SlideShare a Scribd company logo
1 of 6
Download to read offline
Spies, Lies and Secrets: 37 Industrial Espionage Tactics that Threaten to Kill Your International Business. 
By Santiago A. Cueto 
Industrial Espionage is the biggest threat to U.S. business interests. No other threat even comes close. 
It’s the fastest and least expensive way for our foreign competitors to bridge the innovation gap with the U.S. 
Using cutting-edge technology and age-old techniques of deceit and manipulation, corporate spies are the greatest post-cold war threat to international business. 
Today’s international conflicts are not limited to nation to nation disputes. Increasingly, they include corporation versus corporation. 
The recent trial between U.S.-based Apple and South Korean technology giant Samsung is just one example of the epic battle raging over the world’s most coveted trade secrets. 
Industrial Espionage 
At its essence, Industrial espionage is the process of illegally and unethically gaining confidential information from other companies – formulas, algorithms, strategic plans, and other intellectual 
“Perhaps the biggest group of villains to look out for are foreign governments. Foreign governments often engage their own intelligence services to acquire trade or research secrets for their own national purposes or industries.”
property to gain a competitive edge over a competitor. Having company secrets stolen by a competitor is costly and can be lethal to your global business. 
That’s why it’s never been more important for American executives to educate themselves on the range of corporate espionage tactics used against them. 
The Villains: Employees, Recruiters and Foreign Governments. 
Employees are perhaps the most prevalent threat given their ability to access and steal documents, files, customer lists, and trade secrets. Lured by financial gain, employees are highly motivated to steal information and sell their company’s proprietary secrets to the highest bidder. 
Another group of villains to look out for are corporate recruiting agencies. Competitors will often use recruiters to hire away employees of a target company for the sole purpose of collecting critical information. 
Perhaps the biggest groups of villains to look out for are foreign governments. Foreign governments often engage their own intelligence services to acquire trade or research secrets for their own national purposes or industries. Other villains to look out for are private investigative firms, hackers and thieves. 
37 Espionage Tactics 
Below is a comprehensive list of spy tactics that every American executive and in-house counsel should be familiar with. The list put together by the Dictionary of International Trade Handbook of the Global Trade Community, serves as an excellent overview of the things to look out for in you international business dealings. 
As you’ll see, the list includes spying by current employees, former employees, computer hackers, and the full gamut of Cold War-style intelligence techniques. 
Traditional Espionage 
1.Theft: Stealing information or products 
2. Blackmail: using threat or intimidation to extort information 
3. Mole planting: a double agent is embedded and gains the trust of a competing company 
4. Eavesdropping: ranges from wiretapping phones to intercepting WIFI signals and emails. 
5. Seduction: timeless technique using sexual offers to get information out of an individual.
6. Bribery: influence someone by offering money to gain information or prompt illegal action. 
7. Foreign intelligence recruits: business intelligence agencies, such as Kroll, recruit former Cold War intelligence officers for commercial intelligence purposes. 
8. Hiring competitors’ employees: hiring away critical employees from a competitor. 
9. Bogus job interviews: Fake interview of candidates solely for the purpose of collecting key information on their current employers. 
10. Bogus purchase negotiations: Companies pose as “buyers” in order to gain key information from a competitor. 
11. Research under false pretenses: “Author” uses research paper as ruse to gain key information from a competitor. 
12. Corporate communication intercepts: Intercepting telephone calls through public switch exchange. 
13. Using familial connections: conversations with unsuspecting relatives working for competing companies. 
14. Trade fair conversations: establishing a contact at trade fairs, particularly with experts having a high level of understanding of innovative technology. 
