In Joseph Conrad’s classic novel Heart of Darkness, the unexplored and unmapped jungles of the African Congo in the 1890s are referred to as “one of the last dark places of the earth.” Today, with international travel accessible to virtually anywhere, along with the advent of on-line satellite mapping programs, one would assume that no such uncharted areas remain on the planet. However, there does exist one last bastion of “no man’s land,” left virtually unexplored by modern civilizations. This forbidden land is known as the Federally Administered Tribal Areas, or FATA, and is a breeding ground for the Taliban and al-Qaeda to conduct terrorist activity.
Located in the mountainous region between Afghanistan and Pakistan, the Federally Administered Tribal Areas (FATA) is comprised of seven regions or agencies; Bajur, Mohmand, Kurram, Khyber, Orazkzai, North Waziristan, and South Waziristan. Roughly the size of Rhode Island, the FATA is notorious for being a hotbed of a range of difficult issues: among them, the extremely low literacy rates of its tribal inhabitants – the regional average is just 22%;1 opium trafficking and other signs of lawlessness; an underdeveloped economy with only 34% of the population rising above the poverty line; and, of course, the numerous madrassas and Taliban training camps continuously recruiting, sheltering and training Taliban fighters (as well as other al-Qaeda affiliated supporters).
Considered an ungovernable territory of Pakistan, the FATA is inaccessible to U.S. military and ISAF forces operating across the border in Afghanistan. For this reason, Osama bin Laden and al-Qaeda operatives slipped across the Torra Bora mountain range from Afghanistan into the FATA’s Mohmand Agency, to elude the initial special operations teams assigned to kill or capture him following 9/11. Prior to Operation Neptune’s Spear, the joint CIA-Navy Seal operation that killed bin Laden on May 1st of this year in Abbottabod, Pakistan, intelligence analysts commonly assumed that bin Laden was hiding out in either North or South Waziristan (of the seven Agencies, North and South Waziristan are geographically and politically the most difficult to access, a feature that has critical implications for US and Pakistani military strategy).
The FATA is home to 3.3 million ethnic Pashtuns, a centuries old tribal society that, with the exception of AK-47s and other weapons, has not evolved much in the past three hundred years. Governance in the region, like the Durand line conflict (the arbitrarily drawn line which divides Afghanistan and Pakistan), is for the most part a remnant of the British colonial system. To “enforce” the FATA, the Pakistani government assigns Political Agents (PAs) to govern each agency. These Political Agents visit villages from time-to-time to collect taxes and assist with tribal disputes. Law enforcement lies in the hands of a Frontier Corps, headed by Pakistan’s military officers. However, under Pashtun tradition, most “justice” is enforced through an eye-for-an-eye code known as a “blood feud.” Each tribe imposes punishments for theft, murder, and/or rape internally, without the consent or notification to the Pakistani government. The Frontier Crimes Regulations (FCR) is the governing code surviving from British colonial rule; it is decried by the locals and is seldom, if ever, effective in stemming local feuds. The Supreme Court and High Court of Pakistan have no jurisdiction in the region, 2 as the FATA is deemed virtually lawless.
The post-9/11 years, understandably, have created new conflicts and reinforced attitudes that had existed in previous years. Pakistani policy toward the inhabitants of FATA, beyond the FCR, has encouraged the emergence of a population that is more likely to support religious extremism. Indeed, the 1997 “adult franchise” created a situation whereby only leaders of madrassas and mosques could lobby for votes. In 1997 and 2002, Islamic leaders were elected as FATA representatives – a sign that mullahs had displaced secular Maliks (religious scholars who initially welded authority and leadership within Pashtun tribes). The Taliban thus found a fertile ground on which to execute their projects.
