• Corporate espionage in Canada: how HR leaders can guard against insider threats
• Deel and Rippling corporate espionage case takes a turn as accused ‘spy’ agrees to cooperate
• US is increasingly vulnerable to espionage threats, analysts warn
• Former Spy: Unstoppable AI-Powered Threats Target All
• Russian espionage group focused on corporate espionage, mainly targeting organizations in the US
• North Korea hackers go after business executives in latest info-stealing scheme
• DOGE Purge Is Boosting China’s Espionage Activities Against U.S.
• '$35 million gone in one call': Deepfake fraud rings are fooling the world's smartest firms: Impersonating CEOs for wire fraud to creating fake hostage videos for extortion
Showing posts with label #corporate-espionage. Show all posts
Showing posts with label #corporate-espionage. Show all posts
Friday, March 28, 2025
Monday, March 24, 2025
Bank of Ghana - Planted Spy Devices at Home
Retired Colonel Festus Aboagye has accused former Bank of Ghana (BoG) Governor, Dr Ernest Addison, of installing unauthorized electronic surveillance equipment at his residence, allegedly linked to the central bank.
The claim follows a controversial search conducted by National Security operatives at Dr Addison’s residence, which Minority Leader Alexander Afenyo-Markin condemned, alleging that personal belongings, including cash and jewellery belonging to Addison’s wife, were seized.
However, Rtd. Col. Aboagye insists that the operation was based on credible intelligence suggesting Dr Addison had set up surveillance devices that enabled remote monitoring of BoG activities.
Speaking on TV3, he stated, “Monitoring is a very diplomatic word. This is spying, this is surveillance,” adding that sources within National Security had confirmed the presence of such “back door electronic devices” at Addison’s home.
He emphasized that no former BoG Governor had the authority to install systems that allowed remote oversight of the bank’s operations. more
The claim follows a controversial search conducted by National Security operatives at Dr Addison’s residence, which Minority Leader Alexander Afenyo-Markin condemned, alleging that personal belongings, including cash and jewellery belonging to Addison’s wife, were seized.
However, Rtd. Col. Aboagye insists that the operation was based on credible intelligence suggesting Dr Addison had set up surveillance devices that enabled remote monitoring of BoG activities.
Speaking on TV3, he stated, “Monitoring is a very diplomatic word. This is spying, this is surveillance,” adding that sources within National Security had confirmed the presence of such “back door electronic devices” at Addison’s home.
He emphasized that no former BoG Governor had the authority to install systems that allowed remote oversight of the bank’s operations. more
"The Wildest Stories of Corporate Espionage We've Ever Heard"
Video Podcast Episode 689: Sam Parr ( https://x.com/theSamParr ) and Shaan Puri ( https://x.com/ShaanVP ) break down the craziest stories of corporate espionage in history. — Show Notes: (0:00) Rippling vs Deel (10:21) The British East India Company (17:11) Oracle vs Microsoft (21:28) Coke vs. Pepsi (24:14) Uber vs. Waymo (26:03) U.S. Intellectual piracy (28:10) Wiz sells for $32B (39:40) A case for Glassdoor (45:54) Marc Lore's new thing (51:52) Money, Status, Power
Thursday, March 20, 2025
HR Tech Firm Sues Rival for Corporate Espionage
HR software provider Rippling has sued competitor Deel for allegedly planting a spy in its Dublin office to steal trade secrets, court documents [PDF & VERY interesting] showed on Monday. Rippling claims the employee, identified as D.S., systematically searched internal Slack channels for competitor information, including sales leads and pitch decks.
UPDATE - HR giant hired plumbers to search toilets for phone after fears alleged corporate spy in Dublin flushed it away. more
The company discovered the alleged scheme through a "honeypot" trap -- a specially created Slack channel mentioned in a letter to Deel executives. When served with a court order to surrender his phone, D.S. locked himself in a bathroom before fleeing, according to the lawsuit. "We're all for healthy competition, but we won't tolerate when a competitor breaks the law," said Vanessa Wu, Rippling's general counsel. Both companies operate multibillion-dollar HR platforms, with Rippling valued at $13.5 billion and Deel at over $12 billion. more
“The world has changed.
Corporate Espionage is the new Healthy Competition.
You need Operational Privacy to compete.”
