COVID-19 Update: We are currently shipping orders daily. However, due to transit disruptions in some geographies, deliveries may be delayed. To provide all customers with timely access to content, we are offering 50% off Science and Technology Print & eBook bundle options. Terms & conditions.
Business Espionage - 1st Edition - ISBN: 9780124200548, 9780124200593

Business Espionage

1st Edition

Risks, Threats, and Countermeasures

Author: Bruce Wimmer, CPP
Paperback ISBN: 9780124200548
eBook ISBN: 9780124200593
Imprint: Butterworth-Heinemann
Published Date: 18th March 2015
Page Count: 204
Sales tax will be calculated at check-out Price includes VAT/GST
Price includes VAT/GST

Institutional Subscription

Secure Checkout

Personal information is secured with SSL technology.

Free Shipping

Free global shipping
No minimum order.


Business Espionage: Risk, Threats, and Countermeasures provides the best practices needed to protect a company's most sensitive information. It takes a proactive approach, explaining the measures and countermeasures that can be enacted to identify both threats and weaknesses. The text fully explains the threat landscape, showing not only how spies operate, but how they can be detected.

Drawn from the author’s 40 years of experience, this vital resource will give readers a true understanding of the threat of business spying and what businesses can do to protect themselves. It is ideal for use as a tool to educate staff on the seriousness of the threat of business espionage.

Key Features

  • Shows how to identify a company’s threats, weaknesses, and most critical assets
  • Provides proven and practical countermeasures that any business can employ to protect their most sensitive assets from both internal and external threats
  • Uses real-life case studies and examples to help the reader understand how to apply the tactics discussed


Corporate security directors and managers, business managers, risk managers, corporate security consultants, and students in two- and four-year business administration and security management programs.

Table of Contents

  • Dedication
  • Author Biography
  • Introduction
    • Business espionage misunderstood
  • Part 1: Understanding the Problem of Business Espionage
    • 1: Understanding the Risks
      • Abstract
      • Introduction
      • Risk Methodology
      • Risk Formula
      • Summary
    • 2: Characteristics of Business Spies
      • Abstract
      • MICE
      • CRIME
      • BECCA
      • Project Slammer
      • U.S. FBI
      • Summary
    • 3: High-Threat Locations for Business Espionage
      • Abstract
      • Asia-Pacific
      • Latin America
      • Europe
      • Africa
      • Middle East
      • More Examples
      • Business Espionage in Singapore
      • Business Espionage in Vietnam
      • Korea, Japan, and India
      • Business Espionage in Latin America
      • United States
      • Vulnerabilities Identified in Examples
      • Summary
    • 4: Espionage by Electronic Means
      • Abstract
      • Introduction
      • Cases of Electronic Eavesdropping
      • Vulnerabilities Identified
      • Summary
    • 5: Espionage by Force: Physical Theft or Other Appropriation
      • Abstract
      • Introduction
      • Cases of Business Espionage by Physical Theft or Other Appropriation
      • Vulnerabilities Identified
      • Summary
    • 6: Facing Espionage While Traveling
      • Abstract
      • Introduction
      • Cases of Travelers Becoming Victims of Business Espionage
      • Vulnerabilities Identified
      • Conclusion
    • 7: Insider Threat
      • Abstract
      • Introduction
      • Cases of Insider Espionage
      • Vulnerabilities Identified
      • Summary
  • Part 2: Business Espionage Countermeasures
    • 8: Protecting Your Most Critical Resources
      • Abstract
      • Focus on protecting the most critical information and resources
    • 9: Physical and Personnel Security Countermeasures
      • Abstract
      • Introduction
      • Business Espionage Security Awareness Training
      • Business Espionage Reporting Program
      • Travel Security Program that Includes Business Espionage Threat
      • Clear, Demonstrated Senior Leadership Support
      • Identifying and Properly Classifying Sensitive Information
      • Conduct a Holistic Risk Assessment
      • Access controls
      • Control of Office Machines
      • Use of Tiger and Red Team Testing
      • Non-Disclosure, Non-Compete, and Other Legal Agreements
      • Limiting Where/How Company Information Can Be Worked On or Discussed
      • Develop Special Measures for Marketing and Sales Staff
      • Liaise with Counterespionage Government Agencies
      • Offensive Counterespionage
      • Summary
    • 10: Technical Electronic and Computer Countermeasures
      • Abstract
      • Introduction
      • Technical Surveillance Countermeasures (TSCM)
      • Computer countermeasures
      • Mobile Device Countermeasures
      • Summary
    • 11: Comprehensive Countermeasures
      • Abstract
      • Introduction
      • Formal Integrated Approach to IT and Physical Security
      • Summary
  • Conclusion
    • Overview of Business Spying Lessons Learned
    • Vulnerabilities
    • Summary
  • Index


