In early July, the leaders of MI5 and the FBI did something extraordinary, taking the stage together at a meeting in London with international business leaders to warn about the threat of intellectual property and technology theft by agents of the Chinese government. At risk are a wide range of UK, EU, and US businesses, research institutions, universities, government agencies, and other organizations.
“If you are involved in cutting-edge tech, AI, advanced research or product development, the chances are your know-how is of material interest to the CCP (Chinese Communist Party),” MI5’s Director General Ken McCallum said. “And if you have, or are trying for, a presence in the Chinese market, you’ll be subject to more attention than you might think. It’s been described as “the biggest wealth transfer in human history.”
FBI Director Christopher Wray described the threat to U.S. organizations, saying “The greatest long-term threat to our nation’s information and intellectual property, and to our economic vitality, is the counterintelligence and economic espionage threat from China.” And while China was front and center in Wray’s comments, his cautions just as easily apply to the threats many organizations worldwide face from other governments and bad actors who are constantly probing their defenses in hopes of finding ways to bypass existing data security measures to usurp valuable intellectual property and technology secrets.
Managing Risks
McCallum urged the leaders in attendance to make sure their organizations take a number of specific actions to protect themselves and manage their risks. Here are some key questions business leaders should be asking key team members internally as they assess their threat readiness:
- Do you have a strategic approach to managing the risks and have you discussed those risks with your Board members?
- Do you have a thoughtful security culture at all levels in your organization or does everyone leave it to a Security Department that’s off to one side, only to be contacted in an emergency?
- Does your organization know what its crown jewels are, which, if stolen, would compromise your future?
- Have you put the right controls in place to assess the risks attached to your funding sources and partnerships, and to protect your supply chain?
Clearly, addressing these questions can serve as a best-practice roadmap for managing risk. But what are “the right controls” to assess risks and protect your intellectual property, trade secrets, and technology?
Leveraging Advanced Analytic Technology
There is growing recognition that can serve as a powerful risk management control, especially in addressing questions about people and organizations who you may be considering doing business with.
Bank and financial service professionals have long been familiar with this concept as KYC — Know Your Customer. More recently, the concept has evolved to encompass more than just customers and potential customers. It’s evolved to KYX, applying to current and potential suppliers, partners, employees, strategic allies, service providers, and others.
Entering into new professional relationships with individuals and organizations entails risk. Analytic technology, using entity resolution and network generation, can mine data of all types to provide critical information about an individual or firm/organization, including their connections with other people and entities, with past events, with locations, with sanction and/or watch lists, and with a wide range of risk factors.
Mitigating Risks From Individuals
The utility of this type of contextual analysis, however, is not limited to the specific threats presented by foreign governments. Consider these challenges and potential use cases involving individuals that can easily be avoided using the right technology solutions:
- Your organization is approached by an individual who wants to make a large purchase or investment that would be highly profitable for your firm. Using analytic technology to research that person’s background reveals they are closely associated with a Russian individual who is on EU, UK, and US sanctions list, and who has a strong motivation to launder cash.
- A job candidate for an important position in your firm has impressed senior management and is poised to receive an offer. Running a network generation analysis reveals this person was previously involved in the theft of trade secrets from another firm and that they have a number of links to a high-risk foreign government.
- An expert in your professional field with impressive credentials approaches your firm about a collaborative research and development project that could, if successful, yield new drug manufacturing methods and be highly profitable. The project would require sharing sensitive intellectual property with the expert. Using contextual analysis, your firm discovers the expert has close links to an organization suspected of being a front for organized crime.
Seeing the Bigger Picture
There are countless other scenarios where having a complete picture of a potential customers, partners, employees, suppliers, etc. — all the X’s in KYX — can lead to better decision-making, risk avoidance, and risk mitigation. That complete picture is now available using advanced analytic technology to provide context, visualize connections, and discover linkages, using commercially available data from a range of sources including credit information, public records, corporate filings, social media, news media, sanctions lists, and more.
Treasury & Risk reports that in the US alone, The Commission on the Theft of American Intellectual Property estimates that annual costs from IP losses range from $225 billion to $600 billion. Organizational leaders must invoke a sense of urgency to address these risks, but many don’t know where to start. This is where public/private partnerships can be invaluable as a way to jumpstart your risk mitigation strategy as part of a broader plan to transform your organization and secure it against threats to intellectual property and technology thefts in the future.
You may be interested in…

Solving the Shell Company Conundrum
New Decision Intelligence technology is allowing banks to identify illicit shell company networks at scale to crack down on money laundering and fraud.

3 Talented Quantexans Recognized in the 2023 Women of the Channel List
CRN’s 2023 Women of the Channel honors Tina Gravel, Donna Goodwin and Sheryl Wharff of Quantexa.

This Powerful New Solution Provides a Single View of Customers in Minutes
Quantexa is innovating quickly to test a faster, more streamlined way to deliver Entity Resolution at scale by bundling key capabilities of their Decision Intelligence Platform (DI) in a new product called ER Accelerate.

Quantexa Positioned as a Technology Leader in Quadrant’s 2023 AML SPARK Matrix
Quantexa has been named a 2023 Technology Leader in Quadrant Knowledge Solutions’ Anti-Money Laundering (AML) SPARK Matrix.

In Context: Enhancing KYC and AML Efforts With Innovative Technology
Today’s banking environment is rapidly evolving thanks to new technologies that are allowing organizations to get a full, 360-degree view of their customers. We caught up with Scott Nathan from Citi on the challenges the banking industry faces today and how savvy financial institutions are using technology to meet those challenges.

4 Areas of Focus for Financial Services Firms Following the FCA Review
The FCA’s review of firms’ Consumer Duty implementation plans highlights the positive progress made by some, but also the deficiencies in the approaches of others.
Related Solutions

Tax Authorities
Reduce the tax gap, identify fraud and non-compliance, and operate as efficiently as possible with limited resources.

Anti-money laundering
Reveal hidden risks and detect criminal activity faster. Reduce false positives to manage the cost of compliance. And improve investigations to make faster and more consistent decisions at scale.

Customs Agencies & Border Control
Contextual Decision Intelligence enables faster decisions, increased revenue collection and enhanced compliance. The Quantexa platform enables Customs and Border agency teams to analyze data successfully, automate and accelerate decision-making, and achieve improved results.

Fraud
Identify potentially fraudulent activity by looking at people or transactions in isolation. Understand the context surrounding the organizations you do business with to make fast, accurate decisions.

Fraud, Waste & Abuse
Empower your team with the best tools available for today’s challenges to identify and prevent fraud, waste and abuse with contextual decision intelligence software.

Credit Risk
Understand your customers, their business structures and supply chains. Make better lending decisions, faster. And support digital risk transformation.

Customer Intelligence
Generate a complete view of the context around your customers and prospects to build better relationships, reduce attrition and find hidden opportunities.

Revolutionize Your Financial Crime and Fraud Detection

Investigations
Enhance the efficiency, effectiveness and consistency of your operational and complex investigations to empower your teams to expose and understand risk faster.

Master Data Management
Connect all data—internal and third party—to create a joined-up, contextual view of all the relationships between your customers and every other domain.

Compliance
See how we help to reduce costs and improve coverage for financial crime compliance.

CDO
See how our platform uses contextual analysis to turn data into a high value asset.

CIO
See how our platform uses financial crime technology to enhance your existing IT ecosystem.

Healthcare
Reduce the tax gap, identify fraud and non-compliance, and operate as efficiently as possible with limited resources.

Contextual Monitoring
Reveal hidden risks and detect criminal activity faster. Reduce false positives to manage the cost of compliance. And improve investigations to make faster and more consistent decisions at scale.

Unified CRM Solution

Know Your Customer
Reduce significant manual effort across onboarding, refreshes and remediation. Automate checks, implement continuous monitoring, and focus on contextual decision making.

Growth and Retention

Contextual Engagement
Generate a complete view of the context around your customers and prospects to build better relationships, reduce attrition and find hidden opportunities.

Data Management
Connect all data—internal and third party—to create a joined-up, contextual view of all the relationships between your customers and every other domain.

Connected Customer View
Generate a complete view of the context around your customers and prospects to build better relationships, reduce attrition and find hidden opportunities.