Insider Threat Catalogue Of Books

Year Published

Title

Sub Title

Author

Description

Topic Focus

Book Link

2017

Protecting Your Business From Insider Threats

How To Identify, Address And Shape The Human Element Of The Threat Within Your Businesses In Seven Successful Practices

Boaz Fischer

Protecting Your Business From Insider Threats In Seven Effective Steps helps the reader to really understand their vulnerabilities to a most likely internal threat that may be happening in their organisation right now and importantly how to address and mitigate it as effective as possible.

Insider Threats

2022

The Human Side Of Cyber

10 Risks You Need To Know To To Avoid An Internal Cyber Breach Causing Catastophic Impact To Your Organisation

Boaz Fischer

In The Human Side of Cyber, Boaz Fischer deftly navigates the tricky topic with a combination of professional insight, personal reflections and host of humbling examples. Within it pages, you’ll learn how to equip your organisation to effectively prevent, detect, deter and respond to emerging threats.

Insider Threats

2023

42 Risky Behaviours of an Insider Threat

The Risks You Need To Know To Avoid An Internal Cyber Brecah Causing A Catastrophic Impact To Your Oganisation

Boaz Fischer

In 42 Risky Behaviours of an Insider Threat, Boaz Fischer provides a comprehensive overview of human risk and the way it can manifest in your organisation. Through a combination of professional insight, industry data and a host humbling examples, you’ll learn how to better identify risky employee behaviour that have the potential to result in harm, detriment or adverse consequences.

Insider Threats

2024

Behind Enemy Lines

Tales of Insider Threat, Corporate Greed, Espionage and Just Bloody Stupid Behaviour

Boaz Fischer

In Behind Enemy Lines, Tales of Insider Threat, Corporate Greed, Espionage and Just Bloody Stupid Behaviour, Boaz Fischer provides the most important insights into understanding the vulnerabilities in human behaviour within organisations that were exposed by individuals whose actions caused substantial damage to the organisation and themselves.

Insider Threats

2023

The Psychology Of Insider Risk: Detection, Investigation And Case Management

The Critical Pathway To Insider

Eric D. Shaw

Dr. Shaw is the author of the Critical Pathway to Insider Risk (CPIR) which addresses the characteristics, experiences and connections at-risk employees bring to our organizations, the stressors that trigger higher levels of risk, the concerning behaviors that signal this risk has increased and the action or inaction by organizations that escalate insider risk. The CPIR also examines what these employees look like when they have broken bad and the personal characteristics, resources and support that can mitigate these risks. Dr. Shaw also examines specific risk accelerators like subject disgruntlement, personality disorders and problematic organizational responses that can escalate the speed and intensity of insider risks. The investigative applications, strengths and weaknesses of the CPIR are also considered.

Insider Threats

2016

Insider Threat

Prevention, Detection, Mitigation and Deterrence

Michael G. Gelled

This book outlines a step-by-step path for developing an insider threat program within any organization, focusing on management and employee engagement, as well as ethical, legal, and privacy concerns. In addition, it includes tactics on how to collect, correlate, and visualize potential risk indicators into a seamless system for protecting an organization’s critical assets from malicious, complacent, and ignorant insiders. Insider Threat presents robust mitigation strategies that will interrupt the forward motion of a potential insider who intends to do harm to a company or its employees, as well as an understanding of supply chain risk and cyber security, as they relate to insider threat.

Insider Threats

2012

The CERT Guide To Insider Threats

How to Prevent, Detect and Respond To Information Technology Crimes (Theft, Sabotage, Fraud)

Dawn Cappeli, Andrew Moore, Randall Trzeciak

Since 2001, the CERT® Insider Threat Center at Carnegie Mellon University’s Software Engineering Institute has studied over 700 insider cyber crimes, including espionage and theft of trade secrets. The CERT® Guide to Insider Threats offers practical insights and countermeasures for executives, managers, security officers, and staff across private, government, and military sectors. It addresses malicious actions by current and former employees, contractors, partners, outsourcers, and cloud vendors, covering IT sabotage, intellectual property theft, and fraud. The book details crime profiles, motivations, methods, organizational issues, and warning signs to help prevent or detect incidents early. It emphasizes the importance of recognizing insider threats throughout the software development life cycle, enhancing existing security tools, and preparing for sophisticated attacks. Ultimately, it provides actionable recommendations for improving organizational security against insider threats.

