Security Technology Executive

MAY-JUN 2018

Issue link:

Contents of this Issue


Page 16 of 79

www. • May/June 2018 • SECURIT Y TECHNOLOGY E XECUTIVE 17 » CI 'thinking' expands the standard security protective aperture by considering a broader scope of potential collectors who might be targeting those valuable items, as well as the techniques they use to accomplish that collection, which can be sophisticated and persistent. « hoping to gain an edge in their market by stealing specific production data that led to greater economies of scale. In 2015 the FBI's Counterintelligence Division said in a news report that there was a sharp spike in the number of espio- nage investigations by the agency, citing a 53 percent increase in caseloads and with state- sanctioned corporate theft by China at the core of the problem. It added that spies of Chinese origin were using dramatic tactics to steal critical information from U.S. companies. At the time, Beijing was cited as the most predominant threat facing the U.S.; an FBI survey of 165 U.S. companies found China was the perpetrator in 95 percent of economic-espionage cases. Global Threats to U.S. Businesses Heighten Although the exact dollar figure on the costs and losses to U.S. businesses from economic espionage is difficult to document, the amounts are substantial. In a 2013 report by the Blair Hunts- man IP Commission, The Report of the For corporate businesses, information protection is critical and the risks and threats keep changing. Image Courtesy of Commission on the Theft of American Intellectual Property, it estimated the total losses in the "hundreds of billions" each year. Those numbers did not take into consideration companies who either do not detect, do not report or under- report losses tied to economic espionage. Those responsible for the theft are usually foreign competitors or govern- ments looking for trade secrets, produc- tion methods, innovations and even insights into labor or trade disputes. In 2016, the Office of the Director of National Intelligence (ODNI) released the National Counterintelligence Strategy of the United States 2016 to address "the diverse threats and challenges which include not only foreign intelligence ser- vices and their surrogates but also terror- ists, cyber intruders, malicious insiders, transnational criminal organizations and international industrial competitors with known or suspected ties to these entities." The National Counterintelligence Strat- egy of the United States of America 2016 (Strategy) was developed in accordance with the Counterintelligence Enhancement Act of 2002 (Pub. L. No. 107-306, 116 Stat. 2383 (as amended) codified at 50 U.S.C. sec. 3383(d)(2)). The Strategy sets forth how the United States (U.S.) Government will identify, detect, exploit, disrupt, and neutralize foreign intelligence entity (FIE) threats. It provides guidance for the coun- terintelligence (CI) programs and activities of the U.S. Government intended to mitigate such threats. According to NCSC, foreign intelli- gence entities, which may include foreign governments, corporations, and their proxies, are actively targeting informa- tion, assets and technologies vital to both U.S. national security and global competitiveness. Every business, corpo- ration and every vertical market may be at risk from these new threats, and now, establishing in-house counterintelligence (CI) programs are being considered a nec- essary proactive measure.

Articles in this issue

Links on this page

Archives of this issue

view archives of Security Technology Executive - MAY-JUN 2018