StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Industrial Espionage at XYZ - Assignment Example

Cite this document
Summary
Industrial Espionage at XYZ.
I am a computer forensics specialist for the local Police Department. In that capacity and considering case 1, I have worked with the Systems Administrator of XYZ Company…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96.9% of users find it useful
Industrial Espionage at XYZ
Read Text Preview

Extract of sample "Industrial Espionage at XYZ"

Download file to see previous pages

That in itself is a felony under this state’s laws and could also fall under embezzlement laws. The administrator discreetly monitored Mr. Roberts’ activities for quite some time before Human Resources decided it was time to make a move. Using Remote Access Software, namely Manage Engine’s OPS manager the administrator was able to ascertain that Mr. Roberts had inserted a USB thumb drive, which was in direct contravention of company policy. With this information, the administrator asked Mr.

Roberts to meet with him in his own cubicle. Becoming worried, Roberts then proceeded to delete the information from the USB and denied that there was ever anything on the thumb drive. It was then confiscated and Mr. Roberts was suspended. Following procedures, and thinking that Mr. Roberts did not have the technical knowledge to permanently wipe the drive, the administrator made an image copy of the drive which he named Disk G. He and I have spent several days attempting to recreate any data that is contained on the original USB drive, which is still secured in the Company’s vault. . of them falling into other hands is dangerous, especially since the FBI considers industrial espionage as an act of Cold War, particularly when a foreign country such as China is involved in the act (2012).

According to the referenced website, China is one of the biggest culprits in industrial espionage and only seldom recognized copyrights and patents outside their country. With what was found I recommended to the HR and administrator press charges against Mr. Roberts on behalf of their company. The district attorney concurs and assures me the case will be prosecutable, provided the administrator is able to discreetly explain what was on the disc. CASE 2 This case involves a group of students at the university who have been committing terroristic acts upon fellow students at the school.

Acting on a tip that the group, considered a cult by campus security, was planning a series of coordinated attacks, security agents consisting of campus police, local police and Federal agents, raided the hideout of the group, located in a house at a remote off campus location. Along with some papers, which include basic generic information about the students’ courses and do not contain any useful information, there was a floppy disk seized during the raid. The confidential informant assures the investigators that the disk is pay dirt and it contains very useful data on what, when and where the attacks are.

Not only that, it is purported to include the names of group members. With that in mind I took the disk, labeled Case 2FDD Image, back to my computer lab to decipher its contents. The first step I undertook, before examining the contents, was to make an image of the disk, which was successful. This is to ensure the integrity of the disk is not compromised so that the subsequent

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Industrial Espionage at XYZ Assignment Example | Topics and Well Written Essays - 750 words”, n.d.)
Industrial Espionage at XYZ Assignment Example | Topics and Well Written Essays - 750 words. Retrieved from https://studentshare.org/information-technology/1458200-week5project5
(Industrial Espionage at XYZ Assignment Example | Topics and Well Written Essays - 750 Words)
Industrial Espionage at XYZ Assignment Example | Topics and Well Written Essays - 750 Words. https://studentshare.org/information-technology/1458200-week5project5.
“Industrial Espionage at XYZ Assignment Example | Topics and Well Written Essays - 750 Words”, n.d. https://studentshare.org/information-technology/1458200-week5project5.
  • Cited: 0 times

CHECK THESE SAMPLES OF Industrial Espionage at XYZ

Industrial Espionage in America

However, in doing so, it shall also look at the historical development of espionage and examines how the advances in technology in the recent years have facilitated the act of espionage, and also the measures that may prove useful in controlling industrial espionage.... As a prelude to the research, it may be worthwhile to understand how industrial espionage is defined, its nature and implications.... The Federal Bureau of Investigation defines industrial espionage as “an individual or private business entity sponsorship or coordination of intelligence activity conducted for the purpose of enhancing their advantage in the marketplace....
11 Pages (2750 words) Essay

Espionage during the Cold War

hellip; The importance of espionage in wars has been recognized since the beginning of recorded history.... Political espionage gained importance during the Middle Ages.... In the modern age systematized espionage became an essential part of government in most countries.... Joseph Fouché developed the first modern political espionage system, and Frederick II of Prussia is considered the founder of modern military espionage....
5 Pages (1250 words) Essay

The Role of Computers in Industrial Espionage

The attempt to gain access to a company's plans, products and clients' information, and whatever trade secrets are, is considered as industrial espionage.... However, when the search becomes private, industrial espionage is an unlawful act and punishable with financial penalties and sometimes jail time....
7 Pages (1750 words) Research Paper

Where do we draw the line between Business Intelligence and Industrial Espionage

26) has defined industrial espionage (IE) as an “act of gathering proprietary data from private companies or the government for the purpose of aiding other company(ies)”.... The paper will describe these terms in detail and then, with the help of examples and scholars' viewpoints, will explain where… Business Intelligence (BI), best described as a window to business dynamics (Howson, 2007, p....
4 Pages (1000 words) Research Paper

White Collar Crime and Corporate Espionage

The author of the assignment "White Collar Crime and Corporate espionage" states that White collar crimes are those crimes that involve people of politically respectable background and educated class while street crimes are those crimes that involve people of humble background.... rovide specific examples of both insider and outsider espionage that has taken place over the past 10 years and involved access to digital information....
1 Pages (250 words) Assignment

Origins of Espionage and Famous Cases

hellip; Increased knowledge about espionage is paramount in the 21st century as new threats appear thus, creates the need for national security.... However, espionage is common to government defensive and foreign policy.... espionage is intrinsically taken for granted, and in many cases punishable by law.... Still, the cold war relied on intense espionage activities that helped to establish the nuclear weapons secrets.... Following this, one can affirm that large corporations and governments make use of espionage to varying degrees....
10 Pages (2500 words) Term Paper

Cyber Espionage Crime

According to research findings of the paper “Cyber espionage Crime”, the US government should establish trade links and proper relationship with countries such as Russia and China as well as other international communities.... Such links may help to reduce cyber espionage crimes and promote cohesiveness.... nbsp;… Cyber espionage entails unauthorized access of the information in a secretive manner via the use of networks such as extranet, internet, LAN among other networks....
5 Pages (1250 words) Report

Industrial Espionage and Strategic Installations

industrial espionage and Strategic InstallationsIntroduction“Spying and eavesdropping are as old as humankind“(Fennelly 2004, p.... industrial espionage and Strategic InstallationsIntroduction“Spying and eavesdropping are as old as humankind“(Fennelly 2004, p.... Our research focus is about industrial espionage scenarios and countermeasures particularly in businesses and strategic installations.... It include discussions on the nature of industrial espionage, its methods and techniques, and analysis of the problem and countermeasures....
8 Pages (2000 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us