ebook img

Industrial Espionage and Technical Surveillance Counter Measurers PDF

137 Pages·2016·5.583 MB·English
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview Industrial Espionage and Technical Surveillance Counter Measurers

Iosif Androulidakis  Fragkiskos – Emmanouil Kioupakis Industrial Espionage and Technical Surveillance Counter Measurers Industrial Espionage and Technical Surveillance Counter Measurers Iosif Androulidakis Fragkiskos – Emmanouil Kioupakis Industrial Espionage and Technical Surveillance Counter Measurers Iosif Androulidakis Fragkiskos – Emmanouil Kioupakis Researcher Akmi Metropolitan College Pedini Ioannina , Greece Maroussi , Greece ISBN 978-3-319-28665-5 ISBN 978-3-319-28666-2 (eBook) DOI 10.1007/978-3-319-28666-2 Library of Congress Control Number: 2015960240 Springer Cham Heidelberg New York Dordrecht London © Springer International Publishing Switzerland 2016 T his work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part of the material is concerned, specifi cally the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfi lms or in any other physical way, and transmission or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed. T he use of general descriptive names, registered names, trademarks, service marks, etc. in this publication does not imply, even in the absence of a specifi c statement, that such names are exempt from the relevant protective laws and regulations and therefore free for general use. T he publisher, the authors and the editors are safe to assume that the advice and information in this book are believed to be true and accurate at the date of publication. Neither the publisher nor the authors or the editors give a warranty, express or implied, with respect to the material contained herein or for any errors or omissions that may have been made. Printed on acid-free paper S pringer International Publishing AG Switzerland is part of Springer Science+Business Media (www.springer.com) Pref ace Industrial Espionage and Technical Surveillance Countermeasures Undoubtedly, the protection of intellectual property and confi dential data in the information era is vital, not only for the evolution of a company but also for just keep- ing it “alive” in the modern, extremely competitive market. Unlike the “traditional” espionage that is conducted for national security purposes, the practice of collecting confi dential information without authorization from its owner for commercial or fi nancial purposes is called industrial, corporate, commercial, or economic espionage. Despite the fact that the techniques that information “spies” use and the industrial espionage incidents themselves look like they have stemmed out of a movie, the truth is that it is a real, existing problem, more severe than ever. This book tries to shed more light on this subject and inform the readers about the risks involved as well as about the ways they can protect themselves and their companies. In the fi rst chapter, we analyze the phenomenon, giving statistics and describing real incidents in the past recent years. The major contribution of this book is the extensive description of the equipment and techniques used by potential eaves- droppers in order for the right precautionary measures to be taken. In that manner, the second chapter is dedicated to the interception of ambient conversations, the third one to data interceptions, the fourth one to intercepting fi xed line communi- cations, and the fi fth is dedicated to intercepting mobile communications. These chapters are accompanied with a rich collection of photos while also including practical advice for reducing the associated risks. The sixth chapter presents an example of a malware that can be used for industrial espionage or as a personal spyware and a way to protect from it. The book concludes with the seventh chapter which includes an equally extensive description of the countermeasures that can be implemented for protecting intellectual property both on a legal and on a technical v vi Preface level. It also deals with detecting interceptions using specialized equipment. The same chapter further presents guidelines and methodologies for audit controls and also for selecting the appropriate contractor for a successful countersurveillance project. Athens Dr. Iosif Androulidakis November, 2015 Fragkiskos – Emmanouil Kioupakis Acknowledgements A t this point, I would like to thank my family for their love and moral support as well as my professors for their guidance during my studies in Greece and abroad. Authoring a book is a very demanding process. Thanks to the excellent collabora- tion with Fragkiskos, everything went smoothly and fl awless. I would like to thank him very much and also thank the countless information and telecommunication security researchers and professionals that I have met so far. Having completed dozens of projects and given more than 120 relevant speeches in conferences and events in 20 countries, the experience gained from cooperating and discussing with them was valuable and crucial for authoring the book that you now hold in your hands. I hope you enjoy reading and also hope that with the information in the fol- lowing pages you will be able to protect yourselves from the interception of sensi- tive information, commercial or not. –Iosif Androulidakis I n my turn I would fi rst like to thank Iosif very much for giving me the opportunity to work with him for authoring this book. As he is a well-esteemed researcher, the collaboration with him offered me valuable knowledge since he was more of a mentor to me rather than simply a colleague. This opportunity also enabled me to accomplish objectives that otherwise I couldn’t have accomplished so successfully and early in my research career. I would also like to thank my professor who also was my supervisor on my Master’s dissertation as he was the one who introduced me to academic research, offering his help and support. This introduction to academic research was also what led to meeting Iosif, thus being a turning point for me, especially in regard to this book being coauthored by me. Last but not least, I would like to thank my family for all the necessary support that I was given throughout my studies. –Fragkiskos – Emmanouil Kioupakis vii Contents 1 Industrial Espionage ................................................................................. 1 1.1 Introduction ........................................................................................ 1 1.2 Espionage in General ......................................................................... 1 1.3 Industrial, Corporate, Commercial, or Economic Espionage ............ 2 1.4 Business: Competitive Intelligence .................................................... 2 1.5 The Problem ....................................................................................... 3 1.6 The Human Factor ............................................................................. 4 1.7 Statistics ............................................................................................. 5 1.8 Some Actual Facts ............................................................................. 8 1.9 Summary ............................................................................................ 10 2 Intercepting Ambient Conversations ...................................................... 11 2.1 Introduction ........................................................................................ 11 2.2 Interception Devices .......................................................................... 11 2.3 Transmitting Setups ........................................................................... 14 2.4 Microphones ...................................................................................... 15 2.5 Exotic Tools ....................................................................................... 17 2.6 Systems for Enforcing Secrecy of Communications ......................... 18 2.7 Summary ............................................................................................ 21 3 Interception of Computer Data ............................................................... 23 3.1 Introduction ........................................................................................ 23 3.2 Hardware for Intercepting Computer Data ........................................ 23 3.3 Means of Data Transfer ...................................................................... 24 3.4 Software ............................................................................................. 25 3.5 Wireless Networks ............................................................................. 26 3.6 Man-in-the-Middle Attacks ............................................................... 29 3.7 Data Security ...................................................................................... 30 3.8 Data Traffi c and Management ............................................................ 31 3.9 Advanced Persistent Threats .............................................................. 32 ix

See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.