亚洲精品欧洲_久久国产精品精品国产色婷婷_黄动漫在线观看_国内精品久久久久_日韩伦理在线电影_久久久久久一区_精品三级在线观看视频_影音先锋欧美在线_h视频在线免费观看

商業間諜

Spotting corporate espionage

From the top of the Gherkin building in London, Crispin Sturrock points out an anonymous-looking office block in the swirling snow below. “There’s a device in there,” says the chief executive of White Rock Defence Systems, an information security consultancy that helps companies protect themselves against spies. “They’re not clients of ours, but whenever we scan for transmissions in nearby buildings, we pick it up. It’s been there for ages, just streaming information out.” The building in question is bugged with an electronic device transmitting information about one of its tenants. In the era of WikiLeaks, it is tempting to view all leaks as news headlines. But in general, corporate leaks tend to be of interest only to a very small group of people – an organisation’s competitors or potential buyer. “The reasons people engage in competitive information gathering are usually financial gain and leverage,” says Mr Sturrock. Some cases of corporate espionage have, of course, made it to the news pages. In 2006, Hewlett-Packard was investigated in the US by the House Committee on Energy and Commerce, the California attorney-general’s office and the Securities and Exchange Commission for spying on its board members’ e-mails and telephone records. It led to a number of resignations. And in a lawsuit filed last year, Starwood, the hotel chain, alleged that former executives had left the company to join Hilton, the hotel group, armed with confidential information. Hilton says the allegations are without merit. Mr Sturrock says: “High-profile cases are very few and far between. Ideally, the competition should never know you have spied on them because it ruins your chances of doing so in the future.” Moreover, the information might not be put to use immediately. If the spy is smart, he says, they “might be working to a five-year plan. It’s like poker. You don’t win every hand. Rather, you play the game until the jackpot gets big enough.” The jackpot can be phenomenal – tens of thousands spent on corporate espionage can result in a payback in the millions.

“Unfortunately,” says Rob Pope, an ethical hacker for the digital security company Vigilante Bespoke, “people tend to find out after the fact rather than before.” Your company may have lost a string of bids that it really should have won or your competitors may be demonstrating an uncanny ability to pre-guess your launches. Or a tip-off could come from a loyal customer who has been approached by a competitor who knows too much. Competitive intelligence gathering ranges from en-tirely legal to wholly illegal. On the one hand, talking someone into divulging information or putting pieces of information together in the right way is almost certainly legitimate. And on the other, bugging a boardroom or hacking into e-mails is likely to be criminal. If your suspicions are aroused, it might be time to investigate using such measures as sweeping sensitive rooms for bugs or adding traps to a database. “You can seed your database with information which, if acted on, will alert you,” says Phil Beckett, director of disputes and investigations at the corporate investigators arm of Navigant Consulting. He suggests planting a bogus contact that is in fact an e-mail address you have set up. Human fallibility may be the most vulnerable spot. Basic bugs sold for as little as £100 ($155) can be planted in a coffee room. Or a spy may befriend a junior member of staff with access to high-level information, such as a director’s PA. Mr Beckett says that once you know a leak is occurring and what information is being leaked, you can usually work out where it is coming from. “When it’s a known leak, we establish a sphere of influence and knowledge. Who knows this information or knows the people who do know – you draw a sort of Venn diagram. Then you narrow it down to a small group of individuals. That way you’re not on a fishing expedition. Once you’ve done that, you often look at the relationship data. Who’s e-mailing who – and what are their diaries like?” There are other ways to search too. Document tracking systems allow you to see who is looking at, or altering, important documents. Most devices create a time stamp whenever a USB drive is inserted. Or an employee might be acting strangely. “We had one person who came under suspicion because she was logging-on on Saturdays,” says Mr Beckett. “She was actually hiding a fraud and doing it at the weekend because she thought it was more suspicious to do it while she was working. But doing it at the weekends alerted us.” In a lot of cases, however, says Mr Pope, the information simply goes out via private webmail accounts. While these are encrypted by default, a company could note suspiciously large attachments being sent out. Moreover, he adds, there are often surprisingly unsophisticated ways to circumvent high-tech security measures. “I worked on one case where the files in the database couldn’t be saved. So the person in question was viewing each page and taking screenshots, then e-mailing them out as JPEGs.” Mr Pope adds that a leak may not even be from directly within your business. “You have to be very careful about rushing to conclusions. We looked at one company and the leaks were actually coming from the ac-counting firm that was auditing the business.” Similarly, says Mr Sturrock: “It could be a third-party location. If companies book off-site meetings, it is very easy to find out where and when.” Whatever the case, says Mr Beckett, the timing of your pounce can be a tough call: “Obviously, you’re losing valuable information. But stopping something straightaway may not be ideal from an investigative viewpoint. You need to secure the evidence and capture e-mails and PC records.” Mr Sturrock says: “If we find a dev-ice, we can kill it, but the company in question may want to find out who put it there or feed it disinformation or set a trap. To take an obvious example, if a device needs its batteries replaced, someone’s going to do it, and catching them in the act may lead you to a competitor and help you build a case.” Catching a culprit is not the end of the matter: there is the vexed question of what to do. The answer tends to be nothing public. Mr Beckett says: “I often see people putting tog-ether evidence in order to get an out-of-court settlement. They take a commercial and pragmatic viewpoint because reputationally they have to. It’s almost inevitable that it will never go to trial and an agreement will be reached behind closed doors.” Mr Pope points out that if the guilty party is an employee, they may get away with it entirely. “The way it works out is that the company usually wants people to leave quietly and without a fuss.” Ironically, this can mean that the guilty party gets a good reference and a pay-off.

