The information revolution and the progresss in engineering during the past decennaries has brought to fore many challenges and issues to both authoritiess and concerns, the antique offense of espionage or the pattern of descrying to garner secret information is one the most possible issues confronting information-based societies such as the United States, today. Although, much has been documented as fact and fiction refering the traditional foreign agents and undercover agents, in today ‘s universe of multi-national, multi-billion dollar corporations, and industrial espionage is a turning danger. Furthermore, this is aggravated by the fact that many big concerns are physically disseminated which has distributed direction and disposal, and more occupation specialisation.
High engineering offers the ability to roll up and utilize information for competitory border over others in meeting concern and authorities aims, it besides makes modern information and technology-based states and concerns vulnerable as information can be stolen from electronic storage media and transmitted in seconds without even physically taking the information.
The paper efforts to analyze and understand the challenge of espionage to industries and concerns in America. However, in making so, it shall besides look at the historical development of espionage and analyze how the progresss in engineering in the recent old ages have facilitated the act of espionage, and besides the steps that may turn out utile in commanding Industrial Espionage. As a preliminary to the research, it may be worthwhile to understand how industrial espionage is defined, its nature and deductions.
Industrial Espionage – Definition and Nature
The Federal Bureau of Investigation defines industrial espionage as “an single or private concern entity sponsorship or coordination of intelligence activity conducted for the intent of heightening their advantage in the marketplace.” [CitedBoni and Kovacich, 2000 ; p. 48 ] While this definition may connote Industrial Espionage to be more or less the same as concern or competitory intelligence, John F Quinn explains the indispensable difference between the two – while concern intelligence is by and large under private sponsorship utilizing an “open” methodological analysis, espionage may be either authorities or in private sponsored and clandestine. [CitedBoni and Kovacich, 2000 ; p. 47 ]
My definition of Industrial Espionage is it is the procedure of roll uping information and information for the intent of bring forthing gross. Generating gross is really of import facet for these people. They are non thrill searcher, if the compensation does non warrant the wages they will non trouble oneself trying to roll up the needed information. Persons who commit Industrial Espionage are non looking for information for information interest, but for information that will bring forth a large payday when acquired by a 2nd party or when the information is viewed by unauthorised forces the value of the information is no longer valuable. Money and power are incentives and the bets in today ‘s billion dollar concern environment the wagess far exceeds hazards.
In the extremely competitory and globalized concern environment, proprietary rational belongings and economic information is considered the most valuable trade good by all states, peculiarly the advanced 1s. Businesss and/or authoritiess involve in espionage activities for the intent of unlawfully or clandestinely obtaining sensitive fiscal, trade or economic policy information, proprietary/sensitive economic information ; or critical engineerings including but non limited to informations, programs, tools, mechanisms, compounds, designs, expression, processes, processs, plans, codifications or commercial schemes, whether touchable or intangible, for competitory concern advantage. The proprietary information so stolen may hold been stored, compiled or memorialised physically, electronically, diagrammatically, photographically or in composing and may be moderately protected by the proprietor and non available to the general populace. [ Boni and Kovacich, 2000 ; p. 48 ]
Proprietary information may be stolen by employees accessing the concern and company databases, hackers interrupting into the company waiter, or sponsored squads of burglars. While companies may lose critical concern information through employees go forthing the occupation, espionage occurs when the employee wilfully looks for the informations, bargains it, copies it and sells it for money, or for his ain unit, when he intends to bring forth a similar point. Espionage by rivals involve descrying the activities of other concerns and unlawfully assemblage of secret information, so that they can maneuver their concerns by following appropriate schemes and remain at par with, if non in front of, competition in the market place. Interested foreigners and rivals adopt many methods including graft, detective descrying through fly-by-night bureaus, seeking through refuse, besides referred to as ‘dumpster diving, ‘ cozenages to flim-flam workers through ‘social technology ‘ , or even expose loopholes and weak points in the lives of workers and blackjack them for garnering information.
