Espionage by Force
Physical Theft or Other Appropriation
Abstract
This chapter includes information on how good, old-fashioned force and theft can result in loss of sensitive business information to business spies. Techniques include theft of prototypes, documents, processes, trash, and computers. Examples of this take place around the world where poor understanding of the business espionage threats and techniques, poor education and awareness training and poor physical security make business spying entirely too easy.
Key words
electronic eavesdropping
social engineering
trash cover
steal information
physical break-in
dumpster diving
raid the Black Forest
formula
prototype
dim sum
portable toilet
lap top
bakery
video
janitor
re-cycling ...
Get Business Espionage now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.