亚洲精品欧洲_久久国产精品精品国产色婷婷_黄动漫在线观看_国内精品久久久久_日韩伦理在线电影_久久久久久一区_精品三级在线观看视频_影音先锋欧美在线_h视频在线免费观看

商業間諜

Spotting corporate espionage

From the top of the Gherkin building in London, Crispin Sturrock points out an anonymous-looking office block in the swirling snow below. “There’s a device in there,” says the chief executive of White Rock Defence Systems, an information security consultancy that helps companies protect themselves against spies. “They’re not clients of ours, but whenever we scan for transmissions in nearby buildings, we pick it up. It’s been there for ages, just streaming information out.” The building in question is bugged with an electronic device transmitting information about one of its tenants. In the era of WikiLeaks, it is tempting to view all leaks as news headlines. But in general, corporate leaks tend to be of interest only to a very small group of people – an organisation’s competitors or potential buyer. “The reasons people engage in competitive information gathering are usually financial gain and leverage,” says Mr Sturrock. Some cases of corporate espionage have, of course, made it to the news pages. In 2006, Hewlett-Packard was investigated in the US by the House Committee on Energy and Commerce, the California attorney-general’s office and the Securities and Exchange Commission for spying on its board members’ e-mails and telephone records. It led to a number of resignations. And in a lawsuit filed last year, Starwood, the hotel chain, alleged that former executives had left the company to join Hilton, the hotel group, armed with confidential information. Hilton says the allegations are without merit. Mr Sturrock says: “High-profile cases are very few and far between. Ideally, the competition should never know you have spied on them because it ruins your chances of doing so in the future.” Moreover, the information might not be put to use immediately. If the spy is smart, he says, they “might be working to a five-year plan. It’s like poker. You don’t win every hand. Rather, you play the game until the jackpot gets big enough.” The jackpot can be phenomenal – tens of thousands spent on corporate espionage can result in a payback in the millions.

“Unfortunately,” says Rob Pope, an ethical hacker for the digital security company Vigilante Bespoke, “people tend to find out after the fact rather than before.” Your company may have lost a string of bids that it really should have won or your competitors may be demonstrating an uncanny ability to pre-guess your launches. Or a tip-off could come from a loyal customer who has been approached by a competitor who knows too much. Competitive intelligence gathering ranges from en-tirely legal to wholly illegal. On the one hand, talking someone into divulging information or putting pieces of information together in the right way is almost certainly legitimate. And on the other, bugging a boardroom or hacking into e-mails is likely to be criminal. If your suspicions are aroused, it might be time to investigate using such measures as sweeping sensitive rooms for bugs or adding traps to a database. “You can seed your database with information which, if acted on, will alert you,” says Phil Beckett, director of disputes and investigations at the corporate investigators arm of Navigant Consulting. He suggests planting a bogus contact that is in fact an e-mail address you have set up. Human fallibility may be the most vulnerable spot. Basic bugs sold for as little as £100 ($155) can be planted in a coffee room. Or a spy may befriend a junior member of staff with access to high-level information, such as a director’s PA. Mr Beckett says that once you know a leak is occurring and what information is being leaked, you can usually work out where it is coming from. “When it’s a known leak, we establish a sphere of influence and knowledge. Who knows this information or knows the people who do know – you draw a sort of Venn diagram. Then you narrow it down to a small group of individuals. That way you’re not on a fishing expedition. Once you’ve done that, you often look at the relationship data. Who’s e-mailing who – and what are their diaries like?” There are other ways to search too. Document tracking systems allow you to see who is looking at, or altering, important documents. Most devices create a time stamp whenever a USB drive is inserted. Or an employee might be acting strangely. “We had one person who came under suspicion because she was logging-on on Saturdays,” says Mr Beckett. “She was actually hiding a fraud and doing it at the weekend because she thought it was more suspicious to do it while she was working. But doing it at the weekends alerted us.” In a lot of cases, however, says Mr Pope, the information simply goes out via private webmail accounts. While these are encrypted by default, a company could note suspiciously large attachments being sent out. Moreover, he adds, there are often surprisingly unsophisticated ways to circumvent high-tech security measures. “I worked on one case where the files in the database couldn’t be saved. So the person in question was viewing each page and taking screenshots, then e-mailing them out as JPEGs.” Mr Pope adds that a leak may not even be from directly within your business. “You have to be very careful about rushing to conclusions. We looked at one company and the leaks were actually coming from the ac-counting firm that was auditing the business.” Similarly, says Mr Sturrock: “It could be a third-party location. If companies book off-site meetings, it is very easy to find out where and when.” Whatever the case, says Mr Beckett, the timing of your pounce can be a tough call: “Obviously, you’re losing valuable information. But stopping something straightaway may not be ideal from an investigative viewpoint. You need to secure the evidence and capture e-mails and PC records.” Mr Sturrock says: “If we find a dev-ice, we can kill it, but the company in question may want to find out who put it there or feed it disinformation or set a trap. To take an obvious example, if a device needs its batteries replaced, someone’s going to do it, and catching them in the act may lead you to a competitor and help you build a case.” Catching a culprit is not the end of the matter: there is the vexed question of what to do. The answer tends to be nothing public. Mr Beckett says: “I often see people putting tog-ether evidence in order to get an out-of-court settlement. They take a commercial and pragmatic viewpoint because reputationally they have to. It’s almost inevitable that it will never go to trial and an agreement will be reached behind closed doors.” Mr Pope points out that if the guilty party is an employee, they may get away with it entirely. “The way it works out is that the company usually wants people to leave quietly and without a fuss.” Ironically, this can mean that the guilty party gets a good reference and a pay-off.

