Site Search

Course Navigation


Home| Course Catalog| Career Planning

FREE online courses on Corporate Espionage - Why and how is Espionage happening - Physical Vulnerabilities

Your company may be vulnerable to physical breach of security through lack of:

  • Trained, alert and motivated guards

  • Half-hearted gate/outsider admission controls

  • Poor check-out systems and pilferage

  • Poor locking up procedures/unused locks

Indian Car Manufacturer

In a well-documented and publicized case, a major Indian car manufacturer was found to be allowing damaged car received from dealers to be reworked in the factory, then resold off-the-record, at considerable profit to the parties concerned. The ensuing enquiry led to considerable revamping of security procedures and heads rolled. Better gate control/ human control procedures would have obviated these unfortunate happenings.

Multinational household Appliance Manufacturer

One multinational household-electrical-appliance manufacturer suffered a serious setback when one of their electrical contractors, who had been called in to repair a fault in the air-conditioning system, worked overnight, fixed the fault, took his payment next morning…and left, never to be contacted again. Unfortunately, taking advantage of untidy, cluttered desks, functioning photocopiers, open filing cabinets and logged-on computers, he left with data on forthcoming products, which allowed local manufacturers to beat them to the market…and the profits.

Alert and imaginative security staff can forestall break-ins through obvious avenues. One determined break-in involved the thieves entry through the sewerage system – once inside the perimeter, they broke open locks into administrative as well as manufacturing facilities and walked off with not only portable physical assets, but also sensitive income-tax/finance related files, R&D drawings, personnel records and even canteen items. This large Indian manufacturer of over-the-counter products was subsequently raided by IT authorities for concealment of sales tax information, falsification of costs and using two accounting systems. One never knows whose hands will ultimately seize purloined information.

Reserve Bank of India

Disposal of unwanted paper garbage or even stock-in-trade is another grey area. Reserve Bank of India has a system for punching holes in, and then burning, damaged or withdrawn-from-circulation currency notes. Yet, a few years ago, a large number of Rupees Two-denomination currency notes, some punched and slightly singed/ charred found themselves back in circulation!


Another example..

Open storage has to be carefully monitored. It is highly visible and prone to theft or even sabotage. In one of the most glaring examples, one of India's largest munitions depots was nearly destroyed. Huge quantities of small arms and howitzer ammunition were stored in the open, in this depot in Rajasthan. Official enquiry revealed nothing to public gaze. Coincidentally, a few weeks later, a large ammunition depot, across the border with a hostile neighbor, also blew up!



Copy machines near record rooms are a gift from the gods for an operative. They allow him to steal data without arousing suspicion due to missing papers. One company in Eastern India dealing in tea was only able to staunch the flow of vital data when it started monitoring photocopiers usage – and nabbed the insider – an old and trusted employee, heavily in debt.

A Common Problem

Snoopy neighbors can pose a serious threat. Guards of factories in industrial areas generally hesitate to decline admission to proprietors of adjacent factories, they being of status equivalent to their own employer. Such lack of professionalism can be highly detrimental to security. One manufacturer of plastic molded furniture found his new designs had been severely compromised, when a neighbor came into his factory, distributed sweets throughout the facility on the pretext of birth of a son and took pictures of workers….with prototypes in final stages of development occupying a prominent portion of the picture! Needless to say, these designs, with minor changes, found their way into another factory in a neighboring town whose owner was closely related to the infiltrator.

ITC Case

You lose control of (no longer benefit from) security environment, once outside your own facilities. Many organizations presume they are targeted by corporate espionage agents, and take whatever precautions are possible. They speak in code, keep TV set on loudly to confuse bugs, and avoid open places. Many multinationals, who host management Development Seminars or secret ‘strategy planning retreats', select such remote, normally – inaccessible sites, such as Mithun Charavarty's Ooty hotel – as to dodge all but the most ingenious and resourceful ‘agent'. An ITC ‘management retreat' was almost compromised (at Andamans) when the chief security officer fell ill and had to be urgently replaced - by an accomplished operative with an army/RAW background – who would have got away with a good haul of data had he not made a mistake born of over confidence. He was snooping around in a hotel room, opening briefcases, when the occupant came back to fetch some papers he'd forgotten to take. Questioning revealed that ITC had been targeted by a rival tobacco company to get at important information on ITC's diversification plans.

Physical vulnerabilities are therefore, by their very nature, myriad in their possibilities. Apply a little imagination and forethought, and you could avoid most of them.

 

Our Network Of Sites:
Apply 4 Admissions.com              | A2ZColleges.com  | OpenLearningWorld.com  | Totaram.com
Anatomy Colleges.com                | Anesthesiology Schools.com  | Architecture Colleges.com | Audiology Schools.com
Cardiology Colleges.com            | Computer Science Colleges.com| Computer Science Schools.com| Dermatology Schools.com
Epidemiology Schools.com         | Gastroenterology Schools.com  | Hematology Schools.com     | Immunology Schools.com
IT Colleges.com                | Kinesiology Schools.com  | Language Colleges.com  | Music Colleges.com
Nephrology Schools.com             | Neurology Schools.com  | Neurosurgery Schools.com | Obstetrics Schools.com
Oncology Schools.com    | Ophthalmology Schools.com | Orthopedics Schools.com       | Osteopathy Schools.com
Otolaryngology Schools.com| Pathology Schools.com  | Pediatrics Schools.com  | Physical Therapy Colleges.com
Plastic Surgery Schools.com| Podiatry Schools.com  | Psychiatry Schools.com   | Pulmonary Schools.com 
Radiology Schools.com| Sports Medicine Schools.com| Surgery Schools.com | Toxicology Schools.com
US Law Colleges.com| US Med Schools.com | US Dental Schools.com

About Us Terms of Use | Contact Us | Partner with Us | Press Release | Sitemap | Disclaimer | Privacy Policy


©1999-2011 OpenLearningWorld . com - All Rights Reserved