Recommended Reading

This page contains my curated list of the books and reports I have come across which I find useful in my own professional development as it relates to this blog. Click on the link below to jump to the relevant section of the page.

Brand Integrity and Product Protection

Barnett, D. N. (2017). Brand protection in the online world: A comprehensive guide.

Donaker, G., Kim, H., & Luca, M. (January 01, 2019). Designing Better Online Review Systems. Harvard Business Review, 97, 6, 122-122.

Post, R. S., & Post, P. N. (2008). Global brand integrity management: How to protect your product in today’s competitive environment.

Business Integrity and Fraud

Department of Justice and Securities Exchange Commission (2020). A Resource Guide to the U.S. Foreign Corrupt Practices Act, Second Edition, United States of America.

Loughman, B. P. and Sibery, R.A. (2012). Bribery and Corruption: Navigating the Global Risks, Wiley.

Ministry of Justice (2010). The Bribery Act 2010: Guidance about procedures which relevant commercial organisations can put into place to prevent persons associated with them from bribing, United Kingdom.

OECD (2011). OECD Guidelines for Multinational Enterprises, OECD Publishing.

OECD (2018), OECD Due Diligence Guidance for Responsible Business Conduct, OECD Publishing

United Nations (2011). Guiding Principles on Business and Human Rights: Implementing the United Nations “Protect, Respect and Remedy” Framework, Office of the High Commissioner for Human Rights, New York and Geneva.

Wells, J.T. (2017). Corporate Fraud Handbook: Prevention and Detection, 5th Edition, Wiley.

Communication Skills

Minto, B. (1996). The Minto Pyramid Principle: Logic in writing, thinking and problem solving, Minto International Inc.

Data Analytics, Data Science and Fraud Detection

Baesens, B. (2015). Fraud analytics using descriptive, predictive, and social network techniques: A guide to data science for fraud detection. Wiley.

Loth, A., Vogel, N., & Sparkes, S. (2019). Visual analytics with Tableau. Wiley.

McCue, C. (2015). Data Mining and Predictive Analysis: Intelligence Gathering and Crime Analysis (Second Edition). Butterworth-Heinemann.

Vona, L. W. (2017). Fraud data analytics methodology: The fraud scenario approach to uncovering fraud in core business systems. Wiley.

Due Diligence, Supplier Investigations and Background Investigations

Bean, E.J. (2018). Financial Exposure: Carl Levin’s senate investigations into finance and tax abuse, Palgrave McMillan.

Bureau Van Dijk (2018). Creating clarity around ownership structures poster,

Financial Action Task Force (2019). Best Practices on Beneficial Ownership for Legal Persons, October 2019,

Harrison Smith, S. (2004). The Fact Checker’s Bible: A guide to getting it right, Anchor Books.

Hetherington, C. (2007). Business Background Investigations: Tools and Techniques for Solution Driven Due Diligence, Facts on Demand Press, USA.

Hetherington, C. (2015). The Guide to Online Due Diligence Investigations: The Professional Approach on How to Use Traditional and Social Media Resources, Facts on Demand Press, USA.

MacLeod, D. (2012). How to find out anything: From extreme Google searches to scouring government documents, a guide to uncovering anything about everyone and everything. New York: Prentice Hall Press.

May, O. and Curwell, P. (2020). Terrorist Diversion: A guide to prevention and detection for NGOs, 1st Edition, Routledge, UK.

van der Does de Willebois, E., Halter, E.M, Harrison, R.A., Park, J.W, and Sharman, J.C. (2011). The Puppet Masters: How the Corrupt Use Legal Structures to Hide Stolen Assets and What to Do About It, Stolen Assets Recovery Initiative, The World Bank and United Nations Office of Drugs and Crime, Washington D.C.

Yong, K. P. (2013). Due diligence in China: Beyond the checklists. Singapore: Wiley.

Economic Espionage and Industrial Espionage

Fahey, L. (1996). Competitors: Outwitting, outmaneauvering and outperforming, Wiley.

Fleisher, C.S and Benssoussan, B.E. (2003). Strategic and competitive analysis: Methods and techniques for analysing business competition, Prentice Hall.

Javers, E., & Scully, R. (2011). Broker, trader, lawyer, spy: Inside the secret world of corporate espionage.

Kahaner, L. (1996). Competitive intelligence: From black ops to boardrooms : how businesses gather, analyze, and use information to succeed in the global marketplace. New York: Simon & Schuster.

Nasheri, H. (2005). Economic espionage and industrial spying. Cambridge, UK: Cambridge University Press.

United States., & United States. (2011). Foreign spies stealing US economic secrets in cyberspace: Report to Congress on foreign economic collection and industrial espionage, 2009-2011. Washington, D.C.: Office of the National Counterintelligence Executive.

Wimmer, B. (2015). Business Espionage. Butterworth-Heinemann

Geopolitical Risk

Bernstein, P.L. (1998). Against the gods: The remarkable story of risk, Wiley.

