Menu
Navigation

Global articles on espionage, spying, bugs, and other interesting topics.

Keep abreast of the espionage threats facing your organisation.

Corporate Espionage, American-Style

SUDDENLY, Washington is extremely concerned about Chinese espionage.

Last month, the White House blocked a Chinese company from operating a wind farm near a sensitive Navy base in Oregon. Next, the House Intelligence Committee said two Chinese telecommunications firms were manufacturing equipment that could be used to spy on the United States, and Defense Secretary Leon E. Panetta told business leaders that the country faced the risk of a “cyber-Pearl Harbor” — an attack that could come from terrorist groups or a country like China. Finally, during Monday’s presidential debate, Mitt Romney warned that the Chinese were “stealing our intellectual property, our patents, our designs, our technology, hacking into our computers.”

There’s no question that American companies today are under surveillance: I’ve learned that the F.B.I. has obtained a video taken inside a hotel in China that shows Chinese agents rifling through an American businessman’s room, according to two sources familiar with the tape, which the F.B.I. has been playing as a warning for corporate security experts. But while the Chinese spying push is aggressive, American companies have been tapped, bugged and spied on for more than a hundred years. As often as not, the perpetrators have been other Americans — motivated not by patriotism for a foreign flag, but by simple profit.

In Placerville, Calif., a stockbroker named D. C. Williams took advantage of the latest high-tech telecommunications gear in an insider trading scam. The year was 1864. Mr. Williams, claiming to be in the stagecoach business, rented a room at a hotel called the Sportsman’s Hall, where the State Telegraph Company had offices. Sitting in his room, within earshot of the receiving equipment, Mr. Williams simply decoded the messages about business deals as they clattered in. When he tried to bribe the telegraph agent for exclusive access to news on an important mining lawsuit, the agent turned him in, and Mr. Williams was arrested.

Or take the case of John Broady, an audacious wiretapper who in the mid-1950s set up an eavesdropping nest at an apartment in Midtown Manhattan. Working with a source inside the phone company, he set up equipment capable of tapping and simultaneously recording 10 phone lines in the area. Among Mr. Broady’s clients was the drug company Pfizer, which hired him to tap the phones of its own employees and those of a competitor, Squibb.

Mr. Broady was ultimately undone by an anonymous tipster, most likely someone inside his organization. Bizarrely, at his trial he claimed there was a nefarious Chinese angle to his scam — he said he’d used the equipment to spy on a rogue Chinese Air Force general who’d stolen millions from his government. Mr. Broady said that someone who wanted to stop the investigation had killed one of his own agents in Mexico. “I didn’t want them to knock me off, like they did my man,” he said, breaking down in tears. “I have a wife and kids.” The jury thought it was an act, and Mr. Broady received a two- to four-year prison sentence.

Spying for profit continued in more recent times. In the late 1990s, the candy companies Nestlé and Mars engaged in an epic corporate war that included a confidential source nicknamed “Deep Chocolate.” Former government agents, working through a subcontractor for Nestlé, snatched garbage bags from the Mars headquarters, replacing them with dummy trash bags so the custodial staff wouldn’t catch on. Picking through coffee grounds and stale food, they found shredded documents that they were able to painstakingly reconstruct into readable corporate records.

In London in the fall of 2008, I met with Nick, a former British Special Forces soldier who has gone into the private espionage business — working for companies around the world to dig up dirt on their competitors or their own employees. Nick, who asked that I not use his last name, told me that they often used a simple strategy: they hired subcontractors to rent space in a building across the street from their competitor, and pointed laser microphones at conference rooms across the way. Voices in the rooms made slight vibrations in the windows, and Nick’s microphones could translate those back into sound that he could record.

Technology has changed the volume of information spies can purloin from corporate files, as well as the types of attacks possible from a distance. But the principle remains the same: spying is often easier than conducting one’s own research and development. This is certainly true from China’s perspective.

