"Espionage Prevention and Investigation" by Daniel J. Benny

18 downloads 59 Views 33KB Size Report
including our allies, will continue to spy on the United States to obtain vital .... time to provide update training and remind employees of their obligations.
Espionage Prevention And Investigation By Daniel J. Benny, M.A., CPP, PCI, CFE, CCO, CLET Private Investigator and Security Consultant "Espionage is not a game; it’s a struggle we must win if we are to protect our freedom and our way of life." These words spoken by President Ronald Regan nearly twenty years ago during a November 30, 1985 radio speech may not seem relevant today since the "cold war," has been won. However, in the world of industrial espionage, foreign intelligence and terrorism, it is never over. At stake are secrets essential to our national security and research projects. Many countries, including our allies, will continue to spy on the United States to obtain vital information. Targets include private industry and educational institutions which work on government projects, along with those that conduct research related to high-tech industrial applications. Institutions that conduct their own research are always a target. Theft of trade secrets or economic espionage is a federal criminal offense as defined by the Economic Espionage Act of 1996. It imposes up to a 15-year prison term and or a maximum $5,000,000.00 fines on any person and a $10 million fine on any organization that steals or destroys a trade secret of value with intent to benefit any foreign power. (Title 18 UCS 1831) The act imposes a 10 year prison term and or maximum $250,000.00 fine on any person and $5 million fine on any organization who knowingly steals or destroys any trade secret with intent to economically benefit anyone other than the owner and or injures the owner of the trade secret. (Title 18 USC 1832) The act also allows the forfeiture to the U.S. government of proceeds or property derived from economic espionage and may require forfeiture of property used to commit economic espionage. Espionage and the theft of protected company information is also a violation of state law as exemplified in the Crimes Code of Pennsylvania, Section 3930, Theft of Trade Secrets. Under Pennsylvania law theft of trade secrets is a felony offense. The best source of intelligence by a hostile intelligence agency is to use employees and students who have access to the information they seek. This allows easy access and in many cases, longterm access to information with low risk to the hostile intelligence agency. The best and first line of defense and in conducting investigations is to be alert to the signs of espionage through the behavior of employees. During the investigation be alert as to why an individual may take part in such activity. This could be a change in ideology and they now have a negative view of the organization, and the United States Government. They may be supportive of a competitor, foreign country or even a terror organization. Individuals who express inquisitiveness or attempt to gain access to information in areas in which they do not have a need to know could be a risk to your institution as they may be seeking such information for unlawful reason. Individuals seeking to gain unauthorized information may also arrive for work early, work through lunch or stay late in an attempt to gain access to the information they seek. Many employees involved in long-term espionage will not even take vacation in fear that their activities will be uncovered if absent. The photocopying, photographing or the removing sensitive information especially with evidence of sudden unexplained financial gain is an obvious sign of espionage. As Sherlock Holmes stated in the case of Sliver Blaze, “There is nothing more decisive than an obvious fact.” Money in nearly all of the espionage cases brought to light is the number one reason. This can be because an individual is a debtor just seeking to change their lifestyle with additional money. Sympathy for a cause or political belief is also attributed to such activity. This is especially true today in cases where the individual is aligned and supportive of a terror organization. Revenge may also be the motive of a disgruntled employee or student who feels the organization wronged

them. Blackmail is a common motive should an employee be lured into a compromising position. This is a method used by intelligence agencies in order to obtain access to information they seek. Sex and or love, while not the most common motive, can lead to the theft of information. In this type of situation the employee or student is often manipulated by their handler with sex or love as the tool and the love is of course one-sided. There have been times when real love has led to an individual betraying their beliefs and country. The addictions of life such as drugs, gambling, credit card use or even sex can lead to the theft of information to support such habits or addictions. The organization must identify what information is to be protected and for how long and develop a review program to determine if the information is current and needs to be protected. It is also important to determine the monetary or competitive value of your information. If information is stolen, for effective prosecution and recovery of damages, there needs to be a monetary value for the information and/or impact of its loss. Ensure that classified NISPOM or company confidential information is properly marked and staff, as part of the education program, understands this requirement. In addition to proper marking the organization must ensure that the information is properly stored and secured in authorized security containers. Combination and other locks of such containers are to be changed frequently and when required. Proper disposal procedures to shred material or pulp sensitive or classified information needs to be in place as well as effective disposal equipment. Conduct pre-employment and periodic background investigations of staff that will have access to company confidential information. Ask new employees if they are obligated under any confidentiality or nondisclosure agreements and obtain nondisclosure agreements from employees, vendors and others with access. Continue to provide training to staff with regard to the protection of information. During the annual performance review would be an excellent time to provide update training and remind employees of their obligations. By having a strong education program covering the vital information as discussed, you can protect your institution's research and information and prevent espionage that would affect our country. There are many sources from which to obtain information in the establishment of an effective counter-espionage training program. Many colleges and universities have a degree programs with a major in intelligence. Organizations that have information covered under NISPOM can obtain educational information from the Defense Security Service Academy. They offer ready to use educational programs in the form VHS, DVD, power point and publications. An additional source of information is the ASIS International Academic, the Business Espionage Control & Countermeasures Association and the Association of Former Intelligence Officers. Professional Organization Web Pages ASIS International http://asisonlime.org Association of Former Intelligence Officers http://www.afio.com Business Espionage Controls and Countermeasures Association http://www.BECCA-online.org Naval Intelligence Professionals http://www.navintpro.org

Selected Readings 101 Questions and Answers About Business Espionage, Johnson, 2003, BECCA Business Intelligence A Primer, Cooper, 1996, Executive Protection Institute Business Intelligence and Espionage, Green, 1966, Dow Jones-Irwin Confidential, Noland, 1999, Harper Business Countering Industrial Espionage, Heims, 1982, 20th Century Security Education LTD Director of Central Intelligence Directive (Manual for Physical Security Standards for Sensitive Compartmented Information Facilities), 1999, Central Intelligence Agency National Industrial Security Program Operating Manual, DOD, 2003 Safeguarding Proprietary Information, ASIS Reprints Series, 1994, ASIS International Trends in Intellectual Property Loss Survey, Heffernan and Swartwood, 1996, ASIS International Corporate And Economic Espionage, Daniel J. Benny http://hometown.aol.com/djbennypi/