Industrial Espionage: Motives and Threats of Industrial Espionage Defined US Espionage Acts of 1917 The US Economic Espionage Act of 1996 Uniform Trade Secrets Act State Laws Related to Trade Secrets and Espionage US Intelligence Agencies Federal Bureau of Investigation (FBI) Department of Homeland Security Office of Intelligence and Analysis State Department Intelligence Treasury Department Office of Intelligence Support Defense Security Service Determining the Value of Information Conditions for Industrial Espionage Motive Opportunity Rationalization Ability Trigger Espionage Threat from Foreign Governments Espionage Threat from Competitors Espionage Threat from Inside FBI Warning Signs of Insider Espionage Espionage Threat from Freelance Industrial Espionage Operatives Bibliography Espionage Tradecraft The Intelligence Cycle Planning and Direction Collection Processing Analysis and Production Dissemination Categories of Intelligence Collection and Tradecraft Human Intelligence (HUNINT) Methods of recruitment Imagery Intelligence (IMINT) Open Source Intelligence (OSINT) Signals Intelligence (SIGINT) Measure and Signatures (MASINT) Deception and Pretext Tradecraft Bibliography Cyber Espionage Cyber Industrial Espionage Defined Cyber Espionage Indicators Common Cyber Indicators Phishing and Spear Phishing Malicious Code Weak and Default Passwords Unpatched or Outdated Software Vulnerabilities Removable Media Cyber Espionage Tradecraft Reconnaissance Intrusion into the network Obtain user credentials Establish a backdoor Install multiple utilities Data exfiltration Maintaining persistence Use of PowerPoint as Cyber Espionage Tradecraft Insider Methods Counter Methods Internet-Based Social Networking Espionage Advanced Persistent Threats Cyber Espionage Threats and Targets Insiders Hackers Cyber Criminals Terrorists Organized Crime Foreign Intelligence Entities (Cyber Spies) Cyber Espionage Targets Cyber Espionage Countermeasures Cyber Espionage Awareness Training Cyber Espionage Terms Adware Anonymizing Proxies AutoRun Worm Chain Letter or Email Malware Cookies Data Theft, Leakage, or Loss Denial of Service Domain Name System Hijacking Fraudulent Antivirus Malware Internet Worm Keylogger Mobile Phone Malware Phishing Social Networking Threat Spyware Trojan Cyber Counterespionage Terms Anti-Malware Anti-Spam Application Control Encryption Firewall Intrusion Prevention System Network Access Control URL Content Filtering Bibliography Developing a Counterespionage Program Conducting a Counterespionage Risk Assessment The Counterespionage Plan Counterespionage Awareness Training Counterespionage When Traveling Travel Preparations Travel Itinerary Passport Visas Documents Luggage Transportation Hub Security Hotel Security Planning Arriving at and Departing from Hotel Check-in Counterespionage Security in a Foreign Country Personal Conduct Arrested! What Do I Do Now? Counterespionage Audits Counterespionage Investigations Inductive Reasoning Deductive Reasoning Counterespionage Technical Surveillance Counter Measures (TSCMs) Bibliography Protecting Proprietary and US Government Classified Information Identifying Information to be Protected Marking of Protected Information Secure Storage of Protected Information Class 1 Class 2 Class 3 Security Filing Cabinets Secure Destruction of Protected Information Methods of Destruction Paper Records Electronic Media Physical Destruction Removable Media Nonelectronic and Nonpaper Media Protection of US Classified Information Defense Security Service Industry Programs Partnership with Industry The Defense Security Service Vision and Mission Classification of US Government Information National Industrial Security Program Operating Manual Marking Classified Information Overall Classification Markings Automated Information Processing Requirements Portion Marking Point of Contact Marking Release to Foreign Countries/Organizations Access and Need to Know Protection of Classified Information When in Use Protection of Classified Information When in Storage Destruction of Classified Information Methods of Destruction of Classified Information Transmitting Classified Information Reproducing Classified Material Suspicious Espionage Activity Cleared Employee Reporting Requirements Check List of What to Report To Whom to Report Departure of Cleared Employees Required Security Briefing Manual for Physical Security Standards for Sensitive Compartmented Information Compartmented Information Facility Bibliography Physical Security Intrusion Detections System Electromagnetic Contacts Photoelectric Laser Glass Breakage Pressure-Sensitive Sensor Vibration Audio Ultrasonic Microwave Passive Infrared Capacitance Proximity Dual Chamber Smoke Detector Rate of Rise Heat Detector Natural Gas or Carbon Monoxide Detectors Water Flow Security Cameras Lens/Camera Transmission of the Signal Monitoring Digital Recording and Monitoring
Industrial Espionage : Developing a Counterespionage Program