Secrets Stolen, Fortunes Lost
, by Burgess, ChristopherNote: Supplemental materials are not guaranteed with Rental or Used book purchases.
- ISBN: 9781597492553 | 1597492558
- Cover: Paperback
- Copyright: 3/5/2008
Secrets Stolen, Fortunes Lost is a modern-day wake-up call that industrial theft continues today with cybercrime evolving right before our eyes. The book comes alive through the recounting of actual occurrences and takes the discussion a step further by helping the reader understand how to interpret the techniques used and what steps can be taken to take to minimize the chances of becoming the next real-life example.
Introduction | p. xiii |
The Challenge | p. 1 |
The Tale of the Targeted Trojan | p. 3 |
Introduction | p. 4 |
The Haephrati Case | p. 5 |
The When | p. 6 |
The How | p. 6 |
The Hook | p. 6 |
The Mechanism | p. 6 |
The Who | p. 7 |
The Why | p. 7 |
The Cost | p. 7 |
The Discovery | p. 8 |
The Scope | p. 9 |
Alleged Intermediary Clients | p. 9 |
Alleged End-Recipients | p. 9 |
Companies Identified as Victims | p. 10 |
Related U.S./UK Advisories | p. 11 |
UK - National Infrastructure Security Coordination Centre (NISCC) | p. 11 |
U.S. - The Department of Homeland Security (DHS) | p. 12 |
When Insiders and/or Competitors Target a Business's Intellectual Property | p. 15 |
Introduction | p. 16 |
Lightwave Microsystems | p. 16 |
America Online | p. 18 |
Casiano Communications | p. 19 |
Corning and PicVue | p. 20 |
Avery Dennison and Four Pillars | p. 22 |
Lexar Media and Toshiba | p. 24 |
SigmaTel and Citroen | p. 27 |
3dGEO - China | p. 29 |
When State Entities Target a Business's Intellectual Property | p. 31 |
Introduction | p. 32 |
Airbus and Saudi Arabian Airlines | p. 33 |
Russian Intelligence and Japanese Trade Secrets | p. 33 |
Japan and the Cleveland Clinic Foundation | p. 36 |
China and Russia: TsNIIMASH-Export | p. 38 |
Overt Nation State Attempts: India, Venezuela, Brazil, and Others | p. 39 |
Current and Future Threats to Economic Security | p. 41 |
When Piracy, Counterfeiting, and Organized Crime Target a Business's Intellectual Property | p. 45 |
Introduction | p. 46 |
Technology Counterfeiting | p. 50 |
The Apparel Industry | p. 52 |
The Entertainment Industry | p. 53 |
Virtual Roundtable on Intellectual Property and Economic Espionage | p. 57 |
Introduction | p. 58 |
The Legal Perspective: Naomi Fine | p. 60 |
The OpSec Perspective: Keith Rhodes | p. 65 |
The Professional Investigator's Perspective: Ed Stroz | p. 70 |
The DoD Cyber Sleuth's Perspective: James Christy | p. 77 |
The Security and Privacy Consultant's Perspective: Rebecca Herold | p. 81 |
The Strategy | p. 87 |
Elements of a Holistic Program | p. 89 |
Introduction | p. 90 |
False Memes Lead People the Wrong Way | p. 90 |
From the Industrial Age to the Information Age | p. 91 |
Case Study: Cisco's Award-Winning Awareness Program | p. 97 |
Introduction | p. 98 |
What Is This Scenario? | p. 100 |
The Message Is the Medium: Be a Security Champion | p. 102 |
The Message | p. 102 |
When Your Message Reaches the Employees | |
They Become Your Messengers | p. 105 |
Staying on Message | p. 106 |
It Takes More Than Compelling Content and Hard Work | p. 109 |
Lessons Learned | p. 110 |
Case Study: A Bold New Approach in Awareness and Education Meets an Ignoble Fate | p. 113 |
Introduction | p. 114 |
The Mission, the Medium, the Message | p. 114 |
Meaningful Content and Persuasive Delivery | p. 114 |
Investment and Empowerment | p. 116 |
Three-Phase Approach | p. 116 |
Engage Everyone Economically and Effectively | p. 117 |
A Rising Tide Lifts All the Boats | p. 119 |
