Security Supervision and Management
eBook - ePub

Security Supervision and Management

Theory and Practice of Asset Protection

IFPO, Sandi J. Davies,Brion P. Gilbride,Chris A. Hertig

  1. 668 pages
  2. English
  3. ePUB (adapté aux mobiles)
  4. Disponible sur iOS et Android
eBook - ePub

Security Supervision and Management

Theory and Practice of Asset Protection

IFPO, Sandi J. Davies,Brion P. Gilbride,Chris A. Hertig

DĂ©tails du livre
Aperçu du livre
Table des matiĂšres
Citations

À propos de ce livre

Security Supervision and Management, Fourth Edition, fills the basic training needs for security professionals who want to move into supervisory or managerial positions. Covering everything needed from how to work with today's generation security force employees to the latest advances in the security industry, Security Supervision and Management, Fourth Edition, shows security officers how to become a more efficient and well-rounded security professional. Security Supervision and Management, Fourth Edition, is also the only text needed to prepare for the Certified in Security Supervision and Management (CSSM) designation offered by International Foundation for Protection Officers (IFPO).

The IFPO also publishes The Professional Protection Officer: Practical Security Strategies and Emerging Trends, now in its 8th edition.

  • Core text for completing the Security Supervision and Management Program/Certified in Security Supervision and Management (CSSM) designation offered by IFPO
  • Contributions from more than 50 experienced security professionals in a single volume
  • Completely updated to reflect the latest procedural and technological changes in the security industry
  • Conforms to ANSI/ASIS standards

Foire aux questions

Comment puis-je résilier mon abonnement ?
Il vous suffit de vous rendre dans la section compte dans paramĂštres et de cliquer sur « RĂ©silier l’abonnement ». C’est aussi simple que cela ! Une fois que vous aurez rĂ©siliĂ© votre abonnement, il restera actif pour le reste de la pĂ©riode pour laquelle vous avez payĂ©. DĂ©couvrez-en plus ici.
Puis-je / comment puis-je télécharger des livres ?
Pour le moment, tous nos livres en format ePub adaptĂ©s aux mobiles peuvent ĂȘtre tĂ©lĂ©chargĂ©s via l’application. La plupart de nos PDF sont Ă©galement disponibles en tĂ©lĂ©chargement et les autres seront tĂ©lĂ©chargeables trĂšs prochainement. DĂ©couvrez-en plus ici.
Quelle est la différence entre les formules tarifaires ?
Les deux abonnements vous donnent un accĂšs complet Ă  la bibliothĂšque et Ă  toutes les fonctionnalitĂ©s de Perlego. Les seules diffĂ©rences sont les tarifs ainsi que la pĂ©riode d’abonnement : avec l’abonnement annuel, vous Ă©conomiserez environ 30 % par rapport Ă  12 mois d’abonnement mensuel.
Qu’est-ce que Perlego ?
Nous sommes un service d’abonnement Ă  des ouvrages universitaires en ligne, oĂč vous pouvez accĂ©der Ă  toute une bibliothĂšque pour un prix infĂ©rieur Ă  celui d’un seul livre par mois. Avec plus d’un million de livres sur plus de 1 000 sujets, nous avons ce qu’il vous faut ! DĂ©couvrez-en plus ici.
Prenez-vous en charge la synthÚse vocale ?
Recherchez le symbole Écouter sur votre prochain livre pour voir si vous pouvez l’écouter. L’outil Écouter lit le texte Ă  haute voix pour vous, en surlignant le passage qui est en cours de lecture. Vous pouvez le mettre sur pause, l’accĂ©lĂ©rer ou le ralentir. DĂ©couvrez-en plus ici.
Est-ce que Security Supervision and Management est un PDF/ePUB en ligne ?
Oui, vous pouvez accĂ©der Ă  Security Supervision and Management par IFPO, Sandi J. Davies,Brion P. Gilbride,Chris A. Hertig en format PDF et/ou ePUB ainsi qu’à d’autres livres populaires dans Negocios y empresa et GestiĂłn de la informaciĂłn. Nous disposons de plus d’un million d’ouvrages Ă  dĂ©couvrir dans notre catalogue.

Informations

Année
2015
ISBN
9780128004890
Unit VII
Current Issues in Security
37

Espionage

A Primer

Brion P. Gilbride

Abstract

Espionage, in essence, is stealing secrets. Secrets can be in nearly any form—a document, an email, computer files, recorded conversations, text messages, etc. Who keeps secrets? Governments do, as do companies and people. The original recipe for Kentucky Fried Chicken is a secret. The schematics for a new machine may be a secret. Negotiations for a merger between two companies, plans for a brand-new aircraft carrier, and a list of spies with official cover working in Turkmenistan are all secrets. There are thousands of examples. If another entity—either a corporation or even a government—got its hands on one of these secrets, consider what the impact would be. A competitor’s product may beat your employer’s product to market, costing millions in revenues. A government may begin feeding misinformation to your government’s spies because it now knows who they are. Two companies may not merge; instead, your company fails while the other survives. The outcomes are legion, and most of them are bad.

Keywords

Encryption; Espionage; Information; Sabotage; Safety; Secrets; Social Engineering; Stealing; Trade Secrets; Tradecraft
Gentlemen do not read each other’s mail.
Henry L. Stimson, US Secretary of State, 1929
When you think of espionage, what is the first thing that comes to mind? Perhaps you imagine shadowy government agents trading briefcases full of secrets in a dark alley, the CIA and KGB, or James Bond/007. This is what most people, regardless of where they are in the world, understand about the business of espionage. The reality is that governments do collect all manner of information on the operations and activities of other countries, both friend and foe. Also, part of this reality is that businesses and individuals collect information on each other—whether for business advantage, revenge, protection, or any other reason.
Espionage, in essence, is stealing secrets. Secrets can be in nearly any form—a document, an email, computer files, recorded conversations, text messages, etc. Who keeps secrets? Governments do, as do companies and people. The original recipe for Kentucky Fried Chicken is a secret. The schematics for a new machine may be a secret. Negotiations for a merger between two companies, plans for a brand-new aircraft carrier, and a list of spies with official cover working in Turkmenistan, are all secrets. There are thousands of examples. If another entity—either a corporation or even a government—got its hands on one of these secrets, consider what the impact would be. A competitor’s product may beat your employer’s product to market, costing millions in revenue. A government may begin feeding misinformation to your government’s spies because it now knows who they are. Two companies may not merge; instead, your company fails while the other survives. The outcomes are legion, and most of them are bad.

Espionage in History

If the previous examples seem vague, there are plenty of real-life examples. In November 1778, General George Washington ordered that a spy ring be established to operate in New York City and supply information on British troops. The ring, called the Culver Spy Ring, operated until 1783. None of the members were ever caught. Methods used by the spy ring included pseudonyms, writing messages in invisible ink, and designing a numerical substitution system to identify people and places. During the ring’s 5 years, its successes included thwarting a British attack on Rhode Island in 1780, as well as the capture of British Major John Andre—the spy who had led the Americans to Benedict Arnold.1
In the period after World War II, the Soviet Union was able to produce an atomic bomb years before anyone thought they could. They had help from several people; one was noted scientist Klaus Fuchs, who worked on the Manhattan Project. The scientists involved in the Manhattan Project developed the atomic bombs that were ultimately dropped on Nagasaki and Hiroshima, Japan at the end of the war. Fuchs passed along information on bomb design and assembly when he worked in the United States; when he moved to London, he passed along information on plans for a hydrogen bomb. To whom did he pass this information? The Soviet Union.2 Fuchs was arrested in February 1950 and sentenced to 14 years in prison.
During the 1980s, an Iraqi scientist working on Saddam Hussein’s nuclear program used his memory to identify foreign recipients of a restricted report so that he could obtain copies of it for Iraqi use. In his book The Bomb in My Garden, Dr. Mahdi Obeidi described his search for a particular report on the design of an atomic weapon. He tracked down this report to a library at the University of Virginia. When Dr. Obeidi went to see it, he learned that he would need to complete paperwork and provide identification for security purposes. To avoid leaving anything incriminating behind, Dr. Obeidi protested that the paperwork would take time and asked if he could briefly peruse the report to confirm it was the particular report he was looking for. The university agreed, and Dr. Obeidi was given the report. In doing this, Dr. Obeidi had the paper in his possession long enough to review the list of people to whom copies were provided to at the time it was published. This list contained the name of an Italian professor of Dr. Obeidi’s acquaintance who may not have been subject to restrictions such as those placed by the University of Virginia. In this way, Dr. Obeidi was able to obtain a copy of the report without anyone in the United States knowing that he did so. In the United States, his attempt to access the report at the University of Virginia likely would have been reported to the authorities.3

Espionage in the Twenty-First Century

As demonstrated, different varieties of espionage have been used over the years. As the amount of information amassed by people and the methods of storing or transporting all of that data have exploded, the threats generated by espionage have changed. Espionage cases from the twenty-first century demonstrate some of the differences. In June 2013, an Indian national living and working in the United States was arrested and charged with theft of trade secrets. This person allegedly downloaded 8000 files from Becton Dickinson’s computer servers for a disposable pen injector that the company was developing. The files were stored on external hard drives, thumb drives, and other storage devices.4 This case is currently pending.
On February 28, 2007 Hanjuan Jin, a naturalized US citizen of Chinese descent from Aurora, Illinois, was intercepted at Chicago O’Hare International Airport attempting to board a flight to China. In her possession were more than 1000 electronic and paper documents that were property of Motorola. During her trial in 2011, a number of facts came to light. Jin joined Motorola in 1998 and worked until taking a leave of absence in 2006. During this leave, Jin obtained a job with Sun Kaisens, a Chinese communications company with connections to the Chinese military. On February 15, 2007 Jin returned to the United States and resumed employment with Motorola on February 26. Jin made multiple visits to Motorola between February 26 and 27; during those visits, Jin downloaded hundreds of technical documents from Motorola’s servers and transported numerous hard-copy documents out of the facility. Among the materials seized from Jin on February 28 at O’Hare Airport were descriptions of specific Motorola product features, classified Chinese military documents, and $30,000 in cash. Jin was convicted on three counts of theft of trade secrets but was acquitted on three counts of economic espionage on behalf of China.5
On May 20, 2013, a man named Edward Snowden boarded a flight from Hawaii to Hong Kong. In his possession, or under his control at that time, were numerous files and documents containing classified information on US intelligence and diplomatic activities throughout the world. Snowden is believed to have obtained these items via his work with the US National Security Agency (NSA) as a contract employee. Prior to this work, Snowden had worked for the US Central Intelligence Agency from 2007 to 2009 as an information technology (IT) specialist, and before that for the NSA as a security guard.6 It was primarily his IT background that enabled him to find and then copy the materials he ultimately fled with. Among those materials were documents relating to NSA capabilities concerning the collection, recording, and analysis of international and domestic phone calls involving the United States.7

Sabotage

Espionage cannot be adequately covered without discussing its evil twin, sabotage. Sabotage occurs when an individual takes an action that interferes with normal business or government operations. Keep in mind that the action does not have to be physical, such as pouring sugar into the gasoline tank of a car to prevent the engine from working properly. It can be something simple, such as renaming an important computer file so that others cannot find it. Being able to commit sabotage requires many of the same elements that committing espionage requires—particularly, opportunity or access to items or systems that can be sabotaged....

Table des matiĂšres

  1. Cover image
  2. Title page
  3. Table of Contents
  4. Copyright
  5. Dedication
  6. List of Authors and Contributors
  7. Foreword
  8. Acknowledgments
  9. Introduction
  10. Protection Officer Code of Ethics
  11. Unit I. Foundations
  12. Unit II. Basics of Supervision
  13. Unit III
  14. Unit IV. Technology in Security
  15. Unit V. Emergency Management
  16. Unit VI. Investigations
  17. Unit VII. Current Issues in Security
  18. Index
Normes de citation pour Security Supervision and Management

APA 6 Citation

[author missing]. (2015). Security Supervision and Management (4th ed.). Elsevier Science. Retrieved from https://www.perlego.com/book/1827417/security-supervision-and-management-theory-and-practice-of-asset-protection-pdf (Original work published 2015)

Chicago Citation

[author missing]. (2015) 2015. Security Supervision and Management. 4th ed. Elsevier Science. https://www.perlego.com/book/1827417/security-supervision-and-management-theory-and-practice-of-asset-protection-pdf.

Harvard Citation

[author missing] (2015) Security Supervision and Management. 4th edn. Elsevier Science. Available at: https://www.perlego.com/book/1827417/security-supervision-and-management-theory-and-practice-of-asset-protection-pdf (Accessed: 15 October 2022).

MLA 7 Citation

[author missing]. Security Supervision and Management. 4th ed. Elsevier Science, 2015. Web. 15 Oct. 2022.