UCP eLearning 18 hours Level 1 Counter Corporate Espionage
Counter Corporate Espionage
WHO IS THIS COURSE FOR?
Corporate espionage is on the increase and counter measures need to be taken by businesses more now than during the Cold War. Any international organisation has the potential to be exposed to the risk of industrial espionage, and personnel need to be adequately prepared when traveling to high-risk regions where it may be encountered.
Industrial espionage includes theft of intellectual property and trade secrets, tender and contract negotiation material, theft of financial information, targeted corruption, and attempts to lure personnel into compromising situations for blackmail purposes.
Anyone wishing to enhance their Surveillance skills and keep them sharp, anyone wishing to get into the remit of security and investigations
The UCP 18 hours course also gives the learner the minimum requirements to step into the surveillance industry and be confident taking on surveillance contracts and tasks.
This highly valuable course demonstrates just how vulnerable you, your employees and your intellectual property actually are while abroad, and the lengths to which competitors will go to undercut your organization. This course aims to help you protect yourself. A small sample of topics covered includes:
- Economic vs. Industrial Espionage
- Foreign Intelligence Collection Methods
- Recognizing Elicitation and Recruit
- Hotel and Transit Security
- Communication Security (COMSEC)
- Data Attack and Intrusion Methodologies
- Surveillance Detection Techniques
Minimum Required Kit List
- Laptop with Microsoft word and power point,
- USB memory stick with 10 GB max
- Pencil and pen, eraser
Skill Prerequisites None
- Raise security awareness
- Provide an understanding of the threats of industrial espionage
- Provide an understanding of the methodologies that may be deployed by foreign intelligence services and hostile competitors
- Provide an understanding of the measures that can be taken to reduce risk
- Industrial espionage and the methodologies used – Understanding the methodologies used by foreign intelligence services and hostile competitors including undertaking surveillance and technical surveillance, covert elicitation and social engineering
- Travelling under the radar – The principle of becoming the “grey person” to lower the likelihood of drawing attention of the authorities.
- Counter and anti-surveillance – The methods that can be used to detect and to evade hostile surveillance.
- Social media profiling – The use of the Internet and social media is a part of everyday life. The digital footprint left behind and the personal data made available online is often used by criminals or organisations with hostile intent to profile personnel looking for weaknesses they can exploit.
- Undertaking threat assessments – Threat assessments are a key part of the process of identifying the potential risks that will vary country by country.
- Counter espionage measures – Once the threats have been identified mitigating steps can be taken to minimise the risk of corporate espionage, and some simple, easy to follow measures can make a big difference.
- Pre-deployment briefings – Ensuring personnel are fully briefed regarding the destination, its threats and contingency plans prior to deployment.