You are previewing Business Espionage.
O'Reilly logo
Business Espionage

Book Description

Business Espionage: Risk, Threats, and Countermeasures provides the best practices needed to protect a company's most sensitive information. It takes a proactive approach, explaining the measures and countermeasures that can be enacted to identify both threats and weaknesses. The text fully explains the threat landscape, showing not only how spies operate, but how they can be detected.

Drawn from the author’s 40 years of experience, this vital resource will give readers a true understanding of the threat of business spying and what businesses can do to protect themselves. It is ideal for use as a tool to educate staff on the seriousness of the threat of business espionage.



  • Shows how to identify a company’s threats, weaknesses, and most critical assets
  • Provides proven and practical countermeasures that any business can employ to protect their most sensitive assets from both internal and external threats
  • Uses real-life case studies and examples to help the reader understand how to apply the tactics discussed

Table of Contents

  1. Cover image
  2. Title page
  3. Table of Contents
  4. Copyright
  5. Dedication
  6. Author Biography
  7. Introduction
    1. Business espionage misunderstood
  8. Part 1: Understanding the Problem of Business Espionage
    1. 1: Understanding the Risks
      1. Abstract
      2. Introduction
      3. Risk Methodology
      4. Risk Formula
      5. Summary
    2. 2: Characteristics of Business Spies
      1. Abstract
      2. MICE
      3. CRIME
      4. BECCA
      5. Project Slammer
      6. U.S. FBI
      7. Summary
    3. 3: High-Threat Locations for Business Espionage
      1. Abstract
      2. Asia-Pacific
      3. Latin America
      4. Europe
      5. Africa
      6. Middle East
      7. More Examples
      8. Business Espionage in Singapore
      9. Business Espionage in Vietnam
      10. Korea, Japan, and India
      11. Business Espionage in Latin America
      12. United States
      13. Vulnerabilities Identified in Examples
      14. Summary
    4. 4: Espionage by Electronic Means
      1. Abstract
      2. Introduction
      3. Cases of Electronic Eavesdropping
      4. Vulnerabilities Identified
      5. Summary
    5. 5: Espionage by Force: Physical Theft or Other Appropriation
      1. Abstract
      2. Introduction
      3. Cases of Business Espionage by Physical Theft or Other Appropriation
      4. Vulnerabilities Identified
      5. Summary
    6. 6: Facing Espionage While Traveling
      1. Abstract
      2. Introduction
      3. Cases of Travelers Becoming Victims of Business Espionage
      4. Vulnerabilities Identified
      5. Conclusion
    7. 7: Insider Threat
      1. Abstract
      2. Introduction
      3. Cases of Insider Espionage
      4. Vulnerabilities Identified
      5. Summary
  9. Part 2: Business Espionage Countermeasures
    1. 8: Protecting Your Most Critical Resources
      1. Abstract
      2. Focus on protecting the most critical information and resources
    2. 9: Physical and Personnel Security Countermeasures
      1. Abstract
      2. Introduction
      3. Business Espionage Security Awareness Training
      4. Business Espionage Reporting Program
      5. Travel Security Program that Includes Business Espionage Threat
      6. Clear, Demonstrated Senior Leadership Support
      7. Identifying and Properly Classifying Sensitive Information
      8. Conduct a Holistic Risk Assessment
      9. Access controls
      10. Control of Office Machines
      11. Use of Tiger and Red Team Testing
      12. Non-Disclosure, Non-Compete, and Other Legal Agreements
      13. Limiting Where/How Company Information Can Be Worked On or Discussed
      14. Develop Special Measures for Marketing and Sales Staff
      15. Liaise with Counterespionage Government Agencies
      16. Offensive Counterespionage
      17. Summary
    3. 10: Technical Electronic and Computer Countermeasures
      1. Abstract
      2. Introduction
      3. Technical Surveillance Countermeasures (TSCM)
      4. Computer countermeasures
      5. Mobile Device Countermeasures
      6. Summary
    4. 11: Comprehensive Countermeasures
      1. Abstract
      2. Introduction
      3. Formal Integrated Approach to IT and Physical Security
      4. Summary
  10. Conclusion
    1. Overview of Business Spying Lessons Learned
    2. Vulnerabilities
    3. Summary
  11. Index