O'Reilly logo

Business Espionage by Bruce Wimmer, CPP

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

4

Espionage by Electronic Means

Abstract

This chapter includes information on how various electronic means and techniques can be used to copy and steal sensitive business information. This includes case studies where hidden microphones, transmitters, laser beams, key stroke readers, cameras and telephone taps were employed in business spying incidents that occurred around the world. It also discusses how social engineering or insiders were often used to assist in introducing electronic spying devices or access to otherwise sensitive equipment such as IT systems, executive offices or conference rooms.

Key words

electronic eavesdropping

social engineering

trash cover

Technical Surveillance Countermeasures (TSCM)

Unmanned Aerial Vehicle (UAV) ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required