
Business Espionage Controls & Countermeasures Association
The Four Faces of Business Espionage
Pretext Attacks
Technical Surveillance
Computer Abuse
Undercover Attacks
People Who Buy Our Books
Managers
People At Risk
Instructors
Entrepenuers
People In Transition
Professionals Outside The U.S.
Section – 1Through The Polemoscope Section – 2Spies & Private LivesSection – 3Pretext AttacksSection – 4Technical SurveillanceSection – 5Computer AbuseSection – 6Undercover AttacksSection – 7Use What You've Learned
Business Espionage Controls & Countermeasures Association (BECCA) members provided research during the writing of this book. Not all are named due to their concerns about social media tracking, identity theft, and data mining. I thank them all, including the editors of The Business Espionage Report. This book is used in private security briefings and as a textbook for classroom instruction. It provides personal defense stategies for established managers and training materials for those who are new to the subject. Questions and Answers are grouped together by subject for easy reference. Tips, Techniques & Perspectives are provided throughout the book to help you find reliable information specific to you and your organization.Buy the book at Amazon Books