Economic Espionage, From Whom & How to Prevent it? (2)



2- FOREIGN OR DOMESTIC COMPETITORS

A frequent scenario is one in which an employee leaves his company and goes to work for the competitor, taking proprietary information with him.

3- THROUGH UNWITTING ACCOMPLICES

Sometimes persons who want to collect information in cyberspace through economic espionage try to find a way into opportunities in which they can collect critical information. Another poly is to create situations in cyberspace which the employees of a targeted company can be included to give their information away, in the mistaken belief that the individuals requesting the information have been properly authorized to receive it[1].

4- FROM FOREIGN INTELLIGENCE SERVICES

Intelligence services have professional specialists in the techniques of collecting secret information from cyberspace which they can use of their abilities for economic espionage.

5- THE INSIDER TREAT

Most of the people imagine espionage as a special agent with horrible equipment; but in reality espionage happen by an ordinary employee inside the company who approaches an outsider to sell his organization secrets.

Three surveys conducted between 1988 and 1994 by the American Society of Industrial Security determined that approximately 75 percent of all reported incident of cyberspace economic espionage were attributable to employee or former employees with access to sensitive information. The figure for losses attributable to vendors, consultants, joint venture partners and subcontractors was at that time just 15 percent, but by 1999 a similar survey identified on-site contractor employees and original equipment manufacturers as the main source of concern for U.S companies[2].

IN CONTINUE........


[1] Lewis. e. Jonathan (2008), The economic espionage act and the threat of chinese espionage in the united states
[2]Annual Report to Congress on Foreign Economic Collection and Industrial Espionage-2005(2006) published by the office of the national counterintelligence executive.



U.S Code: § 1831. Economic espionage


(a) In General.— Whoever, intending or knowing that the offense will benefit any foreign government, foreign instrumentality, or foreign agent, knowingly—
(1) steals, or without authorization appropriates, takes, carries away, or conceals, or by fraud, artifice, or deception obtains a trade secret;
(2) without authorization copies, duplicates, sketches, draws, photographs, downloads, uploads, alters, destroys, photocopies, replicates, transmits, delivers, sends, mails, communicates, or conveys a trade secret;
(3) receives, buys, or possesses a trade secret, knowing the same to have been stolen or appropriated, obtained, or converted without authorization;
(4) attempts to commit any offense described in any of paragraphs (1) through (3); or
(5) conspires with one or more other persons to commit any offense described in any of paragraphs (1) through (3), and one or more of such persons do any act to effect the object of the conspiracy,
shall, except as provided in subsection (b), be fined not more than $500,000 or imprisoned not more than 15 years, or both.
(b) Organizations.— Any organization that commits any offense described in subsection (a) shall be fined not more than $10,000,000.

Economic Espionage, From Whom & How to Prevent it? (1)


Nowadays, countries information services base on new improvements in technology and globalization phenomenon have seen and understood the change from army competition to global economic competition and have prepaid the shift in their intelligence collection requirements accordingly for covering the cyberspace economic espionage that is one of the major concept in economic competition .

According to the FBI, China is currently linked to about a third of all cyberspace economic espionage cases. due to the severity of the threat the FBI increased the number o agents working on countering alleged Chinese espionage from 150 agents in 2001 to more than 350 agents as of summer 2007[1].

In other case according to japan's largest daily newspaper, Japanese authorities revealed on February 3, 1998, that Russian agents have conducted extensive industrial and cyberspace economic espionage to collect technical information during the last decade. Similar reports have appeared about the other developed country intelligence services that seeking to have access to information of other developed country industries.

Now the question is that these types of threats come from whom?
There are too many occasions that these threats come from, which in continue I am going to explain them.

1- THE OUTSIDER THREAT
Most organizations recognize that the main threat to security information of their industry as coming from outside the organization.
The main outsider threats come from company-to-company cyber attacks launched by economic competitors.

2-FOREIGN OR DOMESTIC COMPETITOR

IN CONTINUE.......

[1] Lewis. e. Jonathan (2008), The economic espionage act and the threat of chinese espionage in the united states
Copyright © 2010 Amazing world All rights reserved.
Wp Theme by Templatesnext . Blogger Template by Anshul