Michael Schrenk 
       Competitive Intelligence Counterintelligence Training & Speaking      In The News      Contact   

Counterintelligence is largely the practice of understanding OPSEC or Operations Security.

OPSEC is a military term that asks:
What can an adversary learn about our
organization by observing normal
day-to-day operations?
Operations Security defines your level of organizational privacy, and protects your trade secrets from unintentional leaks. Everyday, uneducated employees, vendors, and contractors, leak vital organizational secrets by simply doing their jobs.

How are trade secrets leaked online?

Trade secrets are leaked by simply observing what you, and your employees, contractors, and vendors publish online.
  • HR & Job Postings
  • Many organizations leak strategic information in their job postings. This is especially true when an organization is hiring in new skills in new locations. HR Managers are seldom trained to post meaningful job postings in an era when their job openings are periodically harvested by automated agents that are looking for outliers in normal hiring activity.
  • Order Fulfillment
  • The way you fulfill orders can reveal a lot about your business. I've personally been able to glean enough financial information about business from making periodic orders to essentially be able to do their books.
  • Procuring Inventory
  • The way you buy inventory or other supplies from vendors can reveal how healthy your business is, and how well diversified your sources are.
  • Online Stores
  • If not carefully planned and executed, your online store can leak your pricing and brand strategies. It can also say a lot about your suppliers, customers, and responsiveness to market changes.
  • Social Media
  • Your organization's use social media can leak information. And, the problems are multiplied by the social media accounts of your employees, contractors, and vendors. Often, social media can be used to determine, advanced word of new projects, employee rosters, and even customer lists.
  • Regulatory and Transparency
  • Many leaks are caused by rules and regulations intended for transparency. Without proper policy, organization's leak strategic plans through financial, DNS, court, and intellectual property filings.
  • Leaks due to sloppy procedures
  • There is a long history of leaks that are caused by shear laziness, often leading to embarrassing situations. Policies can be employed to limit these leaks.
  • We provide organizational privacy training to help protect your organization's secrets.

    You have a responsibility to know as much as possible about your competition and markets.
    How much information are you giving your competition? Do you have Organizational Privacy policies?
     Training &
    Well informed employees are your only true path to Organizational Privacy.
    Many online processes can be automated for efficiency and cost savings.
    Copyright Michael Schrenk 2024, all rights reserved.
    DEF CON 23: Applied Intelligence: Using information that's not there
    DEF CON 22: You're leaking trade secrets
    DEF CON 21: How my BotNet purchased Millions of Dollars in Cars...
    DEF CON 17: Screen Scraper Tricks: Difficult Cases
    DEF CON 15: The Fabulous Executable Image Exploit
    DEF CON 11: Online Corporate Intelligence
    DEF CON 10: An Introduction to Writing Webbots and Spiders
    DEF CON 5: Computer World: Fear and hacking in Las Vegas
      Organizational Privacy
    Keynote: Secure Computing Forum, Dublin Ireland
    Data Jounralism
    Web Development
    Bot Detector