This chapter includes information on how various electronic means and techniques can be used to copy and steal sensitive business information. This includes case studies where hidden microphones, transmitters, laser beams, key stroke readers, cameras and telephone taps were employed in business spying incidents that occurred around the world. It also discusses how social engineering or insiders were often used to assist in introducing electronic spying devices or access to otherwise sensitive equipment such as IT systems, executive offices or conference rooms.
Technical Surveillance Countermeasures (TSCM)
Unmanned Aerial Vehicle (UAV) ...
Get Business Espionage now with O’Reilly online learning.
O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.