| ==Phrack Inc.== | |
| Volume Four, Issue Thirty-Nine, File 9 of 13 | |
| THE OPEN BARN DOOR | |
| U.S. Firms Face A Wave Of Foreign Espionage | |
| By Douglas Waller | |
| Newsweek, May 4, 1992, Page 58 | |
| It's tough enough these days for American companies to compete with their | |
| Pacific Rim rivals, even when the playing field is level. It's a lot tougher | |
| when your trade secrets are peddled by competitors. One Dallas computer | |
| maker, for example, recently spotted its sensitive pricing information in the | |
| bids of a South Korean rival. The firm hired a detective agency, Phoenix | |
| Investigations, which found an innocent-looking plastic box in a closet at its | |
| headquarters. Inside was a radio transmitter wired to a cable connected to a | |
| company fax machine. The bug had been secretly installed by a new worker -- a | |
| mole planted by the Korean company. "American companies don't believe this | |
| kind of stuff can happen," says Phoenix president Richard Aznaran. "By the | |
| time they come to us the barn door is wide open." | |
| Welcome to a world order where profits have replaced missiles as the | |
| currency of power. Industrial espionage isn't new, and it isn't always | |
| illegal, but as firms develop global reach, they are acquiring new | |
| vulnerability to economic espionage. In a survey by the American Society for | |
| Industrial Security last year, 37 percent of the 165 U.S. firms responding said | |
| they had been targets of spying. The increase has been so alarming that both | |
| the CIA and the FBI have beefed up their economic counterintelligence programs. | |
| The companies are mounting more aggressive safeguards, too. Kellog Company has | |
| halted public tours at its Battle Creek, Michigan, facility because spies were | |
| slipping in to photograph equipment. Eastman Kodak Company classifies | |
| documents, just like the government. Lotus Development Corporation screens | |
| cleaning crews that work at night. "As our computers become smaller, it's | |
| easier for someone to walk off with one," says Lotus spokesperson Rebecca Seel. | |
| To be sure, some U.S. firms have been guilty of espionage themselves -- | |
| though they tend not to practice it overseas, because foreign companies have a | |
| tighter hold on their secrets. And American companies now face an additional | |
| hazard: The professional spy services of foreign nations. "We're finding | |
| intelligence organizations from countries we've never looked at before who are | |
| active in the U.S.," says the FBI's R. Patrick Watson. Foreign intelligence | |
| agencies traditionally thought friendly to the United States "are trying to | |
| plant moles in American high-tech companies [and] search the briefcases of | |
| American business men traveling overseas," warns CIA Director Robert Gates. | |
| Adds Noell Matchett, a former National Security Agency official: "What we've | |
| got is this big black hole of espionage going on all over the world and a naive | |
| set of American business people being raped." | |
| No one knows quite how much money U.S. businesses lost to this black hole. | |
| Foreign governments refuse to comment on business intelligence they collect. | |
| The victims rarely publicize the espionage or report it to authorities for fear | |
| of exposing vulnerabilities to stockholders. But more than 30 companies and | |
| security experts NEWSWEEK contacted claimed billions of dollars are lost | |
| annually from stolen trade secrets and technology. This week a House Judiciary | |
| subcommittee is holding hearings to assess the damage. IBM, which has been | |
| targeted by French and Japanese intelligence operations, estimates $1 billion | |
| lost from economic espionage and software piracy. IBM won't offer specifics, | |
| but says that the espionage "runs the gamut from items missing off loading | |
| docks to people looking over other people's shoulders in airplanes." | |
| Most brazen: France's intelligence service, the Direction Generale de la | |
| Securite Exterieure (DGSE), has been the most brazen about economic espionage, | |
| bugging seats of businessmen flying on airliners and ransacking their hotel | |
| rooms for documents, say intelligence sources. Three years ago the FBI | |
| delivered private protests to Paris after it discovered DGSE agents trying to | |
| infiltrate European branch offices of IBM and Texas Instruments to pass secrets | |
| to a French competitor. The complaint fell on deaf ears. The French | |
| intelligence budget was increased 9 percent this year, to enable the hiring of | |
| 1,000 new employees. A secret CIA report recently warned of French agents | |
| roaming the United States looking for business secrets. Intelligence sources | |
| say the French Embassy in Washington has helped French engineers spy on the | |
| stealth technology used by American warplane manufacturers. "American | |
| businessmen who stay in Paris hotels should still assume that the contents of | |
| their briefcases will be photocopied," says security consultant Paul Joyal. | |
| DGSE officials won't comment. | |
| The French are hardly alone in business spying. NSA officials suspect | |
| British intelligence of monitoring the overseas phone calls of American firms. | |
| Investigators who just broke up a kidnap ring run by former Argentine | |
| intelligence and police officials suspect the ring planted some 500 wiretaps on | |
| foreign businesses in Buenos Aires and fed the information to local firms. The | |
| Ackerman Group Inc., a Miami consulting firm that tracks espionage, recently | |
| warned clients about Egyptian intelligence agents who break into the hotel | |
| rooms of visiting execs with "distressing frequency." | |
| How do the spies do it? Bugs and bribes are popular tools. During a | |
