Obtaining Information
Under False Pretenses

When foreign intelligence services or business competitors cannot obtain information openly, they may devise some more or less elaborate scenario to get it under false pretenses. Among the gambits used are the marketing survey, the phony headhunter, and phony competitive bidding.

Marketing Survey Ploy

Foreign consultants and foreign companies ostensibly looking for business relationships in the U.S. often fax, mail, or e-mail various kinds of market surveys to U.S. companies. Sometimes, the survey sponsors state they are working on behalf of their country's armed forces. In any case, the final recipient of the survey results often remains unknown.1

These surveys sometimes exceed generally accepted procedures for soliciting marketing information. For example, they may solicit proprietary information concerning corporate affiliations, market projections, pricing policies, program or technology directors' names, purchasing practices, and dollar amounts of U.S. Government contracts. Customers and suppliers of a company may also be surveyed.

This is a standard ploy for collecting competitive intelligence. In one case, the foreign consultant was identified as working on behalf of a foreign company that was the primary competitor of the U.S. defense contractor and was preparing a competitive bid on a multi-national program. The surveys were sent to individual engineers, not the marketing department. Other surveys were sent to the company's suppliers asking about the company's prices and supply line.

One foreign defense organization sent out a survey requesting detailed information to include number of employees, areas of activities, products, foreign collaboration, joint ventures, and infrastructure. The marketing survey clearly exceeded generally accepted terms of marketing information. The stated goal was to develop an international aerospace directory. A more likely goal was to develop a targeting guide for collection of information on specific aerospace technologies.2

The following indicators suggest that an ostensible market survey may be an effort to collect intelligence for a competing firm or another government.

  • Marketing surveys are faxed or mailed to an individual instead of the company marketing office.
  • You are unable to find independent sources of information about the sender.
  • The Internet address is in a foreign country. Note: A foreign web site usually has a two-letter country designator after the .com or .org. For e-mail, however, there is no visible indicator of the country from which it was sent. An e-mail from an aol.com address, for example, could be sent from almost anywhere in the world.
  • Technology inquired about is classified, International Traffic in Arms Regulation (ITAR) controlled, is on the Militarily Critical Technologies List, or has both commercial and military applications.
  • The requestor identifies his/her status as a student or consultant or says the work is being done for a foreign government.
  • The requestor insinuates that the third party he/she works for is "classified."
  • The requestor says not to worry about security concerns or assures the recipient that export licenses are not required or are not a problem.
  • The requestor says to disregard the request if it causes a security problem or if it is for information the recipient cannot provide due to security classification, export controls, etc.
  • The requestor admits he/she could not get the information elsewhere because it was classified or controlled.

The following measures are appropriate when you receive any survey request that may not be legitimate.

  • Follow your company or organization's policy in responding to requests for this type of information. It there is no company or organization policy, check with your security officer before responding to any unusual request.

  • Security officers should advise the Defense Security Service industrial security representative or the local counterintelligence unit of any suspicious requests. These reports go into a database of information about possible foreign technology or intelligence collection requirements. This information can then be used to support future analysis or investigations.

False Headhunter Ploy

If you have knowledge and experience in some specialized field, you may be contacted, usually by telephone, by a headhunter who identifies himself or herself as representing a company that seeks applicants for a job position. This is a legitimate, common practice, but not all headhunters are legitimate.

During the interview, a phony headhunter may use skilled elicitation techniques to obtain information from you. In your zeal to impress the headhunter and obtain a better job, you may, without even realizing it, provide sensitive information sought by a foreign organization employing the headhunter. If you are not interested in the job, the headhunter may elicit information on other experts in the field. These individuals can then be targeted by the headhunter, or by the foreign organization in other ways.

A variation of the headhunter ploy is the repatriation of émigré and foreign ethnic scientists. One country, in particular, claims to have repatriated thousands of ethnic scientific and technical personnel back to their home country from the United States. Skilled scientific and technical personnel are asked to return to aid the economic development of their native country. These are frequently naturalized U.S. citizens, some of whom have a security clearances. This is an effective means of transferring technology. Contacting and screening scientific and technical personnel for repatriation also offers excellent opportunities for assessing and recruiting persons as agents who remain in this country. Frequently, foreign intelligence operatives appeal to a person's patriotism and ethnic loyalty.

Request for Competitive Bids Ploy

A request for competitive bids is a standard business practice, but it can also be used as a means of collecting information when there is no intention to let a contract.3

Officials of a U.S. defense contractor reported an incident in which their company was invited to prepare a proposal for an electronic control system and bid on a defense contract for a West European government. The company prepared what it believed was the best, most detailed proposal of all other bidders for the foreign government contact, and also the lowest bidder. Despite this, after all the bids were in, the foreign government decided to build the control system itself.

The U.S. company believes in retrospect that the foreign government never had any intention of awarding the contract to a U.S. company, but was only interested in obtaining technical information. Later, while attending an international trade show, the U.S. contractor saw a foreign-built control system from the same country that rejected its bid, and the foreign country's control system looked identical to the U.S. company's own system.

By deceiving the company, the foreign government acquired preliminary concepts and designs from proven systems and saved money and time in the R&D process. While the U.S. firm may have anticipated some risk in providing technical proprietary information to the foreign government, it also expected an honest competitive process.

It is not unusual for foreign organizations to demand that U.S. companies divulge large amounts of information about their processes and products, at times much more than is justified by the project being negotiated. U.S. contractors can reduce the risk of losing such information by conducting research on their prospective foreign partners and by factoring the potential for being the victim of industrial espionage into their cost benefit analysis. If a particular country or foreign government has a documented history of economic or industrial espionage, companies may decide that it is not in their best interest to conduct business with that country or company. At a minimum, companies may elect to provide the absolutely minimum amount of information necessary to compete for the contract.

Front Companies

A number of governments use front companies to gather intelligence and provide cover for intelligence operations. They are often used to purchase high technology products legally and then export them illegally to an unauthorized recipient.

Front companies are also used by countries and corporations that do not wish to show their hand when conducting competitive intelligence activities such as market surveys, collection of information at conferences and seminars, or purchasing reports from the Defense Technical Information Center. Countries that do not have diplomatic relations with the United States commonly use front companies as cover for placing their intelligence officers in this country.

References
1. Defense Investigative Service brochure, Technology Collection Trends in the U.S. Defense Industry, March 1997.
2. James Norvell, "Assessing Foreign Collection Trends," Security Awareness Bulletin, No. 1-98 (Richmond, VA: Department of Defense Security Institute, 1998).
3. Information obtained by Defense Investigative Service as reported in National Counterintelligence Center publication, Counterintelligence News and Developments, August 1996

 

HOME   |   METHODS OF OPERATION CONTENTS   |   TOP OF PAGE   |   HELP

INFORMATIONCONDUCT | THREATS | TECH VULNERABILITYASSISTANCE
SPY STORIES | TREASON 101


The Chroma Group, Ltd.