Criminal Law News Central Africa

Subscribe

Advertise your job ad
    Search jobs

    More businesses the target of industrial espionage

    South African companies are vulnerable to losing important data due to industrial espionage which will not only impact negatively on their bottom lines and the viability of their businesses, but could also seriously damage their corporate reputations and brands.
    More businesses the target of industrial espionage
    © ginasanders – 123RF.com

    This is according to Alan Carey, operations director of Justicia Investigations, a private investigation company.

    In a highly competitive environment and tough economic times, it is far easier and cheaper to expropriate information than to innovate. Leaked technical specifications could negate a massive investment in being the first to market with a new product. A copied customer database could shrink a market share advantage overnight, he warns.

    Over the past few months Justicia has noted an upsurge in the number of calls from companies requesting debugging services. "We are getting between three and five calls a week from large corporates," he says.

    Concrete statistics

    Leo Nardi, Justicia's technical manager, adds that these calls are not only coming from South Africa but extending throughout Africa from Botswana to Tanzania, as the rush to conquer African markets gathers momentum.

    Finding concrete statistics to back up Justicia's observations is not easy. Both globally and locally, underreporting is rife with companies preferring not to disclose that they have been the targets of industrial espionage for fear of losing customers. However, figures released by Ernst and Young (SA) suggest that industrial espionage is a $67bn a year industry.

    Perhaps the best indicator of the surge in illicit surveillance is a dramatic increase in the sales of bugging devices and equipment. Although, again, there are no South African statistics, but the US State Department estimates that over 700,000 eavesdropping devices are sold each year.

    In addition to constantly updating equipment, Justicia has partnered with an ICT company to ensure a holistic debugging approach.

    Security protocols

    Nardi says that it is evident that the ICT industry is gearing towards more data storage and throughput. Many companies invest in good equipment but then fall behind in adopting suitable security protocols or in configuring the equipment correctly to minimise risk. If you do not take into account your computers, then you are ignoring a large part of your risk profile.

    Carey adds that companies need to tackle industrial espionage and adopt both reactive and proactive measures. "We encourage clients to introduce debugging policies. In addition to protecting and limiting access to confidential information, a debugging policy should help managers to recognise the signs - from the irregular conduct of an employee to physical clues of bugging activities having taken place. Companies also need to have their premises swept for bugs regularly."

    Let's do Biz