The Taliban, and other Al Qaeda supporters, are now believed to be present in all FATA agencies and are in full control of Waziristan, Orakzai and Bajaur. The local government no longer has power in 24% of the region, and analysts maintain that the spread of Taliban militancy is likely in the future.3 U.S. Secretary of Defense Leon Panetta maintains that al-Qaeda’s newly promoted leader Ayman Al-Zawahiri is most likely in the FATA.4 Add to this the animosity of tribesmen to the Pakistani military and intelligence forces – the infamous ISI – and a sketch of the present Af-Pak dilemma is obvious.
One of the most dangerous terrorist groups operating in the FATA is Tehik-i-Taliban Pakistan (TTP). TTP was formed by Waziri tribesman Baitullah Mehsud as a union of various militant groups with the aim of sending fighters to fight the US in Afghanistan. Baitullah, who was killed by a CIA drone attack in 2009 (later to be replaced by his deputy Hakimullah Mehsud), was particularly ruthless in his usage of suicide bombing attacks. According to a United Nations report, TTP is responsible for 80% of the suicide bombing attacks in Pakistan, as well as being responsible for the assignation of former Pakistani Prime Minister Benazir Bhutto.5 On December 30, 2010, seven CIA officers were killed in a suicide bomb attack by Jordanian double agent Humam Khalil Abu-Mulal al-Balawi at Forward Operating Base Camp Chapman in Khost, Afghanistan. In a video later released by TTP, al-Balawi declares that the attack was to be in retaliation of Baitullah Mehsud’s death. Hakimullah Mehsud is seen standing next to al-Balawi in the video.
Other emerging Pakistani terrorist organizations like Hizbul Mujahideen, Harkatul Mujahideen, Lashkar-e-Tayyaba, Jaish-e-Muhamamd, Sipah-e-Sahaba, Lashkar-e-Jhangvi, Lashkar-e-Islam, Ansar-ul-Islam, Amar-bil-Maroof, and Tahreek-e-Nifaz-e-Shariat-e-Muhammadi have expanded their recruiting base by propagating their anti-western messaging in the madrassas (religious schools) in and around the FATA. This fertile terrorist breeding ground has become a magnet for those who wish to wage jihad against the “infidels” and has allowed for a greater number of extremist demagogues to seize political power. Furthering their cause, these new Islamist figures have connections with Pakistan’s Islamist parties, the Taliban and Al Qaeda. Meanwhile, monetary support from the UAE, Saudi Arabia and Kuwait is pouring in to Taliban training camps and madrassas. It is no wonder that Time magazine has used the term “Talibanistan” to refer to the region.6
In 2004, 80,000 Pakistani troops entered FATA and met with hostility from the Taliban and Waziri tribes. But opposition is never the only problem when it comes to the Pakistani military’s operations in this region; the military simply did not have the capability of leveling a serious blow against the militants, the result being the signing of peace accords requiring the release of prisoners and a troop drawback, which in turn has caused the emergence of a more powerful Taliban in the border areas. Nothing testifies more to the weakness and unwillingness of the Pakistani military in dealing with militants in the FATA.
One difficulty has been determining Pakistan’s role in either fighting or supporting the local militants. The presence of ethnic Pashtuns is important to Pakistan: they are practicing Sunni Muslims who reside in rural areas beyond the FATA – their tribes straddle eastern Afghanistan and northwest Pakistan – and are thus capable of expanding Pakistan’s influence in the region. This puts the Pashtuns in the middle of a conflict between Pakistan and Afghanistan, which has spanned decades: namely, the dispute over the Durand Line.
The dispute over the Durand line gives Pakistan incentive to attack Afghan villages and to continue building posts and fences inside Afghanistan. In the past year, Pakistan’s military has reportedly fired 800 rounds of missiles at its western neighbor.7 The movement of jihadists across the border is also beneficial.
Dividing the Pashtuns along the Durand line thus has the double effect of antagonizing the tribes and of reinforcing the conflict between the two countries. Pashtun tribes are in danger of forever remaining under Taliban rule.