15. Using commonalities: targeting individuals with common language, cultural heritage or religion to gain key information. 
16. Naturalized citizens: appealing to naturalized citizens to provide information for patriotic or loyalty reasons or threatening family members in the home country. 
17. Repatriating naturalized citizens: lure naturalized citizens back to the home country to employ process and methods used by the foreign company. 
18. Government debriefing: government debriefing of its citizens to acquire information upon their return from a foreign country. 
19. Dumpster diving: going through a competitor’s trash to find key information. This is the tactic that spawned the billion-dollar paper shredding industry. 
20. Outsourcing/Delocalization: Foreign outsourcing can exploit methods, processes or information. Delocalizing under license often leads to a loss of security n countries unbound by copyright or trademark laws.
21. Front companies and organizations: foreign competitors may pose as software vendors or even nonprofit organizations to access a competitor’s trade secrets. 
22. Joint venture & bidding process: foreign purchasers may prompt companies to provide a great deal of data in the bidding process, compromising valuable proprietary information. 
23. Close proximity: joint ventures and strategic alliances may put unscrupulous personnel in close proximity with a firm’s key personnel or technology. 
24. Mergers & acquisitions: mergers and acquisitions often allow a new company to acquire certain technologies not in their prior possession. 
25. Negotiating: Buyers make excessive technology information demands during negotiations. 
26. Third-party acquisition: This type of acquisition of companies and technologies often indicate a diversion or a transfer of technology. It’s possible that final recipients are actually embargoed individuals, businesses or countries that cannot otherwise get the technology themselves. 
27. Import-export front: import/export companies may be involved with illegal exporting of sensitive or illegal documents, data or other items in the country of export. 
28. Altered products or false certifications: domestic companies serve as fronts for getting export controlled products to an undisclosed end user by falsifying end-user certificates. 
29. University research: industrial spies are often placed in university research facilities by government intelligence services or even by commercial competitors. 
Computer Espionage 
30. Copy files: Easily copy computer files with miniature USB drives and pass them on to other individuals, businesses or governments. 
31. Computer hacking: attempts to illegally gain access to a computer file or network or to do so without proper authorization. 
32. Information requests: Requests for sensitive information, particularly over the internet, to unsuspecting low or mid-level personnel.
Travel Espionage 
33. Luggage or laptop theft: Foreign business people are targets for numerous tactics. Briefcases and luggage in hotel rooms can be searched for sensitive data and copied; the same applies to security checkpoints and border crossings. 
34. Tapped room phones: Phone, Fax and WIFI intercepts are often employed through the traveler’s hotel phone or other point of contact. 
Visitor Espionage 
35. Wired Visitors: Company visitors fitted with recording devices, video cameras and cameras. Beware of visitors who ask unusually expert questions or seek unnecessary access to restricted areas. 
36. Conversation Detours: Conversation “detours” during interview or information conferences to subjects not agreed upon in advance and covering sensitive topics. 
37. Visitor status: downplaying or disguising a visitor’s status or technical skill to gain access for a tour or visit. 
Conclusion 
As the list demonstrates, there is no shortage of corporate espionage tactics. I am sure there are countless others. 
Good luck out there! 
______________________ 
Research References 
Dictionary of International Trade Handbook of the Global Trade Community 10th Edition, World Trade Press 
Broker, Trader, Lawyer, Spy: The Secret World of Corporate Espionage, Eamon Javers 
Secrets and Lies: The Rise of Corporate Espionage in a Global Economy. Georgetown Journal of International Affairs 
Santiago Cueto
Counterespionage for American Business, Peter Pitorri 
Economic Espionage and Industrial Spying, Hedieh Nasheri

