This page contains my curated list of the books and reports I have come across which I find useful in my own professional development as it relates to this blog. Click on the link below to jump to the relevant section of the page.
- Brand Integrity and Product Protection
- Business Integrity and Fraud
- Communication Skills
- Data Analytics, Data Science and Fraud Detection
- Due Diligence, Supplier Investigations and Background Investigations
- Economic Espionage and Industrial Espionage
- Geopolitical Risk
- Grey Markets (Gray Markets) and Product Diversion
- Insider Threats
- Intelligence concepts and Intelligence Analysis
- Investigations and Asset Confiscation
- Money Laundering, Terrorist Financing
- Open Source Intelligence (OSINT)
- Supply Chain Threats, Security, Integrity and Fraud
- Technology Transfer and Export Control
- Trade Sanctions and Sanctions Evasion
Brand Integrity and Product Protection
Barnett, D. N. (2017). Brand protection in the online world: A comprehensive guide.
Donaker, G., Kim, H., & Luca, M. (January 01, 2019). Designing Better Online Review Systems. Harvard Business Review, 97, 6, 122-122.
Post, R. S., & Post, P. N. (2008). Global brand integrity management: How to protect your product in today’s competitive environment.
Business Integrity and Fraud
Department of Justice and Securities Exchange Commission (2020). A Resource Guide to the U.S. Foreign Corrupt Practices Act, Second Edition, United States of America.
Loughman, B. P. and Sibery, R.A. (2012). Bribery and Corruption: Navigating the Global Risks, Wiley.
Ministry of Justice (2010). The Bribery Act 2010: Guidance about procedures which relevant commercial organisations can put into place to prevent persons associated with them from bribing, United Kingdom.
OECD (2011). OECD Guidelines for Multinational Enterprises, OECD Publishing.
OECD (2018), OECD Due Diligence Guidance for Responsible Business Conduct, OECD Publishing
United Nations (2011). Guiding Principles on Business and Human Rights: Implementing the United Nations “Protect, Respect and Remedy” Framework, Office of the High Commissioner for Human Rights, New York and Geneva.
Wells, J.T. (2017). Corporate Fraud Handbook: Prevention and Detection, 5th Edition, Wiley.
Communication Skills
Minto, B. (1996). The Minto Pyramid Principle: Logic in writing, thinking and problem solving, Minto International Inc.
Data Analytics, Data Science and Fraud Detection
Baesens, B. (2015). Fraud analytics using descriptive, predictive, and social network techniques: A guide to data science for fraud detection. Wiley.
Loth, A., Vogel, N., & Sparkes, S. (2019). Visual analytics with Tableau. Wiley.
McCue, C. (2015). Data Mining and Predictive Analysis: Intelligence Gathering and Crime Analysis (Second Edition). Butterworth-Heinemann.
Vona, L. W. (2017). Fraud data analytics methodology: The fraud scenario approach to uncovering fraud in core business systems. Wiley.
Due Diligence, Supplier Investigations and Background Investigations
Bean, E.J. (2018). Financial Exposure: Carl Levin’s senate investigations into finance and tax abuse, Palgrave McMillan.
Bureau Van Dijk (2018). Creating clarity around ownership structures poster, www.bvdinfo.com
Financial Action Task Force (2019). Best Practices on Beneficial Ownership for Legal Persons, October 2019, www.fatf-gafi.org
Harrison Smith, S. (2004). The Fact Checker’s Bible: A guide to getting it right, Anchor Books.
Hetherington, C. (2007). Business Background Investigations: Tools and Techniques for Solution Driven Due Diligence, Facts on Demand Press, USA.
Hetherington, C. (2015). The Guide to Online Due Diligence Investigations: The Professional Approach on How to Use Traditional and Social Media Resources, Facts on Demand Press, USA.
MacLeod, D. (2012). How to find out anything: From extreme Google searches to scouring government documents, a guide to uncovering anything about everyone and everything. New York: Prentice Hall Press.
May, O. and Curwell, P. (2020). Terrorist Diversion: A guide to prevention and detection for NGOs, 1st Edition, Routledge, UK.
van der Does de Willebois, E., Halter, E.M, Harrison, R.A., Park, J.W, and Sharman, J.C. (2011). The Puppet Masters: How the Corrupt Use Legal Structures to Hide Stolen Assets and What to Do About It, Stolen Assets Recovery Initiative, The World Bank and United Nations Office of Drugs and Crime, Washington D.C. https://star.worldbank.org/
Yong, K. P. (2013). Due diligence in China: Beyond the checklists. Singapore: Wiley.
Economic Espionage and Industrial Espionage
Fahey, L. (1996). Competitors: Outwitting, outmaneauvering and outperforming, Wiley.
Fleisher, C.S and Benssoussan, B.E. (2003). Strategic and competitive analysis: Methods and techniques for analysing business competition, Prentice Hall.
Javers, E., & Scully, R. (2011). Broker, trader, lawyer, spy: Inside the secret world of corporate espionage.
Kahaner, L. (1996). Competitive intelligence: From black ops to boardrooms : how businesses gather, analyze, and use information to succeed in the global marketplace. New York: Simon & Schuster.
Nasheri, H. (2005). Economic espionage and industrial spying. Cambridge, UK: Cambridge University Press.
United States., & United States. (2011). Foreign spies stealing US economic secrets in cyberspace: Report to Congress on foreign economic collection and industrial espionage, 2009-2011. Washington, D.C.: Office of the National Counterintelligence Executive.
Wimmer, B. (2015). Business Espionage. Butterworth-Heinemann
Geopolitical Risk
Bernstein, P.L. (1998). Against the gods: The remarkable story of risk, Wiley.
Cleary, S. and Malleret, T. (2007). Global Risk: Business success in turbulent times, Palgrave.
Crump, J. (2015). Corporate Security Intelligence and Strategic Decision Making, CRC Press.
Grabo, C. (2002). Anticipating Surprise: Analysis for Strategic Warning, Centre for Strategic Intelligence Research, Joint Military Intelligence College, United States of America.
Rice, C. and Zegart, A.B. (2018). Political Risk: How businesses and organisations can anticipate global insecurity, Twelve.
Schwartz, P. (1996). The Art of the Long View: Planning for the Future in an Uncertain World, Currency Doubleday.
Grey Markets (Gray Markets) and Product Diversion
Bensen, E. E., & Sugden, D. R. (2019). Gray markets: Prevention, detection, and litigation.
Cassara, J., (2015). Trade-Based Money Laundering: The Next Frontier in International Money Laundering Enforcement, Wiley.
May, O. and Curwell, P. (2020). Terrorist Diversion: A guide to prevention and detection for NGOs, 1st Edition, Routledge, UK.
Insider Threats
Cappelli, D., Moore, A., & Trzeciak, R. (2012). The CERT guide to insider threats: How to prevent, detect, and respond to information technology crimes (theft, sabotage, fraud). Upper Saddle River, NJ: Addison-Wesley.
Gelles, M. G. (2016). Insider threat: Prevention, detection, mitigation, and deterrence, Butterworth-Heinemann.
Hobbs, C. and Moran, M. (2020). Exploring the human dimension of nuclear security: thehistory, theory, and practice of security culture in Nonproliferation Review, https://doi.org/10.1080/10736700.2020.1811532
Silowash, G, Capelli, D, Moore, A., Trzeciak, R., Shimeall, T.J, Flynn, L. (2022). Common Sense Guide to Mitigating Insider Threats, 7th Edition, Carnegie-Mellon University, Pittsburgh PA Software Engineering Institute, United States.
Intelligence concepts and Intelligence Analysis
Beebe, S. M., & Pherson, R. H. (2015). Cases in intelligence analysis: Structured analytic techniques in action : instructor materials.
