Business Espionage Controls & Countermeasures Association
The Four Faces of Business Espionage
People Who Buy Our Books
People At Risk
People In Transition
Professionals Outside The U.S.
Section – 1Through The Polemoscope Section – 2Spies & Private LivesSection – 3Pretext AttacksSection – 4Technical SurveillanceSection – 5Computer AbuseSection – 6Undercover AttacksSection – 7Use What You've Learned
Business Espionage Controls & Countermeasures Association (BECCA) members provided research during the writing of this book. Not all are named due to their concerns about social media tracking, identity theft, and data mining. I thank them all, including the editors of The Business Espionage Report. This book is used in private security briefings and as a textbook for classroom instruction. It provides personal defense stategies for established managers and training materials for those who are new to the subject. Questions and Answers are grouped together by subject for easy reference. Tips, Techniques & Perspectives are provided throughout the book to help you find reliable information specific to you and your organization. We are looking for Instructors. Contact BECCA for more information.