, m.a., cpp, pci, cco, clet private investigator...

35
CORPORATE ESPIONAGE CORPORATE ESPIONAGE COUNTERMEASURES COUNTERMEASURES Daniel J. Benny, M.A., CPP, PCI, Daniel J. Benny, M.A., CPP, PCI, CCO, CLET CCO, CLET Private Investigator & Security Private Investigator & Security Consultant Consultant

Upload: justina-ramsey

Post on 17-Dec-2015

217 views

Category:

Documents


0 download

TRANSCRIPT

CORPORATE ESPIONAGECORPORATE ESPIONAGECOUNTERMEASURESCOUNTERMEASURES

Daniel J. Benny, M.A., CPP, PCI, CCO, Daniel J. Benny, M.A., CPP, PCI, CCO, CLETCLET

Private Investigator & Security Private Investigator & Security ConsultantConsultant

Daniel J. Benny, M.A., CPP, PCI, CCO, Daniel J. Benny, M.A., CPP, PCI, CCO, CLETCLET

Private Investigator & Security Private Investigator & Security ConsultantConsultant

3823 Locust Lane3823 Locust LaneHarrisburg, Pennsylvania 17109-3917Harrisburg, Pennsylvania 17109-3917

Office: 717 540-9236Office: 717 540-9236Cell: 717 574-9273Cell: 717 [email protected]@aol.com

http://hometown.aol.com/djbennypihttp://hometown.aol.com/djbennypi

President Ronald President Ronald ReganRegan

Espionage is not a game; it’s a struggle we must win if Espionage is not a game; it’s a struggle we must win if we are to protect our freedom and ourwe are to protect our freedom and our way of life."way of life."

These words spoken by President Ronald Regan during These words spoken by President Ronald Regan during a November 30, 1985 radio speech may not seem a November 30, 1985 radio speech may not seem relevant today since the "cold war," has been won. relevant today since the "cold war," has been won. However, in the world of corporate espionage, foreign However, in the world of corporate espionage, foreign intelligence and terrorism, it is never over. intelligence and terrorism, it is never over.

The Future of EspionageThe Future of Espionage

The Future Ain’t The Future Ain’t What It Used To BeWhat It Used To Be

Yogi BerraYogi Berra

Corporate EspionageCorporate Espionage

Theft of trade secrets or Theft of trade secrets or economic espionage is a economic espionage is a

federal criminal offense as federal criminal offense as defined by thedefined by the

Economic Espionage Act of Economic Espionage Act of 19961996..

((Title 18 UCS 1831Title 18 UCS 1831))

The Espionage ThreatThe Espionage Threat

Sources of InformationSources of Information

DocumentsDocumentsDraft DocumentsDraft Documents

Working or Scrap PaperWorking or Scrap PaperComputer Based InformationComputer Based InformationPhotographs – Maps - ChartsPhotographs – Maps - Charts

The Espionage ThreatThe Espionage Threat

Sources of InformationSources of Information

Internal CorrespondenceInternal Correspondence

Legal and Regulatory FilingsLegal and Regulatory Filings

Open Source InformationOpen Source Information

Company Web and Company Web and PublicationsPublications

The Espionage ThreatThe Espionage Threat

Sources of InformationSources of Information

Formal MeetingFormal Meeting

Conferences and Trade Conferences and Trade ShowsShows

Casual ConservationsCasual Conservations

The Espionage ThreatThe Espionage ThreatEmployees Who AreEmployees Who Are

In Need of MoneyIn Need of MoneySeeking Sex - LoveSeeking Sex - Love

DisgruntledDisgruntledThrill SeekersThrill Seekers

ActivistsActivistsIdeologuesIdeologues

Departing or FormerDeparting or Former

The Espionage ThreatThe Espionage ThreatCompetitorsCompetitors

United States CompetitorsUnited States Competitors

Foreign CompetitorsForeign Competitors

The Espionage ThreatThe Espionage ThreatForeign Intelligence Foreign Intelligence

AgenciesAgenciesHostile NationsHostile Nations

RussiaRussia

ChinaChina

North North KoreaKorea

CubaCuba

IranIran

The Espionage Threat The Espionage Threat Foreign Intelligence Foreign Intelligence

AgenciesAgencies Friendly Nations Friendly Nations

FranceFrance

GermanyGermany

JapanJapan

IsraelIsrael

The Espionage Threat The Espionage Threat

Third World CountriesThird World Countries

Organized CrimeOrganized Crime

HackersHackers

The Espionage Threat The Espionage Threat

Terrorist Terrorist OrganizationsOrganizations

The Espionage ThreatThe Espionage ThreatCountermeasuresCountermeasures

You Must Conduct A You Must Conduct A

Threat Assessment to Threat Assessment to DetermineDetermine

Risk External / InternalRisk External / Internal

Flaws In Your SecurityFlaws In Your Security

The Espionage ThreatThe Espionage ThreatCountermeasuresCountermeasures

Policies and ProceduresPolicies and Procedures

In Writing and Easy to UnderstandIn Writing and Easy to UnderstandDisseminatedDisseminated

Reviewed and UpdatedReviewed and UpdatedAnnually or When NeededAnnually or When Needed

The Espionage ThreatThe Espionage ThreatCountermeasuresCountermeasures

Assets ProtectionAssets Protection

PeoplePeople

InformationInformation

PropertyProperty

The Espionage ThreatThe Espionage ThreatCountermeasuresCountermeasures

Loss PreventionLoss Prevention

Countermeasures to prevent Countermeasures to prevent losses from occurring and to losses from occurring and to limit unpreventable losses. limit unpreventable losses.

The Espionage ThreatThe Espionage ThreatCountermeasuresCountermeasures

Astor’s Law of Loss PreventionAstor’s Law of Loss Prevention

Shortages Rise to the Level of Their Shortages Rise to the Level of Their Budget.Budget.

The Improbable is Ignored and Becomes The Improbable is Ignored and Becomes ProbableProbable

Person’s Opportunity to Steal Person’s Opportunity to Steal VariesVaries

with His Apparent Trustwith His Apparent Trust

The Espionage ThreatThe Espionage ThreatCountermeasuresCountermeasures

Astor’s Law of Loss PreventionAstor’s Law of Loss Prevention

Effective Loss Prevention is Effective Loss Prevention is Always Preceded by Extensive Always Preceded by Extensive

LossesLosses

Any Loss Prevention Control Fails Any Loss Prevention Control Fails

Only Upon AuditOnly Upon Audit

The Espionage ThreatThe Espionage ThreatCountermeasuresCountermeasures

Human ResourcesHuman Resources

Proper Position DescriptionsProper Position DescriptionsPre-Employment InvestigationsPre-Employment Investigations

Periodic InvestigationsPeriodic InvestigationsNon –Disclosure/Competitive Non –Disclosure/Competitive

AgreementsAgreementsEffective Exit InterviewsEffective Exit Interviews

The Espionage ThreatThe Espionage ThreatCountermeasuresCountermeasures

Awareness TrainingAwareness Training

Prevent Accidental DisclosuresPrevent Accidental DisclosuresPredictabilityPredictabilityConversationsConversations

Reporting Contacts and ActivityReporting Contacts and Activity

The Espionage ThreatThe Espionage ThreatCountermeasuresCountermeasures

Security ForceSecurity Force

Professional StaffProfessional StaffProper StaffingProper Staffing

Professional TrainingProfessional Training

The Espionage ThreatThe Espionage ThreatCountermeasuresCountermeasures

Security Force ManagementSecurity Force Management

Professional Security Professional Security DirectorDirector

Experience-EducationExperience-EducationProfessional Certifications Professional Certifications

CPP CCO CPP CCO

The Espionage ThreatThe Espionage ThreatCountermeasuresCountermeasures

Professional CertificationsProfessional Certifications

Certified Protection Professional Certified Protection Professional ( CPP )( CPP )