More Related Content

What's hot

Chapter 17 a fraud in e commerce Jen
Chapter 17 a  fraud in e commerce JenChapter 17 a  fraud in e commerce Jen
Chapter 17 a fraud in e commerce Jen
VidaB
 
E commerce fraud chapter 17 B Ahmed
E commerce fraud chapter 17 B AhmedE commerce fraud chapter 17 B Ahmed
E commerce fraud chapter 17 B Ahmed
VidaB
 
financial-protection
financial-protectionfinancial-protection
financial-protection
room16voice
 
10.2.2015 e commerce fraud final slide show.ppt
10.2.2015 e commerce fraud final slide show.ppt10.2.2015 e commerce fraud final slide show.ppt
10.2.2015 e commerce fraud final slide show.ppt
shaks9151
 
Protecting Your Law Office Against Data Breaches and Other Cyber Threats
Protecting Your Law Office Against Data Breaches and Other Cyber ThreatsProtecting Your Law Office Against Data Breaches and Other Cyber Threats
Protecting Your Law Office Against Data Breaches and Other Cyber Threats
Blake A. Klinkner
 
Hedna pii is your goldmine a landmine
Hedna   pii is your goldmine a landmineHedna   pii is your goldmine a landmine
Hedna pii is your goldmine a landmine
Evelyne Oreskovich
 
Cyber Security and Fraud Prevention Tools Tactics
Cyber Security and Fraud Prevention Tools TacticsCyber Security and Fraud Prevention Tools Tactics
Cyber Security and Fraud Prevention Tools Tactics
Ben Graybar
 
Updated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools TacticsUpdated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools Tactics
Ben Graybar
 

What's hot (20)

Chapter 17 a fraud in e commerce Jen
Chapter 17 a  fraud in e commerce JenChapter 17 a  fraud in e commerce Jen
Chapter 17 a fraud in e commerce Jen
 
E commerce fraud chapter 17 B Ahmed
E commerce fraud chapter 17 B AhmedE commerce fraud chapter 17 B Ahmed
E commerce fraud chapter 17 B Ahmed
 
financial-protection
financial-protectionfinancial-protection
financial-protection
 
E-commerce and fraud
E-commerce and fraudE-commerce and fraud
E-commerce and fraud
 
File000154
File000154File000154
File000154
 
10.2.2015 e commerce fraud final slide show.ppt
10.2.2015 e commerce fraud final slide show.ppt10.2.2015 e commerce fraud final slide show.ppt
10.2.2015 e commerce fraud final slide show.ppt
 
What Cybercriminals Want: Company Data – by United Security Providers
What Cybercriminals Want: Company Data – by United Security ProvidersWhat Cybercriminals Want: Company Data – by United Security Providers
What Cybercriminals Want: Company Data – by United Security Providers
 
Protecting Your Law Office Against Data Breaches and Other Cyber Threats
Protecting Your Law Office Against Data Breaches and Other Cyber ThreatsProtecting Your Law Office Against Data Breaches and Other Cyber Threats
Protecting Your Law Office Against Data Breaches and Other Cyber Threats
 
Data Security Breach: The Sony & Staples Story
Data Security Breach: The Sony & Staples StoryData Security Breach: The Sony & Staples Story
Data Security Breach: The Sony & Staples Story
 
Cybercrime Awareness
Cybercrime AwarenessCybercrime Awareness
Cybercrime Awareness
 
Phishing
PhishingPhishing
Phishing
 
Cybercrime IN INDIA , LAW AND ORDER
Cybercrime IN INDIA , LAW AND ORDER Cybercrime IN INDIA , LAW AND ORDER
Cybercrime IN INDIA , LAW AND ORDER
 
Gathering Intel from the Dark Web to Identify and Prioritize Critical Risks
Gathering Intel from the Dark Web to Identify and Prioritize Critical RisksGathering Intel from the Dark Web to Identify and Prioritize Critical Risks
Gathering Intel from the Dark Web to Identify and Prioritize Critical Risks
 
Must know about Phishing Attacks and How to Protect Against Them
Must know about Phishing Attacks and How to Protect Against ThemMust know about Phishing Attacks and How to Protect Against Them
Must know about Phishing Attacks and How to Protect Against Them
 
Hedna pii is your goldmine a landmine
Hedna   pii is your goldmine a landmineHedna   pii is your goldmine a landmine
Hedna pii is your goldmine a landmine
 
Cyber Security and Fraud Prevention Tools Tactics
Cyber Security and Fraud Prevention Tools TacticsCyber Security and Fraud Prevention Tools Tactics
Cyber Security and Fraud Prevention Tools Tactics
 
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...
 
