Published January 30, 2026 | Version v1
Video/Audio Open

Ep. 379: Corporate Spies: When Business Intelligence Goes Dark

  • 1. My Weird Prompts
  • 2. Google DeepMind
  • 3. Resemble AI

Description

Episode summary: In this episode, Herman and Corn step away from the world of government secrets to explore the equally cutthroat world of corporate warfare. From the legal nuances of "dumpster diving" to the high-stakes drama of the Coca-Cola and Pepsi rivalry, they break down the thin line between legal competitive intelligence and illegal espionage. Discover how private intelligence firms operate in the "gray zone" and why a single discarded document could cost a company billions.

Show Notes

The world of shadow operations is often associated with high-altitude jumps and government agencies, but as Herman Poppleberry and Corn discuss in their latest episode, some of the most intense espionage happens right on the sidewalk. Inspired by a listener's question about the rivalry between local falafel shops, the duo dives into the multi-billion-dollar industry of corporate espionage, where the stakes involve proprietary formulas, market positioning, and the lengths companies will go to steal a competitor's edge.

### Intelligence vs. Espionage: The Daylight and the Midnight Herman begins by establishing a critical distinction between two frequently confused concepts: competitive intelligence (CI) and corporate espionage. Competitive intelligence is what Herman calls "business archaeology." It is the perfectly legal and ethical practice of analyzing public filings, monitoring social media, and reverse-engineering products bought off the shelf. It is a fundamental part of staying competitive in a modern market.

Corporate espionage, however, is the "midnight version." This involves crossing legal and ethical boundaries through deception, theft, bribery, or electronic surveillance. While the goals might be similar—understanding a rival's next move—the methods define the legality. As the discussion shifts to the year 2026, the hosts note that while technology has advanced, some of the most effective tactics remain surprisingly low-tech.

### The Legality of the Dumpster One of the most intriguing segments of the discussion centers on "dumpster diving," or "trash hits." Corn questions whether searching through a rival's garbage is actually illegal. Herman explains that in the United States, the legal precedent often hinges on the 1988 Supreme Court case *California v. Greenwood*. The court ruled that the Fourth Amendment does not protect trash left for collection outside the "curtilage" (the private area immediately surrounding a building).

Once a trash bag hits a public sidewalk or a communal dumpster, the owner has effectively abandoned the property and lost any reasonable expectation of privacy. However, Herman warns that while taking the physical paper might not be a crime, using the information found on it is a different matter entirely. Under the Economic Espionage Act and the Defend Trade Secrets Act, a trade secret remains protected if the owner took "reasonable measures" to keep it secret—such as shredding documents. If a spy meticulously reconstructs shredded papers, they are likely violating trade secret laws by using "improper means" to circumvent security.

### Lessons from the Cola Wars To illustrate the risks of these operations, the hosts revisit the famous 2006 Joya Williams case involving Coca-Cola and Pepsi. Williams, an administrative assistant at Coca-Cola, attempted to sell confidential documents and a sample of a secret new product to Pepsi for $1.5 million.

In a surprising display of corporate integrity—or perhaps extreme risk aversion—Pepsi did not take the bait. Instead, they notified Coca-Cola and the FBI, leading to a sting operation. Herman points out that for a giant like Pepsi, the potential reputational damage and federal prosecution far outweighed the value of the stolen secrets. This case serves as a benchmark for how high-level corporations manage the legal risks associated with unsolicited trade secrets.

### The Rise of the Private Intelligence Firm The conversation then turns to the "specialist firms" that operate in the shadows. These are private intelligence agencies, often staffed by former Mossad, CIA, or MI6 officers. Firms like Kroll or Black Cube operate in a "gray zone," using sophisticated techniques like social engineering.

Herman describes how an operative might pose as a recruiter or a journalist to trick an engineer into revealing technical details about a project. While lying to someone isn't always a crime, the deceptive acquisition of trade secrets can still lead to massive civil liabilities. These firms provide "plausible deniability" for the corporations that hire them, acting as a buffer between the client and the dirty work.

### The Cost of Getting Caught The episode concludes with a look at the "buffer strategy" and how it is beginning to fail. Herman cites the 2001 case between Procter & Gamble and Unilever, where P&G contractors were caught scavenging Unilever's trash. Fearing the legal fallout and the impact of global privacy laws like GDPR, P&G's management actually self-reported the incident and settled for tens of millions of dollars.

As Corn and Herman wrap up, they reflect on the ongoing arms race between those trying to hide secrets and those willing to go to the bottom of a dumpster to find them. In the world of corporate warfare, the most valuable weapon isn't always a line of code—sometimes, it's just a pair of gloves and a flashlight.

Listen online: https://myweirdprompts.com/episode/corporate-espionage-trade-secrets

Notes

My Weird Prompts is an AI-generated podcast. Episodes are produced using an automated pipeline: voice prompt → transcription → script generation → text-to-speech → audio assembly. Archived here for long-term preservation. AI CONTENT DISCLAIMER: This episode is entirely AI-generated. The script, dialogue, voices, and audio are produced by AI systems. While the pipeline includes fact-checking, content may contain errors or inaccuracies. Verify any claims independently.

Files

corporate-espionage-trade-secrets-cover.png

Files (14.7 MB)

Name Size Download all
md5:13017951797d59b2d2966746f76d63c4
1.3 MB Preview Download
md5:118a5024546385afb434557fe2ad702b
1.6 kB Preview Download
md5:a8d51fab521e5e4bbb4470c7aa809db2
13.3 MB Download
md5:b115c862022bd58956adb80dba876012
22.2 kB Preview Download

Additional details