Skip to Main Content
Business Espionage
book

Business Espionage

by Bruce Wimmer, CPP
March 2015
Intermediate to advanced content levelIntermediate to advanced
204 pages
6h 9m
English
Butterworth-Heinemann
Content preview from Business Espionage
4

Espionage by Electronic Means

Abstract

This chapter includes information on how various electronic means and techniques can be used to copy and steal sensitive business information. This includes case studies where hidden microphones, transmitters, laser beams, key stroke readers, cameras and telephone taps were employed in business spying incidents that occurred around the world. It also discusses how social engineering or insiders were often used to assist in introducing electronic spying devices or access to otherwise sensitive equipment such as IT systems, executive offices or conference rooms.

Key words

electronic eavesdropping

social engineering

trash cover

Technical Surveillance Countermeasures (TSCM)

Unmanned Aerial Vehicle (UAV) ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Trade Secret Theft, Industrial Espionage, and the China Threat

Trade Secret Theft, Industrial Espionage, and the China Threat

Carl Roper
Secrets Stolen, Fortunes Lost

Secrets Stolen, Fortunes Lost

Richard Power, Christopher Burgess

Publisher Resources

ISBN: 9780124200548