Updated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools TacticsUpdated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools Tactics
 
Forensic Investigations and Staff Dishonesty in Cameroon
Forensic Investigations and Staff Dishonesty in CameroonForensic Investigations and Staff Dishonesty in Cameroon
Forensic Investigations and Staff Dishonesty in Cameroon
 
nullcon 2011 - Cyber crime 101: Cost of cyber crime, trends and analysis
nullcon 2011 - Cyber crime 101: Cost of cyber crime, trends and analysisnullcon 2011 - Cyber crime 101: Cost of cyber crime, trends and analysis
nullcon 2011 - Cyber crime 101: Cost of cyber crime, trends and analysis
 

Viewers also liked (9)

Lecture malicious software
Lecture malicious softwareLecture malicious software
Lecture malicious software
 
Information Gathering in Intelligence Agencies
Information Gathering in Intelligence AgenciesInformation Gathering in Intelligence Agencies
Information Gathering in Intelligence Agencies
 
Malicious Software
Malicious SoftwareMalicious Software
Malicious Software
 
Malicious software
Malicious softwareMalicious software
Malicious software
 
Lecture 12 malicious software
Lecture 12 malicious software Lecture 12 malicious software
Lecture 12 malicious software
 
Virus and Malicious Code Chapter 5
Virus and Malicious Code Chapter 5Virus and Malicious Code Chapter 5
Virus and Malicious Code Chapter 5
 
Business law ppt
Business law pptBusiness law ppt
Business law ppt
 
Business law slides
Business law slidesBusiness law slides
Business law slides
 
Malicious software
Malicious softwareMalicious software
Malicious software
 

Similar to Spies, Lies & Secrets: 37 Industrial Espionage Tactics that Threaten to Kill Your International Business

The Business of Hacking - Business innovation meets the business of hacking
The Business of Hacking - Business innovation meets the business of hackingThe Business of Hacking - Business innovation meets the business of hacking
The Business of Hacking - Business innovation meets the business of hacking
at MicroFocus Italy ❖✔
 
Trade Secret Lien
Trade Secret LienTrade Secret Lien
Trade Secret Lien
FNian
 
SYNERGY INITIAL SECURITY BRF 2023 (1).ppt
SYNERGY INITIAL SECURITY BRF 2023 (1).pptSYNERGY INITIAL SECURITY BRF 2023 (1).ppt
SYNERGY INITIAL SECURITY BRF 2023 (1).ppt
NickellReddy
 
How to Fight Product Counterfeiting with Investigative Strategies and Tactics
How to Fight Product Counterfeiting with Investigative Strategies and TacticsHow to Fight Product Counterfeiting with Investigative Strategies and Tactics
How to Fight Product Counterfeiting with Investigative Strategies and Tactics
IntelCollab.com
 
proctecting trade secrets computer crimes
proctecting trade secrets computer crimesproctecting trade secrets computer crimes
proctecting trade secrets computer crimes
welcometofacebook
 
The four ethical topics pertinent to organizations in the IT industr.docx
The four ethical topics pertinent to organizations in the IT industr.docxThe four ethical topics pertinent to organizations in the IT industr.docx
The four ethical topics pertinent to organizations in the IT industr.docx
SUBHI7
 

Similar to Spies, Lies & Secrets: 37 Industrial Espionage Tactics that Threaten to Kill Your International Business (20)

The Business of Hacking - Business innovation meets the business of hacking
The Business of Hacking - Business innovation meets the business of hackingThe Business of Hacking - Business innovation meets the business of hacking
The Business of Hacking - Business innovation meets the business of hacking
 
Business of Hacking
Business of HackingBusiness of Hacking
Business of Hacking
 
Computer Forensics And Investigating Corporate Espionage
Computer Forensics And Investigating Corporate EspionageComputer Forensics And Investigating Corporate Espionage
Computer Forensics And Investigating Corporate Espionage
 
Lgp Asia Enforcement Leave Behind Sept 09
Lgp Asia Enforcement Leave Behind Sept 09Lgp Asia Enforcement Leave Behind Sept 09
Lgp Asia Enforcement Leave Behind Sept 09
 