| security review of a U.S. manufacturer in Hong Kong, consultant Richard | |
| Hefferman discovered that someone had tampered with the firm's phone-switching | |
| equipment in a closet. He suspects that agents posing as maintenance men | |
| sneaked into the closet and reprogrammed the computer routing phone calls so | |
| someone outside the building -- Heffernan never determined who -- could listen | |
| in simply by punching access codes into his phone. Another example: After | |
| being outbid at the last minute by a Japanese competitor, a Midwestern heavy | |
| manufacturer hired Parvus Company, a Maryland security firm made up mostly of | |
| former CIA and NSA operatives. Parvus investigators found that the Japanese | |
| firm had recruited one of the manufacturer's midlevel managers with a drug | |
| habit to pass along confidential bidding information. | |
| Actually, many foreign intelligence operations are legal. "The science | |
| and technology in this country is theirs for the taking so they don't even have | |
| to steal it," says Michael Sekora of Technology Strategic Planning, Inc. Take | |
| company newsletters, which are a good source of quota data. With such | |
| information in hand, a top agent can piece together production rates. | |
| American universities are wide open, too: Japanese engineers posing as students | |
| feed back to their home offices information on school research projects. | |
| "Watch a Japanese tour team coming through a plant or convention," says Robert | |
| Burke with Monsanto Company. "They video everything and pick up every sheet of | |
| paper." | |
| Computer power: In the old days a business spy visited a bar near a plant | |
| to find loose-lipped employees. Now all he needs is a computer, modem and | |
| phone. There are some 10,000 computer bulletin boards in the United States -- | |
| informal electronic networks that hackers, engineers, scientists and | |
| government bureaucrats set up with their PCs to share business gossip, the | |
| latest research on aircraft engines, even private White House phone numbers. | |
| An agent compiles a list of key words for the technology he wants, which | |
| trigger responses from bulletin boards. Then, posing as a student wanting | |
| information, he dials from his computer the bulletin boards in a city where | |
| the business is located and "finds a Ph.D. who wants to show off," says Thomas | |
| Sobczak of Application Configured Computers, Inc. Sobczak once discovered a | |
| European agent using a fake name who posed questions about submarine engines to | |
| a bulletin board near Groton, Connecticut. The same questions, asked under a | |
| different hacker's name, appeared on bulletin boards in Charleston, South | |
| Carolina, and Bremerton, Washington. Navy submarines are built or based at all | |
| three cities. | |
| Using information from phone intercepts, the NSA occasionally tips off | |
| U.S. firms hit by foreign spying. In fact, Director Gates has promised he'll | |
| do more to protect firms from agents abroad by warning them of hostile | |
| penetrations. The FBI has expanded its economic counterintelligence program. | |
| The State Department also has begun a pilot program with 50 Fortune 500 | |
| companies to allow their execs traveling abroad to carry the same portable | |
| secure phones that U.S. officials use. | |
| But U.S. agencies are still groping for a way to join the business spy | |
| war. The FBI doesn't want companies to have top-of-the-line encryption devices | |
| for fear the bureau won't be able to break their codes to tap phone calls in | |
| criminal investigations. And the CIA is moving cautiously because many of the | |
| foreign intelligence services "against whom you're going to need the most | |
| protection tend to be its closest friends," says former CIA official George | |
| Carver. Even American firms are leery of becoming too cozy with their | |
| government's agents. But with more foreign spies coming in for the cash, | |
| American companies must do more to protect their secrets. | |
| How the Spies Do It | |
| MONEY TALKS | |
| Corporate predators haven't exactly been shy about greasing a few palms. | |
| In some cases they glean information simply by bribing American employees. In | |
| others, they lure workers on the pretense of hiring them for an important job, | |
| only to spend the interview pumping them for information. If all else fails, | |
| the spies simply hire the employees away to get at their secrets, and chalk it | |
| all up to the cost of doing business. | |
| STOP, LOOK, LISTEN | |
| A wealth of intelligence is hidden in plain sight -- right inside public | |
| records such as stockholder reports, newsletters, zoning applications and | |
| regulatory filings. Eavesdropping helps, too. Agents can listen to execs' | |
| airplane conversations from six seats away. Some sponsor conferences and | |
| invite engineers to present papers. Japanese businessmen are famous for | |
| vacuuming up handouts at conventions and snapping photos on plant tours. | |
| BUGS | |
| Electronic transmitters concealed inside ballpoint pens, pocket | |
| calculators and even wall paneling can broadcast conversations in sensitive | |
| meetings. Spies can have American firms' phone calls rerouted from the | |
| switching stations to agents listening in. Sometimes, they tap cables attached | |
| to fax machines. | |
| HEARTBREAK HOTEL | |
| Planning to leave your briefcase back at the hotel? The spooks will love | |
| you. One of their ploys is to sneak into an room, copy documents and pilfer | |
| computer disks. Left your password sitting around? Now they have entry to | |
| your company's entire computer system. | |
| _______________________________________________________________________________ | |