訂閱以繼續探索完整內容,并享受更多專屬服務。
版權聲明:本文版權歸FT中文網所有,未經允許任何單位或個人不得轉載,復制或以任何其他方式使用本文全部或部分,侵權必究。
設置字號×
最小
較小
默認
較大
最大
分享×
国产欧美日韩影院| 中文字幕 日本| 99国产精品一区二区| 成人片黄网站色大片免费毛片| 国产欧美一区二区在线观看| 亚洲色图另类图片| 国a精品视频大全| 99香蕉久久| 国产精品午夜影院| 久久综合电影一区| 日韩电影免费观看高清完整版在线观看| 中文字幕第80页| 岛国一区二区在线观看| 色婷婷av一区二区三区之红樱桃 | 国产精品视频看| 粉嫩tv在线播放| 五级黄高潮片90分钟视频| 日韩二区三区在线| free亚洲| 韩国福利视频一区| 国产嫩草在线视频| 亚洲电影一二三区| 亚洲黄页一区| 中文字幕日韩久久| 蜜乳av另类精品一区二区| 手机在线看片日韩| 国产一区二区视频在线播放| 国产精品熟女视频| 欧美制服丝袜第一页| 成全视频全集| 26uuu另类亚洲欧美日本老年| 成人图片小说| 91久久国产婷婷一区二区| 欧美日韩国产传媒| 国产精选久久久| 日韩二区三区在线| 五月婷婷丁香网| 视频在线精品一区| 欧美女激情福利| 天天干,夜夜爽| 国产精品一区二区三区在线观| 日韩国产精品大片| av黄色免费| 免费在线观看的毛片| 在线免费观看成人短视频| 丁香花电影在线观看完整版| 免费成人深夜蜜桃视频| 日韩视频免费在线| 亚洲国产老妈| 国产视频中文字幕| 久久久久免费精品| 欧美日韩一级片网站| 欧美h版在线观看| 天堂网在线播放| 成人欧美一区二区| 99精品国产一区二区三区不卡| 99热最新网址| 少妇高潮喷水在线观看| 色偷偷久久一区二区三区| 国产cdts系列另类在线观看| 国产乱国产乱老熟300部视频| 国内精品一区二区三区| 91欧美一区二区| av先锋下载| 亚洲精品一区二区毛豆| 成人av资源站| 黄色片免费在线观看| 久操视频在线观看免费| 17婷婷久久www| 免费一级欧美片在线观看| 黄色福利在线观看| 国产精品吴梦梦| 久久久久国内| 黄色网址免费在线| 四虎影院一区二区三区| 成人av在线电影| blackedav金发美女大战黑人| 岛国视频一区免费观看| 亚洲二区中文字幕| 国产成人av免费| 永久免费毛片在线播放不卡| 成人软件在线观看| 91国产免费视频| 日本网站免费在线观看| 日本久久电影网| 91麻豆精品国产综合久久久 | 欧美日韩亚洲综合一区| 福利在线午夜| 牛夜精品久久久久久久| 国产精品美女一区二区三区| 青春草免费在线视频| 欧美日韩中文字幕在线观看 | 欧美国产视频| 极品久久久久久| 欧美成人一区二区三区四区| 国产精品美女www爽爽爽| 3d性欧美动漫精品xxxx软件| 欧洲成人一区二区三区| 日本xxxxxxx免费视频| 日韩在线精品视频| 国产精品福利影院| 亚洲色图二区| 18免费在线视频| 亚洲欧美日韩免费| 美女又爽又黄视频毛茸茸| 人偷久久久久久久偷女厕| 在线观看久久久久久| 国产精品美女久久久久久久久 | 亚洲午夜视频在线| 国产成人一区| 欧美性天天影视| www.