One solution that has been proposed and partially implemented is aid. With one hospital bed for every 2,179 and one doctor for every 7,670 residents of FATA, and not a single university, there is no doubt that the tribes would benefit from development projects. However, the $7.5 million USAID package announced in 2007 has been widely criticized8 as bringing minimal development to the region, as corruption is widespread and measurements of effectiveness are difficult to gauge. Furthermore, it is no secret that any explicitly aid that is perceived as being in any way connected to the US falls prey to extreme criticism and is rejected by the Pakistani government itself, which is suspicious of any signs of increase in US involvement.
This fierce anti-American sentiment has been exacerbated in part by the controversial drone attacks, which increasingly have been a staple of US operations in the regionsince 2002, are often blamed for the Pashtun’s intractability. However, studies such as the one conducted by the Islamabad-based think tank, Aryana Institute for Regional Research and Advocacy, show that Pashtuns see the drones as “liberators” from Taliban coercion and the Pakistani military’s indiscriminate and intrusive attacks.9 Moreover, although drone strikes are regularly denounced by the Taliban as indiscriminate attacks on civilians, a January 2011 report by Bloomberg stated that civilian casualties in the strikes had apparently decreased, despite having been ramped up by Obama since 2009. According to the report, the U.S. Government believed that 1,300 militants and only 30 civilians had been killed in drone strikes since mid-2008, with no civilians killed since August 2010. 10Recent events in the region have also highlighted the success of US drone strikes, one of them being the recent alleged (at the time of this writing) death of Atiyah abd al-Rahman, Al Qaeda’s Number 2. Rahman assumed this role in AQ after bin Laden’s death; he had close ties to the Afghan Taliban. He was killed Mir Ali, a town in North Waziristan, that enduring hub of local militants and the Taliban. The success of this drone strike has raised hopes that finding Zawahiri is a similarly attainable goal. Pakistan, by contrast, has initially denied that it was Rahman – and not local militants – that had been killed, and claimed that Rahman’s death would not deter AQ.
In a move that deviated from Pakistan’s official policy on US drone strikes – which is to deny their utility and appropriateness – Pakistani General Mehmood Ghayur has actually expressed approval of the drones. In a March 2011 briefing, he was quoted as stating that ''myths and rumors about U.S. Predator strikes and the casualty figures are many, but it's a reality that many of those being killed in these strikes are hardcore elements, a sizable number of them foreigners.''11 It is undeniable that, at the very least in North Waziristan – an area that Pakistan aims to avoid – drones have yielded concrete results.
Ultimately, remote drone strikes are an effective option for US operations in the FATA in terms of accuracy and the reduction of US casualties. On-the-ground operations carry a greater risk for US soldiers, and their utility is diminished when interrogation is not likely to yield actionable intelligence. The goal of the 2009 troop surge was to “disrupt, dismantle, and defeat al-Qaeda and its safe havens in Pakistan, and to prevent their return to Pakistan or Afghanistan,”12 and indeed, the use of drones has increased our ability to eliminate key AQ figures, and put within our reach the goal of protecting our soldiers.
It is somewhat shocking to think that in 2011 a lawless, tribal society – bent on the destruction of Western beliefs – has successfully flourished within the nuclear state of Pakistan. Equally disconcerting is the fact that the United States and the international community has tried unsuccessfully to purge the FATA of the Taliban, al-Qaeda, and other terrorist groups. Amid a currently strained relationship with Pakistan, the United States is at a crossroad as to how to proceed with future operations in an area that is hemorrhaging violence. One thing is for certain, if the United States fails to act, the Federally Administered Tribal Area will remain, like Conrad’s description, “one of the last dark places of the earth.”
1 FATA Secretariat, UNICEF and World Food Programme. 2009 Survey. Available at http://fata.gov.pk/files/MICS.pdf.
2 Pakistan Constitution. Part XII, Art. 247 and Art. 248. Available at http://www.pakistani.org/pakistan/ constitution/.
3 BBC. 2009 Survey. Available at http://news.bbc.co.uk/2/hi/south_asia/8047504.stm.
4 Iqbal, A. (2011, July 10). Zawahiri Hiding in FATA: Panetta. Dawn. Available at
5 United Nations AMA. July 2011. Available at http://unama.unmissions.org/Portals/UNAMA/Documents/2011%20Midyear%20POC.pdf.
6 Time. (2007, March 22). The Truth About Talibanistan. Available at http://www.time.com/time/magazine/ article/0,9171,1601850-?1,00.html.
7 Shalizi, H. (2011, July 1). Afghanistan Won’t Fire Back on Pakistan: Karzai.Reuters. Available at http://news.yahoo.com/afghanistan-?wont-?fire-?back-?pakistan-?karzai-?124842643.html.
8 Perlez, J. New York Times. (2007, July 16). Aid to Pakistan in Tribal Areas Raises Concerns.New York Times. Available at http://www.nytimes.com/2007/07/16/world/asia/16pakistan.
9 Taj, F. (2010, April 16). CIA Drone Strikes in Pakistan's FATA Region and the "Loss" of Actionable Intelligence: A Pashtun Perspective. Terrorism Monitor. pp. 4-?6. Retrieved from EBSCOhost.
10 Capaccio, T. and Bliss, J. (2011, January 31). US Said to Reduce Civilian Deaths after Reducing CIA Pakistan Strikes. Bloomberg. Available at http://www.bloomberg.com/news/2011-?01-?31/u-?s-?said-?to-?reduce-? civilian-?deaths-?after-?increasing-?cia-?pakistan-?strikes.html.
11 Masood, S. (2011, March 10). Pakistani General Credits U.S. Drone Strikes. New York Times. p. 8. Retrieved from EBSCOhost.
12 President Barack Obama’s speech announcing the surge on December 1, 2009 at the United States Military Academy at West Point, West Point, NY-? http://www.whitehouse.gov/the-?press-?office/remarks-? president-?address-?nation-?way-?forward-?afghanistan-?and-?pakistan.
Proprietary Information – © SMI 2013 www.smiconsultancy.com
The gray arms market consists of untrustworthy deals between governments, rebel groups, or brokers, sometimes supported by legal contracts, but often blurring the line between legal and illegal. The United Nations, as well as many independent state commissions, has attempted to investigate this shadow world of illegal arms distribution, which includes the infamous Viktor Bout and the network of dictators in need of his munitions. These countries and international bodies have placed embargoes and gathered public support to shut down this dangerous operation, but they have rarely gathered enough support or traction for meaningful legislation to lend teeth to enforce such sanctions.
Viktor Bout, aka the “Merchant of Death”, epitomizes the underworld opportunities presented in the transition from Soviet socialist society to a post-Cold War free market illiberal democracy. With access to transit lines across the third world, Bout helped fuel the decade’s worst atrocities in Africa by supplying weapons to dictators that would murder anyone in their path. He is hardly the only weapons facilitator in the world; indeed, the United States itself is the leading global exporter of weapons. The US would do little to help the enforcement or flow of intelligence on Viktor Bout but instead unknowingly hired him as one of the numerous contractors to supply the war in Iraq and Afghanistan in the early part of the decade. An analysis of Viktor Bout’s operations and his eventual conviction can shed light on the gray arms market, and on possible steps to be taken to stem arms smuggling.
Viktor Bout’s past is murky, to say the least. Most likely born in Tajikistan, Bout graduated from the Soviet Union’s Military Institute of Foreign Language and became fluent in six languages, which he used in the service of the Soviet Union military to interpret in Africa. He earned the rank of Lieutenant in the Soviet Military and there is strong evidence that he was a member of the GRU – Soviet Special Forces – which offered him a wide range of contacts which were likely instrumental in starting his international arms endeavors.
In the Russian post-Cold War economy, anything and everything was for sale. Much of the Soviet military stock fell into the hands of the senior officers in charge, who would sell poorly documented weaponry on the international market in order to cover patronage that was no longer forthcoming. Thousands of pilots and aircrews were out of work with the collapse of the Soviet military; they were easy targets for gray arms dealers who were easily able to replace their previous salaries. Under these conditions, an abundance of products and military grade employees, Bout’s additional education in economics enabled him to devise a business model that would maximize profits at every turn. Thus began his long-standing venture into the gray arms market.