Insider Threats

2016

Insider Threats

Matthew Bunn, Scott D. Sagan

“Insider Threats” explores the significant risks posed by trusted employees within high-security organizations who have access to sensitive information and materials. The book features detailed case studies from various institutions, including biological research labs, nuclear power plants, and the U.S. Army, illustrating the devastating impact insiders can have. Authors Matthew Bunn and Scott D. Sagan highlight cognitive and organizational biases that cause institutions to underestimate these threats. They also analyze past failures to provide valuable lessons for improving security practices. The book uniquely addresses the potential for insiders to aid terrorist efforts, especially in acquiring fissile material or sabotaging nuclear facilities. Contributions from experts across different fields enrich the analysis, making the book a crucial resource for any high-security organization.

Insider Threats

2020

Inside Job

Why Insider Risk Is The Biggest Cyber Threat You Can't Ignore

Joe Payne, Jadee Hanson, Mark Wojtasiak

From data security company Code42, Inside Jobs offers companies of all sizes a new way to secure today’s collaborative cultures-one that works without compromising sensitive company data or slowing business down. Authors Joe Payne, Jadee Hanson, and Mark Wojtasiak, seasoned veterans in the cybersecurity space, provide a top-down and bottom-up picture of the rewards and perils involved in running and securing organizations focused on rapid, iterative, and collaborative innovation.

Insider Threats

2016

Insider Threat

A Guide to Understanding, Detecting, and Defending Against the Enemy from Within

Dr. Julie E. Mehan

“Insider Threat – A Guide to Understanding, Detecting, and Defending Against the Enemy from Within” emphasizes building a security culture based on international best practices to mitigate insider threats. It provides quick fixes and long-term strategies for an effective insider threat program, detailing organizational traits of victims, stages of malicious attacks, and steps for success. The book advocates a three-tier security culture and covers risk mitigation, training, monitoring, auditing, and response to suspicious behaviors. It aligns security measures with ISO 27001, ISO 27002, and NIST SP 800-53 standards, addressing risk assessment, staff screening, defense layering, penetration testing, remote access control, and supply chain security.

Insider Threats

2019

The Insider Threat

Assessment and Mitigation of Risk

Eleanor E. Thompson

This book is all about assessment and mitigation of insider threat risks. This book provides emergent knowledge relating to physical, cyber, and human risk mitigation in a practical and readable approach for the corporate environment. It presents and discusses practical applications of risk management techniques along with useable practical policy change options. This practical organizational security management approach examines multiple aspects of security to protect against physical, cyber, and human risk. A practical more tactical focus includes managing vulnerabilities and applying countermeasures. The book guides readers to a greater depth of understanding and action-oriented options.

Insider Threats

1996

License To Steal

Why Fraud Plagues America's Health Care System

Malcolm K. Sparrow

Criminal fraud must be considered in health care reform debates due to significant, yet unknown, losses from the nation’s trillion-dollar health care budget. Malcolm Sparrow, a fraud control expert, highlights rampant and largely unchecked fraud within the health care industry, warning it will worsen without changes in priorities, detection strategies, and technology use. Contrary to popular belief, Sparrow argues that electronic claims processing could increase fraud, and managed care could heighten health risks. His final section offers crucial recommendations for policymakers and those interested in fraud control.

Fraud

2003

Threat Assessment: A Risk Management Approach

James T. Turner, Michael G. Gelles

This book provides the tools you need to protect both your employees and yourself from a variety of threats. Threat Assessment: A Risk Management Approach examines stalking, insider threats, and workplace violence, revealing the best ways to reduce risk and manage emergencies. It includes numerous examples that show recommended practices in action and provides detailed interviewing methods that can increase the efficiency of current strategies.

Risk Management

2018

Rethinking The Human Factor

A Philosophical approach to information security awareness behaviour and culture

Bruce Hallas

“Re-thinking the Human Factor” is not a checklist but a reflective guide that divides readers into those who will love or hate it. Designed to be read in a day, it encourages readers to rethink employee education and awareness through questions, scenarios, and insights into human behavior and culture. The book promotes a philosophical approach, emphasizing the need to design awareness and security measures with an understanding of human nature to embed security into organizational culture.

Cyber Awareness

2022

Jerks At Work

Toxic Coworkers And What To Do About Them

Tessa West

Drawing on decades of original research, in this practical and funny playbook, NYU Professor of Psychology Tessa West offers proven strategies for dealing with the most infuriating workplace archetypes, including the bulldozer, the gaslighter and the micromanager. By exposing their inner workings and weak points, you’ll learn simple tactics to restore your emotional wellbeing.

