Corporate Espionage  THE GAME OF CORPORATE SURVIVAL & CONQUEST
Corporate Espionage <ul><li>Corporate espionage describes activities such as theft of trade secrets, bribery, blackmail, a...
Corporate Espionage <ul><li>Theft of trade secrets or economic espionage is a federal criminal offense as defined by the <...
The Espionage Threat <ul><li>Sources of Information </li></ul><ul><li>Documents </li></ul><ul><li>Draft Documents </li></u...
The Espionage Threat <ul><li>Sources of Information </li></ul><ul><li>Formal Meeting </li></ul><ul><li>Conferences and Tra...
The Espionage Threat Foreign Intelligence Agencies Hostile Nations <ul><li>Russia </li></ul><ul><li>China </li></ul><ul><l...
Tools That Can Be Used In Attacks
The Best Tool Used In A Attack
How To Prevent Attacks <ul><li>Floor Marshalls  </li></ul><ul><li>Secure WiFi And Network Connections </li></ul><ul><li>Li...
How To Prevent Attacks <ul><li>Just remember these people do there homework. They more then likely have someone working on...
Questions? <ul><li>If you have any questions feel free to ask. </li></ul><ul><li>Alexander Berta </li></ul><ul><li>Informa...
Upcoming SlideShare
Loading in...5
×

Corporate Espionage

1,886

Published on

Published in: News & Politics
0 Comments
2 Likes
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
1,886
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
0
Comments
0
Likes
2
Embeds 0
No embeds

No notes for slide
  • USB Wristbands can be concealed as a regular wrist band, but also can store data from 256mb to 1gig. Laptops can be used to break into computer systems, sniff wireless networks, and browse networks. Digital Cameras and Cellphones can be used to take pictures of documents. Dumpsters people never think about what they trash. Most documents are never shredded and these can contain bank info, SS numbers, and fragile info.
  • You VS Them. People are a gold mine for information. Just remember “Luck Beats Skill Everyday”. The attacker will study what they need to get if they are going into a company. The will more then likely blend in with everyone and you wont know who they are or what they look like. How do they get the info. They just talk to people its more of a friend business friend relationship. Its harder to decline a friend info then it is to tell a stranger “NO”. People are like a gold mine. Remember what you tell your kids. “Stranger Danger” instead of “Phone a parent” you used “Phone the boss”.
  • The attacker normally has friends or will make friends that are in the workplace. They will figure out the patterns of these people do. They may even have resource contacts that they can use to get into a company and forged documents that will make them seem they are better then what they are.
  • Corporate Espionage

    1. 1. Corporate Espionage THE GAME OF CORPORATE SURVIVAL & CONQUEST
    2. 2. Corporate Espionage <ul><li>Corporate espionage describes activities such as theft of trade secrets, bribery, blackmail, and technological surveillance. As well as spying on commercial organizations, governments can also be targets of commercial espionage—for example, to determine the terms of a tender for a government contract so that another tenderer can underbid. </li></ul><ul><li>Industrial espionage is most commonly associated with technology-heavy industries, particularly the computer and automobile sectors. </li></ul><ul><li>Espionage takes place in many forms. In short, the purpose of espionage is to gather knowledge about (an) organization(s). A spy may be hired, or may work for oneself. </li></ul>
    3. 3. Corporate Espionage <ul><li>Theft of trade secrets or economic espionage is a federal criminal offense as defined by the </li></ul><ul><li>Economic Espionage Act of 1996. </li></ul><ul><li>(Title 18 UCS 1831) </li></ul>
    4. 4. The Espionage Threat <ul><li>Sources of Information </li></ul><ul><li>Documents </li></ul><ul><li>Draft Documents </li></ul><ul><li>Working or Scrap Paper </li></ul><ul><li>Computer Based Information </li></ul><ul><li>Photographs – Maps - Charts </li></ul>
    5. 5. The Espionage Threat <ul><li>Sources of Information </li></ul><ul><li>Formal Meeting </li></ul><ul><li>Conferences and Trade Shows </li></ul><ul><li>Casual Conservations </li></ul><ul><li>Dumpster Diving </li></ul>
    6. 6. The Espionage Threat Foreign Intelligence Agencies Hostile Nations <ul><li>Russia </li></ul><ul><li>China </li></ul><ul><li>North Korea </li></ul><ul><li>Cuba </li></ul><ul><li>Terrorist Organizations </li></ul><ul><li>Third World Countries </li></ul><ul><li>Organized Crime </li></ul><ul><li>Hackers </li></ul>
    7. 7. Tools That Can Be Used In Attacks
    8. 8. The Best Tool Used In A Attack
    9. 9. How To Prevent Attacks <ul><li>Floor Marshalls </li></ul><ul><li>Secure WiFi And Network Connections </li></ul><ul><li>Limited Items In The Work Place </li></ul><ul><li>Paper Shredders </li></ul><ul><li>Restricted Access </li></ul><ul><li>These are just some of the things that can help you in the work place. </li></ul>
    10. 10. How To Prevent Attacks <ul><li>Just remember these people do there homework. They more then likely have someone working on the inside or have been in your work place before. These people are not stupid, but very smart as well. </li></ul>
    11. 11. Questions? <ul><li>If you have any questions feel free to ask. </li></ul><ul><li>Alexander Berta </li></ul><ul><li>Information Warfare </li></ul><ul><li>[email_address] </li></ul><ul><li>931.338.5994 </li></ul><ul><li>931.305.0198 </li></ul>

    ×