What has people in Washington really worried is the idea that such passive theft could turn into an active threat — not just snooping, but knocking out elevators or communications at a presidential event, or shutting down software controlling water supplies, electrical grids and nuclear power plants.

But while we deal with this new generation of spies, we shouldn’t forget the lessons learned battling the old. The best way to fight technology is not always with more technology — it’s with human beings. As Mr. Williams and Mr. Broady learned, the most dangerous threat to a high-tech snoop is an inside source who’s willing to come forward and expose the scheme. Law enforcement officials in the 19th and 20th centuries found ways to motivate those whistle-blowers. We must do the same.

Eamon Javers is a Washington correspondent for CNBC and the author of “Broker, Trader, Lawyer, Spy: The Secret World of Corporate Espionage.”


Cyber spies can practice ‘clean espionage’ to extract information: analyst

MONTREAL – Stealing secrets through cyber espionage may not have enough action for a spy like James Bond, but there can be less risk and “your own guys don’t get hurt,” a global security expert says.

Cyber spying is going to get more sophisticated and governments and businesses will continue to be targeted, said Steve Durbin, global vice-president of the Information Security Forum.

“If you go back to the original James Bond era, you used to have guys slugging around the streets trying to steal secrets,” Durbin said from New York.

“You don’t have that problem any more because you can set up a laptop or a computer in a living room and try to crack into systems around the world.”

Spying has always been around and now it’s just making use of the technology that’s out there,” he said.

Durbin calls it “clean espionage” and said more often than not it is state sponsored.

“This isn’t about blowing things up, although you can do that, clearly. It’s clean espionage rather than some of the dirtier elements of people slugging it out in Afghanistan, for example.”

This kind of espionage can use computer malware or exploit technology such as close-captioned TV cameras, GPS data, satellite feeds and telecom traffic, in addition to “feet on the street,” he said.

Durbin cites the Stuxnet virus as an example of clean espionage.

Stuxnet was tailored to disrupt Iran’s nuclear centrifuges and caused some setbacks within its uranium enrichment labs. It infected thousands of employees’ computers at the nuclear power reactor, Iranian officials have said. The United States and Israel are believed to be suspects.

An attack like that has more impact on the people being targeted than on your own forces, he said.

“So that’s attractive because not only is it effective, it is lower cost and your own guys don’t get hurt.”

China also has been accused by cyber security analysts of computer-based attacks focused on American oil, gas and other energy companies.

The U.K.-based Information Security Forum deals with security challenges that its corporate and public sector members are facing. It’s considered a global authority on information risk management and cyber security.

Durbin said infrastructure such as transportation, government national defence programs and networks, and energy and defence companies can all be targets.

Canada’s auditor general has said the federal government has been slow to boot up an effective response to the threat of cyber attacks on crucial systems.

The auditor general’s report said the shortcomings have left key networks — such as the one that ensures employment insurance benefits are delivered on time — exposed to attack.

Associate professor Tom Dean of Queen’s University said governments need to worry about what’s called advanced persistent threats.

They aren’t a standard virus or botnet that’s sending out spam email, said Dean, who teaches in the electrical and computer engineering faculty at Queen’s in Kingston, Ont.

“Advanced persistent threats from the more sophisticated actors, quite a few of which are state sponsored, are basically camping out and gathering information,” he said.

“That’s the biggest deal.”

China, Russia, areas in the Balkans, and former Soviet republics are considered suspects in state-sponsored cyber spying, he said.

Dean said there is potential for a destructive cyber attack but that would be “an act of war.”


The strange world of espionage

 

Man of mystery ...  Jean-Philippe Wispelaere admitted during his trial that he thought of himself as James Bond.

Man of mystery … Jean-Philippe Wispelaere admitted during his trial that he thought of himself as James Bond.

One of the weirdest espionage cases in Australian history just got weirder.

A US intelligence officer is writing a book about how a psychic was used to track bumbling spy and former Brighton schoolboy Jean-Philippe Wispelaere during a secretive operation more than a decade ago.