The larceny or improper reception of rational belongings and economic information, peculiarly by rivals and foreign authoritiess threatens the development and production of goods derived from such information and besides consequences in loss of net incomes, market portion and possibly the concern itself and may thereby consequence in the weakening of the economic power of one ‘s state. [ Boni and Kovacich, 2000 ] In the present information-driven concern environment, concerns tend to turn to the menace earnestly, and in their quest to derive power, maintain control, addition market portion and round competition, states and concerns espouse espionage, handling it casually and prosecuting themselves in espionage, utilizing information and engineering as armaments of concern and economic warfare. [ Jones, Kovacich and Luzwick, 2002 ]
The procedure of Industrial Espionage can be divided into four classs: demands, aggregation, analysis, and rating. First, the demands have to be established. This is when the person is targeted and approached to supply specific information refering a specific occupation or undertaking within a company or organisation. Most frequently a 3rd party will ask to protect the asking individual, organisation, or corporation from liability. Most companies focus their espionage attempts merely on certain undertaking or maps. The 2nd stage allows the aggregator to concentrate their attempts. Collection is the cardinal constituent of Industrial Espionage. This is the cardinal component for payment and has the most hazard involved. These persons must measure the hazard of obtaining the needed information or information with the value of the fee that they will be paid and the hazards of being caught. The single collecting/obtaining the information may utilize any of the following to obtain the needed information/data: physical onslaughts, electronic onslaughts, or even onslaughts against the employees to derive the necessary information. If the wagess are so great ( finically ) , they will travel to whatever lengths necessary to obtain the information, even slaying if necessary. If the petition is for a on the job transcript of a company ‘s merchandise the Collector might merely hold to travel out and by one, so direct off for the proficient information any client is entitled to. While this might see unusual usage of a Collector, retrieve some of the companies roll uping information exist in embargoed states such as Cuba or Iraq where province of the art US merchandise are non readily available. If the petition is for the complete production informations for a complex computing machine bit the occupation might imply illegal, and hence more hazardous, methods such as graft or burglary. Analysis follows. Now that a Collector has accumulated a mass of informations and information they must take clip to see what they have. This entails everything from reading the contents of paperss, both physical and electronic, treating natural informations, and in some instances looking at the flow of employees and information to see what might be go oning and where it is happening. Once the information has been analyzed the Collector refers to the original Requirement to see if he has meet his ends. This is the Evaluation stage. If the client ‘s Requirements have been met the information is bundle, transmitted, and the Collector paid. “ Extra ” information collected is evaluated for value to the current of future clients and recorded for future minutess. In those instances where the Requirements have non been met, the Collector uses the information to return to the Collection Phase, therefore get downing the procedure anew.
Espionage – A Brief History
The technological progresss and the planetary Internet have drastically reformed the art of espionage. The pattern of espionage has transformed revolutionarily over the old ages, as any facet of life and civilisation, from the old manual and human intensive profession to the sophisticated, high-tech chase of stealing electronic information in networked societies. Toffler and Heidi provide a Three Wave Evolution theoretical account to explicate the technological development, every bit good as the development of espionage. [ Toffler, 1980 ; Toffler & A ; Heidi, 1994 ]
Consequently, during the First Wave period, widening from the beginning of human race to about mid 1700s and characterized by the agricultural revolution, information was passed by word of oral cavity or in written correspondence. The larceny of information was minimum as most of the people could non read or compose and espionage was manual, trusting largely on personal observation and one-to-one contact. The Second Wave or the ‘rise of the industrialised civilisation, ‘ which followed and last until a few old ages after World War II, experienced exponential growing in communications and the sharing of information, made possible by such innovations as telegraph, telephone and computing machines. The ulterior old ages of this period saw the development and usage of cryptanalysis as communicating protection and anti-espionage tool, though basically by authoritiess. While concerns had besides begun to utilize computing machines, most of the systems were stand-alone and therefore the menace of espionage was limited. Espionage was thought of chiefly as a authorities and/or military job and anti-espionage steps during the period basically consisted of some signifier of physical security of physical paperss and equipment, such as combination of locks, guards, dismaies and fencings. Emphasis was besides placed on forces security – hiring honest and ethical employees in computing machine field was deemed to restrict espionage menaces. As merely few people operated computing machines, the menace to electronically stored information was limited. [ Toffler, 1980 ; Toffler and Heidi, 1994 ]
The Third Wave or the age of engineering and information, brushing the universe today has seen more progresss in communicating and information sharing, and paradoxically more menaces, than the First and Second Wave periods combined. While the Internet and the globally linked communicating systems serve as a mainstream concern medium, obnoxious studies on how hi-tech felons in concerns and authorities intelligence bureaus of all advanced states are working the possibilities of the cyber universe to run into their assorted terminals, continue to be appal the universe scruples. Today, a big figure of organisational histrions and single information-brokers sponsored by authorities and otherwise, are utilizing the Internet to perpetrate the old offense of espionage in a radical new manner – what Boni and Kovacich footings the ‘netspionage ‘ or web enabled espionage. Harmonizing to them, in the present information-driven globalized society, the differentiation between espionage motivated entirely by military advantage and the quest for market domination is blurred of non wholly eliminated. The research workers claim that the twenty-first century, envisaged as ‘the “Information Age” or the “Age of Technology” to be may alternatively come to be known as the “Age of Netspionage Agent and Techno-Spy.” ‘ [ Boni and Kovacich, 2000 ; p. 5 ]
Before trying to understand the happening of industrial espionage in America, it may be critical to understand the techniques used by the modern espionage – Netspionage – agents and techno-spies so that equal and effectual steps could be adopted to forestall the menace of espionage. Some of the common methods used by Netspionage agents include:
- Datas Victimizing– changing informations before or during entry into the computing machine
- Scavenging– Obtaining information left around a computing machine system and in rubbish tins
- Data Escape– Removing information by smuggling it out as portion of the printed papers
- Piggybacking/ Impersonation –Physical entree to electronic informations utilizing another ‘s User ID and watchword to derive computing machine entree and protected information.
