U.S. flag

An official website of the United States government, Department of Justice.

NCJRS Virtual Library

The Virtual Library houses over 235,000 criminal justice resources, including all known OJP works.
Click here to search the NCJRS Virtual Library

Industrial Espionage - Intelligence Techniques and Countermeasures

NCJ Number
94116
Author(s)
N R Bottom; R R J Gallati
Date Published
1984
Length
333 pages
Annotation
This book discusses the defense against espionage; planning, organizing, directing, and controlling counterintelligence; developing intelligence; and the use of these tools by the enemy.
Abstract
Virtually all documents, computer data, and conversations have potential as an espionage target. Competitive industrial intelligence may be domestic as well as foreign-directed. Computerized data storage is particularly vulnerable. Although espionage in the United States is illegal, consistent enforcement is lacking. Each company should conduct a formal survey to assess the needs for asset protection. Security should note the seven categories of investigation: communications, undercover assignments, double agents, escape routes, reconnaissance, surveillance, and background investigation. Categories of scientific and technical aids to investigation include aids for data collection, aids for research, aids for identification, and aids for surveillance. Research and analysis are critical elements of each investigation, and intelligence is the product of analysis. Four common errors in analysis are overlooked threats, mistaken suspects, generalized conclusions, and erroneous conclusions. Private owners, in particular, should seek competent security directors and provide adequate resources for their security departments. Security directors should use countermeasures before industrial espionage occurs. An electronic surveillance glossary, about 85 references, and an index are included.