Cleary, S. and Malleret, T. (2007). Global Risk: Business success in turbulent times, Palgrave.

Crump, J. (2015). Corporate Security Intelligence and Strategic Decision Making, CRC Press.

Grabo, C. (2002). Anticipating Surprise: Analysis for Strategic Warning, Centre for Strategic Intelligence Research, Joint Military Intelligence College, United States of America.

Rice, C. and Zegart, A.B. (2018). Political Risk: How businesses and organisations can anticipate global insecurity, Twelve.

Schwartz, P. (1996). The Art of the Long View: Planning for the Future in an Uncertain World, Currency Doubleday.

Grey Markets (Gray Markets) and Product Diversion

Bensen, E. E., & Sugden, D. R. (2019). Gray markets: Prevention, detection, and litigation.

Cassara, J., (2015). Trade-Based Money Laundering: The Next Frontier in International Money Laundering Enforcement, Wiley.

May, O. and Curwell, P. (2020). Terrorist Diversion: A guide to prevention and detection for NGOs, 1st Edition, Routledge, UK.

Insider Threats

Cappelli, D., Moore, A., & Trzeciak, R. (2012). The CERT guide to insider threats: How to prevent, detect, and respond to information technology crimes (theft, sabotage, fraud). Upper Saddle River, NJ: Addison-Wesley.

Gelles, M. G. (2016). Insider threat: Prevention, detection, mitigation, and deterrence, Butterworth-Heinemann.

Hobbs, C. and Moran, M. (2020). Exploring the human dimension of nuclear security: thehistory, theory, and practice of security culture in Nonproliferation Review,

Silowash, G, Capelli, D, Moore, A., Trzeciak, R., Shimeall, T.J, Flynn, L. (2022). Common Sense Guide to Mitigating Insider Threats, 7th Edition, Carnegie-Mellon University, Pittsburgh PA Software Engineering Institute, United States.

Intelligence concepts and Intelligence Analysis

Beebe, S. M., & Pherson, R. H. (2015). Cases in intelligence analysis: Structured analytic techniques in action : instructor materials.

Clark, R. M. (2007). Intelligence analysis: A target-centric approach. 7th Edition. Washington, D.C: CQ Press.

Conway, J. E. (2016). Counterterrorism and threat finance analysis during wartime. Lexington Books, USA.

Gerdes, L. M. (2015). Illuminating dark networks: The study of clandestine groups and organizations. Cambridge University Press.

Heuer, R. J., & Pherson, R. H. (2021). Structured analytic techniques for intelligence analysis. CQ Press, USA.

Investigations and Asset Confiscation

Australian Government (2022). Australian Government Investigation Standard 2022, Australian Federal Police, Canberra.

De Kauwe, S. (2018). The law of fraud: An Australian investigator’s guide, Critical Mass.

Global Intellectual Property Center., Chamber of Commerce of the United States of America., & Coalition Against Counterfeiting and Piracy (CACP). (2007). Intellectual property protection and enforcement manual: A practical and legal guide for protecting your intellectual property rights. Washington D.C: Global Intellectual Property Center.

Ord, B., Shaw, G, Green, T. (2014). Investigative Interviewing Explained, 4th Edition, LexisNexis Butterworths.

Money Laundering and Terrorist Financing

Cassara, J., (2015). Trade-Based Money Laundering: The Next Frontier in International Money Laundering Enforcement, Wiley.

Madinger, J. (2012). Money laundering: A guide for criminal investigators. Boca Raton, FL: Taylor & Francis.

May, O. and Curwell, P. (2020). Terrorist Diversion: A guide to prevention and detection for NGOs, 1st Edition, Routledge, UK.

Open Source Intelligence (OSINT)

Akhgar, B., Bayerl, P. S., & Sampson, F. (2017). Open source intelligence investigation: from strategy to implementation. Springer.

Bazzell, M. (2022). Open Source Intelligence Techniques: Resources for Searching and Analyzing Online Information, 9th Edition, Independently Published.

Hassan, N. A., & Hijazi, R. (2018). Open source intelligence methods and tools: A practical guide to online intelligence. Apress.

Layton, R., & Watters, P. A. (2016). Automating open source intelligence: Algorithms for OSINT. Syngress Media.

Supply Chain Threats, Security, Integrity and Fraud

Arway, A. G. (2016). Supply Chain Security: A Comprehensive Approach. Boca Raton: CRC Press.

Australian Government (2021). Critical Technology Supply Chain Principles, Department of Home Affairs, Canberra.

Burges, D. (2013). Cargo theft, loss prevention, and supply chain security. Butterworth-Heinemann, Amsterdam.

Cesareo, L. (2016). Counterfeiting and piracy: A comprehensive literature review, Springer.