蜜桃av.com| 国产人妻精品久久久久野外| 久久伊人资源站| 欧美成人在线网站| 亚洲香肠在线观看| 爽好久久久欧美精品| 日韩成人亚洲| 美女网站在线观看| 蜜臀av在线观看| 911国产在线| 手机福利在线视频| 欧美激情国产日韩精品一区18| 亚洲精品伦理在线| 欧美理论视频| h网站在线免费观看| 中国xxx69视频| 欧美 变态 另类 人妖| 欧美一区二区三区成人久久片| 国产一区二区在线播放| 色综合老司机第九色激情| 六月丁香综合在线视频| 蜜桃视频在线观看www社区| 久久久久久久久久久久久久免费看| 国产精品久久久久久久久久免费 | 九色porny自拍视频在线观看| jjzz在线观看| 99久久精品无码一区二区毛片| 国产视频一区二区在线| 激情综合五月天| 97偷自拍亚洲综合二区| 加勒比久久高清| 亚洲综合影院| 亚洲美女色播| 四虎影视成人精品国库在线观看| 97人人在线视频| 毛片在线网址播放| 免费三级欧美电影| freexxxx性特大另类| 久久精品国产屋| 国产一级片黄色| 97超碰人人看人人| 欧美黑人又粗大| 亚洲无亚洲人成网站77777| 亚洲精品一区二区三区蜜桃下载| 国产精品初高中害羞小美女文| 首页国产欧美日韩丝袜| 激情久久99| 久久亚洲导航| 国产最新在线| 国际av在线| 国产永久av在线| 户外极限露出调教在线视频| 国产xxx免费观看| 欧美成人做性视频在线播放| www.天天操| 福利视频导航大全| 任你操在线观看| 天天操天天射天天色| 日日夜夜网站| 亚洲欧美日韩成人在线| 亚洲区小说区图片区| 成年人视频网站在线| 欧美99在线视频观看| 久久网站最新地址| 自拍偷拍亚洲一区| 精品久久一二三| 伊人久久成人网| 在线麻豆国产传媒1国产免费| 九色porny丨入口在线| 视频一区中文字幕精品| 欧美电影一二区| 激情五月婷婷综合| 99视频在线精品| 日韩精品一区二区三区在线| 菠萝蜜影院一区二区免费| 亚洲自拍欧美色图| 国产精品无码电影在线观看| 在线观看岛国av| av资源在线免费观看| 精品人妻无码一区二区 | 黄色一级视频片| 国产在线免费视频| 欧美日韩亚洲第一页| 美女免费视频网站| 在线一级视频| 性欧美video另类hd尤物| 久久er99热精品一区二区| 国产日韩欧美a| 国产午夜亚洲精品不卡|