訂閱以繼續探索完整內容,并享受更多專屬服務。
版權聲明:本文版權歸FT中文網所有,未經允許任何單位或個人不得轉載,復制或以任何其他方式使用本文全部或部分,侵權必究。
設置字號×
最小
較小
默認
較大
最大
分享×
色一情一乱一伦一区二区三区丨| 99re视频在线播放| 欧美日韩一区二区不卡| 日韩欧美国产三级| 欧美猛男性生活免费| 激情六月天婷婷| 这里只有精品6| 蜜桃av在线免费观看| 国产综合激情| 欧美日韩精品欧美日韩精品 | av动漫免费观看| 午夜视频在线网站| 日韩国产第一页| 国产精品777一区二区| 污污的网站在线看| 久久久久久毛片免费看 | 久久最新网址| aa级大片欧美三级| 欧美tickling挠脚心丨vk| 欧美精品久久| 欧美人妻精品一区二区三区| 亚洲AV无码精品国产| 久草福利资源站| 综合激情在线| 亚洲r级在线视频| 久久久久久久久久久免费 | 九九热国产视频| 欧美大片免费观看网址| 国产精品美女久久久久久| dy888夜精品国产专区| av片在线免费看| 情趣网站在线观看| 欧美xxxx中国| 欧美日韩电影在线播放| 日韩在线三级| 你懂的网站在线观看| 日本aⅴ精品一区二区三区| 亚洲精品小视频在线观看| 日韩不卡的av| 鲁片一区二区三区| 私库av在线播放| 午夜激情在线| av不卡在线播放| 色偷偷888欧美精品久久久| 女同久久另类69精品国产| 国产丝袜在线播放| 一区精品在线播放| 日韩精品另类天天更新| 在线观看国产成人| 国产精品ⅴa有声小说| 亚洲午夜久久久久久久久久久 | www.avtt| eeuss草民免费| 国产在线国偷精品产拍免费yy| 国产精品一区二区三区久久| 中文在线字幕在线观看| 国产一区二区三区不卡视频网站| 欧美有码在线视频| 日本成人动漫在线观看| 97国产精品久久久| 国内自拍视频在线看免费观看| 天天天天天天天操| 国产精品三级久久久久三级| 99在线影院| 国产成人禁片在线观看| 黄色欧美日韩| 91国在线高清视频| 亚洲AV午夜精品| 粉嫩高潮美女一区二区三区| 色之综合天天综合色天天棕色| 亚洲视频一区在线播放| 久久成人免费网| 久久成人免费观看| av在线中出| 国产精品观看在线亚洲人成网| 中文字幕欧美日韩在线不卡| 秋霞午夜av一区二区三区| 天天想你在线观看完整版电影免费| 俄罗斯xxxx性全过程| 中文字幕乱码日本亚洲一区二区| 91精品国产三级| 白浆视频在线观看| 国产国语videosex另类| 97在线资源在| 欧美va亚洲va香蕉在线| 久久久精品国产| www.