Bout was able to purchase a small force of surplus Soviet Antonovs and Ilyushin planes that could sustain rough landings on demanding dirt runways in many of the African countries he delivered to. Bout paid so little for the planes in fact that he was able to recover his cost after only a few runs; aiding his bottom line, it also did not hurt that the aircraft were not insured and were registered in countries with the most laissez-faire regulations.
Viktor Bout’s planes never flew empty, a stream of Soviet-era craft continuously carrying arms into warring countries. Complicating the tracking of such material, his shell companies would often fly legitimate cargo such as food and appliances into these same markets, along with illegitimate non-military cargo such as diamonds out of them. Bout’s honed business mind manipulated these decoy shell corporations and his numerous bank accounts, as well as utilized the remoteness of the locations he operated in, to evade investigation and elude the law.
Viktor Bout’s small fleet acquired increasingly dangerous customers as his reputation grew, and began arming the Afghan Northern Alliance Resistance led by Ahmad Shah Massoud in 1992. The turbulence of Afghanistan’s militia politics resulted in the opposing Taliban taking one of Bout’s flight crews and arms shipments hostage in 1995, but the latter’s escape the following year led many investigators to believe that a deal had been struck between Bout and the Taliban.
Throughout the 1990s Bout also armed the inner circle of ruthless African dictators including Mobuto Sese Seko and Jean-Pierre Bemba in the Democratic Republic of the Congo, Jonas Savimbi’s UNITA force in Angola, Charles Taylor in Liberia, Bockarie in Sierre Leone, and Paul Kagame in Rwanda. Bout and Taylor were even friends beyond the supply of arms. Bout would at times use this friendship for everything from hunting with friends in the bush, evading arrest, and registering his planes in Liberia (among many other African nations). Bout played a shell game of operations between nations, often flying two planes with the same registrations, changing flight plans or not following the ones filed, and forging documents such as End-User Certificates (EUCs). With vast corruption and ample natural resources, the continent of Africa was a prime target for Bout’s weapons the trade.
In 1993, Bout moved his business, known as Transavia Travel Agency, to Sharjah, United Arab Emirates, where he partnered with Sultan Hamad Said Nassir al Suwaidi to gain access to the Sharjah airport. This new operation was a hub for Bout to facilitate his weapons smuggling to Africa, Afghanistan and the Bosnia. The Emirates staging area also offered protection from the prying eyes of investigators who were targeting the network of planes Bout ran through his shell corporations and sister companies. Viktor Bout and his brother Sergei, involved in many of his operations, made hundreds of millions of dollars from the transport and sale of weapons to embargoed nations in turmoil from Persian Gulf. In the end though, there was no denying this business had grown invaluable in the third world transit of arms. Despite being the target of investigations and having supposed assets frozen throughout the Clinton and Bush administrations, he was nevertheless hired as one of the thousands of subcontractors transporting military goods into Afghanistan and Iraq. Bout’s cargo fleets were so successful at delivering their payload that even after his companies were proven to be involved in illicit arms movement, it would be years before the American government would cease using his services.
Both the success of Bout’s network, and the intensity with which international organizations and individual agencies alike pursued him, changed the face of arms control and conflict resolution. His operations throughout Africa changed the way investigators looked into containing failing states, eventually learning that restricting the arms flow from actors such as Bout was essential to favorable outcomes. Yet for nearly two decades, in spite of his obvious ties with known war criminal and the tremendous energy focused on understanding his operation, Bout remained at large and in business.
Finally in 2008, Bout was arrested in Thailand at the culmination of a DEA sting investigation involving agents posing as FARC (Revolutionary Armed Forces of Columbia) militia members. It was not until 2010, after much deliberation by Thai Courts, that Bout was eventually extradited to the U.S. and charged with supplying and supporting a known terrorist organization.
