Get the Global IP Investigations and Enforcement Perspective

Industry content delivered straight to your inbox.
Email address
Secure and Spam free...

Have You Noticed How Trade Secrets Thieves Are Circumventing Their Employer’s Computer Monitoring System…Lately?

In an effort to circumvent their employer’s computer network monitoring system, trade secrets thieves sometimes–simply–pull up the proprietary information onto their computer screen and take photographs of the screen.

TWO RECENT NOTABLE CASES HIGHLIGHT THIS POINT

Apple Case:

I first noticed this in the recent Apple trade secrets theft indictments I wrote about in my previous post titled, “Another Apple Employee-Enroute to China – Arrested – Trade Secrets Theft”

Here are a few quotes from the Apple criminal complaint:

“…hundreds of files on Chen’s personally-owned computer were photographs of computer screens.”

“…taking a photograph of the computer screen with Apple’s information would circumvent Apple’s internal monitoring of activity on its network.”

“…When Apple’s investigation team went through Chen’s personally-owned phone, with Chen present, they discovered that it had about 100 photographs taken within the interior of Apple’s building…”

Coca-Cola Case:

I have now come across it again in the recent Coca-Cola trade secrets theft case

Here are a few quotes from the Coca-Cola criminal complaint:

“…opened files containing TSI [Trade Secrets Information] on a computer and took photographs of those TSI files while they were open on the computer screen to bypass Employer #1’s security measures.”

“…took photos of Employer #2 laboratory equipment located in secure and restricted Employer #2 laboratories…”

IT’S NOT ROCKET SCIENCE

It’s not rocket science (pun intended) but it works.

ONE BASIC PROTECTION STRATEGY

So, there’s a number of IP protection strategies that could be implemented to prevent or at least substantially minimize risk to similar thefts, but a basic one (frequently raised by IP protection specialists) applies here:

Strategic CCTV Installation and Vigorous Monitoring

If a company is not going to prevent personal electronic devices (iPhones, iPads, zip drives, etc.) from being carried into their secure research areas, then the company needs to devise a strategic CCTV program to monitor the behavior of employees in an effort to identify bad actors attempting to record their trade secrets (i.e., photographs, video, or audio.)

THINGS TO CONSIDER

In the Apple case, another employee observed the accused taking photographs of his screen which was the catalyst for an investigation and eventual indictment.

In the Coca-Cola case, we don’t know (from the filed criminal complaint) if anybody noticed the accused photographing her computer screen or if CCTV captured it and, as a result, the company protection team initiated the investigation which led to FBI involvement and the subsequent indictment.

But, in another notable trade secrets case (I wrote about in October last year titled, “Composition of a Trade Secrets Theft Enterprise – Case Study – Part 5 of 5”) involving the pharmaceutical giant GlaxoSmithKline (GSK) another employee overheard one of several conspiring trade secrets thieves bragging about the benefits of her criminal enterprise.

WHAT’S THE POINT?

The point is that it is rare to come across trade secrets criminal prosecutions that originate from a company’s monitoring and protection procedures.

These major trade secrets theft cases often start when somebody just happens to notice something suspicious. As important as that is, the protection of a company’s trade secrets cannot depend on just that.

What’s needed is the implementation of robust trade secrets protection procedures to prevent the theft, and if a theft occurs, to uncover it and immediately act to recover it.

THE REALITY

Companies, by necessity, need to accept the times we live in and the bad actors out there who will go to extreme lengths to steal their “trade secrets.” Just as we all—in this age of terrorism—have learned to live with exhaustive airport screening to minimize the chance of being attacked, similarly, in this exponentially growing age of IP theft, companies need to accept the critical need to raise the “trade secrets protection mindfulness” of its employees and implement vigorous IP physical and concrete protection procedures.

NEXT POST

In our next post, we will discuss China’s “Thousand Talents Rewards Program” which was specifically raised in the Coca-Cola case.

Disclaimer: IPPIBlog.com is offered as a service to the professional IP community. While every effort has been made to check information in this blog, we provide no guarantees or warranties, express or implied, with regard to content provided in IPPIBlog.com. We disclaim any and all liability and responsibility for the qualification or accuracy of representations made by the contributors or for any disputes that may arise. It is the responsibility of the readers to independently investigate and verify the credentials of such person and the accuracy and validity of the information provided by them. This blog is provided for general information purposes only and is not intended to provide legal or other professional advice.

Did you find this post useful?
I agree to have my personal information transfered to MailChimp ( more information )
Join other IP protection professionals, i.e., investigators, attorneys, and brand protection specialists and receive updates straight to your inbox.
We hate spam. Your email address will not be sold or shared with anyone else.

Ron Alvarez is an IP Protection and Investigations specialist at XG Consultants Group, Inc., in New York City. He is a former NYPD lieutenant where he investigated robbery, narcotics, internal affairs, and fine art theft cases. Ron is a graduate of the FBI National Academy and earned a B.A. in Government and Public Administration from John Jay College of Criminal Justice in Manhattan. He has published a number of articles on various topics for PI Magazine. Ron is licensed in New York State.

0 comments on “Have You Noticed How Trade Secrets Thieves Are Circumventing Their Employer’s Computer Monitoring System…Lately?

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Get the Global IP Investigations and Enforcement Perspective

Industry content delivered straight to your inbox.
Email address
Secure and Spam free...
%d bloggers like this: