Stop Business Espionage & Sabotage Now – Building Corporate Intelligence Agency (CIA) – onsite or online

Business Espionage & Sabotage – Spies, AI and Spy Games  – “Competitors may have this time prevented us from knowing enough about them; but we have not prevented them from knowing far too much about us.” 

Critical analysis on building an artificial intelligence and quantum computing for business intelligence gathering, internal and external threat assessment, competitive intelligence, customer assessment and actions and more.

The archive and complete presentation can be found here.

To schedule or discuss details, email or call 303-594-1694

Client review – “A bit Churchillian but never in the field of business have I feared so much and gained so much from this executive seminar. There is so much at stake and the company has done so little to protect our IP and business as this was like a Category 5 hurricane to our parochial thinking leading us to take action now.” Daniel T – CEO.

Executive Seminar on
Building an Internal Competitive Intelligence Agency (CIA)

Spy Rings and Spy Agencies

“The enemy have this time prevented us from knowing enough about them; but we have not prevented them from knowing far too much about us.”

This onsite and online course explores the changing road rules surrounding corporate and state-sponsored efforts to probe, puncture, and pillage trade secrets, customer lists, financial systems and mis/disinform employees at all levels.  It is intended to give an overview of the issues, challenges and solutions leading to further indepth investigation on the part of the attendees.

Here are some of the topics presented which can be customized based on nature of the audience and level:

Historical Precedence

            – Agents, double agents, handlers and orchestrated efforts

            – Key failures in machine AI intelligence 

            – Quantum computing

Understanding private and state-sponsored competitive efforts

            – Trade secrets and intellectual property

            – Customer data

            – Mis/Disinformation (anti-vaxers)

            – Fake/deep fake

            – New efforts

Attack formats

            – Cyber – sigint-signal intelligence

            – Human – humint-human intelligence

            – Spies – external efforts

            – AI – artificial intelligence

Attack Assessments

            – C-Level contacts

            – Mid-level contacts

            – Customer communications

            – Internal secret data and intellectual property communications

            – Intelligence gathering practices

            – Dissemination policies – do not share rules


            – Financial and pricing

            – Corporate culture and organization

            – Sales and marketing strategies

            – Compliance

            – Goodwill

            – Trust

            – Crisis conditions

Spies and Double Agents

            Maskirovka level efforts

            – Curating connections

            – Managing deception


            – Wiretapping

            – Hacking

            – Attacking – weaponized social

            – Deception and mis-direction

            – Machine Accelerated – AI

Defensive Attacks

            – Overcoming flaws machine and human intelligence

            – AI-driven business communication channels

            – Social media and content-driven strategies

Trends in Corporate Intelligence Agencies (CIA)

            Ultra AI intelligence platforms

            – Fake and deep fake

            – Machine-learning – deep learning

            – Algorithmic efforts

            – Ongoing Privacy violations

            – Consumer compliance

Delivery methods– three- or six-hour one or two-day onsite
delivery with webinar option available. Scheduling is extremely limited
due to previously scheduled seminars. If you have topic or scheduling
questions, you can call 303-594-1694 or email

Scheduling and Terms– Tuition and travel are prepaid prior
to confirmation of delivery date. Payment methods include credit cards,
PayPal, ACH/wire. Due to the breadth and depth of this seminar, all topics may
not be discussed due to student questions and class interaction. Course topics
or terms may change without notice.


If you have any questions regarding specific content presented or want specific topics or issues addressed, please email or call.

The author and presenter(s) have used their best efforts in preparing this seminar and the programs contained in it. These efforts include the development, research, and testing of the theories and programs to determine their effectiveness. The author and presenter make no warranty of any kind, expressed or implied, with regard to these programs or the documentation contained in this seminar. The author and presenter shall not be liable in any event for incidental or consequential damages in connection with, or arising out of, the furnishing, performance, or use of these programs.


Comments are closed.