Skip to main content

Updated Aug. 2022

Business Counterespionage is built of the following premises:

Business Espionage Top Ten Tips

  • Business is competitive.
  • Not everyone plays by the rules.
  • This is especially true during times of heated competition.

With these in mind, here are a few Business Counterespionage Tips that you can employ today. But first a few general thoughts, and answers to your questions.

Trust your instincts.

If you feel there is an eavesdropping attack or espionage problem at work, or personally, take it seriously. This is not a normal thought. The thought would not have crossed your mind if everything were fine, something is wrong. It’s time for Business Counterespionage 101.

Expect attacks.

You never hear about successful espionage or eavesdropping attacks. You’re not supposed to. It’s a covert act. You only hear about failed espionage. This apparent quiet gives victims a false sense of security. Not only is information theft prevalent and invisible, but it is also silent. Discovery relies heavily on the victim’s intuition and preparedness to handle the problem.

Spying is a common activity.

Due to the covert nature of spying, the exact extent of it is not known. We can use failed espionage attempts as a gauge, however. They reveal over and over again that the problem does exist. Also, the plethora of electronic surveillance equipment being openly sold on the Internet, in “spy shop” stores, and “executive toy” catalogs gives us a good indication of the magnitude and types of eavesdropping attacks.

Eavesdropping attacks and espionage can cripple or kill a company.

Documented cases of eavesdropping attacks and espionage have shown repeatedly that, left unchecked, they will eventually desiccate a bottom line, wipe out a competitive advantage, and leave a company a shell of its former self.

The law only protects those who protect themselves.

Companies can’t just wander into the courtroom crying, “They stole my business secrets” and expect help. They have to show the extraordinary business counterespionage steps taken (and maintained) to elevate their business information to business secret status.

You are expected to prevent espionage.

Information is like any other corporate asset. Management has a responsibility to protect it. Stockholders can claim negligence and hold company executives responsible if this asset is lost due to improper protection efforts. If you don’t have a business counterespionage strategy, get one soon.

Who are these snoops?

Snoops can be competitors, vendors, investigators, business intelligence consultants, colleagues vying for positions, overbearing bosses, suspicious partners, the press, labor negotiators, government agencies, activists, terrorists. The list is long.

Why would I be a target?

Money and power are the top two reasons behind illegal surveillance. If anything you say or write could increase wealth or influence for someone else, you are a target. Sex is a close third.

Is snooping common?

Yes. The news is full of stories about stolen information. In fact, many news stories themselves begin with leaks.

Can I protect myself?

Yes. Espionage and eavesdropping attacks are preventable. When you know what an eavesdropping attack is, and all of the vulnerabilities, you can take the proper security precautions. Some spy tricks are very obvious if you stop to think about them. Some are clever abuses of the new technology we live with every day. All are devastating. Time has shown that many of the same tricks are used successfully over and over again.

Prepare to fight back.

Presented, for your edification and elucidation-in no particular order…

Ten Business Counterespionage Tips

1 – Trash Trawling

Business Espionage Top Ten Tips - Dumpster Diver

Dumpster diving, waste archaeology, or trashing, all refers to rifling through garbage in an effort to cull valuable information. This is believed to be the number one method of business and personal espionage.

In and of itself, stealing garbage is legal. In 1988, the U. S. Supreme Court confirmed that there is no expectation of privacy or ownership once an item is left for garbage pickup.

Scraps of seemingly useless information are synergistically related. The business counterespionage process is one of reducing the availability of these puzzle parts. Shredding all waste paper is a major step in the protection process.

Here are a few ways  to protect yourself from trash trawlers:

  • Encourage the destruction of all waste paper.
  • Purchase the appropriate shredders for your needs, but make sure it at least has crosscut capabilities.
  • If you have a lot of computer paperwork and large volume waste, you need to use a central bulk shredder, or outside shredding service.
  • Do not entrust wastepaper destruction to paper recycling vendors unless you can watch them shred. It is best to destroy it before recycling. Don’t forget: you also need shredders next to copiers and in the home offices of executives and associates.
  • Snoops love it when confidential papers are saved in a bucket under the desk. Don’t allow this practice.

