Download presentation
Presentation is loading. Please wait.
Published byJustina Ramsey Modified over 9 years ago
1
CORPORATE ESPIONAGE COUNTERMEASURES Daniel J. Benny, M.A., CPP, PCI, CCO, CLET Private Investigator & Security Consultant
2
Daniel J. Benny, M.A., CPP, PCI, CCO, CLET Private Investigator & Security Consultant 3823 Locust Lane Harrisburg, Pennsylvania 17109-3917 Office: 717 540-9236 Cell: 717 574-9273 DJBennyPI@aol.com http://hometown.aol.com/djbennypi
3
President Ronald Regan Espionage is not a game; it’s a struggle we must win if we are to protect our freedom and our way of life." These words spoken by President Ronald Regan during a November 30, 1985 radio speech may not seem relevant today since the "cold war," has been won. However, in the world of corporate espionage, foreign intelligence and terrorism, it is never over. These words spoken by President Ronald Regan during a November 30, 1985 radio speech may not seem relevant today since the "cold war," has been won. However, in the world of corporate espionage, foreign intelligence and terrorism, it is never over.
4
The Future of Espionage The Future Ain’t What It Used To Be Yogi Berra
5
Corporate Espionage Theft of trade secrets or economic espionage is a federal criminal offense as defined by the Economic Espionage Act of 1996. (Title 18 UCS 1831) (Title 18 UCS 1831)
6
The Espionage Threat Sources of Information Documents Draft Documents Working or Scrap Paper Computer Based Information Photographs – Maps - Charts
7
The Espionage Threat Sources of Information Internal Correspondence Legal and Regulatory Filings Open Source Information Company Web and Publications
8
The Espionage Threat Sources of Information Formal Meeting Conferences and Trade Shows Casual Conservations
9
The Espionage Threat Employees Who Are In Need of Money Seeking Sex - Love Disgruntled Thrill Seekers ActivistsIdeologues Departing or Former
10
The Espionage Threat Competitors United States Competitors Foreign Competitors
11
The Espionage Threat Foreign Intelligence Agencies Hostile Nations RussiaChina North Korea CubaIran
12
The Espionage Threat Foreign Intelligence Agencies Friendly Nations FranceGermanyJapanIsrael
13
The Espionage Threat Third World Countries Organized Crime Hackers
14
The Espionage Threat Terrorist Organizations
15
The Espionage Threat Countermeasures You Must Conduct A Threat Assessment to Determine Risk External / Internal Flaws In Your Security
16
The Espionage Threat Countermeasures Policies and Procedures Policies and Procedures In Writing and Easy to Understand Disseminated Reviewed and Updated Annually or When Needed
17
The Espionage Threat Countermeasures Assets Protection PeopleInformationProperty
18
The Espionage Threat Countermeasures Loss Prevention Countermeasures to prevent losses from occurring and to limit unpreventable losses.
19
The Espionage Threat Countermeasures Astor’s Law of Loss Prevention Shortages Rise to the Level of Their Budget. The Improbable is Ignored and Becomes Probable Person’s Opportunity to Steal Varies with His Apparent Trust with His Apparent Trust
20
The Espionage Threat Countermeasures Astor’s Law of Loss Prevention Effective Loss Prevention is Always Preceded by Extensive Losses Any Loss Prevention Control Fails Only Upon Audit
21
The Espionage Threat Countermeasures Human Resources Proper Position Descriptions Pre-Employment Investigations Periodic Investigations Non –Disclosure/Competitive Agreements Effective Exit Interviews
22
The Espionage Threat Countermeasures Awareness Training Awareness Training Prevent Accidental Disclosures PredictabilityConversations Reporting Contacts and Activity
23
The Espionage Threat Countermeasures Security Force Security Force Professional Staff Proper Staffing Professional Training
24
The Espionage Threat Countermeasures Security Force Management Professional Security Director Experience-Education Professional Certifications CPP CCO
25
The Espionage Threat Countermeasures Professional Certifications Certified Protection Professional ( CPP ) Certified Protection Professional ( CPP ) ASIS International
26
The Espionage Threat Countermeasures Professional Certifications Certified Confidentially Officer ( CCO ) Business Espionage Controls & Countermeasures Association Countermeasures Association
27
The Espionage Threat Countermeasures Physical Security Physical SecurityCPTEDBarriers Access and Key Management IDS Fire Protection CCTV Security Containers Inventory Control
28
The Espionage Threat Countermeasures Information Security Information Security Marking All Protected Information Securing Protected Information Network Security
29
The Espionage Threat Countermeasures Audits and Investigations Regular Audits of All Areas Investigations of Losses Investigations of Violations of Policy
30
Recovery from an Espionage Threat Economic Espionage Act of 1996. (Title 18 UCS 1831) (Title 18 UCS 1831) Theft of trade secrets or economic espionage is a federal criminal offense as defined by the Economic Espionage Act of 1996. It imposes up to a 15-year prison term and or a maximum $5000, 000.00 fines on any person and a $10 million fine on any organization that steals or destroys a trade secret of value with intent to benefit any foreign power. It imposes up to a 15-year prison term and or a maximum $5000, 000.00 fines on any person and a $10 million fine on any organization that steals or destroys a trade secret of value with intent to benefit any foreign power.
31
Recovery from an Espionage Threat Economic Espionage Act of 1996. (Title 18 UCS 1831) (Title 18 UCS 1831) The act imposes a 10 year prison term and or maximum $250,000.00 fine to any person and $5 million fine on any organization who knowingly steals or destroys any trade secret with intent to economically benefit anyone other than the owner and or injuries the owner of the trade secret. The act also allows the forfeiture to the U.S. government of proceeds or property derived from economic espionage and may require forfeiture of property used to commit economic espionage. The act also allows the forfeiture to the U.S. government of proceeds or property derived from economic espionage and may require forfeiture of property used to commit economic espionage.
32
Recovery from an Espionage Threat To Prosecute You Must Show The Information Has Value MonetaryHiddenAdversary/Competitor
33
Recovery from an Espionage Threat To Prosecute You Must Show The Information has been Protected Properly Marked for Protection Policies and Procedures Awareness Training
34
CORPORATE ESPIONAGE COUNTERMEASURES Review What is Corporate Espionage Sources of Information ThreatCountermeasures Recovery from Threat
35
CORPORATE ESPIONAGE COUNTERMEASURES Questions
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.