360 likes | 829 Views
CORPORATE ESPIONAGE COUNTERMEASURES. Daniel J. Benny, M.A., CPP, PCI, CCO, CLET Private Investigator & Security Consultant. Daniel J. Benny, M.A., CPP, PCI, CCO, CLET Private Investigator & Security Consultant. 3823 Locust Lane Harrisburg, Pennsylvania 17109-3917 Office: 717 540-9236
E N D
CORPORATE ESPIONAGECOUNTERMEASURES Daniel J. Benny, M.A., CPP, PCI, CCO, CLET Private Investigator & Security Consultant
Daniel J. Benny, M.A., CPP, PCI, CCO, CLETPrivate Investigator & Security Consultant 3823 Locust Lane Harrisburg, Pennsylvania 17109-3917 Office: 717 540-9236 Cell: 717 574-9273 DJBennyPI@aol.com http://hometown.aol.com/djbennypi
President Ronald Regan Espionage is not a game; it’s a struggle we must win if we are to protect our freedom and ourway of life." These words spoken by President Ronald Regan during a November 30, 1985 radio speech may not seem relevant today since the "cold war," has been won. However, in the world of corporate espionage, foreign intelligence and terrorism, it is never over.
The Future of Espionage The Future Ain’t What It Used To Be Yogi Berra
Corporate Espionage Theft of trade secrets or economic espionage is a federal criminal offense as defined by the Economic Espionage Act of 1996. (Title 18 UCS 1831)
The Espionage Threat Sources of Information Documents Draft Documents Working or Scrap Paper Computer Based Information Photographs – Maps - Charts
The Espionage Threat Sources of Information Internal Correspondence Legal and Regulatory Filings Open Source Information Company Web and Publications
The Espionage Threat Sources of Information Formal Meeting Conferences and Trade Shows Casual Conservations
The Espionage ThreatEmployees Who Are In Need of Money Seeking Sex - Love Disgruntled Thrill Seekers Activists Ideologues Departing or Former
The Espionage ThreatCompetitors United States Competitors Foreign Competitors
Russia China North Korea Cuba Iran The Espionage ThreatForeign Intelligence AgenciesHostile Nations
France Germany Japan Israel The Espionage Threat Foreign Intelligence Agencies Friendly Nations
The Espionage Threat Third World Countries Organized Crime Hackers
Terrorist Organizations The Espionage Threat
The Espionage ThreatCountermeasures You Must Conduct A Threat Assessment to Determine Risk External / Internal Flaws In Your Security
The Espionage ThreatCountermeasures Policies and Procedures In Writing and Easy to Understand Disseminated Reviewed and Updated Annually or When Needed
The Espionage ThreatCountermeasures Assets Protection People Information Property
The Espionage ThreatCountermeasures Loss Prevention Countermeasures to prevent losses from occurring and to limit unpreventable losses.
The Espionage ThreatCountermeasures Astor’s Law of Loss Prevention Shortages Rise to the Level of Their Budget. The Improbable is Ignored and Becomes Probable Person’s Opportunity to Steal Varies with His Apparent Trust
The Espionage ThreatCountermeasures Astor’s Law of Loss Prevention Effective Loss Prevention is Always Preceded by Extensive Losses Any Loss Prevention Control Fails Only Upon Audit
The Espionage ThreatCountermeasures Human Resources Proper Position Descriptions Pre-Employment Investigations Periodic Investigations Non –Disclosure/Competitive Agreements Effective Exit Interviews
The Espionage ThreatCountermeasures Awareness Training Prevent Accidental Disclosures Predictability Conversations Reporting Contacts and Activity
The Espionage ThreatCountermeasures Security Force Professional Staff Proper Staffing Professional Training
The Espionage ThreatCountermeasures Security Force Management Professional Security Director Experience-Education Professional Certifications CPP CCO
The Espionage ThreatCountermeasures Professional Certifications Certified Protection Professional ( CPP ) ASIS International
Professional Certifications Certified Confidentially Officer ( CCO ) Business Espionage Controls & Countermeasures Association The Espionage ThreatCountermeasures
The Espionage ThreatCountermeasures Physical Security CPTED Barriers Access and Key Management IDS Fire Protection CCTV Security Containers Inventory Control
Information Security Marking All Protected Information Securing Protected Information Network Security The Espionage ThreatCountermeasures
Audits and Investigations Regular Audits of All Areas Investigations of Losses Investigations of Violations of Policy The Espionage ThreatCountermeasures
Recovery from anEspionage Threat Economic Espionage Act of 1996. (Title 18 UCS 1831) Theft of trade secrets or economic espionage is a federal criminal offense as defined by the Economic Espionage Act of 1996. It imposes up to a 15-year prison term and or a maximum $5000, 000.00 fines on any person and a $10 million fine on any organization that steals or destroys a trade secret of value with intent to benefit any foreign power.
Recovery from anEspionage Threat Economic Espionage Act of 1996. (Title 18 UCS 1831) The act imposes a 10 year prison term and or maximum $250,000.00 fine to any person and $5 million fine on any organization who knowingly steals or destroys any trade secret with intent to economically benefit anyone other than the owner and or injuries the owner of the trade secret. The act also allows the forfeiture to the U.S. government of proceeds or property derived from economic espionage and may require forfeiture of property used to commit economic espionage.
Recovery from anEspionage Threat To Prosecute You Must Show The Information Has Value Monetary Hidden Adversary/Competitor
Recovery from anEspionage Threat To Prosecute You Must Show The Information has been Protected Properly Marked for Protection Policies and Procedures Awareness Training
CORPORATE ESPIONAGECOUNTERMEASURES Review What is Corporate Espionage Sources of Information Threat Countermeasures Recovery from Threat