Among Enemies: Counter-Espionage for the Business Traveler by Luke Bencie

Posted by

By Luke Bencie

Every one enterprise day, a few 35,000 executives, scientists, specialists, and attorneys go through the nation's airports to locations around the globe. they convey, in addition to proprietary files and laptop records, the most recent in own digital equipment. despite the fact that, rigorously looking at so much of these travelers—beginning the instant they come on the airport and infrequently sooner—are uncounted numbers of espionage operatives.

These participants paintings for overseas intelligence prone and fiscal issues and search to split foreign company tourists from their exchange secrets and techniques. To prevail, they use many time-tested suggestions to entice unsuspecting tourists into susceptible or compromising positions. in addition they hire the most recent digital capability to thieve enterprise details usually at a distance from their prey. this is often the twenty first century, in any case, and fiscal and commercial espionage became multibillion-dollar corporations, using a big selection of the main refined capacity to procure proprietary info.

Luke Bencie is a veteran of this fight. He is aware in detail the threats enterprise tourists face and the way to wrestle these threats. In Among Enemies: Counter-Espionage for the company Traveler, Bencie offers every thing you must recognize to guard your self and your organization from tried espionage.

Show description

Read Online or Download Among Enemies: Counter-Espionage for the Business Traveler PDF

Best espionage books

The Key to Rebecca

Ken Follett’s the foremost to Rebecca took readers and critics by means of typhoon whilst first released greater than fifteen years in the past. this present day, it continues to be the most effective espionage novels ever written.

A amazing and ruthless Nazi grasp agent is at the free in Cairo. His project is to ship Rommel’s advancing military the secrets and techniques that may release the city’s doorways. In all of Cairo, basically humans can cease him. One is a down-on-his-luck English officer nobody will take heed to. the opposite is a weak younger Jewish girl….

 

The Hunt for Red October (Jack Ryan, Book 1)

I notice this is often already up the following in a one or Jack Ryan omnibuses in retail ePub, yet a few humans, myself incorporated, illogically want examining person books and never omnibuses if that may be helped. here's a great Retail ePub from Penguin US which was once lately once more made on hand to borrow on OverDrive.

The Revolutionist

An epic saga of the Soviet Union's brutal first decades-from the hot York occasions bestselling grasp of espionage.

Hailed as "the American le Carré," Robert Littell provides an formidable novel approximately star-crossed idealist Alexander Til. whilst Til returns from the United States to Petrograd at the eve of the October Revolution in 1917, it's to place his existence at the line within the desire of remodeling Russia. yet after witnessing the start of a brand new period, he watches the folk, and his personal beliefs, trampled by way of the increase of Josef Stalin-with whom Til is destined to have a shattering war of words. Taking readers from the storming of the wintry weather Palace to the nightmares of the gulag, The Revolutionist is a masterwork of historic fiction.

Spy Handler: Memoir of a KGB Officer: The True Story of the Man Who Recruited Robert Hanssen and Aldrich Ames

In his 4 many years as a KGB officer, Victor Cherkashin used to be a critical participant within the shadowy international of chilly conflict espionage. From his rigorous education in Soviet intelligence within the early Fifties to his major spot because the KGB's head of counterintelligence on the Soviet embassy in Washington, Cherkashin's profession used to be wealthy in episode and drama.

Extra info for Among Enemies: Counter-Espionage for the Business Traveler

Example text

Several countries, and possibly foreign companies, have developed the ability to overcome commercial computer intrusion-protection software and hardware. If you detect and report them, they can be explained away as a criminal activity; for example, some unauthorized person looking for passports, cash and other valuables. You should expect that officials will take no action to locate the thieves – proof positive that an ounce of prevention is worth a pound of cure. Misdirection. You must know by now that it’s unadvisable to take sensitive information with you on an electronic device, especially to foreign destinations.

Never assume your valuables are secure in the hotel room safe. All hotel safes can be opened in seconds with a master key or code, often by your housekeeper. By keeping your valuables there, you have provided everything the espionage operative seeks in a single location. I once checked into a hotel in Bangkok only to find that the room safe had been accidently locked by the previous guest. The bellboy came up and pressed in the numbers 0000# and the safe magically opened. When I questioned him about it, he said many people make that mistake, so every safe in the hotel could be opened with the same code.

Pickpockets commonly try to distract or intimidate their prey to make their task easier. No one was better at this than Tony Slydini, who could reduce his victims to stupefaction. Using misdirection, operatives can conceal valuable BI/IP in nonassociated files – for example, MP3 music files, photo images or smartphone app shells that do nothing. Another imaginative ploy is renaming BI/IP files with dull-sounding names and burying them in unlikely directories. Varied and creative forms of misdirection emerged shortly after 9/11.

Download PDF sample

Rated 4.18 of 5 – based on 42 votes