There is widespread misconception in America that industrial espionage is a high-tech crime perpetrated by slick James Bond types or genius computer hackers -- not true! Every year millions of companies lose billions of dollars because their valuable information leaks out through ordinary people and simple, preventable methods.In his new book, Corporate Espionage, information security expert Ira Winkler reveals how he stole billions of dollars in sensitive information from a large corporation in a day and a half while they didn't even know he was inside. Of course he then gave back the information because the target was his client and its executives were paying him to execute a penetration test. But what might really alarm companies is the fact that Winkler steals most of his information by simply asking for it, looking on desk tops, digging through trash, walking into unlocked offices at night or reading internal newsletters that reveal too much. Corporate Espionage instructs companies how to break bad habits and protect themselves from espionage. Readers catch an inside look at:Step-by-step details of foreign and domestic case studies involving KGB agents, the Japanese, German, China, Cuban and Israeli government, and losses from Intel, Boeing, and other major corporations and banksAn interview with the former director of the CIAWhy companies must consider their own employees as the most deadly of all spiesWhy and which apparently friendly countries are the most actively engaged in espionage against the United StatesWhere and how Russia, Germany, Chinese and other major intelligence agencies recruit their agents
Customer Reviews, including Product Star Ratings help customers to learn more about the product and decide whether it is the right product for them.
To calculate the overall star rating and percentage breakdown by star, we don’t use a simple average. Instead, our system considers things like how recent a review is and if the reviewer bought the item on Amazon. It also analyzed reviews to verify trustworthiness.
Rather amazing how applicable the issues that Ira Winkler wrote about in 1997, are just as pressing and vexing today in 2020. So many years have gone by, yet in many respects so little has changed. You could almost change the date of publication from 1997 to 2020 and not notice the difference.
Reviewed in the United States on December 24, 2005
As the current Director of Technology for the National Computer Security Asociation and a former NSA agent (10+ years), Ira Winkler is 'the' individual to address this topic. According to resources such as the FBI, industrial espionage costs US corporations between 24 and 100 billion dollars every year.
This book divided into three sections.
Part one discusses basic espionage concepts and your companay's 'risk equation.' Spies don't care about the form in which the information they seek comes. It can be from a computer, formal or draft documents, scrap paper or internal correspondence. Aside from domestic spies, there are an estimated 100+ nations that are currently engaging in espionage against US companies. Risk level is determined by Threat x Vulnerability x Value / Countermeasures.
Part two contains case studies to show how a breach occurs. One study concerns William Geade and how he stole over a billion dollars worth of information from AMD and Intel. Another study includes the author himself, who hired in (under cover) as a temp at NCC in 1995. Within 2 days Mr. Winkler had compromised 28 of the 29 top development projects exposing many breach points.
Part three is titled 'What You Can Do' and goes over many effective countermeasures that you can employ right now. It is jam packed with many ideas, most of them simple, that will tighten your security. Countermeasures are broken down into four areas: Operations, Personell, Physical and Techincal.
Winkler covers this extensive topic in great detail. After reading Corporate Espionage I was left with the realization that being careful and aware of the threats and vulnerabilities around us is vital in this competitive world. The countermeasures that Winkler describes can also be used in all parts of our lives, not just the corporate environment. Corporate Espionage is a "must read" for anyone interested in protecting their personal or corporate information.
Reviewed in the United States on February 28, 1998
Fantastic book! Time and again Mr. Winkler shows the power of social engineering, the use of widely (and readily available)software tools and maybe a little cleverness, used seperately or in combination to foil computer security. But he goes further and in Part III identifies MANY very simple procedures (most at no additional cost) that will foil almost any attack on your computer system.