This case study of the gray arms market should be carried one step further. As stated, gray arms trade borders on legality and, in many cases, crosses that line. Often this process of weapons purchases also results in smuggling, generally to a tertiary consumer who cannot acquire material directly from the dealer for any number of reasons.
Having worked for the Central Intelligence Agency (CIA) for 22 year (1971-1993) in Counterterrorism, Counterinsurgency, Arms Interdiction and Special Operations, I have managed and directed mobile arms interdiction teams throughout El Salvador to prevent the spread of contraband and arms smuggling in Central America. The latter, smuggling, is a major business in Central America, offering intermediaries an opportunity to both fuel the inflow of arms across the Western hemisphere and make a considerable amount of money doing so. Those in need of these intermediaries, who cannot buy weapons wholesale, include drug cartels, insurgents, and terrorists. Still, while it may help take some small measure of arms out of combatant control, interdicting a shipment is not particularly effective in identifying and disbanding a smuggling network—just as arresting a drug mule is not a very efficient way to dismantle a cartel. To do this, tandem intelligence and law enforcement operations are required in order to identify both the origins and destinations of a smuggled shipment, often by incorporating some form of electronic tagging or surveillance, and tracing the shipment throughout the criminal network. This was in fact done quite effectively in the early 1980s to reduce the flow of arms from Nicaragua to El Salvador through the Gulf of Fonseca.
Another more contemporary example of illegal arms smuggling is the ATF Fast and Furious “gunwalking” operation. Those arms were traveling through the Southwest United States to notorious drug cartels in Mexico. The operation’s legality was dubious, though it allegedly had the complicity of the U.S. Justice Department, making it a good example of the legal confusion involved in gray market trade. Still, while operating closer to the States and lacking certain clarity in the chain of command, the concept of Fast and Furious was nevertheless similar to my operations in Central America during the 1980s. There was also some level of success in Central America and in other related counterterrorist operations worldwide, which helps make a stronger case for the idea of Fast and Furious. However, a major problem with these operations is the high penalty both law enforcement and civilians face if the operation fails, as it may have in Fast and Furious.
The post-9/11 world of privatized military contracts is likely a looking glass at the future of the American Defense System. The military industrial complex, with a strong lobby and considerable political support, will not allow the defense budget to be cut substantially, and will continue to result in the trade of superfluous military equipment. And although for twenty years Viktor Bout epitomized the gray arms trade – forging EUC’s, flight plans, and flight manifests, befriending ruthless dictators, fueling conflicts across the African and Asian continents, and illegally transporting weapons – Viktor Bout and the likes of his network will inevitably disappear from prominence. However his legacy, for better or likely for worse, will remain, this time in the form of more ‘legitimate’ private companies providing weapons, training, medical, and security services for the U.S. troops operating in the region. What is perhaps most disturbing of all though, is that these private security firms, known to many simply as mercenaries, have not been held more responsible for their actions in exchange for their legitimate contracting. They are running lawless through warring areas, often held less accountable for their actions than Bout’s networks ever were. The face of arms dealing may have changed from former Soviet strongmen to businessmen in pinstripe suits, but the problems they cause manage to persist across time.
Leo Labaj is Director of the Infrastructure Protection Division at Security Management International, LLC (SMI). He is retired from the Central Intelligence Agency and has worked weapons interdiction cases throughout his distinguished career. He can be reached at email@example.com. Daniel Levanti is a Research Associate at SMI and recently graduated from the University of Central Florida with a degree in “Political Science.” He can be reached at firstname.lastname@example.org.
As today’s business environment has become globally interconnected, foreign intelligence activities have extended beyond traditional targets in the U.S. intelligence community and other national security structures. Hostile intelligence services, as well as “private collectors”, now target a wide variety of corporate executives, which has compounded the risk of foreign economic collection and industrial espionage like never before.
In previous decades the threat of physical or electronic surveillance from international intelligence services applied primarily to U.S. diplomats or those individuals responsible for transporting R&D materials. In today’s world, however, anyone can be a target of foreign collection activities. Of particular interest to foreign “collectors” are American business travelers.
According to the Office of the National Counterintelligence Executive (NCIX), over $300 billion worth of intellectual property is stolen from U.S. companies each year. In many of these cases, the information was extracted while an executive was traveling abroad for business. Furthermore, in most instances, the executive never realized that his or her sensitive materials had been compromised. As such, a recent annual report to Congress on foreign counterintelligence concerns stated, “the United States private sector is seen as an irresistible ‘soft target’ for foreign intelligence collectors.”
The most common methods to obtain sensitive information from travelers are through electronic surveillance and exploitation of laptops/PDAs/cell phones, the use of elicitation techniques by trained intelligence officers against unwitting business people, and surreptitious hotel room intrusions. Bribery, blackmail, sexual entrapment and extortion are also common methods, however those operations expose the espionage intent, thus removing the clandestine aspect of the theft.
According to recent FBI statistics, 23 foreign governments actively target the intellectual property of US corporations, while over 140 countries spend resources to acquire American technology. The top U.S. technologies targeted for theft include aeronautics, information systems, lasers and optics, sensors, marine systems, and electronics. Additionally, ONCIX warns that the rapid expansion of social networking software and virtual world technology offer new venues for making contacts and transferring information.
Before proceeding further, it is important to note the differences between economic and industrial espionage, as both terms are often times mistakenly used interchangeably. The key difference between the two forms of collection methods is that economic espionage involves the assistance of a government intelligence service, while industrial espionage is purely a covert or clandestine collection performed by an industry competitor (that is not to imply, however, that former intelligence officers do not carry out these industrial espionage operations).
It should come as no surprise that countries such as China, Russia, France, Iran, Cuba, Israel, Japan, and India are commonly alleged to have involvement with the theft of valuable U.S. business secrets. Most of the time these countries deny any involvement with economic espionage activities, however on some occasions they are caught “red-?handed” or simply boast about their successes. One of the most notable cases (or myths – depending upon who you ask), involved the admission from retired director of the French intelligence service (Direction Generale de la Secuirite Exterierure – DGSE) Pierre Marion. Marion, on more than one occasion confessed publicly to installing audio devices in the business class cabin of Air France flights to listen in on the conversations of American businesspersons.
“This espionage activity is an essential way for France to keep abreast of international commerce and technology. Of course, it was directed against the United States as well as others. You must remember that while we are allies in defense matters, we are also economic competitors in the world.”
Despite the French admission, the most immediate threat to American business travelers still remains from China. Businessmen and women traveling to Beijing, Shanghai, Hong Kong and even Taipei need to be especially vigilant, as the likelihood for eavesdropping, intrusion operations, and electronic interception is extremely high. Unlike many other countries, the Chinese recognize the need for all of its citizens to contribute to the foreign collection efforts – almost as a point of patriot duty.
China’s pursuit toward modern economic prosperity became evident when during the 1980s President Deng Xiaoping unveiled China’s 863 Program. The 863 Program was Xiaoping’s personally approved National High-?Tech R&D initiative. Per a 2009 interview with China’s former Minister of Science, the objective of the 863 Program was as follows:
“…to boost the innovation capability in the high-?tech sectors, particularly in strategic high-?tech fields, in order to gain a foothold in the world arena; to strive to achieve breakthroughs in key technological fields that concern the national economic lifeline and national security; and to achieve leap-?frog development innkey high-?tech fields in which Chinas enjoys relative advantages or should take strategic positions…”
In other words, it is the decree of the Chinese government that the theft of foreign economic secrets is an acceptable, and necessary, responsibility of all Chinese citizens. This concept is particularly reinforced to those Chinese who may actively travel abroad and have access to foreign companies and organizations, universities, national laboratories, or tradeshows.
Industrial espionage is equally as prevalent, and problematic, as economic espionage. Although foreign government involvement is not present, the amount of financial damage that can be inflicted upon a company through the loss of a formula, blueprint, methodology, or proposal can cost upwards of hundreds of millions – if note billions -? of dollars.
According to ASIS International, Fortune 1000 companies fall prey to industrial espionage attacks on average of 2.5 times per year. The cost alone to secure and investigate these attempted intrusions can range anywhere from the tens of thousands to millions of dollars. Therefore, it is safe to say the problem of both economic and industrial espionage is not going to disappear any time soon.
It should come as no surprise to anyone that a number of nations friendly to the United States continue to engage in economic espionage. Likewise, the on-?going threat of industrial espionage from foreign private sector competitors is equally pervasive. With the billions of dollars that are stolen from American businesses each year, the only immediate solution to the problem is to implement effective countermeasures that reinforce strong operational security practices.
Unfortunately, many companies recognize the need for these practices only after their secrets have been stolen and millions of dollars in research and development funds have been lost. Corporations should protect themselves now before their company secrets are no longer secret!
Luke Bencie is the President of Security Management International, LLC. He has traveled to over 120 countries for the U.S. Government, as well as the private sector,and frequently lectures on counterintelligence, foreign economic collection, and industrial espionage. His latest book, Among Enemies: Counter-?Espionage for the Business Traveler, is now available everywhere.
Proprietary – Copyright SMI 2013
One trillion dollars is a big number. One trillion dollars is a one, followed by 12 zeros. One trillion dollars would buy you over forty million new cars. One trillion dollars would buy you more than five... More »
From the publisher: "The world is a tumultuous place, filled with war, corruption, and an evil desire for politicians, terrorists, and other underworld figures to achieve or maintain power. In the middle... More »
Luke Bencie, Managing Director of SMI is pleased to announce new educational resources for current and aspiring Global Security Consultants! Global Security Consulting Education Resources Global Security... More »
“Establishing a brand where clients ask for you by name when their security situation requires immediate – and often discrete - solutions. Building a global reputation that has been forged... More »
Counter-Espionage for the Business Traveler | 2017 Washington DC Training Announcing course dates for Counter-Espionage Training Washington DC! The Counter-Espionage for Business Travelers Course is the... More »
Ask most Americans what they know about the word “espionage” and they might answer something about the CIA battling the KGB during the Cold War, maybe a tuxedo-clad James Bond drinking martinis,... More »
The contemporary business tie has a long and unexpected history behind it tracing its way back through Victorian fashion and Fifteenth Century Parisian fancies it seems as if the necktie originated originated... More »
If you think about it, business travelers are very predictable. International, C-suite executives are even more predictable. Even the most populous cities in the world have limited hotels that executives... More »
For most international business travelers, overseas hotel accommodations can conjure up an array of images. Depending on the region of the world they travel, frequent fliers know that lodging is never... More »
April 11-13, 2017June 13-15, 2017August 15-17, 2017October 10-12, 2017 Each course is limited to 8 attendees | Register Below Today! The CARVER Target Analysis and Vulnerability Assessment™... More »
By Luke Bencie and Yuji Kumamaru The March 11th, 2011 accident at the Fukushima Daiichi Nuclear Power Station (simply referred to in Japan as “3/11”) exposed vulnerabilities in Japan’s... More »
Elicitation. A ploy where a seemingly normal conversation is contrived to extract information about the individual, their work, or their colleagues that is not readily available to the public. “So,... More »
We are excited to announce that Security Management International, LLC's Counter-Espionage for the Business Traveler Course has been nominated for the 2016 Security and Fire Excellence Awards by... More »
Why the Reduction in Bank Robberies is a Cause for Concern Kidnapping Awareness and Prevention: Why Less Bank Robberies is Dangerous Crime doesn’t pay. Not like it used to at least. In the last... More »
As a nation, the United States has become addicted to the steady and dependable delivery of electrical power. Without electricity the world, as we know it, would cease to function (imagine no lights, television,... More »
8300 Boone Boulevard
Suite 850, Vienna,
VA 22182 United States
Telephone : (703) 893-8000