Skip to main content Skip to navigation

WM054-15 Industrial Espionage and Counterfeiting

Department
WMG
Level
Taught Postgraduate Level
Module leader
Harjinder Lallie
Credit value
15
Module duration
1 week
Assessment
Multiple
Study location
University of Warwick main campus, Coventry

Introductory description

In modern economic development the most important asset is intellectual property. The value of this commodity has accelerated both the frequency and sophistication of espionage attacks and of counterfeiting. These may be directed by nation states or commercial organisations. The attack may be on the physical security of an organisation, on the staff, on the suppliers of the organisation or against the electronic infrastructures. In sophisticated attacks, combinations of all vectors may be employed.

In this module students will discover the motivations for industrial espionage, the methods of execution and the possible defences and countermeasures. This will include anti-counterfeiting technologies, track and trace, forensics, staff vetting and physical security.

There will be a strong emphasis on cyber attacks and defences which will complement the other modules on the course.

Module aims

The module equips students to reason about the inappropriate departure of assets from an organisation, or the inappropriate introduction of assets into an organisation's supply chain.

Outline syllabus

This is an indicative module outline only to give an indication of the sort of topics that may be covered. Actual sessions held may differ.

Motivations for espionage
The legal and regulatory framework
Methods of attack
Staff coercion and corruption
Staff vetting
Physical security and methods for defeating it
Cyber attacks with an emphasis on Advanced Persistent Threat (APT)
Role play in both attack and defence
Anti counterfeit technologies
How they are circumvented
Encryption and digital rights management
Cracking encryption
Track and trace and 'armoured pipelines'
Business cases for defeating espionage and counterfeiting.

Learning outcomes

By the end of the module, students should be able to:

  • Analyse exposure of businesses to industrial espionage
  • Synthesise the threat landscape with regards to industrial espionage while exploring risk management best practices
  • Propose appropriate risk mitigation measures to industrial espionage exposure
  • Evaluate the exposure of products and services to counterfeiting along with relevant mitigation measures

Indicative reading list

Chinese Industrial Espionage: Technology Acquisition and Military Modernisation (Asian Security Studies), William C. Hannas, James Mulvenon, Anna B. Puglisi (2013), Routledge

Industrial Espionage: Developing a Counterespionage Program, Danniel J. Benny (2013), CRC Press

Industrial Espionage and Technology Transfer: Britain and France in the 18th Century, John R. Harris (2000), Ashgate Publishing

Subject specific skills

Analysis of the abuse of trust relationships.

Transferable skills

Intercultural awareness, organisational awareness, ethical values

Study time

Type Required
Lectures 10 sessions of 1 hour (7%)
Seminars 10 sessions of 1 hour (7%)
Tutorials 10 sessions of 1 hour (7%)
Online learning (independent) 60 sessions of 1 hour (40%)
Assessment 60 hours (40%)
Total 150 hours

Private study description

No private study requirements defined for this module.

Costs

No further costs have been identified for this module.

You must pass all assessment components to pass the module.

Assessment group A1
Weighting Study time Eligible for self-certification
Coursework 100% 60 hours Yes (extension)

Report, typically addressing a specific scenario.

Assessment group R
Weighting Study time Eligible for self-certification
Assessed work as specified by department 100% Yes (extension)

100% Assignment

Feedback on assessment

Written feedback provided with the mark via tabula.

Anti-requisite modules

If you take this module, you cannot also take:

  • WM054-10 Industrial Espionage and Counterfeiting

Courses

This module is Core optional for:

  • Year 1 of TWMA-H6C7 Postgraduate Taught Cyber Security Engineering