Human Behaviour

2017

Behave

The Biology of Humans at Our Best and Worst

Robert Sapolsky

This groundbreaking book explores the science of human behavior, examining our capacity for both violence and kindness. It traces the layers of causation behind our actions and how biology influences war, peace, and morality. It offers an insightful look into what makes us human.

Human Behaviour

2019

Counterintelligence Theory And Practice (2nd ed.)

Hank Prunckun

In this thoroughly updated and revised edition of Counterintelligence Theory and Practice, Hank Prunckun provides all of the elements required for a successful counterintelligence operation from both an academic and a practitioner’s point of view. It offers an advanced understanding of the underlying theory that supports the art and science of the craft, and examines the challenges and practicalities of defensive and offensive counterintelligence. Designed for students in intelligence studies as well as professional training classes, this text explores issues related to national security, military, law enforcement, and corporate as well as private affairs.

Counterintelligence

2018

Counterintelligence For Corporate Environments (Volume I)

How To Protect Information Business Integrity in the Modern World

Dylan van Genderen

Counterintelligence for Corporate Environments, Volume I” introduces comprehensive methodologies to enhance corporate security and operations. It emphasizes the crucial role of intelligence in organizational survival and protection.

Counterintelligence

2018

Counterintelligence For Corporate Environments (Volume II)

How To Protect Information Business Integrity in the Modern World

Dylan van Genderen

Volume II presents innovative strategies adapted from intelligence and military tactics, aimed at improving corporate security. The book equips managers, security officers, and consultants with advanced counterintelligence models to address modern threats effectively.

Counterintelligence

2018

Deception: Counterdeception And Counterintelligence

Robert M. Clark, Dr. William L. Mitchell

“Deception: Counterdeception and Counterintelligence” offers a practical guide to understanding and implementing deception in intelligence operations. Authors Robert M. Clark and William L. Mitchell use case-based exercises to train operational planners in building deception campaigns and intelligence analysts in detecting them. The book explores new deception channels like social media and covers multichannel deception across various domains. Practical exercises and assignments enhance critical thinking, making it an invaluable resource for both individual and team learning.

Counterintelligence

2019

O'Hara's Fundamentals Of Criminal Investigation

DeVere D. Woods, Jr.

Investigation

2023

The Official U.S. Army Counterintelligence Handbook

The U.S. Army's Official Playbook For Deception On The World's Deadliest Stage

Department Of The Army

The U.S. Army’s official playbook for deception on the world’s deadliest stage, and a must-read for anyone with an interest in today’s difficult military intelligence questions.

Counterintelligence

2015

Get The Truth

Former CIA Offices Teach You How To Persuade Anyone To Tell All

Phillip Houston, Michael Floyd, Susan Carnicero

Former CIA agents and authors of Spy the Lie provide a step-by-step guide with thrilling anecdotes and easy instructions to elicit the truth from anyone, using a methodology developed for counterterrorism and criminal investigations that encourages short-term thinking over long-term ramifications of lying.

Human Behaviour

2013

Spy The Lie

Former CIA Officers Teach You How to Detect Deception

Phillip Houston, Michael Floyd, Susan Carnicero

Philip Houston, Michael Floyd, and Susan Carnicero are world-class deception detectors as former CIA officers. Spy the Lie tells the riveting narrative of how they used Houston’s deception detection system in counterterrorism and criminal investigations and how we may use it in our daily lives.

Human Behaviour

2023

Insider Risk And Personnel Security

An Introduction

Paul Martin

This textbook examines insider risk’s causes and effects using real-life case studies and discusses how to protect organisations.

Insiders who break trust by acting in damaging ways pose some of the biggest hazards to organisations and organisations. Insiders injure their employers, society, and betrayed coworkers and friends psychologically. Still, few businesses have a systematic awareness of insider danger and a clear and effective security mechanism to mitigate it. This book explores the environmental and psychological elements that predispose some people to become damaging insiders and the most typical ways they do so. Society’s increasing use of technology and changing work patterns have changed insider risk. The second half of the book describes a practical systems-based approach to personnel security, which protects against insider risk. It uses the best industry and academic research, behavioural science, and practitioner experience to illustrate how to make personnel security effective at managing risk and facilitating business.

Insider Threats

2020

Chinese Espionage Operations and Tactics

Nicholas Eftimiades

This short book is the most detailed work ever published in the unclassified world on China’s intelligence tradecraft. It is NOT a causal description of a few cases of Chinese espionage with pictures thrown in for intrigue and excitement. This monograph (50 pages) is a critical analysis of China’s current intelligence activities and associated espionage tradecraft. It reviews 595 cases of espionage, economic espionage, covert action, theft of technology and trade secrets.

The study identifies and analyzes the specific espionage tradecraft used by China’s intelligence services, State Owned Enterprises, universities, private companies, and individuals. This work is for Insider Threat specialists, Intelligence Officers, security professionals, attorneys, policy makers, journalists, and anyone else who needs a detailed understanding of China’s espionage operations and tactics.

Espionage

2019

Chinese Communist Espionage: An Intelligence Primer

Peter Mattis, Matthew Brazil

This is the first book of its kind to employ hundreds of Chinese sources to explain the history and current state of Chinese Communist intelligence operations. It profiles the leaders, top spies, and important operations in the history of China’s espionage organs, and links to an extensive online glossary of Chinese Language intelligence and security terms.

Peter Mattis and Matthew Brazil present an unprecedented look into the murky world of Chinese espionage both past and present, enabling a better understanding of how pervasive and important its influence is, both in China and abroad.

Espionage

2013

Chinese Industrial Espionage: Technology Acquisition and Military Modernisation

William C. Hannas, James Mulvenon, Anna B. Puglisi

This book is the first government or non-government-sponsored account of China’s technology acquisitions.

Based on authentic materials and rigors study, the book reveals China’s technical advancement through others’ successes. China has used sophisticated methods to find foreign inventions, steal them, and turn them into weapons and competitive commodities without paying their owners for decades. Recently, the NSA director termed it “the greatest transfer of wealth in history”.

This book, written by two of America’s top government analysts and a Chinese cyber network expert, details these transfer mechanisms in detail, providing context and depth not found elsewhere. The authors place the new research in historical context and then examine the People’s Republic of China’s policy support for economic espionage, clandestine technology transfers, cyberspace theft, and its impact on the US’s future using previously unexploited Chinese language sources.

Chinese politics, Asian security studies, US defense, foreign policy, and IR students will enjoy this book.

Espionage

2020

China's Quest For Foreign Technology: Beyond Espionage

William C. Hannas, Didi Kirsten Tatlow

This book analyzes China’s foreign technology acquisition activity and how this has helped its rapid rise to superpower status.

Since 1949, China has operated a vast and unique system of foreign technology spotting and transfer aimed at accelerating civilian and military development, reducing the cost of basic research, and shoring up its power domestically and abroad—without running the political risks borne by liberal societies as a basis for their creative developments. While discounted in some circles as derivative and consigned to perpetual catch-up mode, China’s “hybrid” system of legal, illegal, and extralegal import of foreign technology, combined with its indigenous efforts, is, the authors believe, enormously effective and must be taken seriously. Accordingly, in this volume, 17 international specialists combine their scholarship to portray the system’s structure and functioning in heretofore unseen detail, using primary Chinese sources to demonstrate the perniciousness of the problem in a manner not likely to be controverted. The book concludes with a series of recommendations culled from the authors’ interactions with experts worldwide.

This book will be of much interest to students of Chinese politics, US foreign policy, intelligence studies, science and technology studies, and International Relations in general.

Espionage

Insider Threat Catalogue Of Books

Title: Protecting Your Business From Insider Threats
Sub Title: How To Identify, Address And Shape The Human Element Of The Threat Within Your Businesses In Seven Successful Practices
Year Published: 2017
Author: Boaz Fischer
Description: Protecting Your Business From Insider Threats In Seven Effective Steps helps the reader to really understand their vulnerabilities to a most likely internal threat that may be happening in their organisation right now and importantly how to address and mitigate it as effective as possible.
Topic Focus: Insider Threats
Book Link: View Book

Title: The Human Side Of Cyber
Sub Title: 10 Risks You Need To Know To To Avoid An Internal Cyber Breach Causing Catastophic Impact To Your Organisation
Year Published: 2022
Author: Boaz Fischer
Description: In The Human Side of Cyber, Boaz Fischer deftly navigates the tricky topic with a combination of professional insight, personal reflections and host of humbling examples. Within it pages, you’ll learn how to equip your organisation to effectively prevent, detect, deter and respond to emerging threats.
Topic Focus: Insider Threats
Book Link: View Book

Title: 42 Risky Behaviours of an Insider Threat
Sub Title: The Risks You Need To Know To Avoid An Internal Cyber Brecah Causing A Catastrophic Impact To Your Oganisation
Year Published: 2023
Author: Boaz Fischer
Description: In 42 Risky Behaviours of an Insider Threat, Boaz Fischer provides a comprehensive overview of human risk and the way it can manifest in your organisation. Through a combination of professional insight, industry data and a host humbling examples, you’ll learn how to better identify risky employee behaviour that have the potential to result in harm, detriment or adverse consequences.
Topic Focus: Insider Threats
Book Link: View Book

Title: Behind Enemy Lines
Sub Title: Tales of Insider Threat, Corporate Greed, Espionage and Just Bloody Stupid Behaviour
Year Published: 2024
Author: Boaz Fischer
Description: In Behind Enemy Lines, Tales of Insider Threat, Corporate Greed, Espionage and Just Bloody Stupid Behaviour, Boaz Fischer provides the most important insights into understanding the vulnerabilities in human behaviour within organisations that were exposed by individuals whose actions caused substantial damage to the organisation and themselves.
Topic Focus: Insider Threats
Book Link: View Book

Title: The Psychology Of Insider Risk: Detection, Investigation And Case Management
Sub Title: The Critical Pathway To Insider
Year Published: 2023
Author: Eric D. Shaw
Description: Dr. Shaw is the author of the Critical Pathway to Insider Risk (CPIR) which addresses the characteristics, experiences and connections at-risk employees bring to our organizations, the stressors that trigger higher levels of risk, the concerning behaviors that signal this risk has increased and the action or inaction by organizations that escalate insider risk. The CPIR also examines what these employees look like when they have broken bad and the personal characteristics, resources and support that can mitigate these risks. Dr. Shaw also examines specific risk accelerators like subject disgruntlement, personality disorders and problematic organizational responses that can escalate the speed and intensity of insider risks. The investigative applications, strengths and weaknesses of the CPIR are also considered.
Topic Focus: Insider Threats
Book Link: View Book

Title: Insider Threat
Sub Title: Prevention, Detection, Mitigation and Deterrence
Year Published: 2016
Author: Michael G. Gelled
Description: This book outlines a step-by-step path for developing an insider threat program within any organization, focusing on management and employee engagement, as well as ethical, legal, and privacy concerns. In addition, it includes tactics on how to collect, correlate, and visualize potential risk indicators into a seamless system for protecting an organization’s critical assets from malicious, complacent, and ignorant insiders. Insider Threat presents robust mitigation strategies that will interrupt the forward motion of a potential insider who intends to do harm to a company or its employees, as well as an understanding of supply chain risk and cyber security, as they relate to insider threat.
Topic Focus: Insider Threats
Book Link: View Book

Title: The CERT Guide To Insider Threats
Sub Title: How to Prevent, Detect and Respond To Information Technology Crimes (Theft, Sabotage, Fraud)
Year Published: 2012
Author: Dawn Cappeli, Andrew Moore, Randall Trzeciak
Description: Since 2001, the CERT® Insider Threat Center at Carnegie Mellon University’s Software Engineering Institute has studied over 700 insider cyber crimes, including espionage and theft of trade secrets. The CERT® Guide to Insider Threats offers practical insights and countermeasures for executives, managers, security officers, and staff across private, government, and military sectors. It addresses malicious actions by current and former employees, contractors, partners, outsourcers, and cloud vendors, covering IT sabotage, intellectual property theft, and fraud. The book details crime profiles, motivations, methods, organizational issues, and warning signs to help prevent or detect incidents early. It emphasizes the importance of recognizing insider threats throughout the software development life cycle, enhancing existing security tools, and preparing for sophisticated attacks. Ultimately, it provides actionable recommendations for improving organizational security against insider threats.
Topic Focus: Insider Threats
Book Link: View Book

Title: Insider Threats
Year Published: 2016
Author: Matthew Bunn, Scott D. Sagan
Description: “Insider Threats” explores the significant risks posed by trusted employees within high-security organizations who have access to sensitive information and materials. The book features detailed case studies from various institutions, including biological research labs, nuclear power plants, and the U.S. Army, illustrating the devastating impact insiders can have. Authors Matthew Bunn and Scott D. Sagan highlight cognitive and organizational biases that cause institutions to underestimate these threats. They also analyze past failures to provide valuable lessons for improving security practices. The book uniquely addresses the potential for insiders to aid terrorist efforts, especially in acquiring fissile material or sabotaging nuclear facilities. Contributions from experts across different fields enrich the analysis, making the book a crucial resource for any high-security organization.
Topic Focus: Insider Threats
Book Link: View Book

