Search This Blog

Thursday, October 20, 2005

Industrial espionage, Part 5: People from many countries targeting U.S.

NETWORK WORLD NEWSLETTER: M. E. KABAY ON SECURITY
10/20/05
Today's focus: Industrial espionage, Part 5: People from many
countries targeting U.S.

Dear security.world@gmail.com,

In this issue:

* Reports show long list of countries involved in industrial
espionage
* Links related to Security
* Featured reader resource
_______________________________________________________________
This newsletter is sponsored by Arbor Networks

Network Perimeter defense has become an industry in of itself.
But what if the danger to your network lurks from within - a
disgruntled employee, misuse of a VPN, 3rd party access,
employee access for personal reasons? In the following report,
Internal Intrusion Prevention, read about this threat and
providing multidimensional protection.
http://www.fattail.com/redir/redirect.asp?CID=117902
_______________________________________________________________
ARE X86 SERVERS THE ANSWER?

Analysts say users want to consolidate x86 systems but don't
want a move that may require a change to operating systems or
modify applications. As a result, they're looking for the
computing muscle and manageability once limited to more
expensive servers. Technology advances are making volume x86
servers more powerful, but are they powerful enough? More:
http://www.fattail.com/redir/redirect.asp?CID=117741
_______________________________________________________________

Today's focus: Industrial espionage, Part 5: People from many
countries targeting U.S.

By M. E. Kabay

So far in this series, I have reviewed methods of industrial
espionage and surveys about the dimensions of the problem. Today
I look at information about who is attacking us.

The information comes from the National Counterintelligence
Center (NACIC), which later became the Office of the National
Counterintelligence Executive (ONCIX). As I mentioned in my
first article, these agencies have been reporting annually to
Congress since 1995 about foreign economic collection and
industrial espionage. Their reports are freely available as PDF
files <http://tinyurl.com/cu34l>.

Early reports from NACIC/ONCIX blanked out the names of
countries suspected or known to be engaging in foreign
industrial espionage against the U.S.; however, later editions
began publishing lists. The countries mentioned in early reports
were Algeria, Armenia, Azerbaijan, Belarus, China, Cuba,
Georgia, India, Iran, Iraq, Israel, Kazakhstan, Kyrgyzstan,
Libya, Moldova, Pakistan, Russia, Syria, Taiwan, Turkmenistan,
Ukraine, and Uzbekistan.

In the 2000 Annual Report, respondents to the NACIC survey of a
few (about a dozen) Fortune 500 companies reported that the top
countries involved in industrial espionage cases against their
firms were (in order of importance) China, Japan, Israel,
France, Korea, Taiwan, and India.

By 2002, the ONCIX Annual Report commented:

"The laundry list of countries seeking U.S. technologies in 2001
was long and diverse. Some 75 countries were involved in one or
more suspicious incidents. The most active countries in economic
espionage, according to DSS data, were an interesting mix of
rich and poor and 'friend' and foe. Many of the richest nations
aggressively sought the latest in advanced technologies both to
upgrade their already formidable military infrastructures -
particularly command, control, and communications - and to make
their already sophisticated industries even more competitive
with the United States. Most of the poorer countries, however,
continued to exhibit a preference for older 'off the shelf'
hardware and software to renovate their existing defensive
systems and to develop countermeasures to provide them
battlefield advantage. The search for lower technology goods by
these less developed countries probably reflected their desire
to bring in technologies that could be more easily integrated
into their existing military structures; a number of these
countries were probably not capable of utilizing the most
sophisticated U.S. technologies."

The 2003 ONCIX report stated, "Foreigners from almost 90
countries attempted to acquire sensitive technologies from the
United States in 2003, according to data compiled from across
the [counterintelligence community], about the same number as in
2002."

That report also explained:

"While foreign government officials were behind some of the
incidents, they by no means accounted for the majority of
collection attempts. For example, Defense Security Service (DSS)
data show that [bullets added]
* only about 15% of suspicious efforts to illegally acquire
sensitive U.S. military-related technology in 2003 directly
involved foreign governments.
* Another 25% came from government-affiliated organizations or
foreign companies that work solely or predominantly for foreign
governments, according to DSS statistics.
* The remainder came from individuals (14%) claiming to be
working for themselves and
* from company representatives (31%);
* in 15% of cases, there was no indication of affiliation."