Hopkins, D. M., Kontnik, L. T., & Turnage, M. T. (2003). Counterfeiting exposed: How to protect your brand and market share. New York: Wiley.

Katz, N. A. (2016). Detecting and Reducing Supply Chain Fraud. Gower.

Kurvinen, M., To͏̈yryla͏̈, I., & Murthy, D. N. P. (2016). Warranty fraud management: Reducing fraud and other excess costs in warranty and service operations. Hoboken: Wiley.

OECD. (2008). The economic impact of counterfeiting and piracy. (Economic impact of counterfeiting and piracy.) Paris: OECD.

OECD/EUIPO (2016), Trade in Counterfeit and Pirated Goods: Mapping the Economic Impact, Illicit Trade, OECD Publishing, Paris.

Prokop, D. (2017). Global supply chain security and management: Appraising programs, preventing crimes. Butterworth-Heinemann.

Talbot, J., & Jakeman, M. (2013). Security risk management body of knowledge. Hoboken, N.J: Wiley.

Technology Transfer and Export Control

Commission on the Theft of American Intellectual Property (2013). The IP Commission Report: The Report on the Commission on the Theft of American Intellectual Property, National Bureau of Asian Research, United States.

Fedasiuk, R. & Weinstein, E. (2020). Overseas Professionals and Technology Transfer to China, July 2020, Center for Security and Emerging Technology, Georgetown University,

Lee, B., Arno, M., Salisbury, D. (2017). Searching for Illicit Dual Use Items in Online Marketplaces: A Semi-Automated Approach, Occasional Paper #27, James Martin Centre for Nonproliferation Studies, Middlebury Institute of International Studies at Monterey, California.

Lucas, R., & Taylor, T. (March 19, 2021). Sealing Technology Transfer Leaks : The Whack-a-Mole AnalogyThe Rusi Journal, 166, 1, 32-47.

Matthews, R. & Williams, R. (2000) Technology transfer: Examining Britain’s defence industrial participation policy, The RUSI Journal, 145:2, 26-31,  DOI: 10.1080/03071840008446504

O’Connor, S. (2019). How Chinese companies facilitate technology transfer from the United States. U.S.-China Economic and Security Review Commission, Washington D.C.

Rafaelof, E. (2021). Unfinished business: Export control and foreign investment reforms. US-China Economic and Security Review Commission, Washington D.C.

Stewart, I. (2022). Export Control and Emerging Technology Control in an Era of Strategic Competition, James Martin Centre for Nonproliferation Studies, Middlebury Institute of International Studies at Monterey, California.

Trade Sanctions and Sanctions Evasion

Anderson, G. (2016). Points of Deception: Exploring How Proliferators Evade Controls to Obtain Dual-Use Goods, Strategic Trade Review, Spring 2016, 2(2).

Andreas, P. (June 01, 2005). Criminalizing Consequences of Sanctions: Embargo Busting and Its LegacyInternational Studies Quarterly, 49, 2, 335-360.

Baldwin, D. A., & Kapstein, E. B. (2020). Economic statecraft. Revised Edition. Princeton (N.J). Princeton University Press.

Blancke, S. (2016). Proliferation Case Study Series: Examining Allegations that Pakistan diverted Chinese-origin goods to the DPRK, 2 August 2016, Kings College London.

Brewer, J. (2017). Study of Typologies of Financing of WMD Proliferation, Project Alpha and Kings College London, United Kingdom.

Carlisle, D. & Izenman, K. (2019). Closing the Crypto Gap: Guidance for Countering North Korean Cryptocurrency Activity in Southeast Asia, Occasional Papers, 14 April 2019, Centre for Financial Crime and Security Studies, RUSI, London

Gillard, N. (2015). Catch me if you can: The illicit trade network of Daniel Frosch, Project Alpha, 5 January 2015, Kings College London.

Gillard, N (2016). Alpha In Depth report: North Korea’s Proliferation and Illicit Procurement Apparatus, May 2016, Project Alpha, Kings College London

Joshi, A., Dall, E, & Dolzikova, D. (2019). Guide to Conducting a National Proliferation Financing Risk Assessment, Other Publications, 13 May 2019, Centre for Financial Crime and Security Studies, RUSI, London

Krawec, C. (2018). A terrorist’s stockroom? The effectiveness of e-markertplace prohibited item policies, 16 January 2018, Project Alpha, Kings College London

Mallory, K. (2021). North Korean sanctions evasion techniques, RAND Corporation, International Security and Defense Policy Center, United States.

O’Sullivan, M. L. (2003). Shrewd sanctions: Statecraft and state sponsors of terrorism. Washington, D.C: Brookings Institution Press.

Perlangeli, S. (2018). Flagging down North Korea on the High Seas, Commentary, 29 March 2018, Centre for Financial Crime and Security Studies, RUSI, London

U.S. Treasury (2019). A Framework for OFAC Compliance Commitments, 2 May 2019,

Leave a Reply