Enter your mobile number or email address below and we'll send you a link to download the free Kindle App. Then you can start reading Kindle books on your smartphone, tablet, or computer - no Kindle device required.
To get the free app, enter your mobile phone number.
Corporate Espionage: What It Is, Why It's Happening in Your Company, What You Must Do About It Hardcover – April 9, 1997
"Warlight" by Michael Ondaatje
A dramatic coming-of-age story set in the decade after World War II, "Warlight" is the mesmerizing new novel from the best-selling author of "The English Patient." Learn more
Frequently bought together
Customers who viewed this item also viewed
Ira Winkler, a former analyst with the National Security Agency, contends that American companies lose billions of dollars each year through preventable information leaks. In Corporate Espionage, he shows how much of it is pilfered by unremarkable efforts--looking at memos, sifting through trash, peeking on desktops, or simply asking for it--and provides some advice to stop it. Additional highlights include a variety of illuminating anecdotes and an enlightening look at international subterfuge.
All businesses, from multi-billion dollar corporations to $20,000-a-year mom-and-pop corporations, technically literate or not, are vulnerable to corporate espionage and every company is potentially under attack
Top customer reviews
There was a problem filtering reviews right now. Please try again later.
The structure of "Corporate Espionage" is ideal, with Winkler discussing espionage concepts, followed by case studies and countermeasures. It almost reads like a manual, and an effective one at that. Winkler worked at NSA for 10 years ---where paranoia is a way of life--- so it is no surprise that he is good at what he does, and that he takes a very methodical approach to handling security issues.
This book divided into three sections.
Part one discusses basic espionage concepts and your companay's 'risk equation.' Spies don't care about the form in which the information they seek comes. It can be from a computer, formal or draft documents, scrap paper or internal correspondence. Aside from domestic spies, there are an estimated 100+ nations that are currently engaging in espionage against US companies. Risk level is determined by Threat x Vulnerability x Value / Countermeasures.
Part two contains case studies to show how a breach occurs. One study concerns William Geade and how he stole over a billion dollars worth of information from AMD and Intel. Another study includes the author himself, who hired in (under cover) as a temp at NCC in 1995. Within 2 days Mr. Winkler had compromised 28 of the 29 top development projects exposing many breach points.
Part three is titled 'What You Can Do' and goes over many effective countermeasures that you can employ right now. It is jam packed with many ideas, most of them simple, that will tighten your security. Countermeasures are broken down into four areas: Operations, Personell, Physical and Techincal.
Most recent customer reviews
Winkler can be a bit melodramatic at times, but overall, Corporate Espionage is a great book.