Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Industrial espionage and technical surveillance counter measurers
Androulidakis I., Kioupakis F., Springer International Publishing, New York, NY, 2016. 126 pp. Type: Book (978-3-319286-65-5)
Date Reviewed: Dec 16 2016

Industrial and economic espionage has now grown in sophistication and international dimension, adopting approaches previously reserved for “traditional” espionage driven by national security motivations. The goal is stealing trade secrets by removing, copying, or recording confidential and valuable information in order to gain competitive advantage.

With this publication, Androulidakis and Kioupakis present an overview of the technical aspects of industrial espionage and of related countermeasures. In the first chapter, after introducing some statistics on the financial relevance of industrial espionage, the authors provide an overview of different techniques to intercept third-party communications. The following chapters detail how interception can actually be performed in the case of ambient communications (microphones, exotic tools), or when the target consists of computer data (hardware, software, man-in-the-middle attacks, advanced persistent threats, global surveillance), fixed line telephony (wiretaps, private branch exchanges, digital lines, call metadata, voice over IP), or mobile phones.

The book is completed by a closing chapter on protection against industrial espionage, introducing the equipment used for detection of electronic tapping, as well as methodologies for the detection of electronic interception, preventative measures and area protection, and advice on choosing the right contractor for the delivery of a technical countermeasures program.

This is a small book that can be read quickly, written in very simple terms and enriched by plenty of illustrations. Its elementary approach to technical matters makes it approachable to a vast audience of nontechnical readers whose business activities could be affected by the phenomenon of industrial espionage. The book is a good instrument to increase awareness within the user community, but will be less interesting to security practitioners, who are already conversant with the concepts exposed, and might benefit by consulting other titles [1,2].

Reviewer:  Alessandro Berni Review #: CR144970 (1703-0178)
1) ACM IV Security Services. Countering hostile surveillance: detect, evade, and neutralize physical surveillance threats. Paladin Press, Boulder, CO, 2008.
2) Menthe, L.; Sullivan, J. A RAND analysis tool for intelligence, surveillance, and reconnaissance. RAND Corporation, Santa Monica, CA, 2008.
Bookmark and Share
  Reviewer Selected
Featured Reviewer
 
 
Intellectual Property Rights (K.4.1 ... )
 
 
Business (J.1 ... )
 
 
Intellectual Property (K.4.4 ... )
 
 
Electronic Commerce (K.4.4 )
 
 
Administrative Data Processing (J.1 )
 
Would you recommend this review?
yes
no
Other reviews under "Intellectual Property Rights": Date
The Internet is changing the music industry
Lam C., Tan B. Communications of the ACM 44(8): 62-68, 2001. Type: Article
Jan 1 2002
The moral rights of authors in the age of digital information
Fernández-Molina J., Peis E. Journal of the American Society for Information Science 52(2): 109-117, 2001. Type: Article
Dec 1 2001
Legally speaking: the promise and problems of the No Electronic Theft Act
Grosso A. Communications of the ACM 43(2): 23-26, 2000. Type: Article
Feb 1 2000
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy