<<

Who might steal IP? Department of Justice • Domestic and foreign commercial rivals. Let us know how Federal Bureau of Investigation • Domestic and foreign research facilities. we can help you! • Foreign intelligence officers (Spies). • Disgruntled employees (Insider threat). »» Selling IP for profit. Contact your local FBI Office and ask Counterintelligence »» Using IP to create new start up. to speak with the SPC so you can • Organized criminals. safeguard your hard work and keep Strategic your people safe. Partnership Indicators of IP Theft • Employees/Insiders: Programs »» Seeks/Obtains IP not related to their work “America’s entrepreneurial spirit and integrity are duties. embodied by the creativity and resourcefulness of our workforce. New inventions, innovations, works »» Working odd hours to facilitate theft of art, and discoveries create jobs and industries The Challenge: of technology, schematics and/or and add to our country’s heritage. Innovation prototypes. To protect corporate and drives commerce and enables the United States academic Intellectual Property (IP), sensitive » Unexplained affluence; buying things that » to compete in the global marketplace. Intellectual information, and technologies from foreign he/she cannot afford on their household property rights and the ability to protect those economic activities. income. rights encourage American companies to continue the tradition of American innovation by developing products, ideas and merchandise.” ICE Asst Deputy Director Erik Barnett testimony before US Senate Judiciary Committee, 22 June 2011

Contact Information: • IT/Remote Access: »» Maliciously or unwittingly downloading and installing Malware. »» Blatant theft of data via Universal Serial Bus (USB), electronic mail (email), or Cloud sharing. »» Unauthorized access to official laptops/ smartphones (unsecured/lost/stolen). »» Transferring data from official laptop while not connected to Virtual Private Network (offsite/telework). FBI STRATEGIC PARTNERSHIP COORDINATORS - READY TO ASSIST! Our solution: Strategic Partnership Coordinator Best practices to protect your IP Our Counterintelligence Strategic (SPC) Information Technology Partnership Program works to determine Every FBI Field Office has specially- • Assess your company’s and safeguard those technologies which, trained Counterintelligence Agents, vulnerabilities. if compromised, could result in significant serving as the primary liaison with their • Use up-to-date software security tools. economic and national security losses. local businesses, cleared contractors and Many firewalls stop incoming threats but Through our Strategic Partnership academia. SPC responsibilities include: do not restrict outbound data. Competitive Coordinators (SPCs), the FBI initiates and • Community outreach to support intelligence hackers try to retrieve data stored fosters relationships with businesses and Counterintelligence and threat mitigation. on your network. academia. • Counterintelligence investigations. • Educate employees/students on spear To foster communication and build phishing email tactics. Establish protocols for • Facilitate locally-focused and/or Industry reporting and quarantining suspicious emails. awareness through partnerships with key specific CI-Threat Working Groups. public and private entities by educating and • Do not store proprietary/vital information on enabling our partners to identify what is at • CI Awareness presentations/briefings to local any device that connects to the Internet. If groups, companies, and academia, topics risk and how to protect it. not entirely possible, review contents and include: minimize, as practical. »» Economic Espionage. • Clearly identify and safeguard critical »» Elicitation Techniques. information/IP and mark it accordingly. (Both soft/hardcopy). »» Protection of Intellectual Property and Trade Secrets. Employee Education »» Insider Threats. • Conduct training (at least annually). »» Risks of Foreign/Competitor visits. • Ensure employees are trained to avoid »» Joint Ventures/Foreign Workforce. unintended disclosures. »» Business Travel/Tradeshows. • Educate employees on techniques used to acquire IP: »» Social Networking Risks. »» Social Media (LinkedIn/Facebook). »» Colleges/Universities Targeted. »» Tradeshows and Conferences. »» Safety Tips for U.S. Students Traveling »» Threats/Blackmail. Abroad. The United States is the world’s leader Your SPC can provide vulnerability self- Personnel Management in innovation. Consider the breakthrough assessment tools, which will allow you to • Ensure Human Resources have policies in- research and development taking place on take an unbiased evaluation of your current place to specifically enhance information and campuses nationwide and within research threat vulnerabilities. SPCs stand ready to personnel security. facilities, often on behalf of the government. assist your company, university, or research • Document employee education and other Sensitive research, much of which is center with the tools to address findings measures to protect IP. unclassified, is the key to our nation’s and pro-actively work to mitigate Economic global advantage, both economically and Espionage threats to your Intellectual militarily. Property, Research and Development and Your SPC is your Advocate personnel. for protecting your IP