Sunday, March 16, 2025
Book: In the Shadow of Giants: A true story of corporate espionage... by Liam Monclair
A true story of corporate espionage in the shadow of China’s rise.
At the heart of modern power struggles, In the Shadow of Giants follows the extraordinary journey of Liam Monclair, a security and strategy expert. This gripping narrative, blending memoir and thriller, opens the door to a unique and little-known universe—corporate espionage, geopolitical manipulations, and cultural tensions—spanning from the skyscrapers of Shanghai to the streets of Jakarta and the vast deserts of the Middle East.
From the escalation of a fierce conflict between Altéone Group—a French multinational—and Wang Industries, a Chinese giant led by the enigmatic Mr. Wang, to high-stakes missions in Iraq and the protection of a football star in dangerous zones, the author unveils the inner workings of a demanding world.
Based on a true story, In the Shadow of Giants is both a tribute to those who work behind the scenes and an exploration of a life lived on the edge. Masterfully blending suspense and thought-provoking insights, it takes readers deep into the hidden reality of an extraordinary existence. more
At the heart of modern power struggles, In the Shadow of Giants follows the extraordinary journey of Liam Monclair, a security and strategy expert. This gripping narrative, blending memoir and thriller, opens the door to a unique and little-known universe—corporate espionage, geopolitical manipulations, and cultural tensions—spanning from the skyscrapers of Shanghai to the streets of Jakarta and the vast deserts of the Middle East.
From the escalation of a fierce conflict between Altéone Group—a French multinational—and Wang Industries, a Chinese giant led by the enigmatic Mr. Wang, to high-stakes missions in Iraq and the protection of a football star in dangerous zones, the author unveils the inner workings of a demanding world.
Based on a true story, In the Shadow of Giants is both a tribute to those who work behind the scenes and an exploration of a life lived on the edge. Masterfully blending suspense and thought-provoking insights, it takes readers deep into the hidden reality of an extraordinary existence. more
Tuesday, March 11, 2025
Hackers are Taking Aim at Board Directors
Well-known CEOs and executives aren’t the only potential victims of hacks and threats from criminals. Board directors also have to be vigilant, according to Jason Lish, the global chief information security officer at Cisco.
“Often times they’re targets, especially for public companies, where their profiles are out there,” he said during a virtual conversation on Thursday hosted by Fortune in partnership with Diligent for The Modern Board series.
Lish added that he’s even seen an increase in the mailing of physical ransom letters to board directors and company executives. “How do they stay protected in their personal lives?” he said. “Because threat actors will try to do reconnaissance.” more
“Often times they’re targets, especially for public companies, where their profiles are out there,” he said during a virtual conversation on Thursday hosted by Fortune in partnership with Diligent for The Modern Board series.
Lish added that he’s even seen an increase in the mailing of physical ransom letters to board directors and company executives. “How do they stay protected in their personal lives?” he said. “Because threat actors will try to do reconnaissance.” more
TSCM is the corporate counterespionage measure you need.
Wednesday, February 19, 2025
Spy History: 1902 Corporate Espionage on the High Seas
Your Editor (not me) chanced upon the following in the library of the National Maritime Museum at Greenwich last winter and it is reprinted here by kind permission of Stephen Rabson, Group Information Manager of P&O.
The document is in the form of a quasi-official report, written by one of P&O's traveling inspectors on two voyages in 1902, one from Southampton to New York, the other from Vancouver to Yokohama.
The writer (whose signature is, alas, indecipherable) was clearly more than a passenger, he was a benevolent spy, assessing conditions aboard the competition...
"I have the honor to report my arrival here yesterday. The following details of the steamers in which I have traveled may interest you..." more
The document is in the form of a quasi-official report, written by one of P&O's traveling inspectors on two voyages in 1902, one from Southampton to New York, the other from Vancouver to Yokohama.
The writer (whose signature is, alas, indecipherable) was clearly more than a passenger, he was a benevolent spy, assessing conditions aboard the competition...
"I have the honor to report my arrival here yesterday. The following details of the steamers in which I have traveled may interest you..." more
This business spy tactic has been around forever. These days corporate espionage is enhanced with electronics (audio, video, and data). This is why businesses have added Technical Surveillance Countermeasures to their security precautions. If you have not, it is highly recommended you do so. Contact a professional TSCM information security consultant to begin protecting your company.