Deliver Vital Intelligence and Early Warning to the Executive | p. 120 |
Don't Be Surprised If | p. 121 |
Case Study: The Mysterious Social Engineering Attacks on Entity Y | p. 127 |
Introduction | p. 128 |
Fundamentals of Social Engineering Attacks | p. 129 |
The Mysterious Social Engineering Attacks on Entity Y | p. 133 |
Guidance for the Workforce | p. 135 |
How to Recognize Elicitation | p. 135 |
How to Handle the Caller | p. 136 |
How to Report the Incident | p. 136 |
General User-Oriented Guidance on How to Detect and Defeat Social Engineering | p. 137 |
Personnel Security | p. 139 |
Introduction | p. 140 |
Coming and Going: Guidelines for Background Checks and Termination Procedures | p. 143 |
Two Important Caveats | p. 154 |
And Everywhere in between: Guidelines for Travel Security and Executive Protection Programs | p. 154 |
Physical Security: The "Duh" Factor | p. 161 |
Introduction | p. 162 |
Information Security | p. 187 |
Introduction | p. 188 |
The Intelligent Approach | p. 227 |
Introduction | p. 228 |
The Intelligence Function As an Internal Early Warning System | p. 230 |
What Happens to a Million Grains of Sand in a Perfect Storm? | p. 232 |
The Partnership Issue Is a Daunting Force-Multiplier, Double-Edged Sword | p. 234 |
Protecting Intellectual Property in a Crisis Situation | p. 237 |
Introduction | p. 238 |
How to Sell Your Intellectual Property Protection Program | p. 247 |
Introduction | p. 248 |
Questions to Ask and People to Approach | p. 250 |
What Is Your Business Differentiation from Your Competitors? | p. 251 |
Whom Do You Have to Protect These Differentiators From? | p. 252 |
What Are the Probabilities in Terms of Likely Attackers, Targets, and Objectives? | p. 254 |
If the Competition Obtained or Tampered with Your Intellectual Property, What Harm Would Be Done? | p. 255 |
What Security Measures Would Be Cost-Effective and Business-Enabling? | p. 255 |
Notes on Figure 15.1 | p. 257 |
Notes on Figure 15.2 | p. 257 |
Executives and Board Members | p. 257 |
Research and Development | p. 257 |
Manufacturing | p. 258 |
Sales and Marketing | p. 258 |
Human Resources | p. 258 |
Operations | p. 259 |
Risk Identification | p. 259 |
Implications of IP loss | p. 260 |
Notes on Figure 15.3 | p. 261 |
Implementation Plan | p. 261 |
Potential Inhibitors | p. 261 |
Identified Milestones | p. 261 |
Notes on Figure 15.4 | p. 262 |
Notes on Figure 15.5 | p. 263 |
Executive Commitment | p. 263 |
Business Value Statement | p. 263 |
Notes | p. 263 |
Conclusion | p. 265 |
Protect Your IP | p. 266 |
Baseline Controls for Information Security Mapped to ISO | p. 267 |
Leveraging Your Tax Dollar | p. 289 |
Domestic | p. 290 |
Department of Justice (DOJ) | p. 290 |
Department of Homeland Security (DHS) | p. 292 |
International | p. 294 |
Department of Commerce (DOC) | p. 294 |
Department of State (DOS) | p. 294 |
Notes on Cyber Forensics | p. 297 |
Digital Evidence: Volume | p. 298 |
Digital Evidence: Searches/Legal | p. 299 |
Digital Evidence: Cell Phones | p. 300 |
Digital Evidence: Accreditation | p. 301 |
Definitions | p. 302 |
Digital Evidence: Digital Forensics Intelligence | p. 302 |
U.S. International Trade Commission Section 337 Process | p. 305 |
U.S. Trade Representative's 2007 Special 301 Watch List | p. 339 |
U.S. Department of Justice Checklist for Reporting a Theft of Trade Secrets Offense | p. 343 |
Index | p. 349 |
Table of Contents provided by Ingram. All Rights Reserved. |
What is included with this book?
The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.
The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.