File000095
File000095File000095
File000095
 
Trade Secret Lien
Trade Secret LienTrade Secret Lien
Trade Secret Lien
 
SYNERGY INITIAL SECURITY BRF 2023 (1).ppt
SYNERGY INITIAL SECURITY BRF 2023 (1).pptSYNERGY INITIAL SECURITY BRF 2023 (1).ppt
SYNERGY INITIAL SECURITY BRF 2023 (1).ppt
 
TOC PROJECT
TOC PROJECTTOC PROJECT
TOC PROJECT
 
Information Security 5 06
Information Security 5 06Information Security 5 06
Information Security 5 06
 
How to Fight Product Counterfeiting with Investigative Strategies and Tactics
How to Fight Product Counterfeiting with Investigative Strategies and TacticsHow to Fight Product Counterfeiting with Investigative Strategies and Tactics
How to Fight Product Counterfeiting with Investigative Strategies and Tactics
 
Living in the IT Era - Lesson 5.0.pptx
Living in the IT Era - Lesson 5.0.pptxLiving in the IT Era - Lesson 5.0.pptx
Living in the IT Era - Lesson 5.0.pptx
 
Living in the IT Era - Lesson 5.pptx
Living in the IT Era - Lesson 5.pptxLiving in the IT Era - Lesson 5.pptx
Living in the IT Era - Lesson 5.pptx
 
Social Engineering - Human aspects of industrial and economic espionage
Social Engineering - Human aspects of industrial and economic espionageSocial Engineering - Human aspects of industrial and economic espionage
Social Engineering - Human aspects of industrial and economic espionage
 
Introduction to trade secret
Introduction to trade secretIntroduction to trade secret
Introduction to trade secret
 
Trade secrets
Trade secretsTrade secrets
Trade secrets
 
02 presentation-christianprobst
02 presentation-christianprobst02 presentation-christianprobst
02 presentation-christianprobst
 
International-Dimensions-of-Cybercrime (1).pptx
International-Dimensions-of-Cybercrime (1).pptxInternational-Dimensions-of-Cybercrime (1).pptx
International-Dimensions-of-Cybercrime (1).pptx
 
proctecting trade secrets computer crimes
proctecting trade secrets computer crimesproctecting trade secrets computer crimes
proctecting trade secrets computer crimes
 
Corporate Espionage "Pharma Industry at Risk"
Corporate Espionage "Pharma Industry at Risk" Corporate Espionage "Pharma Industry at Risk"
Corporate Espionage "Pharma Industry at Risk"
 
The four ethical topics pertinent to organizations in the IT industr.docx
The four ethical topics pertinent to organizations in the IT industr.docxThe four ethical topics pertinent to organizations in the IT industr.docx
The four ethical topics pertinent to organizations in the IT industr.docx
 

More from Scueto77

More from Scueto77 (7)

My Client has been Sued in the United States--Now What?
My Client has been Sued in the United States--Now What?My Client has been Sued in the United States--Now What?
My Client has been Sued in the United States--Now What?
 
7 steps to effectuate international service of process under the hague servic...
7 steps to effectuate international service of process under the hague servic...7 steps to effectuate international service of process under the hague servic...
7 steps to effectuate international service of process under the hague servic...
 
Why international litigation is superior to litigation in resolving internati...
Why international litigation is superior to litigation in resolving internati...Why international litigation is superior to litigation in resolving internati...
Why international litigation is superior to litigation in resolving internati...
 