Wispelaere was a low-level imagery analyst who should probably never have got through the security vetting process. 

Scott Carmichael, an author and senior security and counter-intelligence investigator at the US Defence Intelligence Agency, worked on the Wispelaere case in 1999. He is writing a book about how he used a psychic to identify Wispelaere after the former Australian Defence Intelligence Organisation analyst tried to sell stolen US documents to Singaporean embassy officials in Thailand.


Jean-Philippe Wispelaere.

Jean-Philippe Wispelaere.

While Wispelaere had given his email address to the embassy during negotiations to sell 1382 classified documents for hundreds of thousands of dollars, US authorities were not sure of his identity or whether he would make contact with the embassy again.

The Australian National University graduate eventually did make contact. He was then tricked by the Federal Bureau of Investigation into travelling to the US, where he was arrested, and sentenced to 15 years in federal prison in 2001.

The 41-year-old was released earlier this year and snubbed Australia, the country where he was raised and where his mother still lives, for Canada, his country of birth.

Wispelaere in his year 12 Brighton Secondary College School photograph.

Wispelaere in his year 12 Brighton Secondary College School photograph.

Mr Carmichael stated, via email, that the use of psychics to identify ”unknown subjects” had been common among US intelligence agencies in the 1980s and was used until 1995.

It had been phased out by the time of the Wispelaere case, but Mr Carmichael said he decided to get in contact with psychic Angela Ford to conduct an operation that was not authorised by DIA.

”The agency was out of the psychic business,” Mr Carmichael said. ”It seemed that I was out of luck. But I persisted. It was a purely personal endeavour to determine whether Angela could develop – through paranormal means – useful information about the walk-in event.”

Ms Ford said in an email that she had been told little detail about the case during her contact with Mr Carmichael, but had been able to establish that the man had called himself Baker, was an Australian, and was muscular and aged in his 20s.

She determined Wispelaere had tried to sell US documents at the Singaporean embassy in Bangkok, but she was confused as to why he had said he was involved with US imagery when he was an Australian.

Wispelaere, a steroid abuser and gym junkie, had used the name Jeff Baker when he approached the embassy, and had claimed to be an American.

”I was working many cases at this time and I was kept in the dark on all of them,” Ms Ford said.

”I couldn’t know anything about the cases I was working on because that would be cheating.”

US Naval Institute Press publicist Judy Heise confirmed Mr Carmichael was preparing a manuscript on the Wispelaere case and had previously had a book published by the company. She also confirmed his position with the DIA.

Clive Williams, a former intelligence analyst and army officer, said he was not aware of psychics ever being used in Australian operations. The visiting fellow at the Australian National University’s Strategic and Defence Studies Centre, and adjunct professor at Macquarie University’s Centre for Policing, Intelligence and Counter-terrorism, said he did not think the US had ever had much success with their psychic programs.

Professor Williams said he often found the published accounts of those who had worked in intelligence agencies questionable.

”Wispelaere’s espionage case was not very complicated. In fact, it was quite straightforward from an investigative perspective,” he said.

”Wispelaere was a low-level imagery analyst who should probably never have got through the security vetting process.

”There is a cottage industry of writers who claim that bin Laden is not dead, the Israelis were behind the World Trade Centre attack, etc. Of course, it is often very hard to prove the opposite case and may be limited by releasability of information.”


Related Coverage

The spy who came undone

9 Jul Jean-Philippe Wispelaere was falling apart. The East Brunswick boy who had tried to commit suicide as a seven-year-old had grown into an unstable young man and, faced with life in a US prison on espionage charges, began to implode.

Ten years on, Wispelaere snubs Australia

6 Jul A Melbourne spy who spent more than a decade in a US federal prison after being convicted of espionage charges has snubbed Australia, the country he once considered home.


