Cart
Free US shipping over $10
Proud to be B-Corp

Industrial Espionage Summary

Industrial Espionage: Developing a Counterespionage Program by Daniel J. Benny, PhD (Embry-Riddle Aeronautical University Worldwide and Private Investigator & Security Consultant, Harrisburg, Pennsylvania, USA)

The FBI estimates that billions of U.S. dollars are lost each year to foreign and domestic competitors who deliberately target industrial trade secrets. And, although today's organizations face unprecedented threats to the security of their proprietary information and assets, most books on industrial espionage fail to supply guidelines for establishing a program to prevent and thwart such threats.

Filling this need, Industrial Espionage: Developing a Counterespionage Program provides complete coverage of how to ensure the protection of company proprietary information and assets, including how to develop an effective corporate counterespionage program. The book presents the insights of a former veteran of the Office of Naval Intelligence.

The book examines the motives behind industrial espionage and illustrates the variety of spy tradecraft utilized. Through the use of real-world case examples, the author provides guidelines to determine the current threat level to your organization's proprietary assets as well as the physical security countermeasures, policy, and procedures that must be in place to establish an effective counterespionage program.

Outlining the day-to-day aspects of protecting sensitive data and trade secrets in a corporate security setting, this book is suitable for organizations that have proprietary information and assets to protect, businesses that have operations or partner with companies overseas such as China, organizations that work with the federal government on classified projects, security and counterespionage professionals, and university degree programs in Homeland Security and intelligence.

Industrial Espionage Reviews

... takes the security novice and quickly brings them up to speed on what exactly industrial espionage is and how to develop effective counterespionage programs.
-General Aviation Security

The overall visual presentation is professional with photographs by the author throughout. This book is recommended for general readers interested in protecting intellectual property and those with a specific interest in industrial espionage issues.
-Security Management

Benny has covered every angle-guarding against cyber-espionage, being wary when in hotels and travelling abroad, protecting classified information (whether paper records or in digital form) and what locks, filing cabinets, and windows you might want.
-Professional Security

About Daniel J. Benny, PhD (Embry-Riddle Aeronautical University Worldwide and Private Investigator & Security Consultant, Harrisburg, Pennsylvania, USA)

Daniel J. Benny, PhD, CPP, PCI, CFE, CCO, is a licensed private investigator and security consultant. He holds a PhD in criminal justice from Capella University, a master's degree in aeronautical science from Embry-Riddle Aeronautical University, an MA in security administration from Vermont College of Norwich University, a BA in security administration from Alvernia College, an associate's degree in both commercial security and police administration from Harrisburg Area Community College; and a diploma in naval command and staff from the United States Naval War College. He is board certified by ASIS International in security management as a certified protection professional (CPP) and as a professional certified investigator (PCI), a certified fraud examiner (CFE) by the Association of Certified Fraud Examiners, and a certified confidentiality officer (CCO) by Business Espionage Controls and Countermeasures Association. He is the author of the books General Aviation Security: Aircraft, Hangars, Fixed Base Operators, Flight Schools and Airports, and Industrial Espionage: Developing a Counterespionage Program. He is also coauthor of the book The Complete Guide to Physical Security. He has authored more than 300 articles on security administration, intelligence, aviation security, private investigation, and cultural property security topics. Dr. Benny served as a U. S. Naval intelligence officer with duty at the Office of Naval Intelligence, Naval Criminal Investigative Service, Willow Grove Naval Air Station, Fleet Rapid Support Team and Central Intelligence Agency. He also served as director of protective services for the Pennsylvania Historic and Museum Commission and a U.S. Navy police chief.