5 Ways Corporations Can Avoid International Liability
5 Ways Corporations Can Avoid International Liability5 Ways Corporations Can Avoid International Liability
5 Ways Corporations Can Avoid International Liability
 
Oil's Not Well in Latin America: A Case for Corporate Codes of Conduct
Oil's Not Well in Latin America: A Case for Corporate Codes of ConductOil's Not Well in Latin America: A Case for Corporate Codes of Conduct
Oil's Not Well in Latin America: A Case for Corporate Codes of Conduct
 
Silicoln Riviera: Miami's Fast-Rising Tech Startup Culture
Silicoln Riviera: Miami's Fast-Rising Tech Startup CultureSilicoln Riviera: Miami's Fast-Rising Tech Startup Culture
Silicoln Riviera: Miami's Fast-Rising Tech Startup Culture
 
Legal Implications of the BP Deepwater Horizon Disaster
Legal Implications of the BP Deepwater Horizon DisasterLegal Implications of the BP Deepwater Horizon Disaster
Legal Implications of the BP Deepwater Horizon Disaster
 

Recently uploaded

Code_Ethics of_Mechanical_Engineering.ppt
Code_Ethics of_Mechanical_Engineering.pptCode_Ethics of_Mechanical_Engineering.ppt
Code_Ethics of_Mechanical_Engineering.ppt
JosephCanama
 
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理
Airst S
 
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
bd2c5966a56d
 
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
ShashankKumar441258
 
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxxAudience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
MollyBrown86
 
一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理
一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理
一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理
Airst S
 

Recently uploaded (20)

LITERAL RULE OF INTERPRETATION - PRIMARY RULE
LITERAL RULE OF INTERPRETATION - PRIMARY RULELITERAL RULE OF INTERPRETATION - PRIMARY RULE
LITERAL RULE OF INTERPRETATION - PRIMARY RULE
 
Shubh_Burden of proof_Indian Evidence Act.pptx
Shubh_Burden of proof_Indian Evidence Act.pptxShubh_Burden of proof_Indian Evidence Act.pptx
Shubh_Burden of proof_Indian Evidence Act.pptx
 
Relationship Between International Law and Municipal Law MIR.pdf
Relationship Between International Law and Municipal Law MIR.pdfRelationship Between International Law and Municipal Law MIR.pdf
Relationship Between International Law and Municipal Law MIR.pdf
 
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top Boutique
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top BoutiqueAndrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top Boutique
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top Boutique
 
Code_Ethics of_Mechanical_Engineering.ppt
Code_Ethics of_Mechanical_Engineering.pptCode_Ethics of_Mechanical_Engineering.ppt
Code_Ethics of_Mechanical_Engineering.ppt
 
8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx
8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx
8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx
 
Municipal-Council-Ratlam-vs-Vardi-Chand-A-Landmark-Writ-Case.pptx
Municipal-Council-Ratlam-vs-Vardi-Chand-A-Landmark-Writ-Case.pptxMunicipal-Council-Ratlam-vs-Vardi-Chand-A-Landmark-Writ-Case.pptx
Municipal-Council-Ratlam-vs-Vardi-Chand-A-Landmark-Writ-Case.pptx
 
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理
 
CAFC Chronicles: Costly Tales of Claim Construction Fails
CAFC Chronicles: Costly Tales of Claim Construction FailsCAFC Chronicles: Costly Tales of Claim Construction Fails
CAFC Chronicles: Costly Tales of Claim Construction Fails
 
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURY
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURYA SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURY
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURY
 
589308994-interpretation-of-statutes-notes-law-college.pdf
589308994-interpretation-of-statutes-notes-law-college.pdf589308994-interpretation-of-statutes-notes-law-college.pdf
589308994-interpretation-of-statutes-notes-law-college.pdf
 
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
 
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
 
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxxAudience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
 
Police Misconduct Lawyers - Law Office of Jerry L. Steering
Police Misconduct Lawyers - Law Office of Jerry L. SteeringPolice Misconduct Lawyers - Law Office of Jerry L. Steering
Police Misconduct Lawyers - Law Office of Jerry L. Steering
 
PPT- Voluntary Liquidation (Under section 59).pptx
PPT- Voluntary Liquidation (Under section 59).pptxPPT- Voluntary Liquidation (Under section 59).pptx
PPT- Voluntary Liquidation (Under section 59).pptx
 
一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理
一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理
一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理
 