The big shredder mistake: Buying just one large shredder for everyone to use. Reason: Not everyone will use it.

Why? Some people are too busy to be bothered with going to the BIG shredder.

Top Shredding Business Counterespionage Tip:

Purchase several convenient desk-side cross cut shredders. This is one perk or status symbol that has a very positive payback.

Value-Added Business Booster: Some organizations actually promote their extensive use of shredders to protect their clients’ privacy interests.

2 – Bugs, Taps, & Video Zaps

Although most snooping involves other methods listed in this briefing, eavesdropping attacks through electronic surveillance are the most devastating spy trick there is. Very private – and irrefutable secrets – are the target of electronic surveillance attacks.

Common mistake… Saying, “Oh, I’m just being paranoid,” when you suspect an eavesdropping attack using electronic surveillance. Think… You wouldn’t be suspicious if everything were fine. Something is wrong.

Course of Action…

  • Do not discuss your suspicions with others unless they have a real need to know.
  • Do not discuss suspicions in suspected areas.
  • Do not attempt a do-it-yourself solution.
  • Do not waste money buying spy buster toys.
  • Seek professional guidance without delay.

Contrary to what you see on television, in the movies or in catalogs, investigating illegal eavesdropping attacks  is intensive work requiring expensive equipment and specialized knowledge. You should expect a professional sweep team to have about $250,000+ dollars invested in their instrumentation. Their personnel will have extensive experience with many types of eavesdropping attacks, as well as in physical security, corporate investigations, communications electronics, and computer networks.

Hint: Be careful when checking the Internet for someone to assist you. The web is spidered with faceless websites and anonymous “experts.” Carefully vet who you will be trusting.

Business Counterespionage Tip: Get a referral from a security professional. Contact a corporate security director or professional security organization for a knowledgeable recommendation. Although hiring “the best” might be more costly initially, it will be worth the effort and will save you time and money in the long run.

3 – The Drop-by Spies

Check – and photocopy – the credentials and work orders of anyone performing technical work in or around your offices. Double-check. Verify the work was actually requested and is necessary. This includes:

  • telecommunications technicians
  • computer technicians
  • office equipment repair persons
  • paper recyclers
  • cleaning crews
  • electricians

Have someone who represents your interests accompany visitors while they are on your property. If possible, have them complete their work during normal business hours. Outside contractors and unauthorized company employees should never be allowed to roam unescorted within areas containing sensitive information.

One professional snoop brags openly that any building can be entered at any time, simply by posing as the air conditioning / heating guy. His props include a clipboard with forms and an industrial thermometer. Optional: a 2-way radio and a hard hat. If challenged, he threatens not to come back for three weeks. Busy schedule, you know. No one wants responsibility for denying this guy entry.

More business counterespionage tips…

  • Check your locks and alarm system regularly. Make sure each component still operates as expected. It is surprising how many effective-looking broken locks and alarm sensors are relied upon for protection. Physical security hardware effectiveness decays with time.
  • If key control has long since gone out of control, tackle the problem now. Change locks and set up a system which will work. Consider biometric access for high security areas.
  • When seeking assistance with security matters, be sure to hire consultants who does not also sell products, and who will not accept remuneration from security solutions they recommend. Members of the International Association of Professional Security Consultants are signatories to a Code of Ethics which includes this provision. You can find their membership list here.

Continue reading the rest of the Top Ten Business Counterespionage Tips Competitors Don’t Want You to Know – Part II

###

Murray Associates is an independent security consulting firm, providing eavesdropping attack detection and counterespionage services to business, government, and at-risk individuals.

Headquartered in the New York metropolitan area, a Murray Associates team can assist you quickly, anywhere in the United States, and internationally.

EXTRAS: • More security tips, spy and privacy news at spybusters.blogspot.com . Be sure to sign up for the free email updates. • Concerned about Spy Cameras? Learn how to detect them.

close

Helpful? Please let others know.

error

Helpful? Please help others.

RSS
Follow by Email
YouTube
YouTube
LinkedIn
LinkedIn
Share