中文字幕av| avav成人| 91精品国产91| 灌醉mj刚成年的大学平面模特| 岛国一区二区三区| www.av中文字幕| h网站在线播放| 亚洲午夜日本在线观看| 美女黄色片视频| 欧美成人milf| 国产传媒久久久| 欧美18xxxx| 日韩视频在线观看视频| 嫩草影院懂你的影院| 日韩一区二区视频| 国产欧美日韩专区| 成人免费高清视频在线观看| 欧美在线观看视频网站| 国产黄色大片在线观看| 成人欧美视频在线| 手机亚洲第一页| 91精品国产一区二区三区蜜臀 | 欧美中文字幕亚洲一区二区va在线| 无码人妻aⅴ一区二区三区有奶水| 在线观看国产高清视频| 中文字幕亚洲区| 中文字幕黄色片| 国产jizzjizz一区二区| 久久久精品视频在线| 国产激情一区二区三区四区| 制服丝袜在线第一页| 亚洲乱码电影| 国产a级片视频| 青青草97国产精品免费观看| 无码 人妻 在线 视频| 日韩主播视频在线| 澳门黄色一级片| ㊣最新国产の精品bt伙计久久| 国产农村妇女毛片精品| 午夜欧美视频在线观看 | 欧美日韩精品三区| 色婷婷亚洲十月十月色天| 4438全国亚洲精品在线观看视频| 日韩在线免费播放| 亚洲影影院av| 亚洲成人1区| 涩涩网站在线看| 99精品视频免费| 丰满少妇被猛烈进入一区二区| 中文字幕第一页久久| 精品推荐国产麻豆剧传媒| 天堂av中文在线观看| 一区二区三区我不卡| 欧美一区二区三| 国产又粗又硬又长又爽| 久久精品人人做人人爽97| 婷婷综合激情网| 亚洲欧美一区二区三区情侣bbw| 绯色av一区| 青青草国产精品| 亚洲福利专区| 欧美一区二区三区激情| 3751色影院一区二区三区| 国产精品欧美韩国日本久久| 日本久久久久久久| 91大神在线网站| 亚洲一区三区在线观看| av在线成人| 99热这里只有精品2| 国产成人午夜99999| 亚洲欧美一二三区| 欧美中文字幕一二三区视频| 黄色av免费在线| 99久久国产免费免费| 美腿丝袜亚洲综合| www.免费av| 日韩精品一区二区三区在线| 在线观看国产高清视频| 五月天亚洲综合| 圆产精品久久久久久久久久久| 亚洲蜜桃精久久久久久久| 最新福利小视频在线播放| 欧美国产中文字幕| 最新精品在线| 成年人性生活视频| 亚洲成av人片在www色猫咪| 在线观看理论片| 日韩网站在线播放| 国产一区二区三区网站| 国产精品18hdxxxⅹ在线| 老司机成人免费视频| 精品对白一区国产伦| 久久uomeier| 91国产丝袜播放在线| 日韩视频―中文字幕| 精品国产乱码久久久| 中国女人内谢69xxxx免费视频| 国产精品一区二区三区四区五区| 天堂va蜜桃一区二区三区漫画版| 一级美女在线| 最新视频 - x88av| 丁香婷婷深情五月亚洲| 国产va在线观看| 麻豆精品在线视频| 亚洲xxx在线| 成人免费视频网| 亚洲精品资源| 欧美三日本三级少妇三2023| 伊人情人网综合| 亚洲欧美另类久久久精品| 888av在线视频| 亚洲视频在线免费播放| 久久国产精品-国产精品| 国产精品乱码一区二区三区软件|