Secrets Stolen, Fortunes Lost

1st Edition

Preventing Intellectual Property Theft and Economic Espionage in the 21st Century

Authors: Christopher Burgess Richard Power
Paperback ISBN: 9781597492553
eBook ISBN: 9780080558806
Imprint: Syngress
Published Date: 5th March 2008
Page Count: 300
72.95 + applicable tax
55.95 + applicable tax
44.99 + applicable tax
Compatible Not compatible
VitalSource PC, Mac, iPhone & iPad Amazon Kindle eReader
ePub & PDF Apple & PC desktop. Mobile devices (Apple & Android) Amazon Kindle eReader
Mobi Amazon Kindle eReader Anything else

Institutional Access


The threats of economic espionage and intellectual property (IP) theft are global, stealthy, insidious, and increasingly common. According to the U.S. Commerce Department, IP theft is estimated to top $250 billion annually and also costs the United States approximately 750,000 jobs. The International Chamber of Commerce puts the global fiscal loss at more than $600 billion a year.

Secrets Stolen, Fortunes Lost offers both a fascinating journey into the underside of the Information Age, geopolitics, and global economy, shedding new light on corporate hacking, industrial espionage, counterfeiting and piracy, organized crime and related problems, and a comprehensive guide to developing a world-class defense against these threats. You will learn what you need to know about this dynamic global phenomenon (how it happens, what it costs, how to build an effective program to mitigate risk and how corporate culture determines your success), as well as how to deliver the message to the boardroom and the workforce as a whole. This book serves as an invaluable reservoir of ideas and energy to draw on as you develop a winning security strategy to overcome this formidable challenge.

Key Features

It’s Not “Someone Else’s” Problem: Your Enterprise is at Risk

Identify the dangers associated with intellectual property theft and economic espionage The Threat Comes from Many Sources Describes the types of attackers, threat vectors, and modes of attack The Threat is Real Explore case studies of real-world incidents in stark relief How to Defend Your Enterprise Identify all aspects of a comprehensive program to tackle such threats and risks How to Deliver the Message: Awareness and Education Adaptable content (awareness and education materials, policy language, briefing material, presentations, and assessment tools) that you can incorporate into your security program now


Chief Information Officers, Chief Technology Officers, Chief Security Officers, CFOs, Chief Legal Officers, Information Security Professionals, Risk Managers, Auditors, IT Directors, Business Managers, Analysts, Consultants, Government Agency Officials, Investigators, Law Enforcement

Table of Contents

  • Authors
  • Introduction

    • Your Enterprise at Risk
    • How to Read This Book
  • Part 1: The Challenge

    • Introduction
    • Chapter 1: The Tale of the Targeted Trojan

      • Introduction
      • The Haephrati Case
    • Chapter 2: When Insiders and/or Competitors Target a Business’s Intellectual Property

      • Introduction
      • Lightwave Microsystems
      • America Online
      • Casiano Communications
      • Corning and PicVue
      • Avery Dennison and Four Pillars
      • Lexar Media and Toshiba
      • SigmaTel and Citroen
      • 3dGEO – China
    • Chapter 3: When State Entities Target a Business’s Intellectual Property

      • Introduction
      • Airbus and Saudi Arabian Airlines
      • Russian Intelligence and Japanese Trade Secrets
      • Japan and the Cleveland Clinic Foundation
      • China and Russia: TsNIIMASH-Export
      • Overt Nation State Attempts: India, Venezuela, Brazil, and Others
      • Current and Future Threats to Economic Security
    • Chapter 4: When Piracy, Counterfeiting, and Organized Crime Target a Business’s Intellectual Property

      • Introduction
      • Technology Counterfeiting
      • The Apparel Industry
      • The Entertainment Industry
    • Chapter 5: Virtual Roundtable on Intellectual Property and Economic Espionage

      • Introduction
      • The Legal Perspective: Naomi Fine
      • The OpSec Perspective: Keith Rhodes
      • The Professional Investigator’s Perspective: Ed Stroz
      • The DoD Cyber Sleuth’s Perspective: James Christy
      • The Security and Privacy Consultant’s Perspective: Rebecca Herold
  • Part 2: The Strategy

    • Introduction
    • Chapter 6: Elements of a Holistic Program

      • Introduction
      • False Memes Lead People the Wrong Way
      • From the


No. of pages:
© Syngress 2008
eBook ISBN:
Paperback ISBN:

About the Author

Christopher Burgess

Affiliations and Expertise

Senior Security Advisor, Cisco Systems; former Senior Operations Officer with the Central Intelligence Agency (CIA)

Richard Power

Richard Power is an internationally recognized expert in the areas of Security, Intelligence and Risk. An independent consultant, he provides guidance in the areas of personnel security, cyber security, crisis management, terrorism, cyber crime and economic espionage to Fortune 500 companies and government agencies globally. Previously, he served as the Director of Security Management and Security Intelligence for the Global Security Office of Deloitte Touch Tomatsu from 2002-2005. Prior to that, he was Editorial Director of the Computer Security Institute. He authors a monthly column on information security issues for Computer Fraud and Security Journal, as well as a monthly column on for the Research and Technology Protection section of the FBI’s Infragard program. He is the author of Tangled Web: Tales of Digital Crime from the Shadows of Cyberspace (Macmillan/QUE 2000).

Affiliations and Expertise

Internationally recognized expert in the areas of Security, Intelligence and Risk; former Director of Security Management and Security Intelligence for Deloitte Touche Tomatsu