27.12.2014 Views

Strategic Thought Transformation - The IIPM Think Tank

Strategic Thought Transformation - The IIPM Think Tank

Strategic Thought Transformation - The IIPM Think Tank

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

I N D U S T R I A L E S P I O N A G E<br />

2. Operational Structures<br />

Although there is a great deal of variety,<br />

there are at least two fundamental structures<br />

of today’s industrial espionage systems,<br />

and one modification using so-called<br />

“front” companies.<br />

2.1 <strong>The</strong> “Classical” Model”<br />

In the “classical” model, generally the “spy”<br />

is the person who actually is providing the<br />

information. “He” usually is not in direct<br />

contract with the operational agency<br />

in the foreign entity, usually a government<br />

body. In fact, it is quite common for<br />

the “spy” to either not know, or believe<br />

wrongly, the identity of the final consumer<br />

of their information. For example,<br />

if you worked in a government agency,<br />

and were approached by an intelligence<br />

organisation with instructions to provide<br />

confidential information, you easily<br />

might agree to help. However, in the<br />

classical model, you might find out later<br />

that it was not a government intelligence<br />

agency that you were working for, but<br />

rather someone else. That is, you might<br />

believe you are helping a “world peace”<br />

organization, but find out later that the<br />

information you are providing actually<br />

is being supplied directly to the militaryindustrial<br />

complex of a hostile country.<br />

Generally, with the exception of longterm<br />

“moles” –impostors who are trained<br />

overseas and have taken on the identity of<br />

a national –so-called “spies” are citizens of<br />

the country being spied upon. <strong>The</strong> “spy” is<br />

managed by a person who is the “recruiter”.<br />

In the “classical”<br />

model, generally<br />

the “spy” is the<br />

person who<br />

actually is<br />

providing the<br />

information<br />

In many instances, their identity actually is<br />

different from what is revealed, and consequently,<br />

should the “spy” get exposed, then<br />

any information they give to authorities<br />

if false, and even under compulsion, it is<br />

impossible for them to provide accurate<br />

information because they simply do not<br />

know it. <strong>The</strong> “recruiter” many times is in<br />

a similar situation in that their manager,<br />

the “overseas acquisition manager” [see<br />

Figure] also is providing inaccurate identification<br />

information. Although often the<br />

“recruiter” or “cutout” manager is aware<br />

of a connection, however, faint, with the<br />

foreign entity. Several variations on the<br />

scheme can be used to increase security,<br />

including the following:<br />

Extra Cutout : <strong>The</strong> overseas acquisition<br />

manager may be managed by another<br />

counterpart who serves as a buffer between<br />

them and the acquisition agency. This extra<br />

cutout can be located either<br />

1. in the foreign country, or<br />

2. in a third country. Since they also generally<br />

are using an alias, it becomes even<br />

more difficult to trace the steps back<br />

up the chain of control to determine<br />

the final destination of the stolen information.<br />

Alternative Reporting: <strong>The</strong> “spy” [located<br />

inside the target company] might<br />

be instructed to report the stolen information<br />

through yet another cutout manager<br />

[not pictured]. In this case, control and<br />

requests for information come from one<br />

channel, and the reporting [of the information]<br />

is handled through a different<br />

channel. Should the cutout manager or<br />

overseas acquisition manager be nabbed,<br />

then they will have zero knowledge of<br />

what information has been compromised.<br />

Also, if the second cutout manager [who<br />

received the stolen information] is not<br />

noticed, then the spying can continue,<br />

and the chain of control simply changed,<br />

providing of course the actual “spy” is not<br />

compromised.<br />

Mole: In some cases, a “mole”, e.g., a person<br />

who is of the nationality of the foreign<br />

entity, but who has taken on the identity<br />

of the target company’s country is inserted<br />

into the picture. In these cases, which evidently<br />

are rare, the operation works more<br />

or less the same, with the exception that<br />

An <strong>IIPM</strong> Intelligence Unit Publication STRATEGIC INNOVATORS 29

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!