Clark, R. M. (2007). Intelligence analysis: A target-centric approach. 7th Edition. Washington, D.C: CQ Press.
Conway, J. E. (2016). Counterterrorism and threat finance analysis during wartime. Lexington Books, USA.
Gerdes, L. M. (2015). Illuminating dark networks: The study of clandestine groups and organizations. Cambridge University Press.
Heuer, R. J., & Pherson, R. H. (2021). Structured analytic techniques for intelligence analysis. CQ Press, USA.
Investigations and Asset Confiscation
Australian Government (2022). Australian Government Investigation Standard 2022, Australian Federal Police, Canberra.
De Kauwe, S. (2018). The law of fraud: An Australian investigator’s guide, Critical Mass.
Global Intellectual Property Center., Chamber of Commerce of the United States of America., & Coalition Against Counterfeiting and Piracy (CACP). (2007). Intellectual property protection and enforcement manual: A practical and legal guide for protecting your intellectual property rights. Washington D.C: Global Intellectual Property Center.
Ord, B., Shaw, G, Green, T. (2014). Investigative Interviewing Explained, 4th Edition, LexisNexis Butterworths.
Money Laundering and Terrorist Financing
Cassara, J., (2015). Trade-Based Money Laundering: The Next Frontier in International Money Laundering Enforcement, Wiley.
Madinger, J. (2012). Money laundering: A guide for criminal investigators. Boca Raton, FL: Taylor & Francis.
May, O. and Curwell, P. (2020). Terrorist Diversion: A guide to prevention and detection for NGOs, 1st Edition, Routledge, UK.
Open Source Intelligence (OSINT)
Akhgar, B., Bayerl, P. S., & Sampson, F. (2017). Open source intelligence investigation: from strategy to implementation. Springer.
Bazzell, M. (2022). Open Source Intelligence Techniques: Resources for Searching and Analyzing Online Information, 9th Edition, Independently Published.
Hassan, N. A., & Hijazi, R. (2018). Open source intelligence methods and tools: A practical guide to online intelligence. Apress.
Layton, R., & Watters, P. A. (2016). Automating open source intelligence: Algorithms for OSINT. Syngress Media.
Supply Chain Threats, Security, Integrity and Fraud
Arway, A. G. (2016). Supply Chain Security: A Comprehensive Approach. Boca Raton: CRC Press.
Australian Government (2021). Critical Technology Supply Chain Principles, Department of Home Affairs, Canberra.
Burges, D. (2013). Cargo theft, loss prevention, and supply chain security. Butterworth-Heinemann, Amsterdam.
Cesareo, L. (2016). Counterfeiting and piracy: A comprehensive literature review, Springer.
Hopkins, D. M., Kontnik, L. T., & Turnage, M. T. (2003). Counterfeiting exposed: How to protect your brand and market share. New York: Wiley.
Katz, N. A. (2016). Detecting and Reducing Supply Chain Fraud. Gower.
Kurvinen, M., To͏̈yryla͏̈, I., & Murthy, D. N. P. (2016). Warranty fraud management: Reducing fraud and other excess costs in warranty and service operations. Hoboken: Wiley.
OECD. (2008). The economic impact of counterfeiting and piracy. (Economic impact of counterfeiting and piracy.) Paris: OECD.
OECD/EUIPO (2016), Trade in Counterfeit and Pirated Goods: Mapping the Economic Impact, Illicit Trade, OECD Publishing, Paris.
Prokop, D. (2017). Global supply chain security and management: Appraising programs, preventing crimes. Butterworth-Heinemann.
Talbot, J., & Jakeman, M. (2013). Security risk management body of knowledge. Hoboken, N.J: Wiley.
Technology Transfer and Export Control
Commission on the Theft of American Intellectual Property (2013). The IP Commission Report: The Report on the Commission on the Theft of American Intellectual Property, National Bureau of Asian Research, United States.
