ESPIONAGE, the Sequel by James Kitfield

Total Page:16

File Type:pdf, Size:1020Kb

ESPIONAGE, the Sequel by James Kitfield Spies of all stripes have discovered that there is life after the Cold War. ESPIONAGE, the Sequel By James Kitfield f there ever was a Golden Age was loaded with sensitive technologi- collection attempts for the Defense of international espionage, the cal data. Department, the threat is growing. Cold War era was it. The super- Mak, whose case was reported in The most recent DSS report on tech- powers and their satellites and some detail by Newsweek last year, has nology collection trends, released Iallies maintained enormous spying es- pleaded not guilty to charges that he acted in January, notes that the number of tablishments, spending scores of billions as an agent for a foreign government. “suspicious” events is on the rise, as of dollars to employ thousands of profes- His case is pending, as are those of his are the number of countries involved. sional case officers, spies, and analysts family members. DSS also notes a “dramatic increase and finance their advanced equipment In pressing its charges, the govern- in incidents involving government and sophisticated infrastructure. ment claimed that the information on affiliated entities.” Even though the Cold War is over, the disk was linked to quiet “electronic- military espionage, at least, continues to drive” submarine propulsion systems. Record Numbers thrive. In fact, it never slackened at all. Access to such technology could help The National Counterintelligence Increasingly, foreign spies are hidden China achieve one of its dearest strate- Executive says a record 108 nations were among us, recruited from among the gic goals: making US Navy operations involved in trying to steal sensitive US more than 30 million foreign business- in the Taiwan Strait so perilous that technologies in 2005, the last year for men, scientists, students, researchers, Washington would think twice about which full data are available. academics, and tourists entering the coming to the aid of Taiwan in a cross- That Chi Mak may have been spying United States each year. strait conflict. for China is suggestive of another trend: Take, for example, the case of The case is notable for a number Experts say China is far and away the Chi Mak, a Chinese-born electronics of reasons. It reveals how new tools most aggressive and resourceful state engineer working for a US defense commonly associated with the technol- sponsor of technological spying. (See contractor. According to the federal ogy revolution—cell phone cameras, “The China Problem,” August 1999, government, he was part of a family wireless personal digital assistants, p. 70.) that spied together and apparently tiny computer “thumb drives,” readily The FBI estimates that there are more hoped to prosper together. The FBI available encryption software—have than 3,000 Chinese “front companies” has alleged that Mak, along with his made it far easier for foreign govern- operating in the US with the express wife and brother, can be heard on FBI ments and companies to steal classified purpose of gathering intelligence and wiretaps discussing ways to smuggle information. technology. Much of this is “dual use,” an encrypted computer disk to China. According to the Defense Security with both civil and military uses. The disk in question, the bureau added, Service, which monitors technology The FBI has stated publicly that the AIR FORCE Magazine / March 2007 71 number of Chinese counterintelligence ogy that US firms spent hundreds of their own spying operations to collect cases in Silicon Valley alone is increasing millions of dollars developing.” technologies that commercial spies do by 20 to 30 percent each year. One case began in 2004, as a seem- not gather. Globalization—characterized by the ingly innocent meeting at a Japanese free flow of data, commodities, and trade show between two men who False Flags people across porous national bor- shared a common interest in electronic Often, it is simply not clear who is ders—has allowed these cases to be- gadgets. behind the spying. come utterly commonplace. Industrial One was a Japanese employee of “In many cases, we do not know espionage and military technology theft Nikon, the other a Russian working for how much of a nexus there is between is a thriving growth industry. Consider the Russian trade representative office the private and public sectors that are that, in 2005: in Tokyo. targeting our technologies,” conceded The FBI opened 89 economic espio- Over the course of subsequent dinners Van Cleave. nage cases and was working 122 active and drinks at various restaurants—the “Most foreign governments that are cases at year’s end. Russian always picked up the tab—the involved do not discourage such theft US Immigration and Customs En- discussion turned to infrared sensor and often benefit from [it],” she testi- forcement conducted more than 2,400 technologies that Nikon was work- fied. “It’s clear, however, that the major export investigations involving viola- ing on for its cameras, but which also threat countries continue to employ state