Σελίδες

Συνολικές προβολές σελίδας

Κυριακή 19 Φεβρουαρίου 2012

The Four Faces of Business Espionage:




1. Delphi and Other Pretext Attacks.
Sophisticated pretext interviews and/or “surveys” are often the first steps in a spy operation. Pretext interviews may take place on the phone, at seminars and trade shows, in bars, in bed, or anyplace else the target is available. The questions used are worked out in advance, often by someone other than the surveyor. The people hired to ask the questions (college students, private investigators, retirees, etc.) may or may not know the real objectives of the survey.
Pretext attacks through Internet newsgroups, chat lines and direct e-mail help hide the true identity of the attacker.
2. Computer Abuse.
Computer abuse takes many forms. It may take only a few seconds for a spy to break into your computer system if your computer access codes are known around the office. Other attacks may be much more complex and take place both on and off site.
3. Technical Surveillance.
Basic electronic “bugging” is quick and easy. A spy can buy a legal wireless microphone or other listening device, and then plant it illegally by simply walking through your home or place of business and tucking it out of sight. It took less than 30 seconds to plant a bug in one of the demonstrations we witnessed.
4. Undercover Attacks These attacks are performed by spies inside the targeted organization, including people on the target’s payroll. Undercover spy operations may go on for months - or even years - depending on the spy’s objectives. Note: To learn more about The Four Faces of Business Espionage (including controls and countermeasures) see the textbook “101 Questions & Answers About Business Espionage” by William M. Johnson. The book is available from BECCA, Amazon.com, Booksurge.com or through your local bookstore.

 www.BECCA-online.org