Business Espionage Controls & Countermeasures Association

Founded in 1986 by William M. Johnson Ph.D.
"101 questions & answers about business espionage" (new edition at amazon books & amazon kindle)

The Four Faces of Business Espionage

Pretext Attacks
Pretext attacks are limited only by the imagination of the attackers. Attackers may be young or not-so- young, male or female, and in any profession.
Technical Surveillance
Technical spying is easier than ever before because many modern security cameras and listening devices have hidden spytech potential.
Computer Abuse
Hackers and other computer abusers get most of the attention, but many losses are also due to poor security training and the fact that new threats develop.
Undercover Attacks
Terrorists, foreign spies, and former lovers all use data from undercover operatives. Private Investigators and spies from many countries are active in the field.

People Who Buy Our Books

Managers
Managers at all levels use our books to learn more about business espionage and what they can do to protect themselves and their organizations.
People At Risk
Section 2, "Spies & Private Lives" is of special interest. Question 23, "What are some of the first signs that I may be a target?" is vital.
Instructors
Instructors use the book in classroom instruction. The Four Faces of Business Espionage are featured.
Entrepenuers
Entrepenuers wear many hats and are often tied up with the day-to-day trials of running a business. They need quick answers to basic questions. This book can help.
People In Transition
Military Officers transitioning to the private sector take online classes based on the book to become CCOs, Certified Confidentiality Officers
Professionals Outside The U.S.
John Kanalis is an instructor and the BECCA Administrator in Europe. He is based in Athens and is active throughout the region.
101 Questions & Answers About Business EspionageA Textbook by William M. Johnson, Ph.D.ISBN: 0-916775-02-XLibrary of Congress Card Number 00-192680
Section – 1Through The Polemoscope Section – 2Spies & Private LivesSection – 3Pretext AttacksSection – 4Technical SurveillanceSection – 5Computer AbuseSection – 6Undercover AttacksSection – 7Use What You've Learned
Business Espionage Controls & Countermeasures Association (BECCA) members provided research during the writing of this book. Not all are named due to their concerns about social media tracking, identity theft, and data mining. I thank them all, including the editors of The Business Espionage Report. This book is used in private security briefings and as a textbook for classroom instruction. It provides personal defense stategies for established managers and training materials for those who are new to the subject. Questions and Answers are grouped together by subject for easy reference. Tips, Techniques & Perspectives are provided throughout the book to help you find reliable information specific to you and your organization.Buy the book at Amazon Books
office@becca-online.org becca-online@comcast.net
Copyright © 2022 William M. Johnson

We use cookies to enable essential functionality on our website, and analyze website traffic. By clicking Accept you consent to our use of cookies. Read about how we use cookies.

Your Cookie Settings

We use cookies to enable essential functionality on our website, and analyze website traffic. Read about how we use cookies.

Cookie Categories

Essential

These cookies are strictly necessary to provide you with services available through our websites. You cannot refuse these cookies without impacting how our websites function. You can block or delete them by changing your browser settings, as described under the heading "Managing cookies" in the Privacy and Cookies Policy.

Analytics

These cookies collect information that is used in aggregate form to help us understand how our websites are being used or how effective our marketing campaigns are.