A disturbing trend has developed in which foreign intelligence services, non-state actors, and criminals are using intelligence collection techniques against American companies to steal valuable trade secrets and assets. This activity can bankrupt a company by compromising years of costly research and development, weaken the U.S. economy, and threaten national security. According to the FBI, the cost to U.S. industry is tens of billions of dollars each year.
Corporate boards and executive officers must understand the true threat their companies face. It is one that has evolved beyond the stage where information security, as one example, can simply be delegated to the security office or CIO- it requires full executive engagement. With the tools available to economic spies, the American private sector is more vulnerable than ever.
Not too long ago, traditional corporate espionage was dangerous. It required the corporate spy to betray one's coworkers, clandestinely collect company documents, load and mark dead drops, and operate under the constant risk of exposure and arrest. Yet corporate espionage, like so many activities, has moved into the realm of cyberspace. In cyberspace, many American companies are left working in the modern equivalent of the Wild West, an unregulated frontier where the crown jewels of the corporation -trade secrets and intellectual property- are hijacked every day, often without the victim's knowledge. In turn, America often finds itself competing with the very developments and technologies our companies pioneered.
Companies must have aggressive security programs to protect their intellectual property, trade secrets, business processes, strategic goals, and the integrity of their brands. Security Engineering Associates (SEA) provides the steps involved in building a corporate counterintelligence program to complement your company's security program and respond to the intelligence collection techniques used by today's spies. An effective Counterintelligence program will ensure that your company has identified its most vulnerable assets, understands the threats to those assets, has discovered the vulnerabilities that might make your company susceptible to exploitation, and has taken the appropriate steps to mitigate risks.
Unlike many of our most active competitors who engage in cyber espionage, the United States does not have a centralized industrial policy. Our long-standing prosperity is a reflection of the free market. That places a large responsibility on the shoulders of American CEOs. The U.S. Government will share threat and warning information to the full extent of the law, but to protect our economy and our position on the global stage, much of our national security will have to move from the war room to the board room.
"Sensitive US economic information and technology are targeted by the intelligence services, private sector companies, academic and research institutions, and citizens of dozens of countries." - ONCIX
Report to Congress on Foreign Economic Collection and Industrial Espionage
The U.S. economy has changed over the past 20 years. Intellectual capital rather than physical assets now represent the bulk of a U.S. corporation's value. Research by Ocean Tome Intellectual Capital Equity states the transition from an economy of tangible assets (real estate, hardware, vehicles) to one in which intangible assets (patented technology, trade secrets, proprietary data, business process and marketing plans) now represent eighty one (81) percent of the value associated with the S&P 500. This shift has made corporate assets far more susceptible to espionage.
Simon Hunt, Vice President and Chief Technology Officer of McAfee, said in a 2011 report titled "Underground Economies" that: "Criminals understand that there is much greater value in selling a company's proprietary information to competitors and foreign governments the cyber underground economy has shifted its focus to the theft of corporate intellectual capital."
When companies become targets of competitors, foreign intelligence services, and criminal elements, even aggressive security programs may not be enough. A Counterintelligence Risk Assessment can help determine the threat of espionage activity against your company and the size and scope of the Counterintelligence program or capabilities that are needed to address this threat.
Counterintelligence and security are distinct but complementary disciplines, and it is important for organizations contemplating the establishment of a Counterintelligence program to understand the difference.
Counterintelligence and security programs create a continuum of effective protection for your company.
The decision to create corporate Counterintelligence programs and practices will be based on concerns that your company and its assets are a target of foreign intelligence services, criminals, economic competitors, and private spies-for hire. Therefore, the first step that Security Engineering Associates (SEA) will complete in establishing a Counterintelligence program is to conduct a risk assessment that evaluates the threat to your company by examining available threat information, assessing your organization's vulnerabilities, and gauging the consequences of losing critical assets. SEA in cooperation with a senior executive or board member of your company will oversee the Counterintelligence risk assessment process from start to finish, drawing on both in-house experts and SEA expertise in Counterintelligence analysis, operations, and investigations to complete the assessment. A risk assessment will help determine the capabilities and resources that will be required to run an effective Counterintelligence program.
A. Identifying and Prioritizing Assets
SEA will identify and prioritize your company's most critical assets, to include people, groups, relationships, instruments, installations, processes, and supplies. The loss or compromise of these assets would be the most damaging to your organization, could result in substantial economic losses, or could harm U.S. national security.
SEA will support collaboration with industry partners and Federal agencies that have oversight or regulatory responsibilities in your business sector which will provide a fuller picture that will assist your company with this prioritization process.
SEA will assist your company's management in making the final assessment of those assets most worthy of protection.
B. Determining Threats
Next, SEA will need to assess the capabilities, intentions, and opportunity of potential adversaries to exploit or damage company assets or information. SEA will also determine if there are any gaps in an adversary's knowledge of the company or if your company is working on a particular technology or product that an adversary may be trying to acquire. SEA will provide assistance to Company Executives to establish relationships with Federal agencies to make use of existing threat reporting for this part of the assessment.
C. Assessing Vulnerabilities
Finally, SEA will need to assess the inherent susceptibility of its procedures, facilities, information systems, equipment, or policies to an attack. SEA will need to determine how an adversary, including a malicious insider, would attempt to gain access to your critical assets. When assessing vulnerabilities, SEA will consider the physical location of its assets and who has access to them, including both employees and outsiders.
SEA will identify any systemic or institutional vulnerability. Situations in which employees are dispersed geographically-including at overseas locations-or have access to or are involved in sensitive systems or projects deserve extra scrutiny.
The risk assessment will provide a better understanding of the scope and nature of the threats to your company's most important assets. At this point, a number of initial activities should be considered that will lay the groundwork for building an effective Counterintelligence program. To prepare for implementation, SEA will:
While companies will need to tailor Counterintelligence risk assessments to their unique circumstances, all assessments require three important actions:
As progress continues on laying the groundwork, SEA will begin identifying the CJ capabilities needed for an effective Counterintelligence program that is focused on protecting your company's assets, brand, and intellectual property. The risk assessment will be an important guide during this step. The Office of the National Counterintelligence Executive (ONCIX) recommends a layered approach to acquiring Counterintelligence capabilities. Counterintelligence capabilities are essential to identifying and countering insider and cyber threats, which represent the two most challenging threats to U.S. corporate assets.
The following are six primary capabilities that should be considered when determining the size and scope of the CJ program your company requires:
New employee orientations and continual refresher training can equip the workforce with the skills needed to understand who your company's adversaries are, identify threats, and follow reporting procedures for suspicious activities. A highly trained and aware workforce is key to the early detection of potential threats. SEA will utilize a Counterintelligence-specific non-disclosure agreement before divulging their threat and vulnerabilities.
1. Analysis, Reporting & Response
An analysis, reporting, and response capability can integrate resources and information from across relevant corporate elements (CI, security, lA, HR, general counsel) and provide assessments and warning on data that may be indicative of a threat. Mature Counterintelligence programs will also want to incorporate risk assessments related to sensitive acquisitions into this analytic and reporting process.
2. Suspicious Activity Reporting
Defining, training the workforce, and developing company reporting policies on suspicious activities that are deemed inappropriate or potentially threatening could provide an effective "early warning system" of potential threats to your employees or company.
3. Counterintelligence Audit
A CJ audit capability would enable SEA to monitor user activity on corporate IT systems. This would help to identify anomalous behavior, deter the theft or unauthorized use of company information, and protect the company from network intrusions.
4. Counterintelligence investigations
Companies with more advanced corporate CJ programs may wish to augment their ability to conduct security investigations with a capability to perform preliminary Counterintelligence investigations that are consistent with the law.
5. Liaison
SEA will establish a liaison relationships with US Government law enforcement and Intelligence Community agencies, to facilitate the flow of intelligence reporting, investigations, referrals, and training opportunities to aid and assist the company.
Once the risk is assessed, the groundwork has been laid, and the Counterintelligence capabilities required are identified, SEA will can begin implementation of a Counterintelligence program. Although the investment needed to build an effective program will use company resources that might otherwise be dedicated to product development, marketing, and other priorities, it is important to remember that a properly designed program that is tailored to your company's unique security needs and that protects your critical corporate assets can more than justify the costs.
The following describes three management frameworks that are recommended based on the level of capability your company requires. The functions are cumulative and build toward what ONCIX considers to be the framework for a full scope Counterintelligence program.
The Counterintelligence program manager oversees employees in the company's subcomponents or major programs who are dedicated to Counterintelligence responsibilities and have received professional Counterintelligence training.
SEA will also assist your company to make staffing decisions when the size and scope of the Counterintelligence program is decided. Ideally, these points of contact will be dedicated full-time to the Counterintelligence program, respond to headquarters direction, and understand the specific Counterintelligence responsibilities assigned to company entities at non-headquarters locations.
A fully functional headquarters program should, at a minimum, be staffed with the following personnel:
Once your Counterintelligence program is established, ONCIX recommends a number of follow-on activities designed to ensure that the program remains effective. We encourage companies with an active Counterintelligence program to: