Identify and report every and use of songs

The Very Hungry Dragon:
Protecting Intellectual Property From
Industrial Espionage
EXECUTIVE SUMMARY
“THE CONVERSATION” COMES TO LIFE
There seems to be no end to the kinds of trade secrets
competitors want. From seed corn to original masters
to how to make a whiter white those who don’t have
the secret want to have it. Rather than enter into a legal
agreement with the company that owns the secret, many
foreign companies choose to infiltrate and steal it instead.
This trend is on the rise with a reported 53% increase in
incidents from the prior year. The Justice Department describes the vast scale of Chinese espionage as a national
security emergency that costs American companies
hundreds of millions of dollars and millions of jobs.
The FBI reports that industrial espionage costs U.S.
companies more than $300 billion every year and that
number grows as nations seek to quickly advance their
national technological capabilities. Foreign competitors
are bolstered by their governments and their attacks on
industry are becoming more varied and more brazen.
In fact, reported cases are up 53% year over year. In days
past, industrial spies were likely to infiltrate a competitor’s
installations and covertly remove blueprints. Today they
are much more likely to be thousands of miles away,
even more effectively searching for and removing intellectual property electronically, while never setting foot
in a target facility. Recently, the US Justice department
charged six Chinese scientists for stealing trade secrets
and engaging in industrial espionage on behalf of China.
“Delving into China’s ‘elaborate, comprehensive
system for spotting foreign technologies, acquiring
them by every means imaginable and converting
them into weapons and competitive goods,’ the
book concludes that ‘there is nothing like it in the
world.’ The People’s Republic of China (PRC) is implementing ‘a deliberate, state-sponsored project to
circumvent the costs of research, overcome cultural
disadvantages and ‘leapfrog’ to the forefront by
leveraging the creativity of other nations,’ thereby
achieving ‘the greatest transfer of wealth in history.’”
With very little to lose and huge economic gains to be
made, what are US companies doing to prevent losing
their advantages? Until now, they have used the same
strategies used to protect any of their assets: physical
security, encryption, and employee education. But US companies now
have an edge that confounds even the most
persistent spy.
Chinese Industrial Espionage: Technology Acquisition and Military Modernization Hannas, Melvenon, Puglisi. Reviewed by Arturo Munoz
Fans of Gene Hackman movies would recognize many
of the Cold War era spycraft tactics operatives use to
gain access to industrial intellectual property. Espionage
operatives use covert and overt methods to get close
to the information they want. Visiting businessmen may
ask for the restroom and end up looking for an unlocked
computer to pop in a jump drive. Operatives may “get
lost” in restricted areas of a facility. They look for legitimate employees with restricted access and attempt to
turn them. Promises of money, real estate, women, and a
new life are typical offers.
Once the operatives have a way in, the transfer of information begins. From network drives, from stand-alone
servers, from laptops - all types of files are transmitted
via electronic and physical means. Whether an operative
successfully turns an insider, gets lucky downloading
onto an external drive, or breaks through network security protocols inside the firewall, information is what they
are after.
1
www.SertintyONE.com
The mechanisms companies have to combat the exfiltration of their intellectual property are limited and overlap
with the same tactics used in sound hiring and physical security. They include:
•  Thorough background checks on employees and contractors especially. Background checks should include multiple references and identify possible factors that may indicate a worker may be more prone to
disclosing information.
•  Segregate proprietary sensitive data onto servers separated from the network or internet. Trade secrets
like formulas, plans, or codes should be stored on a server segregated from all other data and that server
should not have access to the Internet. An extreme example of this is the way KFC stores Colonel Sanders
original chicken recipe with 11 herbs and spices. That handwritten recipe is stored in a 770-pound Fire King
safe inside a room built of two-foot think concrete with 24-hour video and motion detection surveillance.
•  Follow a least privilege model for authorization to data. A least privilege model allows access to the minimum amount of information that allows normal business operation. For example, a group of application
developers may only have access to specific functions they work on with only a very few, highly trusted,
people having access to the entire code base.
•  Review physical security protocols and sweep for devices (audio or video bugs). It’s good practice to regularly exercise technical surveillance countermeasures like reviewing facilities for eavesdropping equipment and video bugging devices. Whenever a visitor comes to your facility or when an employee has been
turned, your facility is at risk.
•  Sweep for malware. Malware detection and removal are likely part of your IT security processes. The most
common types of malware in industrial espionage are key-logging software, back door access, and information-stealing trojans. Each of these gives a special kind of access to private data. Unfortunately, there
are limitless varieties of malware and it’s often difficult to detect.
•  Train for employee behavior. Employees should be trained to recognize visitors acting without supervision, to lock their workstations, to create strong passwords, and to recognize and report social engineering
attempts.
•  Deep packet inspection optimizes network performance by looking for traffic that consumes more bandwidth and in some cases can stop the traffic. Heavy traffic can be caused by a single process hogging the
network (like streaming services) or by an outside attack. Deep packet capture is used to capture traffic for
review and analysis. While these technologies can identify anomalies faster than a human analyst, they still
cannot prevent a network breach and the subsequent theft of data.
So if corporate spies can steal IP even when your information security is otherwise state-of-the-art, is the battle
lost? No. It’s likely that your company is overlooking a
wide open flank that, until now, has been considered
incapable of participating in the security fabric. That
element is the data itself. SertintyONE can make your IP,
digital masters, or licensed work an active defendant in
its own protection.
Even when US companies follow these protocols closely,
they are subject to espionage. In May 2014, the US government charged five Chinese government officials with
cyber-attacks against some of the US’s largest companies: US Steel, Westinghouse, Alcoa, SolarWorld AG, and
the United Steelworkers. Their goal: to steal trade secrets and strategic information that would allow Chinese
companies to unfairly compete with US companies or
to leapfrog their own technological limitations and save
hundreds of millions of dollars and years of research. The
allegations against the Chinese are wide-ranging and
include theft of proprietary and technical plans, confidential emails from executives, financial data, production line
specifications and costs, and employee network credentials.
www.SertintyONE.com
2
A BETTER WAY
SertintyONE SmartData Ensures:
Legitimate users access the right segment of intellectual property data
•  Data owners determine who can access IP,
digital masters, or licensed files (and how
much of it), providing granular access down
to the byte level
•  Creates effective electronic redaction
•  Owners can add, change, or remove access
at any time
Indelible audit and event logs
•  Any action can trigger an event entry – access attempts and their associated conditions, changes to the SmartData, file signatures and more.
•  Entries can be recorded inside SmartData
or an external repository and data owners
can be notified when there is an entry
Enforced compliance at the data layer
•  Retention policies can be implemented
globally
•  Owners can specify when and where IP can
be accessed
The concept of self-protecting data is about as old as the
concept of data encryption. Typical encryption uses public and private keys that are exchanged between senders and receivers. Anyone in possession of the key can
access the entire contents of the encrypted file, making
encryption an effective method of data protection if the
data needs to be shrouded from casually curious eyes.
For anyone with more than a passing interest, encryption is more of a speed bump than a true deterrent.
To enhance data protection, companies layer security
methods. Firewalls, anti-virus, encryption and employee
behavior all work in concert to deny network breaches
Anomaly mitigation
•  Data owners can be alerted on an attempt
to access SmartData
•  SmartData can request multi-vector
third-party authorization
•  SmartData can deny access to its contents
if any factor is unrecognized
•  Under conditions set by the owner, SmartData can destroy itself
“Ultimately, the security perimeter and access
controls need to be embedded into the data itself. As data increasingly becomes the lifeblood of
business, it must be self-aware and self-protecting to securely flow to the right people—and only
the right people—at the right time and in the right
location. Starting at the time of its creation, enterprise data should be protected and enhanced with
context and policy—who, what, where, when and
how it can be accessed—or know where to go to
determine the access policy.”
SUMMARY
China has maintained a relentless pace in their effort to
poach intellectual property from US companies with no
indication that they will slow down. In fact, since their
latest five-year plan was rubber stamped in early 2016,
any technology company in the spaces they intend to
pursue needs to seriously review the sensitivity of their IP.
Even so, China is likely to target and attack an increasing
number of companies.
- David Konetski, Dell Fellow and Executive Director of End User Computing Security & Systems
Management Solutions, Dell
3
www.SertintyONE.com
(cont’d)
There are physical, technical, and human barriers to prevent the theft of intellectual property that, even working
together, are not enough to prevent trade secrets from
walking out the door. But when SmartData is added to
the equation, the odds change in your favor.
China may be relentless in its initiative to gain trade secrets, but you can add a new weapon to your arsenal that
allows prescribed access only to legitimate individuals
only under specific conditions.
NEXT STEPS
SmartData, with advanced authentication, enforced policy and auditing built-in becomes inextricably combined
with any type of data file (Intellectual, Copyrighted and
Licensed Properties). You can be assured SmartData will
enable access by only legitimate users under conditions
authorized by the data owner. That means that even if
protected data leaves your facility on any type of media,
even if a company insider takes it, it will remain inaccessible and unusable based on the rules defined by the data
owner. Moreover, any attempt to access the data will be
logged and can be transmitted to the data owner.
Protect your IP at the data layer. Contact our Sales Team
for an evaluation of your existing protocols and to see
how SertintyONE SmartData complements your existing
solution.
[email protected]
WHO WE ARE
SertintyONE is a software development company
focused on protecting confidential, proprietary and
personal data. Our development initiatives are aimed at
ensuring the right person has the right information at the
right time, irrespective of the user, device, network or
operating system. We are headquartered in Nashville,
Tennessee.
SertintyONE SmartData technology allows:
✔ Valid, authenticated (legitimate) users only
✔ Complete control that lasts the lifetime of the data
✔ Compliance to be implemented globally and
by data object
✔ Complete privacy and trust
✔ A complete audit history
SertintyONE Corporation
Nashville, TN
(855) 313-6032
SmartData combines with any kind of IP file and cannot
be extracted from it, but it remains invisible to legitimate
users of the data, whether they are people or machines.
When the user has finished accessing the file, it is protected again in a unique way. The self-protection algorithms cannot be reverse engineered.
www.SertintyONE.com
www.SertintyONE.com
4