5

Espionage by Force

Physical Theft or Other Appropriation

Abstract

This chapter includes information on how good, old-fashioned force and theft can result in loss of sensitive business information to business spies. Techniques include theft of prototypes, documents, processes, trash, and computers. Examples of this take place around the world where poor understanding of the business espionage threats and techniques, poor education and awareness training and poor physical security make business spying entirely too easy.

Key words

electronic eavesdropping

social engineering

trash cover

steal information

physical break-in

dumpster diving

raid the Black Forest

formula

prototype

dim sum

portable toilet

lap top

bakery

video

janitor

re-cycling ...

Get Business Espionage now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.