- Simulation and Modeling– Using the computing machine as a tool to be after and/or command a condemnable act
- Wire Tapping– Tapping into a computing machines communicating links to be able to read the information being transmitted between systems and webs
[ Boni and Kovacich, 2000 ; p. 58 ]
Apart from the above, the usage of package application plans, which are standardized over the old ages enable the usage of a assortment of hacker tools includingTrojan Horseenabling covert arrangement of instructions in the plan for unauthorised maps ;Trap Doorsfor infixing debugging AIDSs that provide interruptions in the instructions for interpolation of extra codification and intermediate end product capablenesss ;Logic Bombsor plans executed at a specific clip period ; and the commonComputer Viruswhich are malicious codifications that cause harm to the system information. [ Boni and Kovacich, 2000 ; p. 59 ]
The Cyber Threat
With the coming of the cyber age where information roams free along the electronic corridors of the Internet at the velocity of visible radiation, another sphere has been opened up to the Collector. The tools used are those developed by Hackers and Crackers over the old ages coupled with the good old “ societal technology ” of yearss past. The possible for garnering information is limitless. The sphere, of class, is the World Wide Web and the mark sits on your disc as you view this HTML papers.
In 1997 it was estimated there were fewer than 1000 people that qualified as “ Professional ” Hackers. That is, people who are capable of making tools or developing original methods for Hacking. [ 11 ] Therefore it is safe to presume there are really few Collectors who are true computing machine masterminds. Collectors are merely persons adept at turning bing tools toward roll uping information. An first-class Hacker ‘s Toolkit ( a package bundle which contains books, plans, or independent agents that exploit exposures [ 6 ] ) can be downloaded from the cyberspace with merely a few hours of seeking. Converting computing machine tools to information aggregation is comparatively easy, because with computing machines everything is information and everything created for a computing machine collects and/or transmits information to one grade or another. Corporate web sites hold progressively elaborate information sing a company ‘s construction, merchandises, employees, and the physical layout of its installations. Some sites boast “ fly through ” Tourss of their installations, images and bios of their executive officers, telephone Numberss, and of class electronic mail references of cardinal employees. The exclusive intent of these web sites is to convey the information to anyone who asks. Web browsers collect this information and supply it to the requestor who can see and hive away the information, as they desire. This type of information is priceless to persons who choose to work it as a agency to roll up farther information. With the wealth of information freely available in today ‘s online environment Collectors can make much of their preliminary research without go forthing the comfort of their ain place or interrupting a individual jurisprudence.
