Homework Responses Wk 6
There are few countermeasures available to any organization to help mitigate electronic espionage. The one we have heard repeated throughout this course has been training, and education. Employees for any company must understand how important their individual role is in helping to mitigate espionage of every type. When speaking specifically to electronic espionage however, there are direct countermeasures that an organization should invest in. Organizations must keep in mind that electronic threats can change quickly and that they must stay up to date on both threat risks and countermeasure options.
The best option to mitigate electronic espionage is Technical Surveillance Countermeasures or TSCM. TSCM requires highly skilled personnel and is a full time program that must be conducted on a regular bases therefore, does comes with a significant expense Wimmer (2015). TSCM works to restrict access where sensitive information is held, viewed, or discussed. Some basic examples are conference rooms, offices, or R & D labs. There are a few different ways TSCM works to restrict access of sensitive information to those on a need to know basis. TSCM works to restrict locations where the information is held like mentioned above, but also restricts personnel such as cleaning crews, maintenance personnel, or outside contractors Wimmer (2015). Restricted personnel may be required sign in and out procedures or even issued an escort for the duration of time they are in the facility. TSCM programs are also a great way to detect electronic spy devices. Hidden cameras, and microphones, are a real threat to some organizations. Commonly used in insider threat cases hidden electronics equipment can cause immense damage to an organizations future plans. Another method TSCM will use is random facility sweeps at various times to ensure all access control points are continuously upheld to the standards set. With technology on a consistent upward trajectory it seems clear the TSCM will continue to be a critical tool against the fight against business espionage.
Wimmer, C. B. (2015). Business Espionage: Risks, threats, and countermeasures. ProQuest Ebook Central https://ebookcentral.proquest.com
Recent Comments