tions of the Arms Export Control Act, had applications in advanced weapons organs—including their intelligence International Traffic in Arms Regula- systems. services—as well as commercial en- tions, the Trading With the Enemy Act, In February 2005 the Nikon employee terprises, particularly when seeking the and other laws. was persuaded to give his new friend a most sensitive and difficult-to-acquire According to the American Society prototype device designed to stabilize technologies.” for Industrial Security, economic and light signals in long-distance fiber-optic The leading state sponsors are an open industrial espionage cost US businesses networks, in exchange for a few hundred secret and include India, Pakistan, Iran, an estimated $59 billion. dollars and some presents. Japan, France, and Israel. DSS reported 971 suspicious con- As was eventually reported in the Rus- By nearly all accounts, however, the tacts, an increase of nearly 43 percent sian publication Defense and Security, top two “threat nations” are in a class from a year before, though part of this the Tokyo police had long considered by themselves. Thus, US intelligence may be attributable to “greater threat the Russian trading office a wholly officers and investigators spend much awareness.” owned subsidiary of Russian military of their counterintelligence energies The top five, unnamed, “collecting intelligence. Eventually, Japanese law looking particularly into the activities countries” were responsible for 57.4 enforcement saw to it that the Japanese of China and Russia. percent of all technology collection man was fired from his job and that the But for an investigation by the Japa- activity. Russian quietly returned to Moscow. nese magazine Shukan Bunshun, the State-sponsored spying activity The lines have blurred between indus- suicide of a Japanese consul in Shanghai nearly doubled from the year before, trial and economic espionage conducted in 2004 might have been attributed to to 30.6 percent of the technology col- by foreign governments and intelli- loneliness or thwarted career ambitions. lection attempts. gence agencies, and spying instigated Instead, the investigation revealed that Little wonder that some experts have at the behest of private companies or the Japanese official was in a relation- characterized the trend as the greatest individuals. ship with a hostess in a karaoke bar. foreign intelligence challenge since A number of foreign governments Chinese intelligence officers reportedly the Cold War. Or as one former Rus- have created quasi-official organiza- threatened to make the relationship sian intelligence officer commented to tions, such as the Russian trade office, public unless the man divulged the a reporter on the ubiquity of data theft to tap into and help direct the technology secrets of Tokyo’s diplomatic encryp- and industrial espionage, “Everyone is theft being conducted by the private tion system. stealing from everyone else.” sector. The Japanese consul hanged himself Foreign theft of sensitive technologies Meanwhile, foreign intelligence ser- instead. has “eroded the US military advantage vices continue to aggressively conduct The case reveals why many experts be- by making dangerous technology avail- able to our adversaries,” Michelle Van Cleave, the former national counterin- telligence executive, testified in 2005 before Congress. Prime Targets Sensitive US technologies that un- derpin the economy and contribute to military superiority, she said, remain prime targets of foreign intelligence services, companies, and private in- dividuals. Such spying and theft “has undercut the competitiveness of US industry by allowing foreign firms to acquire, at little or no cost, technol- 72 AIR FORCE Magazine / March 2007 lieve industrial espionage and technical industrial espionage] in cases where successful spying made efforts to keep data theft have become a quasi-official something that would normally take it at arm’s length “futile.” part of Beijing’s foreign and industrial 10 years to develop takes them two or Likewise, there is ample evidence policy, dating back to the 1980s and three,” said David W. Szady, then chief that Washington’s old adversary Mos- the “863 Program” launched by former of FBI counterintelligence operations, cow remains hyperactive in the fields leader Deng Xiaoping. Designed to put in 2005 to the Calgary Herald. of industrial espionage and sensitive China on a fast track to technological DSS provided a telling case study data theft. equality with the developed nations, of how this technology theft can work, In one case, British defense contractor the 863 Program focused on achieving citing an example involving a Near BAE Systems learned in 2002 that one breakthroughs and shortcuts across a Eastern nation. An employee of a Near of its employees was passing stealth wide spectrum of military and industrial East defense firm, working on a joint cruise missile secrets to the Russians. technologies. program with a US defense contrac- Former BAE engineer Ian Parr is now Once critical technologies—or entire tor, connected his computer to the US serving 10 years for spying.