Presentation on Corporate SOCIAL RESPONSIBILITY- PPT.pptx
Presentation on Corporate SOCIAL RESPONSIBILITY- PPT.pptxPresentation on Corporate SOCIAL RESPONSIBILITY- PPT.pptx
Presentation on Corporate SOCIAL RESPONSIBILITY- PPT.pptx
 
$ Love Spells^ 💎 (310) 882-6330 in Utah, UT | Psychic Reading Best Black Magi...
$ Love Spells^ 💎 (310) 882-6330 in Utah, UT | Psychic Reading Best Black Magi...$ Love Spells^ 💎 (310) 882-6330 in Utah, UT | Psychic Reading Best Black Magi...
$ Love Spells^ 💎 (310) 882-6330 in Utah, UT | Psychic Reading Best Black Magi...
 
The doctrine of harmonious construction under Interpretation of statute
The doctrine of harmonious construction under Interpretation of statuteThe doctrine of harmonious construction under Interpretation of statute
The doctrine of harmonious construction under Interpretation of statute
 

Spies, Lies & Secrets: 37 Industrial Espionage Tactics that Threaten to Kill Your International Business

  • 1. Spies, Lies and Secrets: 37 Industrial Espionage Tactics that Threaten to Kill Your International Business. By Santiago A. Cueto Industrial Espionage is the biggest threat to U.S. business interests. No other threat even comes close. It’s the fastest and least expensive way for our foreign competitors to bridge the innovation gap with the U.S. Using cutting-edge technology and age-old techniques of deceit and manipulation, corporate spies are the greatest post-cold war threat to international business. Today’s international conflicts are not limited to nation to nation disputes. Increasingly, they include corporation versus corporation. The recent trial between U.S.-based Apple and South Korean technology giant Samsung is just one example of the epic battle raging over the world’s most coveted trade secrets. Industrial Espionage At its essence, Industrial espionage is the process of illegally and unethically gaining confidential information from other companies – formulas, algorithms, strategic plans, and other intellectual “Perhaps the biggest group of villains to look out for are foreign governments. Foreign governments often engage their own intelligence services to acquire trade or research secrets for their own national purposes or industries.”
  • 2. property to gain a competitive edge over a competitor. Having company secrets stolen by a competitor is costly and can be lethal to your global business. That’s why it’s never been more important for American executives to educate themselves on the range of corporate espionage tactics used against them. The Villains: Employees, Recruiters and Foreign Governments. Employees are perhaps the most prevalent threat given their ability to access and steal documents, files, customer lists, and trade secrets. Lured by financial gain, employees are highly motivated to steal information and sell their company’s proprietary secrets to the highest bidder. Another group of villains to look out for are corporate recruiting agencies. Competitors will often use recruiters to hire away employees of a target company for the sole purpose of collecting critical information. Perhaps the biggest groups of villains to look out for are foreign governments. Foreign governments often engage their own intelligence services to acquire trade or research secrets for their own national purposes or industries. Other villains to look out for are private investigative firms, hackers and thieves. 37 Espionage Tactics Below is a comprehensive list of spy tactics that every American executive and in-house counsel should be familiar with. The list put together by the Dictionary of International Trade Handbook of the Global Trade Community, serves as an excellent overview of the things to look out for in you international business dealings. As you’ll see, the list includes spying by current employees, former employees, computer hackers, and the full gamut of Cold War-style intelligence techniques. Traditional Espionage 1.Theft: Stealing information or products 2. Blackmail: using threat or intimidation to extort information 3. Mole planting: a double agent is embedded and gains the trust of a competing company 4. Eavesdropping: ranges from wiretapping phones to intercepting WIFI signals and emails. 5. Seduction: timeless technique using sexual offers to get information out of an individual.
  • 3. 6. Bribery: influence someone by offering money to gain information or prompt illegal action. 7. Foreign intelligence recruits: business intelligence agencies, such as Kroll, recruit former Cold War intelligence officers for commercial intelligence purposes. 8. Hiring competitors’ employees: hiring away critical employees from a competitor. 9. Bogus job interviews: Fake interview of candidates solely for the purpose of collecting key information on their current employers. 10. Bogus purchase negotiations: Companies pose as “buyers” in order to gain key information from a competitor. 11. Research under false pretenses: “Author” uses research paper as ruse to gain key information from a competitor. 12. Corporate communication intercepts: Intercepting telephone calls through public switch exchange. 13. Using familial connections: conversations with unsuspecting relatives working for competing companies. 14. Trade fair conversations: establishing a contact at trade fairs, particularly with experts having a high level of understanding of innovative technology. 15. Using commonalities: targeting individuals with common language, cultural heritage or religion to gain key information. 16. Naturalized citizens: appealing to naturalized citizens to provide information for patriotic or loyalty reasons or threatening family members in the home country. 17. Repatriating naturalized citizens: lure naturalized citizens back to the home country to employ process and methods used by the foreign company. 18. Government debriefing: government debriefing of its citizens to acquire information upon their return from a foreign country. 19. Dumpster diving: going through a competitor’s trash to find key information. This is the tactic that spawned the billion-dollar paper shredding industry. 20. Outsourcing/Delocalization: Foreign outsourcing can exploit methods, processes or information. Delocalizing under license often leads to a loss of security n countries unbound by copyright or trademark laws.
  • 4. 21. Front companies and organizations: foreign competitors may pose as software vendors or even nonprofit organizations to access a competitor’s trade secrets. 22. Joint venture & bidding process: foreign purchasers may prompt companies to provide a great deal of data in the bidding process, compromising valuable proprietary information. 23. Close proximity: joint ventures and strategic alliances may put unscrupulous personnel in close proximity with a firm’s key personnel or technology. 24. Mergers & acquisitions: mergers and acquisitions often allow a new company to acquire certain technologies not in their prior possession. 25. Negotiating: Buyers make excessive technology information demands during negotiations. 26. Third-party acquisition: This type of acquisition of companies and technologies often indicate a diversion or a transfer of technology. It’s possible that final recipients are actually embargoed individuals, businesses or countries that cannot otherwise get the technology themselves. 27. Import-export front: import/export companies may be involved with illegal exporting of sensitive or illegal documents, data or other items in the country of export. 28. Altered products or false certifications: domestic companies serve as fronts for getting export controlled products to an undisclosed end user by falsifying end-user certificates. 29. University research: industrial spies are often placed in university research facilities by government intelligence services or even by commercial competitors. Computer Espionage 30. Copy files: Easily copy computer files with miniature USB drives and pass them on to other individuals, businesses or governments. 31. Computer hacking: attempts to illegally gain access to a computer file or network or to do so without proper authorization. 32. Information requests: Requests for sensitive information, particularly over the internet, to unsuspecting low or mid-level personnel.
  • 5. Travel Espionage 33. Luggage or laptop theft: Foreign business people are targets for numerous tactics. Briefcases and luggage in hotel rooms can be searched for sensitive data and copied; the same applies to security checkpoints and border crossings. 34. Tapped room phones: Phone, Fax and WIFI intercepts are often employed through the traveler’s hotel phone or other point of contact. Visitor Espionage 35. Wired Visitors: Company visitors fitted with recording devices, video cameras and cameras. Beware of visitors who ask unusually expert questions or seek unnecessary access to restricted areas. 36. Conversation Detours: Conversation “detours” during interview or information conferences to subjects not agreed upon in advance and covering sensitive topics. 37. Visitor status: downplaying or disguising a visitor’s status or technical skill to gain access for a tour or visit. Conclusion As the list demonstrates, there is no shortage of corporate espionage tactics. I am sure there are countless others. Good luck out there! ______________________ Research References Dictionary of International Trade Handbook of the Global Trade Community 10th Edition, World Trade Press Broker, Trader, Lawyer, Spy: The Secret World of Corporate Espionage, Eamon Javers Secrets and Lies: The Rise of Corporate Espionage in a Global Economy. Georgetown Journal of International Affairs Santiago Cueto
  • 6. Counterespionage for American Business, Peter Pitorri Economic Espionage and Industrial Spying, Hedieh Nasheri