March 2015
Intermediate to advanced
204 pages
6h 9m
English
This chapter includes information on how good, old-fashioned force and theft can result in loss of sensitive business information to business spies. Techniques include theft of prototypes, documents, processes, trash, and computers. Examples of this take place around the world where poor understanding of the business espionage threats and techniques, poor education and awareness training and poor physical security make business spying entirely too easy.
Key words
electronic eavesdropping
social engineering
trash cover
steal information
physical break-in
dumpster diving
raid the Black Forest
formula
prototype
dim sum
portable toilet
lap top
bakery
video
janitor
re-cycling ...