Fedasiuk, R. & Weinstein, E. (2020). Overseas Professionals and Technology Transfer to China, July 2020, Center for Security and Emerging Technology, Georgetown University, cset.georgetown.edu/research/overseas-professionals-and-technology-transfer-to-china/. https://doi.org/10.51593/20190038
Lee, B., Arno, M., Salisbury, D. (2017). Searching for Illicit Dual Use Items in Online Marketplaces: A Semi-Automated Approach, Occasional Paper #27, James Martin Centre for Nonproliferation Studies, Middlebury Institute of International Studies at Monterey, California.
Lucas, R., & Taylor, T. (March 19, 2021). Sealing Technology Transfer Leaks : The Whack-a-Mole Analogy. The Rusi Journal, 166, 1, 32-47.
Matthews, R. & Williams, R. (2000) Technology transfer: Examining Britain’s defence industrial participation policy, The RUSI Journal, 145:2, 26-31, DOI: 10.1080/03071840008446504
O’Connor, S. (2019). How Chinese companies facilitate technology transfer from the United States. U.S.-China Economic and Security Review Commission, Washington D.C.
Rafaelof, E. (2021). Unfinished business: Export control and foreign investment reforms. US-China Economic and Security Review Commission, Washington D.C.
Stewart, I. (2022). Export Control and Emerging Technology Control in an Era of Strategic Competition, James Martin Centre for Nonproliferation Studies, Middlebury Institute of International Studies at Monterey, California.
Trade Sanctions and Sanctions Evasion
Anderson, G. (2016). Points of Deception: Exploring How Proliferators Evade Controls to Obtain Dual-Use Goods, Strategic Trade Review, Spring 2016, 2(2).
Andreas, P. (June 01, 2005). Criminalizing Consequences of Sanctions: Embargo Busting and Its Legacy. International Studies Quarterly, 49, 2, 335-360.
Baldwin, D. A., & Kapstein, E. B. (2020). Economic statecraft. Revised Edition. Princeton (N.J). Princeton University Press.
Blancke, S. (2016). Proliferation Case Study Series: Examining Allegations that Pakistan diverted Chinese-origin goods to the DPRK, 2 August 2016, Kings College London.
Brewer, J. (2017). Study of Typologies of Financing of WMD Proliferation, Project Alpha and Kings College London, United Kingdom.
Carlisle, D. & Izenman, K. (2019). Closing the Crypto Gap: Guidance for Countering North Korean Cryptocurrency Activity in Southeast Asia, Occasional Papers, 14 April 2019, Centre for Financial Crime and Security Studies, RUSI, London
Gillard, N. (2015). Catch me if you can: The illicit trade network of Daniel Frosch, Project Alpha, 5 January 2015, Kings College London.
Gillard, N (2016). Alpha In Depth report: North Korea’s Proliferation and Illicit Procurement Apparatus, May 2016, Project Alpha, Kings College London
Joshi, A., Dall, E, & Dolzikova, D. (2019). Guide to Conducting a National Proliferation Financing Risk Assessment, Other Publications, 13 May 2019, Centre for Financial Crime and Security Studies, RUSI, London
Krawec, C. (2018). A terrorist’s stockroom? The effectiveness of e-markertplace prohibited item policies, 16 January 2018, Project Alpha, Kings College London
Mallory, K. (2021). North Korean sanctions evasion techniques, RAND Corporation, International Security and Defense Policy Center, United States.
O’Sullivan, M. L. (2003). Shrewd sanctions: Statecraft and state sponsors of terrorism. Washington, D.C: Brookings Institution Press.
Perlangeli, S. (2018). Flagging down North Korea on the High Seas, Commentary, 29 March 2018, Centre for Financial Crime and Security Studies, RUSI, London
U.S. Treasury (2019). A Framework for OFAC Compliance Commitments, 2 May 2019, https://home.treasury.gov/system/files/126/framework_ofac_cc.pdf