top of page
Animated Logo.gif

Shinobi Enterprises

Detect. Counter. Prevent

Michrophone in hotel wall in China_edited.jpg

Microphone in Beijing hotel of U.S. aerospace executive.

 Shinobi offers confidential consulting and training with specific and in-depth expertise on China's domestic environment, national security, and commercial espionage operations and tactics.

China’s recruitment incentives, covert communications techniques, information objectives, technology acquisition strategies, covert influence practices, and negotiating tactics are all unique. Shinobi has over 30 years working specifically on these topics.  This knowledge is captured in the most extensive database and training program in the world.

While there are many other experts that can provide general information on insider threats and best practices to secure your business, Shinobi has only one focus: China’s national security, industrial, economic espionage, and covert influence operations and tactics.

Custom Training

All of Shinobi's courses are offered online or on-site. Our training can be tailored to address threats to specific industries drawing on 30 years of experience and data from over 825  Chinese national security and commercial espionage cases.  Our course Chinese Intelligence: Operations and Tactics  is the first of its kind  (and the only one online)  with 12 hours of self-paced instruction based on detailed information and analysis. 

Shinobi provides specialized consulting services on Chinese negotiating tactics and insider threats to help you safely conduct business with or even in China.

Shinobi delivers reports and background papers specific to your organization on China's domestic security environment, espionage practices, and the best practices for preventing Insider threats.  We provide pre-business screening of Chinese companies and board members. More than one company has remarked how this service changed the course of their business plans.

14991476_1138627159524689_744958590000349928_o.jpg

China's military advances through technology theft.

4.png

Clients include

Fortune 50 companies, research institutes, the US Department of Defense, the Intelligence Community, and foreign governments.

bottom of page