4

Espionage by Electronic Means

Abstract

This chapter includes information on how various electronic means and techniques can be used to copy and steal sensitive business information. This includes case studies where hidden microphones, transmitters, laser beams, key stroke readers, cameras and telephone taps were employed in business spying incidents that occurred around the world. It also discusses how social engineering or insiders were often used to assist in introducing electronic spying devices or access to otherwise sensitive equipment such as IT systems, executive offices or conference rooms.

Key words

electronic eavesdropping

social engineering

trash cover

Technical Surveillance Countermeasures (TSCM)

Unmanned Aerial Vehicle (UAV) ...

Get Business Espionage now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.