According to the latest ONCIX report available (2004),
"Individuals from both the private and public sectors in almost
100 countries attempted to illegally acquire U.S. technologies
in FY2004, roughly the same number of countries as [in 2003]...."
However, the report indicates a possible growth in
government-sponsored industrial espionage: "foreign state actors
accounted for about one-fifth of suspicious incidents and
government-related organizations accounted for another 15%."
However, "Commercial organizations and private individuals with
no known affiliation to foreign governments together accounted
for nearly half - 36% and 12% respectively - of all suspicious
incidents. In another 16%, the contractors were unable to
determine the affiliation of the foreign parties involved in the
elicitation."

In summary, the enormous investment in U.S. intellectual
property has been a prime target for nations and firms eager to
find shortcuts in the research and development process and thus
to reduce their costs by stealing our information. In the next
couple of articles, I look at some specific cases to illustrate
the problem more vividly than by dry survey results.

The top 5: Today's most-read stories

1. Cisco finally brings security push to LAN
<http://www.networkworld.com/nlsec9066nlsecuritynewsal9145>
2. Skype: Hazardous to network health?
<http://www.networkworld.com/nlsecuritynewsal7851>
3. WiMAX just around the corner
<http://www.networkworld.com/nlsecuritynewsal9149>
4. McAfee, Omniquad top anti-spyware test
<http://www.networkworld.com/nlsecuritynewsal6949>
5. Sourcefire discloses buffer-overflow vulnerability in Snort
<http://www.networkworld.com/nlsecuritynewsal9229>

_______________________________________________________________
To contact: M. E. Kabay

M. E. Kabay, Ph.D., CISSP, is Associate Professor in the
Division of Business and Management at Norwich University in
Northfield, Vt. Mich can be reached by e-mail
<mailto:mkabay@norwich.edu> and his Web site
<http://www2.norwich.edu/mkabay/index.htm>.

New information assurance journal - Norwich University Journal
of Information Assurance (NUJIA). See
<http://nujia.norwich.edu/>
_______________________________________________________________
This newsletter is sponsored by Avocent
Network World Executive Guide: Reviewing Trends and Insights for
SMB Executives

Life is different for IT professionals at small and mid-sized
businesses, which don't have the luxury of hiring legions of
network experts. Read how network executives are keeping a firm
footing on an ever-shifting product landscape. Learn about
trends and insights surrounding VoIP and VPNs; plus get
commentaries from leading experts on storage strategies for
smaller businesses.
http://www.fattail.com/redir/redirect.asp?CID=117593
_______________________________________________________________
ARCHIVE LINKS

Archive of the Security newsletter:
<http://www.networkworld.com/newsletters/sec/index.html>
Security Research Center:
<http://www.networkworld.com/topics/security.html>
Instant sign-up for Security News Alert:
<http://www.networkworld.com/isusecna>
Instant sign-up for Virus & Bug Patch Alert:
<http://www.networkworld.com/isubug>
_______________________________________________________________
FEATURED READER RESOURCE

Network World New Data Center: Spotlight on Advanced IP

Piecing Together the Next Generation IT Architecture. This 5th
installment in a 6 part series takes a look at at On-demand
services, automated management, and management technologies.
PLUS, see how two IT Execs are plotting their way to an all
IP-world. This NDC issue has it all, click here to read now:

<http://www.networkworld.com/supp/2005/ndc5/>
_______________________________________________________________
May We Send You a Free Print Subscription?
You've got the technology snapshot of your choice delivered
at your fingertips each day. Now, extend your knowledge by
receiving 51 FREE issues to our print publication. Apply
today at http://www.subscribenw.com/nl2

International subscribers click here:
http://nww1.com/go/circ_promo.html
_______________________________________________________________
SUBSCRIPTION SERVICES

To subscribe or unsubscribe to any Network World e-mail
newsletters, go to:
<http://www.nwwsubscribe.com/Changes.aspx>

To change your e-mail address, go to:
<http://www.nwwsubscribe.com/ChangeMail.aspx>

Subscription questions? Contact Customer Service by replying to
this message.

This message was sent to: security.world@gmail.com
Please use this address when modifying your subscription.
_______________________________________________________________

Have editorial comments? Write Jeff Caruso, Newsletter Editor,
at: <mailto:jcaruso@nww.com>

Inquiries to: NL Customer Service, Network World, Inc., 118
Turnpike Road, Southborough, MA 01772

For advertising information, write Kevin Normandeau, V.P. of
Online Development, at: <mailto:sponsorships@nwfusion.com>

Copyright Network World, Inc., 2005

No comments: