Industrial espionage and theft of information
2015 (English)Conference paper (Refereed)
One of the most serious threats to a modern country’s trade, industry and long-term economic development is industrial espionage and insiders. The activities are directed against high-technological industries and companies with advanced basic research. The defence and telecoms sectors are of particular interest, just as biotechnics, medical and material technology. Behind this kind of espionage there may be individual states and security services as well as competing companies. One trend is that criminal players are getting involved both as thieves and fences of information. Computerisation and the development of the Internet drastically increase the possibility of procuring sensitive information through illegal means. This can be done in different ways. In the paper a number of examples are provided of how industrial espionage has been revealed and of the methods used during collection of information over the Internet – such as signals intelligence, monitoring of traffic, penetration and overtaking of computers with the aid of trojans. Examples are given on succesful cybertheft operations such as the operation Buckshot Yankee and the Chinese Ghostnet.
The paper ends with a discussion on how to improve information security in organisations in order to reduce the risks for illegitimate information drainage.
Place, publisher, year, edition, pages
Acpil , 2015. 10- p.
Cyber espionage, information theft, Echelon, PRISM, SORM, Ghostnet
Engineering and Technology Social Sciences
IdentifiersURN: urn:nbn:se:kth:diva-178950ISBN: 9781910810286OAI: oai:DiVA.org:kth-178950DiVA: diva2:878518
14th European Conference on Cyber Warfare & Security, University of Hertfordshire, Hatfield, UK, 2-3 July 2015
QC 201601142015-12-092015-12-092016-01-14Bibliographically approved