Chapter 10

Personnel Security

Introduction

As the Haephrati case discussed in Chapter 1 illustrates, the theft of trade secrets and other intellectual property has expanded beyond classic industrial age espionage (largely focused on the turning of insiders) to include information age espionage (e.g., hacking into networks or using targeted malware). And it is also true, as has been previously noted, that the severity of the insider threat is often disproportionately emphasized in relation to the severity of the outsider threat.

Nevertheless, much illegal activity, particularly in the arenas of economic espionage and trade secret theft, is still predicated on, or instigated by, insiders of one kind or another. Furthermore, this is true regardless ...

Get Secrets Stolen, Fortunes Lost now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.