Espionage by Electronic Means
Abstract
This chapter includes information on how various electronic means and techniques can be used to copy and steal sensitive business information. This includes case studies where hidden microphones, transmitters, laser beams, key stroke readers, cameras and telephone taps were employed in business spying incidents that occurred around the world. It also discusses how social engineering or insiders were often used to assist in introducing electronic spying devices or access to otherwise sensitive equipment such as IT systems, executive offices or conference rooms.
Key words
electronic eavesdropping
social engineering
trash cover
Technical Surveillance Countermeasures (TSCM)
Unmanned Aerial Vehicle (UAV) ...
Get Business Espionage now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.