Table of Contents

Industrial Espionage: Motives and Threats of Industrial Espionage Defined
US Espionage Acts of 1917
The US Economic Espionage Act of 1996
Uniform Trade Secrets Act
State Laws Related to Trade Secrets and Espionage
US Intelligence Agencies
Federal Bureau of Investigation (FBI)
Department of Homeland Security Office of Intelligence and Analysis
State Department Intelligence
Treasury Department Office of Intelligence Support
Defense Security Service
Determining the Value of Information
Conditions for Industrial Espionage
Motive
Opportunity
Rationalization
Ability
Trigger
Espionage Threat from Foreign Governments
Espionage Threat from Competitors
Espionage Threat from Inside
FBI Warning Signs of Insider Espionage
Espionage Threat from Freelance Industrial Espionage Operatives
Bibliography

Espionage Tradecraft
The Intelligence Cycle
Planning and Direction
Collection
Processing
Analysis and Production
Dissemination
Categories of Intelligence Collection and Tradecraft
Human Intelligence (HUNINT)
Methods of recruitment
Imagery Intelligence (IMINT)
Open Source Intelligence (OSINT)
Signals Intelligence (SIGINT)
Measure and Signatures (MASINT)
Deception and Pretext Tradecraft
Bibliography

Cyber Espionage
Cyber Industrial Espionage Defined
Cyber Espionage Indicators
Common Cyber Indicators
Phishing and Spear Phishing
Malicious Code
Weak and Default Passwords
Unpatched or Outdated Software Vulnerabilities
Removable Media
Cyber Espionage Tradecraft
Reconnaissance
Intrusion into the network
Obtain user credentials
Establish a backdoor
Install multiple utilities
Data exfiltration
Maintaining persistence
Use of PowerPoint as Cyber Espionage Tradecraft
Insider Methods
Counter Methods
Internet-Based Social Networking Espionage
Advanced Persistent Threats
Cyber Espionage Threats and Targets
Insiders
Hackers
Cyber Criminals
Terrorists
Organized Crime
Foreign Intelligence Entities (Cyber Spies)
Cyber Espionage Targets
Cyber Espionage Countermeasures
Cyber Espionage Awareness Training
Cyber Espionage Terms
Adware
Anonymizing Proxies
AutoRun Worm
Chain Letter or Email Malware
Cookies
Data Theft, Leakage, or Loss
Denial of Service
Domain Name System Hijacking
Fraudulent Antivirus Malware
Internet Worm
Keylogger
Mobile Phone Malware
Phishing
Social Networking Threat
Spyware
Trojan
Cyber Counterespionage Terms
Anti-Malware
Anti-Spam
Application Control
Encryption
Firewall
Intrusion Prevention System
Network Access Control
URL Content Filtering
Bibliography

Developing a Counterespionage Program
Conducting a Counterespionage Risk Assessment
The Counterespionage Plan
Counterespionage Awareness Training
Counterespionage When Traveling
Travel Preparations
Travel Itinerary
Passport
Visas
Documents
Luggage
Transportation Hub Security
Hotel Security
Planning
Arriving at and Departing from Hotel
Check-in
Counterespionage Security in a Foreign Country
Personal Conduct
Arrested! What Do I Do Now?
Counterespionage Audits
Counterespionage Investigations
Inductive Reasoning
Deductive Reasoning
Counterespionage Technical Surveillance Counter Measures (TSCMs)
Bibliography

Protecting Proprietary and US Government Classified Information
Identifying Information to be Protected
Marking of Protected Information
Secure Storage of Protected Information
Class 1
Class 2
Class 3
Security Filing Cabinets
Secure Destruction of Protected Information
Methods of Destruction
Paper Records
Electronic Media
Physical Destruction
Removable Media
Nonelectronic and Nonpaper Media
Protection of US Classified Information
Defense Security Service
Industry Programs Partnership with Industry
The Defense Security Service Vision and Mission
Classification of US Government Information
National Industrial Security Program Operating Manual
Marking Classified Information
Overall Classification Markings
Automated Information Processing Requirements
Portion Marking
Point of Contact Marking
Release to Foreign Countries/Organizations
Access and Need to Know
Protection of Classified Information When in Use
Protection of Classified Information When in Storage
Destruction of Classified Information
Methods of Destruction of Classified Information
Transmitting Classified Information
Reproducing Classified Material
Suspicious Espionage Activity
Cleared Employee Reporting Requirements
Check List of What to Report
To Whom to Report
Departure of Cleared Employees
Required Security Briefing
Manual for Physical Security Standards for Sensitive Compartmented Information
Compartmented Information Facility
Bibliography

