Printer Friendly

CIA, Inc.: Espionage and the Craft of Business Intelligence.

CIA, Inc.: Espionage and the Craft of Business Intelligence. By F.W. Rustmann, Jr.: published by Brassey's Inc., 800/775/2518 (phone), 703/661-1501 (fax); 217 pages; $2750.

Compelling, novel-like narrative is not usually found in a book providing advice for security practitioners, but F.W. Rustmann's quarter century in the CIA helps him pull off this impressive feat. By interweaving history, personal experience, and actual economic espionage cases, Rustmann has crafted one of the best books on business intelligence available today.

Not only is the book an excellent guide for dealing with economic espionage and the protection of intellectual property, but it also points out the critical vulnerabilities created by company staff. Rustmann discusses how to seal these various vulnerabilities through such means as employment agreements and positive employee relations.

One particularly beneficial section discusses the recurring problem of source protection. In 1996, for example, after Chinese missiles were fired in the direction of Taiwan, the Taiwan defense ministry quelled citizen outrage by noting that the missiles were only a minor threat because they were unarmed and contained only devices to measure their accuracy That information had been held top secret by China, so Chinese officials knew they bad a Taiwanese spy in their midst. That spy was eventually discovered, setting back Taiwanese intelligence efforts immeasurably. Rustmann lays out where exactly the espionage operation went awry.

Another excellent section describes the trove of intelligence available on the Internet. The Securities and Ex change Commission, for example, allows surfers to tap into public filings on a company for free. Rustmann also discusses the use of information brokers, personal information databases, press sources, and the combination of database and band searching.

It is evident throughout that Rustmann has been on the front lines of intelligence work and knows how to convey what he's learned. Any security professional interested in developing or countering these techniques--and all should be--must have this book. It gets high marks for its universal relevance.

Reviewer: Mark Beaudry, CPP is a senior professional with IBM-SWG Security in Cambridge, Massachusetts. He is a member of ASIS.
COPYRIGHT 2002 American Society for Industrial Security
No portion of this article can be reproduced without the express written permission from the copyright holder.
Copyright 2002 Gale, Cengage Learning. All rights reserved.

Article Details
Printer friendly Cite/link Email Feedback
Author:Beaudry, Mark
Publication:Security Management
Article Type:Book Review
Date:Aug 1, 2002
Words:347
Previous Article:Congressional legislation. (Legal Reporter).
Next Article:Security in the Health Care Environment.
Topics:


Related Articles
Blond Ghost: Ted Shackley and the C.I.A. 's Crusades.
Gentleman Spy: The Life of Allen Dulles.
Challenging the Secret Government: The Post-Watergate Investigations of the CIA and the FBI.
War by Other Means.
FIXING THE SPY MACHINE Preparing American Intelligence for the Twenty-First Century.
NATIONAL INSECURITY: U.S. Intelligence After the Cold War.
Baghdad's Spy: a Personal Memoir of Espionage and Intrigue from Iraq to London.

Terms of use | Privacy policy | Copyright © 2019 Farlex, Inc. | Feedback | For webmasters