Recommended publications
  • Commercial and Industrial Cyber Espionage in Israel
    Commercial and Industrial Cyber Espionage in Israel Shahar Argaman and Gabi Siboni Cyberspace is especially suited to the theft of business information and to espionage. The accessibility of information, along with the ability to remain anonymous and cover one’s tracks, allows various entities to engage in the theft of valuable information, an act that can cause major damage. Israel, rich in advanced technology and a leader in innovation-based industries that rely on unique intellectual property, is a prime target for cyber theft and commercial cyber attacks. This article examines the scope of cyber theft and cyber industrial espionage globally, and attempts to estimate how much !nancial damage they cause in countries around the world and in Israel. It seeks to raise awareness of the extent of the phenomena among the relevant authorities in Israel and provide recommendations on how to grapple with it. Keywords : Cyber, espionage, industrial espionage, intellectual property, cyber crime, cyber theft, technology “There are two types of companies: companies that have been breached and companies that don’t know they’ve been breached…. The vast majority of companies have been breached.” 1 Shawn Henry The director of the National Security Agency, Gen. Keith Alexander, called cybercrime “the greatest transfer of wealth in history.” The price tag for intellectual property theft from U.S. companies is at least $250 billion a year .2 Shahar Argaman is the director of the National Cyber Sta!. Col. (ret.) Dr. Gabi Siboni is the head of the Military and Strategic A!airs Program and Cyber Security Program at INSS. Military and Strategic Affairs | Volume 6 | No.
    [Show full text]
  • Espionage Against the United States by American Citizens 1947-2001
    Technical Report 02-5 July 2002 Espionage Against the United States by American Citizens 1947-2001 Katherine L. Herbig Martin F. Wiskoff TRW Systems Released by James A. Riedel Director Defense Personnel Security Research Center 99 Pacific Street, Building 455-E Monterey, CA 93940-2497 REPORT DOCUMENTATION PAGE Form Approved OMB No. 0704-0188 The public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information, including suggestions for reducing the burden, to Department of Defense, Washington Headquarters Services, Directorate for Information Operations and Reports (0704- 0188), 1215 Jefferson Davis Highway, Suite 1204, Arlington, VA 22202-4302. Respondents should be aware that notwithstanding any other provision of law, no person shall be subject to any penalty for failing to comply with a collection of information if it does not display a currently valid OMB control number. PLEASE DO NOT RETURN YOUR FORM TO THE ABOVE ADDRESS. 1. REPORT DATE (DDMMYYYY) 2. REPORT TYPE 3. DATES COVERED (From – To) July 2002 Technical 1947 - 2001 4. TITLE AND SUBTITLE 5a. CONTRACT NUMBER 5b. GRANT NUMBER Espionage Against the United States by American Citizens 1947-2001 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT NUMBER Katherine L. Herbig, Ph.D. Martin F. Wiskoff, Ph.D. 5e. TASK NUMBER 5f. WORK UNIT NUMBER 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) 8.
    [Show full text]
  • Foreign Economic Espionage in Cyberspace 2018
    Foreign Economic Espionage in Cyberspace 2018 NATIONAL COUNTERINTELLIGENCE AND SECURITY CENTER Contents Executive Summary • 1 Scope Note • 2 I. The Strategic Threat of Cyber Economic Espionage • 4 II. Threats from Foreign Countries • 5 China: Persistent Cyber Activities • 5 Russia: A Sophisticated Adversary • 8 Iran: An Increasing Cyber Threat • 9 Targeted Technologies • 11 III. Emerging Threats • 12 Software Supply Chain Operations • 13 Foreign Laws Could Enable Intellectual Property Theft • 13 Foreign Technology Companies With Links to Host Governments • 14 Annex – Decreasing the Prevalence of Economic or Industrial Espionage in Cyberspace • 15 Executive Summary In the 2011 report to Congress on Foreign Spies Stealing U.S. Economic Secrets in Cyberspace, the Office of the National Counterintelligence Executive provided a baseline assessment of the many dangers facing the U.S. research, development, and manufacturing sectors when operating in cyberspace, the pervasive threats posed by foreign intelligence services and other threat actors, and the industries and technologies most likely at risk of espionage. The 2018 report provides additional insight into the most pervasive nation-state threats, and it includes a detailed breakout of the industrial sectors and technologies judged to be of highest interest to threat actors. It also discusses several potentially disruptive threat trends that warrant close attention. This report focuses on the following issues Foreign economic and industrial espionage against the United States continues to represent a significant threat to America’s prosperity, security, and competitive advantage. Cyberspace remains a preferred operational domain for a wide range of industrial espionage threat actors, from adversarial nation- states, to commercial enterprises operating under state influence, to sponsored activities conducted by proxy hacker groups.