No. of pages:
© Butterworth-Heinemann 2015
18th March 2015
Paperback ISBN:
eBook ISBN:

About the Author

Bruce Wimmer, CPP

Bruce Wimmer, CPP

Bruce Wimmer has been involved in investigations and security consulting for more than 42 years. He served for nearly 22 years in the U.S. Air Force, briefly as an intelligence officer and the majority of that time as a special agent with the Office of Special Investigations (OSI). He has also spent nearly 20 years in corporate security and investigations, mostly with various divisions of Pinkerton.

During his long career, he has conducted and supervised thousands of investigations and security consulting projects around the world. Mr. Wimmer has worked in more than 50 countries and in every state within the United States. He has lived abroad for 18 years and has worked in Asia, the Near East, Europe, the Caribbean, Latin America, and even on the Polar Ice Cap. He has special expertise in countering business espionage.

During his time with the Department of Defense, he was cited for developing the best and most comprehensive counterespionage education and awareness program in the entire U.S. Air Force. He was also cited for having the largest actual espionage investigations caseload in the entire U.S. Air Force while in Berlin. He was responsible for the neutralization of multiple internal Air Force spies. He has also been responsible for a number of counterespionage operations that were publicly disclosed and a far larger number that have remained classified and sensitive. He has spoken on the espionage threat and countermeasures around the world, and represented the U.S. military as the nation’s official speaker at a North Atlantic Treaty Organization Counterespionage Conference.

Mr. Wimmer was also responsible for the Air Force counterespionage programs in Japan and Korea, and was the head of counterespionage operations in Berlin, Germany before, during, and after the fall of the infamous Berlin Wall. He also was responsible for overseeing the Air Force counterespionage program in the entire Western Hemisphere, including the United States, Canada, and all of Latin America.

In the business arena, Mr. Wimmer has assisted some of the largest companies in the world, as well as some of the smallest companies – all with sensitive business information -- in protecting their trade secrets and sensitive data from business espionage threats. He has lived and worked behind the “Iron Curtain” in what was then East Germany, as well as in Vietnam and the People’s Republic of China. He has worked at protecting secrets in 20 out of the top 25 highest risk locations in the world for business espionage.

Mr. Wimmer has been designated a Certified Protection Professional (CPP) by ASIS International, has served as an officer in multiple chapters globally, and is a regular speaker at the organization’s annual convention. He was the founding chairman of Taiwan’s ASIS chapter. He is certified in Homeland Security (Level III) with the America College of Forensic Examiners Institute and is also is certified both as an operative and a trainer in the Sandia Laboratory’s Risk Assessment Methodology. He is also a member of the Espionage Research Institute International.

A recognized expert on security and investigative matters, Mr. Wimmer has spoken internationally on business espionage as well as international terrorism, crisis management planning, travel security and dealing with business fraud, purchasing fraud and kickbacks. He has appeared on CNN, CNBC, National Public Radio, ABC/Discovery Channel, as well as television and radio in Taiwan, Pakistan, and Hong Kong. He has been interviewed by such international publications as Newsweek, Business Week, the International Herald Tribune, USA Today and many regional daily newspapers/media.

Affiliations and Expertise

Director of global consulting and supply chain security, Pinkerton Consulting and Investigations, Ann Arbor, MI, USA


" links the key practice of security risk management to this critical business issue in today’s global and interconnected environment. As such, it fills a disturbing gap in current writings on the subject."--ASIS Dynamics

"...the losses are substantial and largely under appreciated by complacent corporate and govt. leadership. That's the view of Bruce Wimmer, a practitioner with four decades of experience in protecting the govt. and cos. from business espionage...Wimmer wins with his argument for better security controls to prevent espionage."--Security Letter

Ratings and Reviews