Download
corporate espionage countermeasures n.
Skip this Video
Loading SlideShow in 5 Seconds..
CORPORATE ESPIONAGE COUNTERMEASURES PowerPoint Presentation
Download Presentation
CORPORATE ESPIONAGE COUNTERMEASURES

CORPORATE ESPIONAGE COUNTERMEASURES

438 Views Download Presentation
Download Presentation

CORPORATE ESPIONAGE COUNTERMEASURES

- - - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript

  1. CORPORATE ESPIONAGECOUNTERMEASURES Daniel J. Benny, M.A., CPP, PCI, CCO, CLET Private Investigator & Security Consultant

  2. Daniel J. Benny, M.A., CPP, PCI, CCO, CLETPrivate Investigator & Security Consultant 3823 Locust Lane Harrisburg, Pennsylvania 17109-3917 Office: 717 540-9236 Cell: 717 574-9273 DJBennyPI@aol.com http://hometown.aol.com/djbennypi

  3. President Ronald Regan Espionage is not a game; it’s a struggle we must win if we are to protect our freedom and ourway of life." These words spoken by President Ronald Regan during a November 30, 1985 radio speech may not seem relevant today since the "cold war," has been won. However, in the world of corporate espionage, foreign intelligence and terrorism, it is never over.

  4. The Future of Espionage The Future Ain’t What It Used To Be Yogi Berra

  5. Corporate Espionage Theft of trade secrets or economic espionage is a federal criminal offense as defined by the Economic Espionage Act of 1996. (Title 18 UCS 1831)

  6. The Espionage Threat Sources of Information Documents Draft Documents Working or Scrap Paper Computer Based Information Photographs – Maps - Charts

  7. The Espionage Threat Sources of Information Internal Correspondence Legal and Regulatory Filings Open Source Information Company Web and Publications

  8. The Espionage Threat Sources of Information Formal Meeting Conferences and Trade Shows Casual Conservations

  9. The Espionage ThreatEmployees Who Are In Need of Money Seeking Sex - Love Disgruntled Thrill Seekers Activists Ideologues Departing or Former

  10. The Espionage ThreatCompetitors United States Competitors Foreign Competitors

  11. Russia China North Korea Cuba Iran The Espionage ThreatForeign Intelligence AgenciesHostile Nations

  12. France Germany Japan Israel The Espionage Threat Foreign Intelligence Agencies Friendly Nations

  13. The Espionage Threat Third World Countries Organized Crime Hackers

  14. Terrorist Organizations The Espionage Threat

  15. The Espionage ThreatCountermeasures You Must Conduct A Threat Assessment to Determine Risk External / Internal Flaws In Your Security

  16. The Espionage ThreatCountermeasures Policies and Procedures In Writing and Easy to Understand Disseminated Reviewed and Updated Annually or When Needed

  17. The Espionage ThreatCountermeasures Assets Protection People Information Property

  18. The Espionage ThreatCountermeasures Loss Prevention Countermeasures to prevent losses from occurring and to limit unpreventable losses.

  19. The Espionage ThreatCountermeasures Astor’s Law of Loss Prevention Shortages Rise to the Level of Their Budget. The Improbable is Ignored and Becomes Probable Person’s Opportunity to Steal Varies with His Apparent Trust

  20. The Espionage ThreatCountermeasures Astor’s Law of Loss Prevention Effective Loss Prevention is Always Preceded by Extensive Losses Any Loss Prevention Control Fails Only Upon Audit

  21. The Espionage ThreatCountermeasures Human Resources Proper Position Descriptions Pre-Employment Investigations Periodic Investigations Non –Disclosure/Competitive Agreements Effective Exit Interviews

  22. The Espionage ThreatCountermeasures Awareness Training Prevent Accidental Disclosures Predictability Conversations Reporting Contacts and Activity

  23. The Espionage ThreatCountermeasures Security Force Professional Staff Proper Staffing Professional Training

  24. The Espionage ThreatCountermeasures Security Force Management Professional Security Director Experience-Education Professional Certifications CPP CCO

  25. The Espionage ThreatCountermeasures Professional Certifications Certified Protection Professional ( CPP ) ASIS International

  26. Professional Certifications Certified Confidentially Officer ( CCO ) Business Espionage Controls & Countermeasures Association The Espionage ThreatCountermeasures

  27. The Espionage ThreatCountermeasures Physical Security CPTED Barriers Access and Key Management IDS Fire Protection CCTV Security Containers Inventory Control

  28. Information Security Marking All Protected Information Securing Protected Information Network Security The Espionage ThreatCountermeasures

  29. Audits and Investigations Regular Audits of All Areas Investigations of Losses Investigations of Violations of Policy The Espionage ThreatCountermeasures

  30. Recovery from anEspionage Threat Economic Espionage Act of 1996. (Title 18 UCS 1831) Theft of trade secrets or economic espionage is a federal criminal offense as defined by the Economic Espionage Act of 1996. It imposes up to a 15-year prison term and or a maximum $5000, 000.00 fines on any person and a $10 million fine on any organization that steals or destroys a trade secret of value with intent to benefit any foreign power.

  31. Recovery from anEspionage Threat Economic Espionage Act of 1996. (Title 18 UCS 1831) The act imposes a 10 year prison term and or maximum $250,000.00 fine to any person and $5 million fine on any organization who knowingly steals or destroys any trade secret with intent to economically benefit anyone other than the owner and or injuries the owner of the trade secret. The act also allows the forfeiture to the U.S. government of proceeds or property derived from economic espionage and may require forfeiture of property used to commit economic espionage.

  32. Recovery from anEspionage Threat To Prosecute You Must Show The Information Has Value Monetary Hidden Adversary/Competitor

  33. Recovery from anEspionage Threat To Prosecute You Must Show The Information has been Protected Properly Marked for Protection Policies and Procedures Awareness Training

  34. CORPORATE ESPIONAGECOUNTERMEASURES Review What is Corporate Espionage Sources of Information Threat Countermeasures Recovery from Threat

  35. CORPORATE ESPIONAGECOUNTERMEASURESQuestions