    [Show full text]
  • Cyber-Espionage: a Growing Threat to the American Economy
    Cyber-Espionage: A Growing Threat to the American Economy Gerald O'Harat "It's the great irony of our Information Age-the very technologies that empower us to create and to build also empower those who would disrupt and destroy. "' I. INTRODUCTION The American economy is currently the world's largest and most advanced. 2 It is this status that allows the United States to remain among the most power- ful and influential countries in the world. However, the country's economy is at risk of marginalization in a way that many policymakers could not have en- visioned just a decade ago. The potential result threatens not only the economic standing of the United States in the global economy, but its national security as well. Although threats of economic and industrial espionage have long ex- isted,' the international proliferation of the Internet makes cyber economic and J.D. 2010, The Catholic University of America, Columbus School of Law. The author would like to thank Ed Schellhom and Jenny Childs for their thoughtful suggestions throughout the writing process, as well as the editors and staff of the COMMLAW CONSPEC- TUS for all of their hard work in preparing Volume 19. 1 President Barack Obama, Remarks by the President on Securing Our Nation's Cyber Infrastructure (May 29, 2009), available at http://www.whitehouse.gov/thepress-office/Remarks-by-the-President-on-Securing-Our- Nations-Cyber-Infrastructure/. 2 The World Factbook, CENT. INTELLIGENCE AGENCY, http://www.cia.gov/library/publications/the-world-factbook/geos/us.html (follow "Econ- omy" hyperlink) (last visited Jan.
    [Show full text]
  • Industrial Espionage from AFIO's the INTELLIGENCER
    Association of Former Intelligence Officers 7700 Leesburg Pike, Suite 324 From AFIO's The Intelligencer Falls Church, Virginia 22043 Journal of U.S. Intelligence Studies Web: www.afio.com, E-mail: [email protected] • A trained foreign agent, who had been in the Volume 22 • Number 1 • $15 single copy price Spring 2016 ©2016, AFIO United States for more than 20 years and had become a citizen, suddenly was “activated” by his controllers in Asia and given a “shopping list” of technical information to obtain, and then proceeded to steal massive amounts of technical information from his company on the next generation of nuclear submarines being constructed for the US Navy. GUIDE TO THE STUDY OF INTELLIGENCE • An employee working for a large US manufac- turing company decided to strike out and form his own company, but first stole all of the nec- essary technical information to manufacture competing high-technology products. • A country that is an enemy (or “strategic com- petitor”) to the United States sent a number of Industrial Espionage “illegals” into various companies to systemat- ically report on all technical developments and strategies of the targeted US companies. by Edward M. Roche, PhD, JD • A major hotel chain vice president decided that he was not being paid enough and took all of No information I received was the result of spying. the records regarding the development of a Everything was given to me in casual conversations new hotel concept to a competitor, where he got without coercion. better pay and a substantial promotion. 1 — Richard Sorge, interrogation at Sugamo Prison.
    [Show full text]
  • Guide to Computer Forensics and Investigations Fourth Edition
    Guide to Computer Forensics and Investigations Fourth Edition Chapter 2 Understanding Computer Investigations Objectives • Explain how to prepare a computer investigation • Apply a systematic approach to an investigation • Describe procedures for corporate high-tech investigations Guide to Computer Forensics and Investigations 2 Objectives (continued) • Explain requirements for data recovery workstations and software • Describe how to conduct an investigation • Explain how to complete and critique a case Guide to Computer Forensics and Investigations 3 Preparing a Computer Investigation • Role of computer forensics professional is to gather evidence to prove that a suspect committed a crime or violated a company policy • Collect evidence that can be offered in court or at a corporate inquiry – Investigate the suspect’s computer – Preserve the evidence on a different computer Guide to Computer Forensics and Investigations 4 Preparing a Computer Investigation (continued) • Follow an accepted procedure to prepare a case • Chain of custody – Route the evidence takes from the time you find it until the case is closed or goes to court Guide to Computer Forensics and Investigations 5 An Overview of a Computer Crime • Computers can contain information that helps law enforcement determine: – Chain of events leading to a crime – Evidence that can lead to a conviction • Law enforcement officers should follow proper procedure when acquiring the evidence – Digital evidence can be easily altered by an overeager investigator • Information on hard disks
    [Show full text]
  • Counterintelligence