Advertisement

  • Latest Video

    National News Video More video

    Baby Elijah robbed of fighting chance

    Sandra Bernobic says failures by health authorities have denied her son chance to beat the illness meningococcal meningitis.

Man dies in plane crash, two injured

 

 

Vodafone slashes 500 jobs

 

 

Cannabis spray tested for severe pain


Featured advertisers

Sponsored links

Special offers Powered by Mozo

Advertisement

Advertisement

Real Estate


$1,000 to be won each week with Domain

$1,000 to be won each week with Domain

Jobs


Fancy a New Job Title  the Chance to Win $5,000?

Fancy a New Job Title the Chance to Win $5,000 Cash?

Essential Kids


maleficent-angelina

Whose new movie features three of her kids?

Holidays


stayz pet friendly

Find a holiday that welcomes the whole family

Dating


RSVP beautiful young lady

Chat To Women Right Now!


Compare and Save

Skip to:

Check out today’s best deals

Cheap Credit Cards

Say NO to credit card fees! Compare fee-free cards.

 

Low Home Loan Rates

Make the most of the rate cut. Home loans from 5.47%.

 

Top Car Loans

Drive a bargain with loans from 7.78% (comparison rate)

 

Galaxy S3 Bonus

Bonus accessory pack and bonus data deals

 

Budget – Under $35

Hot smartphones under $35 per month

 



Feedback Form








AMSC espionage case due to start

Bloomberg reports that China’s Supreme People’s Court was due to begin hearing AMSC Inc.’s copyright infringement case against Sinovel Wind Group Co. last Friday.

AMSC, a Devens-based maker of wind-turbine components, is seeking $6 million in damages from Sinovel, which is accused of stealing trade secrets from the local company through a rogue employee.

It’s one of four cases totaling $1.2 billion AMSC is seeking against Sinovel.

Sinovel stopped accepting contracted shipments from AMSC in March 2011.


Lawyer pleads not guilty to bugging car

OAKLAND — A divorce attorney pleaded not guilty Tuesday to charges that she hired a private investigator, who was a central character in Contra Costa County’s “dirty DUI” scandal, to illegally install listening devices inside the car of a client’s ex-husband.

Mary Nolan, 60, appeared in Oakland federal court, where she also pleaded innocent to four counts of tax evasion. She faces up to 15 years in prison and $750,000 in fines if convicted on all counts.

Nolan was first linked to disgraced private investigator Christopher Butler,50, in 2010, after two men told The Chronicle that she used their drunken driving arrests against them in divorce and custody battles. Both men have since filed civil lawsuits against Nolan alleging she orchestrated their arrests through Butler.

Butler pleaded guilty earlier this year to using attractive women to meet estranged husbands in bars and set them up for drunken driving arrests by police officers tied for him.

Butler, who is scheduled to be sentenced Tuesday afternoon, admitted in court papers that Nolan referred clients to him. He also estimated that he bugged between 75 and 100 cars during his tenure as a private investigators.

Nolan was never charged in connection with the drunken driving scandal that snared Butler and others.

But prosecutors alleged in their separate case against Nolan that in at least one instance she hired Butler to bug the car of a client’s spouse so she could use the recorded information against him in divorce proceedings.

Nolan’s court appearance drew the attention of Phil Dominic, 55, of Oakland, who said Nolan represented his ex-girlfriend in a 2010 custody dispute over their son. His case is not the one forming the basis of the criminal case against Nolan.

Dominic said Nolan lied about him to family court judges and destroyed his relationship with the mother of his son, as well as his child.

“This is Christmas for me,” said Dominic, who heckled Nolan as she left the courthouse.

Dominic said he was organizing a group of men whose wives were represented by Nolan to discuss taking legal action against the attorney.

“I told her one day she’d get caught,” Dominic said. “I told her, ‘One day I’m going to see you on the other side.”

Outside court, Nolan’s attorney Jay Weill declined to comment.

Nolan is scheduled to appear in court next month for further proceedings.