Strategic Thought Transformation - The IIPM Think Tank
Strategic Thought Transformation - The IIPM Think Tank
Strategic Thought Transformation - The IIPM Think Tank
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
I N D U S T R I A L E S P I O N A G E<br />
2. Operational Structures<br />
Although there is a great deal of variety,<br />
there are at least two fundamental structures<br />
of today’s industrial espionage systems,<br />
and one modification using so-called<br />
“front” companies.<br />
2.1 <strong>The</strong> “Classical” Model”<br />
In the “classical” model, generally the “spy”<br />
is the person who actually is providing the<br />
information. “He” usually is not in direct<br />
contract with the operational agency<br />
in the foreign entity, usually a government<br />
body. In fact, it is quite common for<br />
the “spy” to either not know, or believe<br />
wrongly, the identity of the final consumer<br />
of their information. For example,<br />
if you worked in a government agency,<br />
and were approached by an intelligence<br />
organisation with instructions to provide<br />
confidential information, you easily<br />
might agree to help. However, in the<br />
classical model, you might find out later<br />
that it was not a government intelligence<br />
agency that you were working for, but<br />
rather someone else. That is, you might<br />
believe you are helping a “world peace”<br />
organization, but find out later that the<br />
information you are providing actually<br />
is being supplied directly to the militaryindustrial<br />
complex of a hostile country.<br />
Generally, with the exception of longterm<br />
“moles” –impostors who are trained<br />
overseas and have taken on the identity of<br />
a national –so-called “spies” are citizens of<br />
the country being spied upon. <strong>The</strong> “spy” is<br />
managed by a person who is the “recruiter”.<br />
In the “classical”<br />
model, generally<br />
the “spy” is the<br />
person who<br />
actually is<br />
providing the<br />
information<br />
In many instances, their identity actually is<br />
different from what is revealed, and consequently,<br />
should the “spy” get exposed, then<br />
any information they give to authorities<br />
if false, and even under compulsion, it is<br />
impossible for them to provide accurate<br />
information because they simply do not<br />
know it. <strong>The</strong> “recruiter” many times is in<br />
a similar situation in that their manager,<br />
the “overseas acquisition manager” [see<br />
Figure] also is providing inaccurate identification<br />
information. Although often the<br />
“recruiter” or “cutout” manager is aware<br />
of a connection, however, faint, with the<br />
foreign entity. Several variations on the<br />
scheme can be used to increase security,<br />
including the following:<br />
Extra Cutout : <strong>The</strong> overseas acquisition<br />
manager may be managed by another<br />
counterpart who serves as a buffer between<br />
them and the acquisition agency. This extra<br />
cutout can be located either<br />
1. in the foreign country, or<br />
2. in a third country. Since they also generally<br />
are using an alias, it becomes even<br />
more difficult to trace the steps back<br />
up the chain of control to determine<br />
the final destination of the stolen information.<br />
Alternative Reporting: <strong>The</strong> “spy” [located<br />
inside the target company] might<br />
be instructed to report the stolen information<br />
through yet another cutout manager<br />
[not pictured]. In this case, control and<br />
requests for information come from one<br />
channel, and the reporting [of the information]<br />
is handled through a different<br />
channel. Should the cutout manager or<br />
overseas acquisition manager be nabbed,<br />
then they will have zero knowledge of<br />
what information has been compromised.<br />
Also, if the second cutout manager [who<br />
received the stolen information] is not<br />
noticed, then the spying can continue,<br />
and the chain of control simply changed,<br />
providing of course the actual “spy” is not<br />
compromised.<br />
Mole: In some cases, a “mole”, e.g., a person<br />
who is of the nationality of the foreign<br />
entity, but who has taken on the identity<br />
of the target company’s country is inserted<br />
into the picture. In these cases, which evidently<br />
are rare, the operation works more<br />
or less the same, with the exception that<br />
An <strong>IIPM</strong> Intelligence Unit Publication STRATEGIC INNOVATORS 29