    COUNTERINTELLIGENCE OFFICE OF THE NATIONAL COUNTERINTELLIGENCE EXECUTIVE October 2011 Table of Contents Executive Summary ................................................................................................................................ i Scope Note ........................................................................................................................................... iii US Technologies and Trade Secrets at Risk in Cyberspace .....................................................................1 The Appeal of Collecting in Cyberspace................................................................................. .....1 Security and attribution .......................................................................................................1 Faster and cheaper ..............................................................................................................2 Extra-territoriality ................................................................................................................2 Large but Uncertain Costs...........................................................................................................3 Pervasive Threat from Intelligence Adversaries and Partners ...............................................................4 China: Persistent Collector ..........................................................................................................5 Russia: Extensive, Sophisticated Operations ..............................................................................5
    [Show full text]
  • ECHELON Interception System) (2001/2098(INI))
    EUROPEAN PARLIAMENT ««« « « « « 1999 « « 2004 ««« Session document FINAL A5-0264/2001 PAR1 11 July 2001 REPORT on the existence of a global system for the interception of private and commercial communications (ECHELON interception system) (2001/2098(INI)) Part 1: Motion for a resolution Explanatory statement Temporary Committee on the ECHELON Interception System Rapporteur: Gerhard Schmid RR\445698EN.doc PE 305.391 EN EN PE 305.391 2/194 RR\445698EN.doc EN ‘Sed quis custodiet ipsos custodes.’ Juvenal (ca. 60 to 130 AD), Sat. 6, 347 RR\445698EN.doc 3/194 PE 305.391 EN CONTENTS Page PROCEDURAL PAGE .............................................................................................................. 9 MOTION FOR A RESOLUTION ............................................................................................ 10 EXPLANATORY STATEMENT ............................................................................................. 21 1. Introduction: .......................................................................................................21 1.1. The reasons for setting up the committee .................................................................21 1.2. The claims made in the two STOA studies on a global interception system codenamed ECHELON .............................................................................................21 1.2.1. The first STOA report of 1997 ..................................................................................21 1.2.2. The 1999 STOA reports.............................................................................................21
    [Show full text]
  • Who's Spying on You? | Cyber-Espionage Whitepaper
    SPECIAL REPORT WHO’S SPYING ON YOU? No business is safe from cyber-espionage With Kaspersky, now you can. kaspersky.com/business Be Ready for What’s Next CONTENTS “Many cyberattacks can be mitigated by relatively Cyber-espionage: simple measures. Why should your business care? 4 Espionage is nothing new 5 Unfortunately, some What do the perpetrators gain? 7 people fail to take Is any business safe? 8 what appear to be basic precautions – such as Methods of spreading cyber-espionage malware 14 using strong passwords, Beyond cyber-espionage 16 applying patches and How can you protect running a security your business? 17 solution. In many cases, How Kaspersky Lab security breaking into a company’s technologies can help 22 network is easier than Appendix: it sounds.” An overview of some COSTIN RAIU significant cyberthreats 28 “High-profile targeted DIRECTOR, GLOBAL RESEARCH & ANALYSIS TEAM A cyber-glossary 30 KASPERSKY LAB attacks on enterprises About Kaspersky 34 are becoming increasingly widespread. Thousands of businesses have already been hacked and had their sensitive data stolen – resulting in multi-billion dollar losses. Cyber-espionage is a tangible and growing global threat today – and fighting it is one of the principal tasks we’ve set ourselves.” EUGENE KASPERSKY CEO, KASPERSKY LAB 2 3 WHY SHOULD YOUR BUSINESS ESPIONAGE IS NOTHING NEW CARE ABOUT CYBER-ESPIONAGE? EXECUTIVE OVERVIEW Espionage, in one form or another, has existed for as long as any Cyber-espionage may sound like some strangely exotic activity from organisation or individual has felt that it could gain an advantage the movies. However, the harsh reality is that almost any business by illicitly accessing someone else’s confidential information.
