O'Reilly logo

Business Espionage by Bruce Wimmer, CPP

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

5

Espionage by Force

Physical Theft or Other Appropriation

Abstract

This chapter includes information on how good, old-fashioned force and theft can result in loss of sensitive business information to business spies. Techniques include theft of prototypes, documents, processes, trash, and computers. Examples of this take place around the world where poor understanding of the business espionage threats and techniques, poor education and awareness training and poor physical security make business spying entirely too easy.

Key words

electronic eavesdropping

social engineering

trash cover

steal information

physical break-in

dumpster diving

raid the Black Forest

formula

prototype

dim sum

portable toilet

lap top

bakery

video

janitor

re-cycling ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required