Armed with the freely available information Collectors are now prepared use the net to garner even more information. With the bios and names of executives and cardinal employees they can seek the cyberspace for their favourite electronic hangouts. Spoofing can so be used. Spoofing is defined as “ mask by presuming the visual aspect of a different entity in web communications. ” [ 6 ] Emails or ICQ references can be “ spoofed, ” sent with the Collector poising as an investor, possible client, a newsman, or even a pupil researching the lifting stars of the corporate universe. After having answers, Email spoofing can be farther used to look as person in authorization within the corporation who can direct mailing of information, the constitution of computing machine entree histories, and even allow greater entree for established histories. All of these gives the aggregator entree to merely a small spot more of the corporation and its secrets, all with minimum exposure of the aggregator and sets the phase for farther onslaughts. These can run from accessing an unbarred port for downloading files, to working any one of a figure of known security holes to derive root entree to a system. A good illustration of the potency for “ Cyber ” Industrial Espionage comes from a New York Times report that claimed Reuters Analytics, Inc. hired a Collector to steal the implicit in package and codifications for their challenger ‘s, Bloomberg, L.P, information terminuss. Though Reuters had a head start in the industry, Bloomberg ‘s merchandise was considered superior. Annual gross revenues of these informations terminuss exceeds $ 6.5 Billion. [ 11 ]
By blending Mundane and Cyber techniques aggregators can multiply the effects of their aggregation attempts. The modus operandi of the office, gathered by watching, can enable the aggregator to be after physical housebreakings of the edifice. While rolling the halls of the corporation they can steal trade secrets, ringer thrusts of cardinal employees, and even set in topographic point login gaining controls, all Acts of the Apostless that could travel wholly undetected because it does no affect the remotion of a individual piece of belongings. Well planned daytime entries over tiffin the lunch hr can let the informed aggregator clip ringer discs, transcript cardinal files, or even direct electronic mails from cardinal employee ‘s desks to put into gesture ironss of events to leak information or interrupt company public presentation. Collectors can do usage of internal webs to convey the paperss outside the edifice to avoid security.
Industrial Espionage in America
The United States being the most dominant economic power in the universe today is besides a major mark of espionage. In 1988, the FBI accused a former Amgen Inc. research worker of mongering secret paperss refering the wonder drug Epogen. In 1989, U.S. agents tracked down three moles working at an IBM affiliate in France after they purportedly botched a sale of confidential paperss. [CitedCrock, 1997 ] The monolithic information engineering substructure enables concerns and industries to tap proprietary and secret information of rivals to derive control of the planetary market topographic point. Research suggests that the menace of espionage and the loss of proprietary/sensitive information have hit the fabrication industries peculiarly hard. As the R & A ; D disbursals for fabrication companies are dearly-won, some companies, foreign or domestic, are tempted to catch up even if through improper agencies. [ Naef, 2003 ]
Industrial espionage is rampant in the United States — harmonizing to the FBI, of the 173 universe states, 57 were actively running operations aiming the U.S. companies ; approximately 100 states spent some part of their financess aiming U.S. engineerings. [ Boni and Kovacich, 2000 ; p. 50 ] A study conducted by PricewaterhouseCoopers and the American Society for Industrial Security revealed that Fortune 1000 companies lost more than $ 45 billion in 1999 due to larceny of their proprietary information entirely. The survey finds that “although fabrication reported merely 96 incidents, the acknowledged losingss of fabricating companies accounted for the bulk of losingss reported in the study, and averaged about $ 50 million per incident.” [ Cited Naef, 2003 ] While current and former employees, providers and clients are considered to be responsible for 70 to 80 % of proprietary/sensitive information losingss, an unidentified study suggests that 21 per centum of attempted or existent larcenies of proprietary/sensitive information occurred in abroad locations. [ Boni and Kovacich, 2000 ; p. 50 ]
It is important to observe that the U.S is non merely a mark of espionage, but besides actively indulge in espionage activities themselves. The US authorities has admitted utilizing commercial espionage – phone calls were illicitly tapped to find that a Gallic rival of a US house was corrupting Brazilian functionaries to obtain an air traffic control radio detection and ranging contract ; it was subsequently revealed that the US house was besides corrupting functionaries. It is by and large believed that big intelligence bureaus of developed states are involved in the pattern of espionage. A committee of the European Parliament suspects that ECHELON, a communications espionage system operated by the U.S. National Security Agency and bureaus of the United Kingdom, Germany, Canada, Australia and New Zealand, is used for political espionage and on occasion to assist American companies against European rivals. [ Vest, 1998 ]
Economic Espionage Act of 1996
Economic and industrial espionage present many challenges to many American companies as rampant information breaches are bing companies significant amounts of money. While corporations and concerns frequently do non describe espionage incidents to jurisprudence enforcement, the Federal authorities today recognizes industrial and economic espionage as a offense ; the Congress has legislated the Economic Espionage Act of 1996 in an effort to assistance companies to protect themselves from espionage. Section 19831 punishes the larceny, embezzlement, unlawful change and bringing of trade secrets when accused parties intended to, or knew that their misconduct would profit a foreign authorities, instrumentality or agent. The Act allows for legal action sing “financial, concern, scientific, technology, proficient and economic information, ” if a company can show it has attempted to maintain this information classified and protected. The prescribed maximal penalty for an single wrongdoer is 15 old ages ‘ imprisonment, $ 500,000 mulct or both ; for an organisation the mulct is $ 10 million. [ Kelley, 1997 ]