    [Show full text]
  • The Federal Government's War on Economic Espionage
    THE FEDERAL GOVERNMENT'S WAR ON ECONOMIC ESPIONAGE DARREN S. TUCKER* In economics, we are competitors, not allies. - Pierre Marion, former French Intelligence Director. They're robbing us blind. - Raymond Rocca, former Central Intelligence Agency Deputy Director of Counterintelligence. 1. INTRODUCTION During the Cold War, both intelligence1 and counterintelli- gence2 focused on military and political targets.3 A typical case * J.D. Candidate, 1998, University of Pennsylvania Law School; B.A., 1995, College of William and Mary. Special thanks to Robert A. Rizzi and Jonathan Fredman for commenting on a previous draft and Edwin O'Connor and his team of Associate Editors for their editing assistance. I dedicate this Comment to my grandmother, Betty, my parents, tom and Audrey, my sister, Megan, and my fiancee, Anne. ' Intelligence is categorized as strategic or tactical. See UNITED STATES INTELLIGENCE: AN ENCYCLOPEDIA at xi (Bruce W. Watson et al. eds., 1990). Strategic*intelligence is "information on events, threats, and individuals that create major problems for the federal government." Id. Tactical intelligence is (1) information used to assess military threats against the U.S. armed forces and (2) covert and clandestine operations used to collect information or to influence events. See id. 2 Counterintelligence is "information gathered and activities conducted to protect against espionage, other intelligence activities, sabotage, or assassinations conducted for or on behalf of foreign powers, organizations or persons, or international terrorist activities, but not including personal, physical, document or communications security programs." Exec. Order No. 12,333, 46 Fed. Reg. 59,941 (1982), reprinted in 50 U.S.C. § 401 (1997).
    [Show full text]
  • Case Study of Industrial Espionage Through Social Engineering
    CASE STUDY OF INDUSTRIAL ESPIONAGE THROUGH SOCIAL ENGINEERING Ira S. Winkler National Computer Security Association 10 South Courthouse Avenue Carlisle, Pennsylvania 17013 [email protected] (717) 258-1816 x257 Abstract The Federal Bureau of Investigation estimates that U.S. Corporations lose $100 Billion annually due to industrial espionage. While many people believe that the espionage is committed by well financed organizations that can only be stopped by national agencies, that is very incorrect. Industrial espionage usually exploits simple and very preventable vulnerabilities to produce tremendous results. By focusing on comprehensive security, and not just technical security, information security professionals can significantly hamper adversary attempts to steal their organization’s information assets. The presentation that describes this paper presents a case study of an actual industrial espionage attack against a large U.S. corporation. Introduction The theft of sensitive information from U.S. corporations is the goal for many foreign nations and companies. Adversaries do not care about what form the information takes. Whether information is in electronic format or is thrown away in the trash, it is irrelevant as long as the information is compromised. Unfortunately for most corporate security programs, there is a preoccupation with technical security that leaves information very vulnerable to basic espionage methods. Information security professionals focus their efforts on what they know best. When they allocate their limited budgets, the division of funds reflects their perceived needs, which are basically technical security mechanisms. Firewalls and other Internet security mechanisms are the hottest selling products. While firewalls go a long way in preventing the traditional computer hackers from intruding into a corporate computer network, they do nothing to stop the most significant source of computer crime: Insiders.
    [Show full text]
  • Industrial Espionage
    A Literature Review: Industrial Espionage Harrison John Bhatti & Andrii Alymenko Master’s Programme in Industrial Management and Innovation School of Business and Engineering Halmstad University, Sweden. Emails: [email protected]; [email protected] Abstract This is a literature review article. The purpose of this article is to explain and provide a deeper understanding of economic and industrial espionage. Furthermore, it describes legal and illegal methods of espionage and highlights the different aspects of preventing espionage such as: technical, operational, physical and personnel security. A number of theoretical concepts have been extracted and analyzed from different scientific articles which have been summarized and anticipated in the form of theoretical framework. Incredible results are often produced by exploiting industrial espionage. By concentrating on complete security, and not simply specialized security, data security experts can altogether hamper enemy endeavors to take their association's data resources. Keywords: Industrial Espionage, Economic Espionage. Corporate Crime, Espionage Methods, Avoiding Espionage. 1. Introduction One of the issues for the confrontations within the field of data security is the scarcity of tenable knowledge about existing threats to intelligence protection. Governments and companies experience a deficiency of ascertainment and information gathering in this field and face an increasing problem of industrial espionage (Thorleuchter & Van den Poel, 2013). Moreover, different researchers such as: Malone, Baluja, Costanzo, and Davis (2000) show the evidence that many of the recognized intrusions in the information systems are ignored which makes impossible to provide the proper statistical analysis. However, in many cases described by Polanyi (1967) theft of knowledge from the organization is not allowing robbers to use the technology and results in further violations such as luring away employees or even kidnapping.
    [Show full text]