Corporate Espionage Defense: Don't Become a Statistic
One does not really know what to make of it, and this was not given any great importance till sometime back. This was due to the fact that communications were then based on direct methods over which people had control. Today with the advent of the Internet and the World Wide Web, the spread of information is very high, and often information is beyond the control of the people whose information is being spread. The importance of corporate espionage has been proved through the efforts of certain individuals who found out all the "hidden" information to meet a challenge. The methods depended on easily available information. At the same time, the technique is not new and has been the reason for the development of industry in United States. The practitioners are also now easily available from the retired employees of the defense services. Earlier, the efforts were restricted only to a limit of a few million dollars, but lately it is known to be worth more than 300 million dollars.
There are many methods of gathering the required information, but the best method is to use the trust of people and this can be gathered through confidence building techniques which are known to most people and practiced by some. At the same time, the building up of friendships to collect information is important with only some people in the organization, and these people have to be more careful than others. Certain industries are specifically more susceptible to this than others. At the same time, the extent of collecting information has now become so widespread that some people have made a profession of this. As with all other industries, only some are more susceptible to it than others. One of the critical activities is to tackle the victim who is going to provide the required information. Sometimes even wrong suspicion of leakage of information is made, and even some inefficient machines are being touted as the solution to this trouble.
The Proof:
It was done recently by a former U.S. intelligence officer when he was invited by a chief executive officer of a consumer electronics company from California to find out about his own company's new project for developing a new technology. The former intelligence agent was asked to find out the secret as the project was important for the company and expected to double the revenue base. He wanted to be sure that his competitors had not found out the secret, and he wanted the intelligence officer to find out about it. The intelligence officer and his employees went to the house of a senior officer of the company who had not been at home for the last three months and follow him when he went to work the next morning. At his place of working, there were a lot of other people who were working also. The people concerned were traced from the numbers of their cars, and from these find out their identities from the Web. Then they posed as employer representatives and pollsters. They were able to find out the top secret technology, its cost of development and the time of launch. All this was done within 30 days, and the CEO who had set this up as a test was shocked.
How old is corporate espionage?
Corporate espionage has been around for a long time, and the experts in the field say that it has only become professionalized now. In 1811 Francis Cabot Lowell went to England and was able to memorize the plans for the Cartwright loom while on a trip to a factory. This ultimately proved to be the blueprint for the industrial revolution in America. This particular individual got his ideas of espionage from the hackers and the stories on hacking he had done Forbes. This gave him knowledge about software piracy and music piracy on the Net and the structure of the gangs within cyberspace for this purpose. This gave him clear ideas of how hacking is done without people becoming aware of it. For corporate espionage people hire to break the law, and even if they do not break the law, they work as spies. The original training of most of these people came from the CIA or the DIA of the FBI. 2
The extent:
The business of espionage was not so big earlier, and in 1995, the level was only of the order of about $15 million, but by 2002, it had reached a figure of nearly $300 million. 3 The figures of costs of corporate espionage are very expensive on the shareholders of the U.S. companies and are in excess of $25 billion. 4 According to the FBI and similar organizations, industrial espionage costs U.S. companies from $24 billion to $100 billion yearly. 5
Gathering...
Industrial Espionage Information is an element that can make an astounding difference in terms of succeeding, or attaining a profit, and failure, or attaining a loss in the realm of business. According to Robinson (2003), when a trade secret is stolen, it can either level the playing field, or worse, tip it in favor of the competitor. This aspect is even more intricate as trade secrets are sought after not just
However, during the little more than 10 years of this research line, contradictory results have been found (Brynjolfsson, Hitt, & Yang, 2002). From the 1970s to 1980s, those companies that invested more in IT suffered a relative setback in the work factor productivity indexes. This paper will discuss the relationship between IT and competitive advantage in following content. We believe that IT is necessary to improve competitive position of
Media in America as the Fourth Estate: From Watergate to the Present During the 1970's, the role of the media changed from simply reporting the news to revealing serious political scandals (Waisbord, 2001). The media's role during Watergate was viewed as the mirror that reflected the most that journalism could offer to democracy: holding powers accountable for their actions. This became a trend in the American media and journalism had
National Security Implications of Transnational Organized Crime The paper deals with three important aspects, one the National Security, second the crime -- organized in many ways, and the third rogue nations that pose a threat. National security is to be understood in multiple contexts. Firstly the physical security of the nation from alien threats, and intrusions, secondly damages to vital infrastructure and thirdly anti-national activities by organizations that may lead to
Cybercrime, Cybercriminals, And Cybercops Cybercrime Cybercrime has long been perceived to represent new crimes arising from the emergence of technological advancement, but an examination of the history of cybercrime reveal that its roots are as ancient as the crimes of fraud, harassment, and malicious property damage. The history of cybercrime is reviewed briefly here, as are the challenges faced by law enforcement efforts to curb cybercrime. Some gains have been realized, such
Sometimes, it is even necessary to carry out certain clandestine operations like deceptions, clandestine collection of information, covert actions, and also the carrying out of the exercise of distributing disinformation or misleading information, which would mislead the suspected threat. The United States Intelligence Community is, as stated earlier, made up a number of different agencies. The Central Intelligence Agency is one of these. Also known popularly as the CIA, this
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now