Physical Security
Intrusion Detections System
Electromagnetic Contacts
Photoelectric
Laser
Glass Breakage
Pressure-Sensitive Sensor
Vibration
Audio
Ultrasonic
Microwave
Passive Infrared
Capacitance Proximity
Dual Chamber Smoke Detector
Rate of Rise Heat Detector
Natural Gas or Carbon Monoxide Detectors
Water Flow
Security Cameras
Lens/Camera
Transmission of the Signal
Monitoring
Digital Recording and Monitoring
Motion Detection
Determining Total System Cost
System Design Cost
System Installation Cost
System Operational Cost
IT Related Cost
Maintenance Cost
Replacement Cost
Cost-Benefit Analysis
Cost of Loss
The Cost of Prevention
Return on Investment (ROI)
Total Cost of Ownership (TCO)
Cost Factor
Locks, Key Control, and Access Control
Mechanical Locks
Wafer Tumbler Lock
Dial Combination Lock
High Security Dead Bolt Lock
Card Access Electrified Locks
Exit Locks
Master Locking System
Control of Keys and Locking Devices
Master Key
Duplication of Keys
Lost Keys
Disposition of Employee Keys upon Transfer or Termination
Security Containers
Class 4
Class 5
Class 6
Security Filing Cabinets
Security Barriers and Fencing
Security Lighting
Incandescent
New Fluorescent (To Replace Incandescent)
Quartz
Mercury Vapor
Sodium Vapor
Protection of Windows and Utility Ports
Annealed Glass
Wire Reinforced Glass
Tempered Glass
Laminated Glass
Annealed Glass with Security Film
Acrylic
Lexan
Bullet Resistant Glass
Bullet Resistant Acrylic
Lexgard
Radio Frequency Identification, Magnetometers and X-Ray
Magnetometers
X-Ray
Bibliography

Security Department

Chief Security Officer
Determining the Size of the Security Department
Mission of the Security Department
Legal Authorization to Protect the Facility
Pedestrian Stops
Profile and Security Threat
Size of the Facility
Hours of Operation
Number of Employees and Visitors
Proprietary Security Force
Contract Security Force
Security Department Uniforms and Identification
Staff and Visitor Identification
Security Department Protective Equipment
Handcuffs
Oleoresin Capsicum Spray
Batons
Firearms
Use of Force Continuum
Security Department Vehicles
Lighting
Security Department Communications
Security Department Reports
Incident/Complaint Report and Continuation Report
Daily Activity Report
Protection of Security Department Information
Ethics and Conduct
Ethics
Security Department Training
Professional Security Certifications
Security Patrols
Apprehension and Arrest
Bibliography

The Human Resources Department and Counterespionage
Position Description and Separation of Functions
Pre-Employment Background Investigation
Criminal Records
Civil Records
Driving Records
Employment History
Professional Licenses and Certifications
Education
Memberships
Financial History
Military Service
Personal and Professional References
Residence Inquiry
Family
Medical
Internet Search
Polygraph
Periodic and Promotion Update Counterespionage Investigation
Non-Disclosure Non-Competitive Agreements
Employee Exit Interview
Bibliography

Counterespionage Resources
Private Professional Intelligence Organizations
Association of Former Intelligence Officers
Business Espionage Controls and Countermeasures Association
International Association for Intelligence Education
Purpose
International Spy Museum
Naval Intelligence Professionals
Society of Competitive Intelligence Professionals
Private Professional Security Organizations
ASIS International
ASIS Certifications
Association of British Investigators
Association of Certified Fraud Examiners
National Council of Investigation and Security Services
World Association of Detectives
US Government Security and Intelligence Agencies
Defense Security Service
Mission
Vision
Divisions
Federal Bureau of Investigation
FBI Mission
Priorities

Appendices
Index

Additional information

CIN1466568143G
9781466568143
1466568143
Industrial Espionage: Developing a Counterespionage Program by Daniel J. Benny, PhD (Embry-Riddle Aeronautical University Worldwide and Private Investigator & Security Consultant, Harrisburg, Pennsylvania, USA)
Used - Good
Hardback
Taylor & Francis Inc
20130918
232
N/A
Book picture is for illustrative purposes only, actual binding, cover or edition may vary.
This is a used book - there is no escaping the fact it has been read by someone else and it will show signs of wear and previous use. Overall we expect it to be in good condition, but if you are not entirely satisfied please get in touch with us

Customer Reviews - Industrial Espionage