ASIS InternationalASIS International

The Espionage ThreatThe Espionage ThreatCountermeasuresCountermeasures

Professional CertificationsProfessional Certifications

Certified Confidentially Officer ( CCO )Certified Confidentially Officer ( CCO )

Business Espionage ControlsBusiness Espionage Controls &&

Countermeasures AssociationCountermeasures Association

The Espionage ThreatThe Espionage ThreatCountermeasuresCountermeasures

Physical SecurityPhysical Security

CPTED CPTED BarriersBarriers

Access and Key ManagementAccess and Key ManagementIDS IDS

Fire ProtectionFire ProtectionCCTVCCTV

Security ContainersSecurity ContainersInventory ControlInventory Control

The Espionage ThreatThe Espionage ThreatCountermeasuresCountermeasures

Information SecurityInformation Security

Marking All Protected Marking All Protected InformationInformation

Securing Protected Securing Protected InformationInformation

Network SecurityNetwork Security

The Espionage ThreatThe Espionage ThreatCountermeasuresCountermeasures

Audits and Audits and InvestigationsInvestigations

Regular Audits of All Regular Audits of All AreasAreas

Investigations of Investigations of LossesLosses

Investigations of Investigations of Violations of PolicyViolations of Policy

Recovery from anRecovery from anEspionage ThreatEspionage Threat

Economic Espionage Act of 1996Economic Espionage Act of 1996.. ((Title 18 UCS 1831Title 18 UCS 1831))

Theft of trade secrets or economic espionage Theft of trade secrets or economic espionage is a federal criminal offense as defined by the is a federal criminal offense as defined by the

Economic Espionage Act of 1996Economic Espionage Act of 1996. .

It imposes up to a 15-year prison term and It imposes up to a 15-year prison term and or a maximum $5000, 000.00 fines on any or a maximum $5000, 000.00 fines on any

person and a $10 million fine on any person and a $10 million fine on any organization that steals or destroys a trade organization that steals or destroys a trade secret of value with intent to benefit any secret of value with intent to benefit any

foreign powerforeign power. .

Recovery from anRecovery from anEspionageEspionage Threat Threat

Economic Espionage Act of 1996Economic Espionage Act of 1996.. ((Title 18 UCS 1831Title 18 UCS 1831))

The act imposes a 10 year prison term and or The act imposes a 10 year prison term and or maximum $250,000.00 fine to any person maximum $250,000.00 fine to any person

and $5 million fine on any organization who and $5 million fine on any organization who knowingly steals or destroys any trade secret knowingly steals or destroys any trade secret

with intent to economically benefit anyone with intent to economically benefit anyone other than the owner and or injuries the other than the owner and or injuries the

owner of the trade secret. owner of the trade secret. The act also allows the forfeiture to the U.S. The act also allows the forfeiture to the U.S. government of proceeds or property derived government of proceeds or property derived from economic espionage and may require from economic espionage and may require

forfeiture of property used to commit forfeiture of property used to commit economic espionage.economic espionage.

Recovery from anRecovery from anEspionage ThreatEspionage Threat

To Prosecute You Must Show To Prosecute You Must Show

The Information Has ValueThe Information Has Value

MonetaryMonetary

HiddenHidden

Adversary/CompetitorAdversary/Competitor

Recovery from anRecovery from anEspionage ThreatEspionage Threat

To Prosecute You Must Show To Prosecute You Must Show The Information has beenThe Information has been

ProtectedProtectedProperly Marked for ProtectionProperly Marked for Protection

Policies and ProceduresPolicies and ProceduresAwareness TrainingAwareness Training

CORPORATE ESPIONAGECORPORATE ESPIONAGECOUNTERMEASURESCOUNTERMEASURES

ReviewReviewWhat is Corporate EspionageWhat is Corporate Espionage

Sources of InformationSources of InformationThreatThreat

CountermeasuresCountermeasuresRecovery from ThreatRecovery from Threat

CORPORATE ESPIONAGECORPORATE ESPIONAGECOUNTERMEASURESCOUNTERMEASURES

QuestionsQuestions