Title: Inside Job
Sub Title: Why Insider Risk Is The Biggest Cyber Threat You Can’t Ignore
Year Published: 2020
Author: Joe Payne, Jadee Hanson, Mark Wojtasiak
Description: From data security company Code42, Inside Jobs offers companies of all sizes a new way to secure today’s collaborative cultures-one that works without compromising sensitive company data or slowing business down. Authors Joe Payne, Jadee Hanson, and Mark Wojtasiak, seasoned veterans in the cybersecurity space, provide a top-down and bottom-up picture of the rewards and perils involved in running and securing organizations focused on rapid, iterative, and collaborative innovation.
Topic Focus: Insider Threats
Book Link: View Book

Title: Insider Threat
Sub Title: A Guide to Understanding, Detecting, and Defending Against the Enemy from Within
Year Published: 2016
Author: Dr. Julie E. Mehan
Description: “Insider Threat – A Guide to Understanding, Detecting, and Defending Against the Enemy from Within” emphasizes building a security culture based on international best practices to mitigate insider threats. It provides quick fixes and long-term strategies for an effective insider threat program, detailing organizational traits of victims, stages of malicious attacks, and steps for success. The book advocates a three-tier security culture and covers risk mitigation, training, monitoring, auditing, and response to suspicious behaviors. It aligns security measures with ISO 27001, ISO 27002, and NIST SP 800-53 standards, addressing risk assessment, staff screening, defense layering, penetration testing, remote access control, and supply chain security.
Topic Focus: Insider Threats
Book Link: View Book

Title: The Insider Threat
Sub Title: Assessment and Mitigation of Risk
Year Published: 2019
Author: Eleanor E. Thompson
Description: This book is all about assessment and mitigation of insider threat risks. This book provides emergent knowledge relating to physical, cyber, and human risk mitigation in a practical and readable approach for the corporate environment. It presents and discusses practical applications of risk management techniques along with useable practical policy change options. This practical organizational security management approach examines multiple aspects of security to protect against physical, cyber, and human risk. A practical more tactical focus includes managing vulnerabilities and applying countermeasures. The book guides readers to a greater depth of understanding and action-oriented options.
Topic Focus: Insider Threats
Book Link: View Book

Title: License To Steal
Sub Title: Why Fraud Plagues America’s Health Care System
Year Published: 1996
Author: Malcolm K. Sparrow
Description: Criminal fraud must be considered in health care reform debates due to significant, yet unknown, losses from the nation’s trillion-dollar health care budget. Malcolm Sparrow, a fraud control expert, highlights rampant and largely unchecked fraud within the health care industry, warning it will worsen without changes in priorities, detection strategies, and technology use. Contrary to popular belief, Sparrow argues that electronic claims processing could increase fraud, and managed care could heighten health risks. His final section offers crucial recommendations for policymakers and those interested in fraud control.
Topic Focus: Fraud
Book Link: View Book

Title: Threat Assessment: A Risk Management Approach
Year Published: 2003
Author: James T. Turner, Michael G. Gelles
Description: This book provides the tools you need to protect both your employees and yourself from a variety of threats. Threat Assessment: A Risk Management Approach examines stalking, insider threats, and workplace violence, revealing the best ways to reduce risk and manage emergencies. It includes numerous examples that show recommended practices in action and provides detailed interviewing methods that can increase the efficiency of current strategies.
Topic Focus: Risk Management
Book Link: View Book

Title: Rethinking The Human Factor
Sub Title: A Philosophical approach to information security awareness behaviour and culture
Year Published: 2018
Author: Bruce Hallas
Description: “Re-thinking the Human Factor” is not a checklist but a reflective guide that divides readers into those who will love or hate it. Designed to be read in a day, it encourages readers to rethink employee education and awareness through questions, scenarios, and insights into human behavior and culture. The book promotes a philosophical approach, emphasizing the need to design awareness and security measures with an understanding of human nature to embed security into organizational culture.
Topic Focus: Cyber Awareness
Book Link: View Book

Title: Behave
Sub Title: The Biology of Humans at Our Best and Worst
Year Published: 2017
Author: Robert Sapolsky
Description: This groundbreaking book explores the science of human behavior, examining our capacity for both violence and kindness. It traces the layers of causation behind our actions and how biology influences war, peace, and morality. It offers an insightful look into what makes us human.
Topic Focus: Human Behaviour
Book Link: View Book

