Home :: Books :: Business & Investing  

Arts & Photography
Audio CDs
Audiocassettes
Biographies & Memoirs
Business & Investing

Children's Books
Christianity
Comics & Graphic Novels
Computers & Internet
Cooking, Food & Wine
Entertainment
Gay & Lesbian
Health, Mind & Body
History
Home & Garden
Horror
Literature & Fiction
Mystery & Thrillers
Nonfiction
Outdoors & Nature
Parenting & Families
Professional & Technical
Reference
Religion & Spirituality
Romance
Science
Science Fiction & Fantasy
Sports
Teens
Travel
Women's Fiction
War by Other Means: Economic Espionage in America

War by Other Means: Economic Espionage in America

List Price: $15.00
Your Price: $15.00
Product Info Reviews

<< 1 >>

Rating: 4 stars
Summary: A definite eye opener
Review: A great read for anyone. Gives a glimpse of what's going on in this country. Highlights a problem that is taken seriously by some federal agencies, ignored by some politicians. You won't see this kind of stuff on the news.

Rating: 5 stars
Summary: This is a must read for CIOs and directors of corporate secu
Review: After showing that economic espionage is an age-old problem, Fialka quickly propels us into 1997, showing economic espionage occurring on a grand scale. The book is replete with examples and categorizes the major styles of this business. These are comprised of 1) those countries like China, Taiwan, and South Korea who target present and former nationals working for U.S. companies and research institutions, 2) classic Cold War recruitment methods which Russia, Israel, and Germany use to varying levels, and 3) the economic intelligence gatherers who prey on accessing company proprietary documents and data, the most successful of which is Japan. I very much agree with Fialka's assertion that the NSA, CIA, and FBI have hitherto shown they are not capable of dealing with this issue and, in my longer review (see http://www.sscs.net/bookstore/book-review-wbom.html), I discuss some of the reasons why. This book is an exceptional piece of work. Very rare indeed is the time when I find myself underlining, highlighting, and writing comments in the leaf.

Rating: 5 stars
Summary: This is a must read for CIOs and directors of corporate secu
Review: After showing that economic espionage is an age-old problem, Fialka quickly propels us into 1997, showing economic espionage occurring on a grand scale. The book is replete with examples and categorizes the major styles of this business. These are comprised of 1) those countries like China, Taiwan, and South Korea who target present and former nationals working for U.S. companies and research institutions, 2) classic Cold War recruitment methods which Russia, Israel, and Germany use to varying levels, and 3) the economic intelligence gatherers who prey on accessing company proprietary documents and data, the most successful of which is Japan. I very much agree with Fialka's assertion that the NSA, CIA, and FBI have hitherto shown they are not capable of dealing with this issue and, in my longer review (see http://www.sscs.net/bookstore/book-review-wbom.html), I discuss some of the reasons why. This book is an exceptional piece of work. Very rare indeed is the time when I find myself underlining, highlighting, and writing comments in the leaf.

Rating: 3 stars
Summary: A somewhat paranoid view.
Review: I read this book when it first came out and have had some time to consider the viewpoints espoused. I believe the dissimenation of information and know how is inevitable, albeit this author does point out examples of unmitigated stealing of ideas, intellectual properties, etc. from U.S.-based businesses that should be curtailed.

In my view, the leaky bucket theory of developing technology and know-how described in the book does not give enough consideration to the rate of innovation in the U.S. Instead, a somewhat paranoid view of losing all the goodies to the bad guys comes across.

The people and money behind the innovation seem to be the real keys, not the specifics of any implementation. Most of the examples of copy cats or rip-offs the author uses to illustrate his point are technologies that have lived their life cycle and near zero margins anyway. Although the margins might have been diminished in a less timely fashion had better controls been in place. Innovation moves on to the next better thing with higher margins. Its natural -- get over it.

Rating: 3 stars
Summary: A somewhat paranoid view.
Review: I read this book when it first came out and have had some time to consider the viewpoints espoused. I believe the dissimenation of information and know how is inevitable, albeit this author does point out examples of unmitigated stealing of ideas, intellectual properties, etc. from U.S.-based businesses that should be curtailed.

In my view, the leaky bucket theory of developing technology and know-how described in the book does not give enough consideration to the rate of innovation in the U.S. Instead, a somewhat paranoid view of losing all the goodies to the bad guys comes across.

The people and money behind the innovation seem to be the real keys, not the specifics of any implementation. Most of the examples of copy cats or rip-offs the author uses to illustrate his point are technologies that have lived their life cycle and near zero margins anyway. Although the margins might have been diminished in a less timely fashion had better controls been in place. Innovation moves on to the next better thing with higher margins. Its natural -- get over it.

