Accidental threats, 31
Achaemenid Empire, 4
Action comparison and decision phase, 7–8
Action development
course of, 45
phase, 6
Action field testing
Announced inspections, 36
Assets, 22
Backdoors, 24
Black Hat hackers, 19
Blueprint, 55
Boko Haram, 34
Breaching a company, 23
British Empire, 5
Buni Yadi attack, 34
Business integrity and authenticity, benefits of counterintelligence in, 46–48
Captain Philips, 33
Central Intelligence Agency (CIA), 84
Chibok kidnappings, 34
Closed Circuit Television Technology (CCTV), 12–13
Closing checks, 102
Coca Cola, 23
Coleman, Randall, 14
Committee for State Security (KGB), 6
Community centers, 65
Cordon and search operations, 71–72
Corporate ...
Get Counterintelligence for Corporate Environments, Volume II now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.