Title: Counterintelligence Theory And Practice (2nd ed.)
Year Published: 2019
Author: Hank Prunckun
Description: In this thoroughly updated and revised edition of Counterintelligence Theory and Practice, Hank Prunckun provides all of the elements required for a successful counterintelligence operation from both an academic and a practitioner’s point of view. It offers an advanced understanding of the underlying theory that supports the art and science of the craft, and examines the challenges and practicalities of defensive and offensive counterintelligence. Designed for students in intelligence studies as well as professional training classes, this text explores issues related to national security, military, law enforcement, and corporate as well as private affairs.
Topic Focus: Counterintelligence
Book Link: View Book

Title: Counterintelligence For Corporate Environments (Volume I)
Sub Title: How To Protect Information Business Integrity in the Modern World
Year Published: 2018
Author: Dylan van Genderen
Description: Counterintelligence for Corporate Environments, Volume I” introduces comprehensive methodologies to enhance corporate security and operations. It emphasizes the crucial role of intelligence in organizational survival and protection.
Topic Focus: Counterintelligence
Book Link: View Book

Title: Counterintelligence For Corporate Environments (Volume II)
Sub Title: How To Protect Information Business Integrity in the Modern World
Year Published: 2018
Author: Dylan van Genderen
Description: Volume II presents innovative strategies adapted from intelligence and military tactics, aimed at improving corporate security. The book equips managers, security officers, and consultants with advanced counterintelligence models to address modern threats effectively.
Topic Focus: Counterintelligence
Book Link: View Book

Title: Deception: Counterdeception And Counterintelligence
Year Published: 2018
Author: Robert M. Clark, Dr. William L. Mitchell
Description: “Deception: Counterdeception and Counterintelligence” offers a practical guide to understanding and implementing deception in intelligence operations. Authors Robert M. Clark and William L. Mitchell use case-based exercises to train operational planners in building deception campaigns and intelligence analysts in detecting them. The book explores new deception channels like social media and covers multichannel deception across various domains. Practical exercises and assignments enhance critical thinking, making it an invaluable resource for both individual and team learning.
Topic Focus: Counterintelligence
Book Link: View Book

Title: O’Hara’s Fundamentals Of Criminal Investigation
Year Published: 2019
Author: DeVere D. Woods, Jr.
Topic Focus: Investigation
Book Link: View Book

Title: The Official U.S. Army Counterintelligence Handbook
Sub Title: The U.S. Army’s Official Playbook For Deception On The World’s Deadliest Stage
Year Published: 2023
Author: Department Of The Army
Description: The U.S. Army’s official playbook for deception on the world’s deadliest stage, and a must-read for anyone with an interest in today’s difficult military intelligence questions.
Topic Focus: Counterintelligence
Book Link: View Book

Title: Get The Truth
Sub Title: Former CIA Offices Teach You How To Persuade Anyone To Tell All
Year Published: 2015
Author: Phillip Houston, Michael Floyd, Susan Carnicero
Description: Former CIA agents and authors of Spy the Lie provide a step-by-step guide with thrilling anecdotes and easy instructions to elicit the truth from anyone, using a methodology developed for counterterrorism and criminal investigations that encourages short-term thinking over long-term ramifications of lying.
Topic Focus: Human Behaviour
Book Link: View Book

Title: Spy The Lie
Sub Title: Former CIA Officers Teach You How to Detect Deception
Year Published: 2013
Author: Phillip Houston, Michael Floyd, Susan Carnicero
Description: Philip Houston, Michael Floyd, and Susan Carnicero are world-class deception detectors as former CIA officers. Spy the Lie tells the riveting narrative of how they used Houston’s deception detection system in counterterrorism and criminal investigations and how we may use it in our daily lives.
Topic Focus: Human Behaviour
Book Link: View Book

Title: Insider Risk And Personnel Security
Sub Title: An Introduction
Year Published: 2023
Author: Paul Martin
Description: This textbook examines insider risk’s causes and effects using real-life case studies and discusses how to protect organisations. Insiders who break trust by acting in damaging ways pose some of the biggest hazards to organisations and organisations. Insiders injure their employers, society, and betrayed coworkers and friends psychologically. Still, few businesses have a systematic awareness of insider danger and a clear and effective security mechanism to mitigate it. This book explores the environmental and psychological elements that predispose some people to become damaging insiders and the most typical ways they do so. Society’s increasing use of technology and changing work patterns have changed insider risk. The second half of the book describes a practical systems-based approach to personnel security, which protects against insider risk. It uses the best industry and academic research, behavioural science, and practitioner experience to illustrate how to make personnel security effective at managing risk and facilitating business.
Topic Focus: Insider Threats
Book Link: View Book

Title: Chinese Espionage Operations and Tactics
Year Published: 2020
Author: Nicholas Eftimiades
Description: This short book is the most detailed work ever published in the unclassified world on China’s intelligence tradecraft. It is NOT a causal description of a few cases of Chinese espionage with pictures thrown in for intrigue and excitement. This monograph (50 pages) is a critical analysis of China’s current intelligence activities and associated espionage tradecraft. It reviews 595 cases of espionage, economic espionage, covert action, theft of technology and trade secrets.

