Related
Fraud is often an insider job
31 May 2017
Identity fraud in Gauteng is increasing
20 Nov 2013
Domestic crime is on the rise
11 Sep 2013
Pre-employment polygraph tests prevent crime
17 Jan 2013
Are we censoring ourselves?
5 Sep 2012
This is according to Alan Carey, operations director of Justicia Investigations, a private investigation company.
In a highly competitive environment and tough economic times, it is far easier and cheaper to expropriate information than to innovate. Leaked technical specifications could negate a massive investment in being the first to market with a new product. A copied customer database could shrink a market share advantage overnight, he warns.
Over the past few months Justicia has noted an upsurge in the number of calls from companies requesting debugging services. "We are getting between three and five calls a week from large corporates," he says.
Leo Nardi, Justicia's technical manager, adds that these calls are not only coming from South Africa but extending throughout Africa from Botswana to Tanzania, as the rush to conquer African markets gathers momentum.
Finding concrete statistics to back up Justicia's observations is not easy. Both globally and locally, underreporting is rife with companies preferring not to disclose that they have been the targets of industrial espionage for fear of losing customers. However, figures released by Ernst and Young (SA) suggest that industrial espionage is a $67bn a year industry.
Perhaps the best indicator of the surge in illicit surveillance is a dramatic increase in the sales of bugging devices and equipment. Although, again, there are no South African statistics, but the US State Department estimates that over 700,000 eavesdropping devices are sold each year.
In addition to constantly updating equipment, Justicia has partnered with an ICT company to ensure a holistic debugging approach.
Nardi says that it is evident that the ICT industry is gearing towards more data storage and throughput. Many companies invest in good equipment but then fall behind in adopting suitable security protocols or in configuring the equipment correctly to minimise risk. If you do not take into account your computers, then you are ignoring a large part of your risk profile.
Carey adds that companies need to tackle industrial espionage and adopt both reactive and proactive measures. "We encourage clients to introduce debugging policies. In addition to protecting and limiting access to confidential information, a debugging policy should help managers to recognise the signs - from the irregular conduct of an employee to physical clues of bugging activities having taken place. Companies also need to have their premises swept for bugs regularly."