It is understood that many companies do n’t take advantage of the Act ; companies safely exploit the jurisprudence in full cognition when intelligence of the breach is known publically. However, as Naef observes, if the trade secret larceny is non publically known, a company may hold to meticulously measure the advantages and disadvantages of actioning another company and thereby traveling public as intelligence of the larceny may damage the company ‘s repute. [ Naef, 2003 ] Yet, instances of industrial and economic espionage have been reported since the passage of the Act, though barely. In September 2003 one adult male was pled guilty of copying trade secrets as defined under the Economic Espionage Act of 1996 ; the instance was the first of its sort in Northern California. The US Attorney ‘s office subsequently publicized that Say Lye Ow, a 31 twelvemonth old originally from Malaysia, copied sensitive information on Intel ‘s first 64-bit processor when he left the company in 1998. [ Naef, 2003 ]
Industrial Espionage and Corporate Vulnerability
It is frequently the failure of corporations to adequately protect their information resources that makes them vulnerable to espionage. The exposure and the casual attitude of companies are by no agencies excusable, given the economic deductions of the menace of espionage every bit good as the weakening of the economic power of the capable state. It may be worthwhile, possibly critical, to understand the grounds for the exposure of corporations in order to forestall espionage and the resulting economic losingss to concerns. Businesss make themselves vulnerable to espionage for a assortment of grounds, including:
- Proprietary/sensitive concern information non identified
- Proprietary information non adequately protected
- Computer and telecommunication systems non adequately protected
- Lack of or unequal policies and processs
- Employees non cognizant of their duties
- Management attitude of “ We do n’t hold proprietary or sensitive information” and/or “It ca n’t go on to us”
[ Boni and Kovacich, 2000 ; p. 50 ]
These factors along with such other menaces as increasing reprobates seeking to steal information for money and the exposures of systems on the Internet easing information larceny on a planetary graduated table present permeant menace to information worth protecting every bit good as challenge directors, security forces and jurisprudence enforcement functionaries responsible for safety and security of information.
Employees, a Menace or Defense mechanism
Whether called Social Engineering, as in most Hacker manuals, or HUMINT ( Human Intelligence ) , as the Department of Defense refers to it, your employees are marks of Collectors. Peoples are a two-edged arm in procuring your corporate secrets being both the best protection, and the biggest hazard. Proper preparation, instruction, and motive can give people the tools and desire to maintain your corporate secrets safe. Conversely, appealing to the amour propre, greed, or vindictive nature of disenchanted or bored people has ever been a tool of the traditional undercover agent. Now these entreaties can be made with protection of the electronic web. After garnering sufficient information on employees the Collector can take his mark. If the person bites, a face to confront meeting can be scheduled, if non the lone thing that can be turned over the security is an email reference or ICQ figure, all easy disposed of with no hint to the Collector.
Another method used to assail through your employees is to take the information gathered by Mundane and Cyber agencies and portray another person or burlesque them electronically. Calls are placed over the phone, or messages sent via electronic mail pretense to be person with the authorization to do determinations. A good pick would be one of those executive officers with the image and bio on the corporate web page. Regardless of the function many bored or detached persons will give out information to include IP references, system apparatus, and even watchwords and userids over to phone when intimidated.
Enrolling Insiders is another common pattern among Collectors. “ Many publications on computing machine security identify the most common beginning of knowing break as authorised persons executing unauthorised activity. ” [ 13 ] Again, much of the information on the persons that you would wish to enroll can be found in publically accessible databases and web sites. From this, some insouciant research can give those campaigners who are most susceptible to corrupt or extortion. Often after proper research the Collector can do his presence know to the Insider and have them do the first overtures. This allows the Collector to hold some modicum of assurance the person will no travel running directly to corporate security. Insiders are the most valuable assets a Collector can hold. “ They have the clip and freedom to seek people ‘s desks, read private memos, transcript paperss, and maltreatment coworker friendly relationships. [ 3 ] The menace does non stop when the Insider leaves the corporation either. In 1992 several General Motors employees were accused of taking over 10,000 paperss and discs incorporating GM trade secrets when they “ defected ” to Volkswagen. GM sued and in 1997 received a payment of $ 100 million from Volkswagen. [ 11 ]
Inserting Agents is one of the least hazardous signifiers of Industrial Espionage. The Collector handpicks the person who they intend to infix. They provide the preparation, background narrative, and decide at which degree to try to infix the person. Once hired, even in a place of limited entree, the single becomes a sure Insider for the Collector, able to supply increasing degrees of entree and execute some of the Mundane and Cyber onslaughts from within the corporation with minimal menace of being caught.
Preventing Industrial Espionage
While legal steps and statute laws that send strong messages against espionage can be effectual in forestalling its happening, the function and duty of corporations is important. Even as companies take a non-serious attack to espionage, there is small argument that companies should guard themselves efficaciously against the ‘info-thieves ‘ , both insiders and those unleashed by foreigners, who try to acquire secrets by all possible agencies. Measures that may assist companies to forestall espionage include:
- Conducting a study of hazard appraisal, and placing possible hazard countries,
- Developing a security policy without much of safety hazards.
- Frequently measuring the security policy and processs and modify if necessary
- Classifying and taging sensitive and valuable information
- Isolating information that should ne’er fall into the custodies of a rival
- Detecting the vulnerable countries that could be exploited by a rival
- Controlled storage of sensitive information
- Controlled devastation of stuffs
- Executing Nondisclosure Agreements for employees, sellers and contractors
- Procuring computing machine systems and webs by put ining appropriate information system security merchandises
- Monitoring electronic mail and Internet usage
[ Winkler, 1997 ; Boni and Kovacich, 2000 ]
While the above methods may be utile in protecting against espionage, cardinal to commanding the industrial espionage is security consciousness and preparation of employees as one of the major points of exposure is descrying activities by people belonging to the same organisation. “Security consciousness and preparation plans can function to inform employees about their organisation ‘s information security policy, to sensitise them to put on the line and possible losingss, and to develop them in the usage of security patterns and technologies” [ Denning, 1998, p.382 ] . By puting in security processs and preparation, corporations may develop employees in the countries of forces, internet and physical security ; they can besides be made cognizant of their duties sing information security of the organisation.
The increasing value of trade secret information in the planetary and domestic market place and the possibilities of the information engineering revolution have resulted in a important rise in espionage activities in the recent old ages, peculiarly against the U.S. being the most dominant economic power in the universe. While statute laws may be utile in forestalling the offense of industrial and economic espionage, the burden is mostly on corporations to implement equal security policies and steps to protect themselves from concern losingss every bit good as prevent the weakening of the economic power of their state.
1. Boni W. & A ; Kovacich G.L. ( 2000 )Netspionage: The Global Threat to InformationMa: Butterworth- Heinemann
2. Crock, S. ( 1997 ) “Business Spies: The New Enemy
Within? ” Book Review: War By Other Means” Economic Espionage in America By John J. FialkaBusiness WeekAvailable at: hypertext transfer protocol: //www.businessweek.com/1997/06/b351325.htm Accessed 02/26/06
3. Denning, D. E. ( 1998 )Information Warfare and SecurityMa: Addison-Wesley
4. Jones A. Kovacich G.L. & A ; Luzvick P.G. ( 2002 )Global Information Warfare: How Businesss, Governments and Others Achieve Aims and Attain Competitive AdvantageFlorida: Auerbach Publications
5. Kelley, P.W. ( 1997 ) “The Economic Espionage Act of 1996”InBoni W. & A ; Kovacich G.L.Netspionage: The Global Threat to InformationMa: Butterworth- Heinemann p. 241-247
6. Naef, W. E. ( 2003 ) “Economic and Industrial Espionage: A Menace to Corporate America”Infocon MagazineIssue One, October Available at: hypertext transfer protocol: //www.iwar.org.uk/infocon/economic-espionage.htm Accessed 02/26/06
7. Vest, J. ( 1998 ) “Erosion of Individual Privacy – Echelon Subchapter” TheVillage Voice, August 11 Available at: hypertext transfer protocol: //www.mega.nu:8080/ampp/echelon.html Accessed 02/26/06
8. Toffler, A. & A ; Heidi. ( 1994 )Making a New World CivilizationAtlanta: Turner Printing
9. Toffler, A. ( 1980 ) The Third Wave NY: Bantam Book
10. Winkler, I. ( 1997 )Corporate EspionageCalcium: Prima Printing