Rating: 4 stars
Summary: Very good.
Review: I think this book needs to be read by every business owner in America. It contains worrysome information on how overseas people are stealing and rapeing technology and trade secrets of American Businesses and what can be done about it.

Rating: 5 stars
Summary: Great Work
Review: John is a distinguished correspondent for the Wall Street Journal, their lead reporter during the Gulf War, and an award-winning investigative journalist in the fields of national security, politics, and financial scandal. The Chinese, Japanese, French and Russians are featured here, together with useful cross-overs into criminal gangs doing espionage on U.S. corporations, as well as overt data mining and other quasi-legal activities that yield far more economic intelligence than most business leaders understand.

Rating: 5 stars
Summary: A reader
Review: Since first popularized by Winn Schwartau, the concept of Information Warfare has tantalized and titillated. It is a fascinating idea that the wars of an information society would be fought on a digital playing field. Certainly the practice of economic espionage is not new. Reduced political tensions worldwide means that cold warriors need something to do for a living, so today, it appears that resources that were formerly applied to defense-related targets are now being redeployed against American corporations.

Hitting so close to home, and being such a morbidly fascinating subject, it has tended to attract a lot of crank authors with populist approaches. While Fialka doesn't really pull his punches, his approach is much more even-handed than many writers. This well-researched and competently written book stands well above the junk being currently produced in this subject area.

Although this text is now over four years old, it is still relatively current. For example, one who has read this book could not have been surprised at the amount of Federal attention paid to a nuclear physicist of Chinese extraction with strong ties to his native land, which has a long-standing pattern not only of economic espionage, but also of using and abusing non-professional spies. The author also gives convincing evidence to support the consistent rumors that the French have a ongoing tradition of government-sponsored economic warfare against their 'allied' partners. (As someone who has benefited from the character-building experience of a long-term relationship with a Peugeot, I remain convinced that although the French undoubtedly engage in economic espionage, Gallic pride prevents them from actually applying anything that they learn.)

This is an excellent text for helping build a mental picture of one particular class of Information Security threat. Those involved in Infosec topics will also find value in the chapters "Virtual Justice," which explains why corporations are so reluctant to report incidents of espionage, and "Surviving" which describes the lack of attention that corporations are willing to pay to security issues. As someone who has been involved in the field for over ten years, I can attest that this attitude is pervasive, and that security failures do occur. But without a greater willingness to report incidents to the authorities, the true statistics will never be known.

Given that virtually all large corporations are highly-vulnerable to attack, and given the author's supportable contention that both motivated and resourceful adversaries exist, it seems imprudent to write this book off as mere scare mongering. Since the writing of this book, the problem has only worsened.

Rating: 4 stars
Summary: A good book in a subject area with mostly bad books
Review: Since first popularized by Winn Schwartau, the concept of Information Warfare has tantalized and titillated. It is a fascinating idea that the wars of an information society would be fought on a digital playing field. Certainly the practice of economic espionage is not new. Reduced political tensions worldwide means that cold warriors need something to do for a living, so today, it appears that resources that were formerly applied to defense-related targets are now being redeployed against American corporations.

Hitting so close to home, and being such a morbidly fascinating subject, it has tended to attract a lot of crank authors with populist approaches. While Fialka doesn't really pull his punches, his approach is much more even-handed than many writers. This well-researched and competently written book stands well above the junk being currently produced in this subject area.

Although this text is now over four years old, it is still relatively current. For example, one who has read this book could not have been surprised at the amount of Federal attention paid to a nuclear physicist of Chinese extraction with strong ties to his native land, which has a long-standing pattern not only of economic espionage, but also of using and abusing non-professional spies. The author also gives convincing evidence to support the consistent rumors that the French have a ongoing tradition of government-sponsored economic warfare against their 'allied' partners. (As someone who has benefited from the character-building experience of a long-term relationship with a Peugeot, I remain convinced that although the French undoubtedly engage in economic espionage, Gallic pride prevents them from actually applying anything that they learn.)

This is an excellent text for helping build a mental picture of one particular class of Information Security threat. Those involved in Infosec topics will also find value in the chapters "Virtual Justice," which explains why corporations are so reluctant to report incidents of espionage, and "Surviving" which describes the lack of attention that corporations are willing to pay to security issues. As someone who has been involved in the field for over ten years, I can attest that this attitude is pervasive, and that security failures do occur. But without a greater willingness to report incidents to the authorities, the true statistics will never be known.

Given that virtually all large corporations are highly-vulnerable to attack, and given the author's supportable contention that both motivated and resourceful adversaries exist, it seems imprudent to write this book off as mere scare mongering. Since the writing of this book, the problem has only worsened.


<< 1 >>

© 2004, ReviewFocus or its affiliates