Spionage Radecraf T: The Intelligence Cycle
Spionage Radecraf T: The Intelligence Cycle
Spionage Radecraf T: The Intelligence Cycle
Only by understanding the threats and the basics of the tradecraft utilized to facilitate industrial espionage can an organization develop an
effective counterespionage program. A review of espionage tradecraft
will include the intelligence cycle, the categories of intelligence collection, and the methods of collection.
The Intelligence Cycle
Planning is the first phase of the process during which the decision is made concerning what intelligence is required, the sources
of the intelligence needed, how it will be collected, and the value of
such information. At this stage, the target company or individual
will be identified. The type of information required from the target
is then decided. The methods of collection will be decided upon
and the techniques of using such collection methods must also be
determined.
The budget must also be determined. This will include salary of
agents; cost of collection equipment to be used, travel, possible hotel
cost and other expenses. The funds, if any, used to pay for information
retrieved through espionage must also be considered.
In d us t ria l E s pi o n ag e
Figure 2.1 The tools used in industrial espionage tradecraft are not what one would see in the
cinema such as the U.N.C.L E pistol and pen communicator. (Photo by Daniel J. Benny)
Collection
This phase of the intelligence cycle deals with taking all of the information collected and putting it into a usable intelligence report for
the customer. The final product may be a report, photographs, video,
charts, maps and graphs or a voice recording. Whatever the media
chosen, it must be formatted in a form that can be used and based on
what the customer requires.
Click here to order
Industrial Espionage: Developing a Counterespionage Program
by Daniel J . Benny
Print ISBN: 978-1-4665-6814-3 CRC Press 2013
E s pi o n ag e T r a d ec r a f t
Dissemination
In this final phase of the cycle, the final written analysis is provided
to the intelligence customer. The customer may come back with more
questions. Then the whole process starts over again
Categories of Intelligence Collection and Tradecraft
Within the intelligence community there are five categories of intelligence collection. The intelligence categories are identified by the type
of intelligence and how it is collected.
In d us t ria l E s pi o n ag e
E s pi o n ag e T r a d ec r a f t
the asset handler from identification and possible arrest for industrial espionage.
The recruitment of an asset can take time, but if successful, can
result in the collection of an enormous amount of information over
many years. The goal of the recruitment process is to find the right
asset within the targeted company. When selecting an asset, there
are several primary methods of recruitment to secure the assets
cooperation.
Most cases of industrial espionage where human intelligence is utilized involve the assets desire for monetary gain. This need for money
may just be to live a more enjoyable lifestyle. It may be to pay for
expensive habits or addictions such as drugs, alcohol, gambling, sex,
or just the need to buy things. It may also may be due to health issues
wherein the asset needs money to pay medical bills or routine bills
and credit cards. If may also be due to divorce actions and the need to
make payment to the former spouse and legal fees.
To recruit these employees as assets, the handler will gather intelligence on the various employees of a company to identify those in
need of money due to debt, divorce actions, addictions or medical
issues. This information may be obtained by searching public records
of divorces or bankruptcy filings. Other methods might include frequenting restaurants where employees of the target company gather
and to listen and to get to know individuals. A particular individual
may be targeted based on his or her position in the target company.
Once a possible asset is identified, the handler will befriend the
asset, get to know him or her and at some point will offer to help
resolve the situation by offering extra money for information. Initially,
the information requested may seem innocent such as an employee
directory. The handler will gradually upgrade the information
requested as he or she continues to pay for information.
Should the asset desire to discontinue stealing and providing the
protected information requested, the handler will attempt to blackmail the asset. In most cases, the handler will document the transfer
of protected document and payment with photographs or recordings.
If the asset at some point in time wishes to discontinue the espionage, the handler will then expose this evidence and threaten to tell
the assets employer or even law enforcement about the theft of the
protected or classified company information. In some situations, an
Click here to order
Industrial Espionage: Developing a Counterespionage Program
by Daniel J . Benny
Print ISBN: 978-1-4665-6814-3 CRC Press 2013
In d us t ria l E s pi o n ag e
E s pi o n ag e T r a d ec r a f t
to hand as they go by. This may be done any number of places, but is
accomplished most effectively and securely in very busy areas where
there are large crowds. Variations include standing together on a
busy train or passing documents between restroom stalls in a busy
public washroom.
A dead drop or dead letter box can also be used in an unpopulated area at a pre-planned location. The agent loads the dead drop
by placing the item for later collection by another agent or the asset,
be it information or money. This method alleviates the need for the
two individuals to be in the same place at the same time. Examples
include hiding information or money in a soda can, under a rock or
other item, or in a hollow tree.
The use of a live drop or live letter box is also common. This is similar to the dead drop except that a person is used instead of an object.
For example, the agent brings his suit to the drycleaners, where a person known to the agent works. Inside his jacket will be the letter that
needs to be transferred. To any surveillance watching, the agent is just
dropping off laundry. Later, another agent will come in to retrieve his
suits and will be given the letter by the employee, probably inside one
of the suits.
Imagery Intelligence (IMINT)
In d us t ria l E s pi o n ag e
The most recent technology involves the use of very small unmanned
aerial vehicles or UAVs. These small airborne platforms are used in
the collection of information in remote areas or where there is no
visibility from the ground view or surrounding terrain. Satellites that
can record images from space may be utilized if the industrial espionage is being conducted by foreign nations that have the technology
to use satellite imagery for espionage collection. Imaging techniques
may also be used to obtain information on a targeted item. The video
camera is most often used by organizations that are gathering intelligence on a possible target location for a terrorist attack,
These techniques may also be used to document individuals, the
movement of individuals, or security force operation for a terrorist
attack against an individual or a facility. Imagery of a target facility may
also be acquired to facilitate a clandestine entry into the target property.
