INESC-ID Seminar: “Espionagem na Investigação: Mito ou realidade” by Claúdia Cunha (SIS)
On April 15, INESC-ID will host a seminar by Dr. Claúdia Cunha from the Knowledge Protection Program at Serviço de Informações de Segurança (SIS) (Security Information Service). The seminar is titled: “Espionagem na Investigação: Mito ou realidade” (“Espionage in Research: Myth or Reality”) and will be presented in Portuguese.
Date & Time: April 15, 11h00 -12h30
Where: INESC-ID, Rua Alves Redol, 9, 1000-029 Lisboa | Room 9 (Auditorium), Ground Floor
Summary:
“For over two decades, the Serviço de Informações de Segurança (SIS) (Security Information Service) has been carrying out awareness-raising actions in the academic sector, particularly in universities, research centres, and public and private laboratories, to alert to the threats and risks of unauthorised access to ongoing research work that has not yet been published, to the risks of conducting joint research projects with certain actors, and to sharing with hostile actors or states seeking the transfer of know-how and dual-use technology.
It is essential for universities, laboratories, and research centres to be aware of the threat of espionage and proliferation and to adopt a cautious approach in managing, storing, and sharing critical and sensitive know-how. Improper exploitation poses a challenge to the protection of technological and scientific advances in Portugal and requires a careful approach to balancing collaboration and security while protecting national interests and innovation.
In the current international context, sanctions imposed on certain states lead them to seek to circumvent international legal restrictions through espionage actions in Western academic institutions.
In the SIS awareness-raising actions, the national reality regarding security issues and threats on national territory is contextualized. Hostile methods of operation to compromise sensitive information are identified, and specific recent cases targeting national entities are shared. During the presentation of these cases, the physical, digital, organizational, and behavioral security measures that were overlooked and compromised are analyzed.”