Among Enemies: Counter-Espionage for the Business Traveler

Among Enemies: Counter-Espionage for the Business Traveler

Luke Bencie

Language: English

Pages: 152

ISBN: 098859191X

Format: PDF / Kindle (mobi) / ePub


Each business day, some 35,000 executives, scientists, consultants, and lawyers pass through the nation’s airports to destinations across the globe. They carry, along with proprietary documents and computer files, the latest in personal electronic gear. However, carefully watching most of those travelers—beginning the moment they arrive at the airport and often sooner—are uncounted numbers of espionage operatives. These individuals work for foreign intelligence services and economic concerns and seek to separate international business travelers from their trade secrets. To succeed, they use many time-tested techniques to lure unsuspecting travelers into vulnerable or compromising positions. They also employ the latest electronic means to steal business information often at a distance from their prey. This is the 21st century, after all, and economic and industrial espionage have become multibillion-dollar enterprises, utilizing a wide array of the most sophisticated means to obtain proprietary information. Luke Bencie is a veteran of this struggle. He knows intimately the threats business travelers face and how to combat those threats. In Among Enemies: Counter-Espionage for the Business Traveler, Bencie provides everything you need to know to protect yourself and your company from attempted espionage.

 

 

 

 

 

 

 

 

 

 

 

 

Many lurk in the airline lounges, dutifully searching for opportunities to strike up a conversation with an unwitting business traveler. Some prefer to eavesdrop near ticket counters. Often, they have already learned who you are and are attempting to discover where you’re going. Others look for arriving business travelers just outside the security area. Your job is to thwart their efforts. Here’s how: — From the moment you arrive at an airport, assume you’re under surveillance by someone – once

escorts the woman to her room and, in a stroke of boldness, asks to join her. She smiles sweetly, tells him she’s flattered, kisses his cheek, and says goodnight. Back in his own room, he realizes he probably has had too much to drink. He stumbles into bed, falling asleep while savoring the memories of the evening – but failing to notice his computer and mobile phone have shifted position on the desk. The following morning, John receives a call on the hotel phone. He learns that the meeting must

“No,” you reply. “Ask her to wait in the lobby by the waterfall, and I’ll come down to meet her.” You intentionally delay your appearance for 15 minutes, during which time you once again remove your cell phone battery from your carry-on, zip up the bag, and set it precisely on your bed. You take your identification, briefcase, papers, laptop and phone with you. When you enter the lobby, the woman is nowhere to be seen. When you return to your floor, you see your door is open a crack. Entering,

protection, the device usually comes with a selfdestruct feature: If you enter an incorrect password too many times, the device shuts down permanently. It’s expensive, but all savvy businesspeople should travel with one. Need to know more? questions@among-enemies.com 6. Surveillance Basics “Technology gets better every day. That’s fine. But most of the time all you need is a stick of gum, a pocket knife, and a smile.” – Nathan Muir, from the movie Spy Game I keep stressing the two primary rules

services — Electric utilities and natural resources — Financial products and services — Healthcare services — Information technology and telecommunications — Life sciences, agriculture and biotechnology — Motor vehicles and components — Pharmaceuticals and medical devices — Transportation If you work in any of these industries, assume you are a high-profile target. That means you could be targeted every time you leave your office building (and often when you’re in it as well). How? — You can be

Download sample

Download