WM054-15 Industrial Espionage and Counterfeiting
Introductory description
In modern economic development the most important asset is intellectual property. The value of this commodity has accelerated both the frequency and sophistication of espionage attacks and of counterfeiting. These may be directed by nation states or commercial organisations. The attack may be on the physical security of an organisation, on the staff, on the suppliers of the organisation or against the electronic infrastructures. In sophisticated attacks, combinations of all vectors may be employed.
In this module students will discover the motivations for industrial espionage, the methods of execution and the possible defences and countermeasures. This will include anti-counterfeiting technologies, track and trace, forensics, staff vetting and physical security.
There will be a strong emphasis on cyber attacks and defences which will complement the other modules on the course.
Module aims
The module equips students to reason about the inappropriate departure of assets from an organisation, or the inappropriate introduction of assets into an organisation's supply chain.
Outline syllabus
This is an indicative module outline only to give an indication of the sort of topics that may be covered. Actual sessions held may differ.
Motivations for espionage
The legal and regulatory framework
Methods of attack
Staff coercion and corruption
Staff vetting
Physical security and methods for defeating it
Cyber attacks with an emphasis on Advanced Persistent Threat (APT)
Role play in both attack and defence
Anti counterfeit technologies
How they are circumvented
Encryption and digital rights management
Cracking encryption
Track and trace and 'armoured pipelines'
Business cases for defeating espionage and counterfeiting.
Learning outcomes
By the end of the module, students should be able to:
- Analyse exposure of businesses to industrial espionage
- Synthesise the threat landscape with regards to industrial espionage while exploring risk management best practices
- Propose appropriate risk mitigation measures to industrial espionage exposure
- Evaluate the exposure of products and services to counterfeiting along with relevant mitigation measures
Indicative reading list
Chinese Industrial Espionage: Technology Acquisition and Military Modernisation (Asian Security Studies), William C. Hannas, James Mulvenon, Anna B. Puglisi (2013), Routledge
Industrial Espionage: Developing a Counterespionage Program, Danniel J. Benny (2013), CRC Press
Industrial Espionage and Technology Transfer: Britain and France in the 18th Century, John R. Harris (2000), Ashgate Publishing
Subject specific skills
Analysis of the abuse of trust relationships.
Transferable skills
Intercultural awareness, organisational awareness, ethical values
Study time
Type | Required |
---|---|
Lectures | 10 sessions of 1 hour (7%) |
Seminars | 10 sessions of 1 hour (7%) |
Tutorials | 10 sessions of 1 hour (7%) |
Online learning (independent) | 60 sessions of 1 hour (40%) |
Assessment | 60 hours (40%) |
Total | 150 hours |
Private study description
No private study requirements defined for this module.
Costs
No further costs have been identified for this module.
You must pass all assessment components to pass the module.
Assessment group A1
Weighting | Study time | Eligible for self-certification | |
---|---|---|---|
Coursework | 100% | 60 hours | Yes (extension) |
Report, typically addressing a specific scenario. |
Assessment group R
Weighting | Study time | Eligible for self-certification | |
---|---|---|---|
Assessed work as specified by department | 100% | Yes (extension) | |
100% Assignment |
Feedback on assessment
Written feedback provided with the mark via tabula.
Anti-requisite modules
If you take this module, you cannot also take:
- WM054-10 Industrial Espionage and Counterfeiting
Courses
This module is Core optional for:
- Year 1 of TWMA-H6C7 Postgraduate Taught Cyber Security Engineering