The study identifies and analyzes the specific espionage tradecraft used by China’s intelligence services, State Owned Enterprises, universities, private companies, and individuals. This work is for Insider Threat specialists, Intelligence Officers, security professionals, attorneys, policy makers, journalists, and anyone else who needs a detailed understanding of China’s espionage operations and tactics.
Topic Focus: Espionage
Book Link: View Book

Title: Chinese Communist Espionage: An Intelligence Primer
Year Published: 2019
Author: Peter Mattis, Matthew Brazil
Description: This is the first book of its kind to employ hundreds of Chinese sources to explain the history and current state of Chinese Communist intelligence operations. It profiles the leaders, top spies, and important operations in the history of China’s espionage organs, and links to an extensive online glossary of Chinese Language intelligence and security terms.

Peter Mattis and Matthew Brazil present an unprecedented look into the murky world of Chinese espionage both past and present, enabling a better understanding of how pervasive and important its influence is, both in China and abroad.
Topic Focus: Espionage
Book Link: View Book

Title: Chinese Communist Espionage: An Intelligence Primer
Year Published: 2019
Author: Peter Mattis, Matthew Brazil
Description: This is the first book of its kind to employ hundreds of Chinese sources to explain the history and current state of Chinese Communist intelligence operations. It profiles the leaders, top spies, and important operations in the history of China’s espionage organs, and links to an extensive online glossary of Chinese Language intelligence and security terms.

Peter Mattis and Matthew Brazil present an unprecedented look into the murky world of Chinese espionage both past and present, enabling a better understanding of how pervasive and important its influence is, both in China and abroad.
Topic Focus: Espionage
Book Link: View Book

Title: Chinese Industrial Espionage: Technology Acquisition and Military Modernisation
Year Published: 2013
Author: William C. Hannas, James Mulvenon, Anna B. Puglisi
Description: This book is the first government or non-government-sponsored account of China’s technology acquisitions.

Based on authentic materials and rigors study, the book reveals China’s technical advancement through others’ successes. China has used sophisticated methods to find foreign inventions, steal them, and turn them into weapons and competitive commodities without paying their owners for decades. Recently, the NSA director termed it “the greatest transfer of wealth in history”.

This book, written by two of America’s top government analysts and a Chinese cyber network expert, details these transfer mechanisms in detail, providing context and depth not found elsewhere. The authors place the new research in historical context and then examine the People’s Republic of China’s policy support for economic espionage, clandestine technology transfers, cyberspace theft, and its impact on the US’s future using previously unexploited Chinese language sources.

Chinese politics, Asian security studies, US defense, foreign policy, and IR students will enjoy this book.
Topic Focus: Espionage
Book Link: View Book

Title: China’s Quest For Foreign Technology: Beyond Espionage
Year Published: 2020
Author: William C. Hannas, Didi Kirsten Tatlow
Description: This book analyzes China’s foreign technology acquisition activity and how this has helped its rapid rise to superpower status.

Since 1949, China has operated a vast and unique system of foreign technology spotting and transfer aimed at accelerating civilian and military development, reducing the cost of basic research, and shoring up its power domestically and abroad—without running the political risks borne by liberal societies as a basis for their creative developments. While discounted in some circles as derivative and consigned to perpetual catch-up mode, China’s “hybrid” system of legal, illegal, and extralegal import of foreign technology, combined with its indigenous efforts, is, the authors believe, enormously effective and must be taken seriously. Accordingly, in this volume, 17 international specialists combine their scholarship to portray the system’s structure and functioning in heretofore unseen detail, using primary Chinese sources to demonstrate the perniciousness of the problem in a manner not likely to be controverted. The book concludes with a series of recommendations culled from the authors’ interactions with experts worldwide.

This book will be of much interest to students of Chinese politics, US foreign policy, intelligence studies, science and technology studies, and International Relations in general.
Topic Focus: Espionage
Book Link: View Book