Saturday, January 25, 2025
Better Idea: Prevent the Boardroom Leaks - Conduct TSCM Inspections
HP Studied Spying on Newsrooms: NY Times
Hewlett-Packard conducted feasibility studies on placing spies in news bureaus of two publications as part of an investigation into leaks from its board, The New York Times reported on Wednesday. Hewlett-Packard could not immediately be reached for comment.
The Times cited an individual briefed on the company's review of the operation in its report. It is not clear whether the plan described in the documents, which were read to a reporter, was ever acted upon, The Times said.
The newspaper said the feasibility studies, referred to in a February 2 draft report for a briefing of senior management, were said to have included the possibility of placing investigators acting as clerical employees or cleaning crews in the San Francisco offices of technology news Web site CNET and The Wall Street Journal.
HP is under investigation by U.S. federal prosecutors and the California attorney general over the company's potentially illegal tactics in obtaining phone records in a bid to end boardroom leaks to the media. more
Hewlett-Packard conducted feasibility studies on placing spies in news bureaus of two publications as part of an investigation into leaks from its board, The New York Times reported on Wednesday. Hewlett-Packard could not immediately be reached for comment.
The Times cited an individual briefed on the company's review of the operation in its report. It is not clear whether the plan described in the documents, which were read to a reporter, was ever acted upon, The Times said.
The newspaper said the feasibility studies, referred to in a February 2 draft report for a briefing of senior management, were said to have included the possibility of placing investigators acting as clerical employees or cleaning crews in the San Francisco offices of technology news Web site CNET and The Wall Street Journal.
HP is under investigation by U.S. federal prosecutors and the California attorney general over the company's potentially illegal tactics in obtaining phone records in a bid to end boardroom leaks to the media. more
Monday, December 30, 2024
Check Before Opening Encrypted Microsoft Word Documents Emailed to You
Threat intelligence analysts have now reported a surge in the activity of the Paper Werewolf cluster, also known as GOFFEE, which uses infected Microsoft Windows Word documents to launch mostly espionage-driven, credential-compromising attacks.
Like so many other attack campaigns, Paper Werewolf uses phishing emails and brand impersonation to distribute its malicious payload. These messages contain an encrypted Microsoft Word document that prompts the recipient to enable macros in order to read it. If they do this, then the content of the document is decrypted, and the malicious program is installed on their device. The threat intelligence analysts said that, in some instances, they observed the use of PowerRAT, a remote access trojan, enabling the attackers to execute commands and carry out reconnaissance. more
Like so many other attack campaigns, Paper Werewolf uses phishing emails and brand impersonation to distribute its malicious payload. These messages contain an encrypted Microsoft Word document that prompts the recipient to enable macros in order to read it. If they do this, then the content of the document is decrypted, and the malicious program is installed on their device. The threat intelligence analysts said that, in some instances, they observed the use of PowerRAT, a remote access trojan, enabling the attackers to execute commands and carry out reconnaissance. more
Wednesday, December 11, 2024
Security Director Alert: Latest Electronic Surveillance of Corporate Executives
What is going on at Boohoo?
• Espionage claims arise as boardroom battle continues.
• Espionage claims arise as boardroom battle continues.
• Cautionary tale.
Spybuster Tip # 675
The past few months have been turbulent for Boohoo, to say the least. Yet, last week, things seemed to come to a head when claims of espionage arose at the fast fashion giant.
According to a report by The Times, three current and former executives of Boohoo are believed to be the victims of stalking and surveillance. The alleged espionage is said to have been committed against Boohoo’s co-founder and executive chair Mahmud Kamani, chief executive Dan Finley and former CEO, John Lyttle.
The allegations were brought to light after the company informed the Information Commissioner’s Office (IOC) of a related incident taking place outside of its Manchester headquarters. The report was confirmed by the IOC in a statement to the press, which read: “We can confirm that Boohoo Group has made us aware of concerns regarding the discovery of surveillance equipment outside its head office.”
In a more recent update, the Times has now reported that police in Manchester and Kent are investigating the claims, with Greater Manchester Police stating to the media outlet that it was looking into allegations “involving serious distress”. No arrests have been made, so far. more
According to a report by The Times, three current and former executives of Boohoo are believed to be the victims of stalking and surveillance. The alleged espionage is said to have been committed against Boohoo’s co-founder and executive chair Mahmud Kamani, chief executive Dan Finley and former CEO, John Lyttle.
The allegations were brought to light after the company informed the Information Commissioner’s Office (IOC) of a related incident taking place outside of its Manchester headquarters. The report was confirmed by the IOC in a statement to the press, which read: “We can confirm that Boohoo Group has made us aware of concerns regarding the discovery of surveillance equipment outside its head office.”
In a more recent update, the Times has now reported that police in Manchester and Kent are investigating the claims, with Greater Manchester Police stating to the media outlet that it was looking into allegations “involving serious distress”. No arrests have been made, so far. more
Prior to any attack (physical, information theft) some form of surveillance tradecraft (audio, video, data or visual surveillance) will be used.
If you are a business executive don't ignore this.
More tips here.
Monday, November 4, 2024
Matt Damon’s Funniest Comedy Flips the Spy Genre on Its Head
By Liam Gaughan
Damon gave the single greatest comedic performance of his career in Steven Soderbergh’s dark comedy The Informant!
The Informant! was released during a time in Damon’s career in which he could certainly afford to be a little bit more experimental...
While it’s understandable why he may have wanted to step outside his comfort zone and try something new, The Informant! is a brilliant deconstruction of espionage thrillers that examines the complexity of American masculinity. more trailer
...and it is a true story!
Tuesday, October 22, 2024
Corporate Espionage: Executives Exploiting Their Roles
In a concerning trend across the corporate world, cases of internal misconduct and corporate espionage are becoming increasingly prevalent, posing significant threats to businesses.
Internal disputes and personal agendas can undermine corporate governance and harm a company’s competitive edge...
Recent events involving senior executives at a Pune-based company, Artur Schade Steel Products India Pvt. Ltd., highlight how internal betrayal and data theft can cause substantial financial damage and disrupt operations. more
Friday, October 11, 2024
Trade Secrets Audits: Strengthening Your Company’s IP Protection
via Sefarth Shaw, LLP...
In a world where corporate espionage and data breaches are increasingly common, protecting your company’s intellectual property is more vital than ever.
Recent developments surrounding the FTC’s Non-Compete Ban, currently stalled in litigation, highlight the need for proactive measures. This webinar will help you navigate these regulatory shifts and strengthen your IP protection strategies.
Join Lauren Leipold, Eddy Salcedo, and James Yu for the next installments of Seyfarth Shaw’s 2024 Trade Secrets Webinar Series. This webinar offers crucial insights into enhancing your IP defenses and preparing for future regulatory changes.
Join Lauren Leipold, Eddy Salcedo, and James Yu for the next installments of Seyfarth Shaw’s 2024 Trade Secrets Webinar Series. This webinar offers crucial insights into enhancing your IP defenses and preparing for future regulatory changes.
Webinar Recap! Trade Secrets Audits: Strengthening Your Company’s IP Protection
In our recent webinar, “Trade Secrets Audits: Strengthening Your Company’s IP Protection,” Seyfarth’s Intellectual Property Partner, Lauren Leipold, along with Trade Secret Attorneys Eddy Salcedo and James Yu, shared essential strategies for enhancing IP protection in today’s complex landscape.
As corporate espionage and data breaches become increasingly prevalent, the session provided valuable insights on effective methods for safeguarding your company’s intellectual assets. Notably, recent developments surrounding the FTC’s Non-Compete Ban—currently stalled in litigation—highlight the pressing need for proactive measures to secure your business against emerging threats.
Key Insights from the Webinar... more
Key Insights from the Webinar... more
Wednesday, August 14, 2024
Thousands of Corporate Secrets Were Left Exposed
This Guy Found Them All...
If you know where to look, plenty of secrets can be found online. Since the fall of 2021, independent security researcher Bill Demirkapi has been building ways to tap into huge data sources, which are often overlooked by researchers, to find masses of security problems. This includes automatically finding developer secrets—such as passwords, API keys, and authentication tokens—that could give cybercriminals access to company systems and the ability to steal data.
If you know where to look, plenty of secrets can be found online. Since the fall of 2021, independent security researcher Bill Demirkapi has been building ways to tap into huge data sources, which are often overlooked by researchers, to find masses of security problems. This includes automatically finding developer secrets—such as passwords, API keys, and authentication tokens—that could give cybercriminals access to company systems and the ability to steal data.
In total, Demirkapi has found more than 15,000 active secrets of all kinds.
Within the vast number of exposed keys were those that could give an attacker access to the digital assets of companies and organizations, including the potential to obtain sensitive data. For instance, a member of Nebraska’s Supreme Court had uploaded details of usernames and passwords linked to its IT systems, and Stanford University Slack channels could be accessed using API keys. more
Wednesday, August 7, 2024
How to Fight a Corporate Espionage Accusation
via SPODEK LAW
What Constitutes Corporate Espionage Fraud?
Corporate espionage fraud involves illegally obtaining confidential business information from a competitor to gain an unfair advantage. This can include:
1. Lack of Intent
2. Information Was Not Actually a Trade Secret
4. Public Availability
5. Whistleblower Protections
6. Statute of Limitations
Key Legal Precedents in Corporate Espionage Cases
What Constitutes Corporate Espionage Fraud?
Corporate espionage fraud involves illegally obtaining confidential business information from a competitor to gain an unfair advantage. This can include:
- Stealing trade secrets or proprietary technology
- Hacking into computer systems to access sensitive data
- Using deception to obtain confidential documents
- Bribing or blackmailing employees to reveal inside information
- Industrial sabotage to damage a competitor’s operations
1. Lack of Intent
2. Information Was Not Actually a Trade Secret
4. Public Availability
5. Whistleblower Protections
6. Statute of Limitations
Key Legal Precedents in Corporate Espionage Cases
- United States v. Hsu (1999): Established that attempted corporate espionage is prosecutable, even if no actual trade secrets were obtained.
- United States v. Chung (2011): Clarified that the government must prove the defendant knew the information was a trade secret, not just confidential.
- United States v. Aleynikov (2012): Found that software source code did not qualify as a trade secret under the Economic Espionage Act (later overturned).
- United States v. Nosal (2016): Ruled that the Computer Fraud and Abuse Act applies to theft of trade secrets by former employees.
- Challenging the evidence:
- Scrutinize how the evidence against you was obtained and push to suppress any improperly gathered information.
- Negotiating with prosecutors
- Presenting alternative explanations:
- Demonstrating lack of economic benefit
- Highlighting inadequate security measures
- Leveraging expert witnesses
- Pursuing civil resolutions
Wednesday, July 31, 2024
$2 billion Corporate Espionage Verdict Overturned by Appeals Court
Software company Pegasystems convinced a Virginia appeals court on Tuesday to throw out a $2 billion jury verdict for rival Appian in a court battle over Pegasystems’ alleged theft of Appian’s trade secrets.
The award from 2022 had been the largest damages verdict in Virginia court history, the Court of Appeals of Virginia said in the decision...
McLean, Virginia-based Appian had said in a 2020 lawsuit that Pegasystems hired a contractor to steal confidential information from Appian’s software platform in order to improve its own products and better train its sales force...
Appian said that Cambridge, Massachusetts-based Pegasystems referred internally to the contractor as a spy and to its scheme as “Project Crush,” with Pegasystems employees using fake credentials to access Appian’s software. Pegasystems characterized “Project Crush” as competitive research in a 2022 statement...
Pegasystems’ CEO said in a statement following the verdict that Appian’s CEO “could not identify one trade secret that Pega had allegedly misappropriated” during the trial. more
The award from 2022 had been the largest damages verdict in Virginia court history, the Court of Appeals of Virginia said in the decision...
McLean, Virginia-based Appian had said in a 2020 lawsuit that Pegasystems hired a contractor to steal confidential information from Appian’s software platform in order to improve its own products and better train its sales force...
Appian said that Cambridge, Massachusetts-based Pegasystems referred internally to the contractor as a spy and to its scheme as “Project Crush,” with Pegasystems employees using fake credentials to access Appian’s software. Pegasystems characterized “Project Crush” as competitive research in a 2022 statement...
Pegasystems’ CEO said in a statement following the verdict that Appian’s CEO “could not identify one trade secret that Pega had allegedly misappropriated” during the trial. more
Moral: Make sure your "trade secrets" meet the requirements of, and can be clearly identified as, Trade Secrets. more
Saturday, July 20, 2024
One Way Corporate Espionage Spies Cover Their Tracks
Residential proxy IP: The invisible cloak in corporate espionage.
From the IP vendor's ad...
"In the fiercely competitive business battlefield, information is power, and how to obtain and use this information has become a problem that every company needs to face. In this spy war without gunpowder, residential proxy IP is like an invisible cloak, providing strong protection and support for enterprises.
From the IP vendor's ad...
"In the fiercely competitive business battlefield, information is power, and how to obtain and use this information has become a problem that every company needs to face. In this spy war without gunpowder, residential proxy IP is like an invisible cloak, providing strong protection and support for enterprises.
Imagine that you are an intelligence analyst at an emerging technology company, and your task is to collect and analyze the latest developments of competitors so that the company can make more informed decisions. However, the online world is not a smooth road, and your IP address can easily expose your true identity and intentions, making your actions subject to various restrictions. At this time, residential proxy IP is like a capable assistant, helping you to move forward invisibly in this spy war.
Residential proxy IP, as the name suggests, is to use the IP address of an ordinary home network environment for network access. Because these IP addresses come from real home users, they are difficult to identify and track. By using residential proxy IP, enterprises can hide their real IP address and avoid being discovered by competitors or network monitoring agencies. In this way, enterprises can access target websites, crawl data, analyze competitors' strategies, etc. more freely without worrying about being blocked by anti-crawler mechanisms or IP being blocked." more
Residential proxy IP, as the name suggests, is to use the IP address of an ordinary home network environment for network access. Because these IP addresses come from real home users, they are difficult to identify and track. By using residential proxy IP, enterprises can hide their real IP address and avoid being discovered by competitors or network monitoring agencies. In this way, enterprises can access target websites, crawl data, analyze competitors' strategies, etc. more freely without worrying about being blocked by anti-crawler mechanisms or IP being blocked." more
Corporate Espionage: Steward Health Care Deployed Spy Outfits to Thwart Critics
Despite its financial turmoil and eventual bankruptcy, Steward Health Care allegedly spent millions spying on its adversaries, hiring intelligence companies to track and intimidate critics worldwide.
In what resembles a poorly written spy novel, Steward's leadership hired agents who placed tracking devices on the car of a financial analyst, accessed a healthcare executive’s phone to potentially blackmail him and circulated an allegedly false wire transfer to frame a politician, a report said.
The videos and documents with the incriminating details were obtained by journalism outfit the Organized Crime and Corruption Reporting Project and shared with the Boston Globe, who investigated the case further.
According to reporters, Steward executives who deployed these intelligence firms prioritized paying their bills over all others, including invoices from vendors and suppliers. Monthly expenses for intelligence services reached as high as $440,000, and from 2019 to 2023, Steward allocated over $7 million to these operations.
As to the legality of all of this, because the spying and fraud took place in various jurisdictions globally, it may not be possible to prosecute anyone responsible. more
In what resembles a poorly written spy novel, Steward's leadership hired agents who placed tracking devices on the car of a financial analyst, accessed a healthcare executive’s phone to potentially blackmail him and circulated an allegedly false wire transfer to frame a politician, a report said.
The videos and documents with the incriminating details were obtained by journalism outfit the Organized Crime and Corruption Reporting Project and shared with the Boston Globe, who investigated the case further.
According to reporters, Steward executives who deployed these intelligence firms prioritized paying their bills over all others, including invoices from vendors and suppliers. Monthly expenses for intelligence services reached as high as $440,000, and from 2019 to 2023, Steward allocated over $7 million to these operations.
As to the legality of all of this, because the spying and fraud took place in various jurisdictions globally, it may not be possible to prosecute anyone responsible. more
Thursday, June 20, 2024
Policing Minister's Wife in legal row over Claims of Corporate Espionage
A leading businesswoman who is married to the policing minister, Chris Philp, has been reported to the Crown Prosecution Service (CPS) by a former employer and is being sued in the high court over allegations of corporate espionage.
Elizabeth Philp, 40, whose husband has called for "zero tolerance" to all crime, is accused of data handling offences and unlawfully using "confidential information" from her former employer to set up a rival business.
She denies the allegations and is countersuing her former employer, which she accuses of cyber-attacking the website of the company she subsequently founded. more
Subscribe to:
Posts (Atom)