Open Source Intelligence (OSINT)
E s pi o n ag e T r a d ec r a f t
All states require that companies doing business within their jurisdiction register, in most case with the secretary of state. Information
on the target corporation, the officers and other vital information can
be obtained. Plans of a target companies including their plans for
expansion can be obtained from a local court house where deeds and
transactions are filed.
Trade and professional organization publications such as Dun &
Bradstreet and Lexis/Nexis databases can also be an open source of
intelligence. Organizations provide intelligence on their company
websites and social links such as Facebook, Twitter, and LinkedIn. A
target organizations booth at a trade show provides an excellent opportunity to collect information about that company both from handouts
being distributed and by talking with a company representative.
Special methods of open source tradecraft include observing how
many trucks a company is using to move goods and the time of movements. This can give an indication as to the amount of business the
company has. Dumpster diving, or going through an organizations
trash can yield valuable information and is legal in most areas as long
as the trash has been placed at the curb. It would be illegal to access
a companys property to explore and remove their trash in most areas.
Another method is to go to a local eatery where employees of a
nearby company go for breakfast, lunch or to meet after work. By
sitting near the group and listening, much open source information
about the company can be learned from the conversations. It is also
possible to become involved in conversations and gather even more
information.
Posing as a customer of a company is still another excellent method
of obtaining open source information. Company representative are
willing to do what it takes to please customers and will provide the
customer with much information.
Signals Intelligence (SIGINT)
10
In d us t ria l E s pi o n ag e
Measure and signatures intelligence is derived from acoustic and radiation sources. Examples of this type intelligence include information
related to nuclear and sound activity from which vital information can
be gained.
Click here to order
Industrial Espionage: Developing a Counterespionage Program
by Daniel J . Benny
Print ISBN: 978-1-4665-6814-3 CRC Press 2013
E s pi o n ag e T r a d ec r a f t
11
In the world of industrial espionage, deception is used to obtain protected information. Most often the deception is in the form of a pretext. A pretext as it relates to industrial espionage involves assuming
an identity or appearance other than ones own in order to cloak the
persons real intentions which are the solicitations of protected information. Some forms of pretexts are legal as long as one is not using
Click here to order
Industrial Espionage: Developing a Counterespionage Program
by Daniel J . Benny
Print ISBN: 978-1-4665-6814-3 CRC Press 2013
12
In d us t ria l E s pi o n ag e
false identification, wearing uniforms or representing himself or herself as a law enforcement officer or a public utility employee. Even if
the pretext is not illegal, depending on the how the pretext was used,
civil action could result for the invasion of privacy or other damages
that may have occurred.
There are many pretexts that can be used to solicit information. The
primary premise of a pretext is to hide ones real identity or motives.
This is often accomplished by utilizing false credentials and dressing
to the part that may include the wearing of uniforms based on the
nature of the pretext. Some pretext attacks require no false credential
or special dress or uniforms at all.
With the capability of computer publishing and copying, the creation of totally fictitious identifications or the fraudulent reproduction
of real identifications is quite easy. Digital photography photos and
logos can be inserted on the false identification. The fictitious identifications that are created could be those of a public office holder, a law
enforcement officer, private investigator, utility worker, news reporter
or delivery worker. The identification might be a fraudulent reproduction of a companys real identification that the perpetrator wants to
access.
Dressing for the part includes a fraudulent uniform of a police officer or a delivery worker from a nationally known company. Often it
includes a jacket, sweatshirt or other garment with a fraudulent logo
imprinted on the garment to provide the illusion that the person represents a legitimate company.
The ploys are limited only by the imagination when it comes to the
use of deception and pretexts in facilitation of industrial espionage.
Examples include seeking employment, writing a college paper, seeking
a news story, delivery, or trying to locate a friend or business associate.
Before an individual uses a pretext for industrial espionage, he or
she will conduct a background inquiry on the target or target location. If the target is a person, as much information as possible will be
obtained in advance such as address, work location, vehicle driven,
family members, travel routine, and routine stops during travel.
If the target is a location, the hours of operations will be identified,
along with employee and visitor traffic patterns. The physical security
such as security cameras, intrusion detections system and access control will be determined. The number and type security force will also
Click here to order
Industrial Espionage: Developing a Counterespionage Program
by Daniel J . Benny
Print ISBN: 978-1-4665-6814-3 CRC Press 2013
E s pi o n ag e T r a d ec r a f t
13
14
In d us t ria l E s pi o n ag e
Bibliography
Association of Certified Fraud Examiners (2000). Corporate Espionage. Austin,
TX: Association of Certified Fraud Examiners.
Central Intelligence Agency (2012) Factbook. Washington, DC: U.S.
Government Printing Office.
Defense Security Service (2013) Retrieved from http://www.dss.mil/
Heims, P. (1982). Countering Industrial Espionage. Surrey, UK: 20th Century
Security Education.
Johnson, W.M. (2007). Business Espionage. Shoreline, WA: Questor Group
Martin, S. (2005) Business Intelligence and Corporate Espionage. Boston, MA:
Pearson.
The National Counterintelligence Center (2011). Annual Report to Congress
on Foreign Economic Collection and Industrial Espionage. Washington,
DC: U.S. Government Printing Office.
Office of National Intelligence (2013). Retrieved from http://www.intelligence.gov/about-the-intelligence-community.
Richelson, J. T. (1999) The US Intelligence Community. Boulder, CO: Westview
Press.
Heims, P. (1982). Countering Industrial Espionage. Surrey, UK: 20th Century
Security Education.
Winker, I. (1997) Corporate Espionage. New York, NY: Prima Publishing.