Chapter 10

Personnel Security

Introduction

As the Haephrati case discussed in Chapter 1 illustrates, the theft of trade secrets and other intellectual property has expanded beyond classic industrial age espionage (largely focused on the turning of insiders) to include information age espionage (e.g., hacking into networks or using targeted malware). And it is also true, as has been previously noted, that the severity of the insider threat is often disproportionately emphasized in relation to the severity of the outsider threat.

Nevertheless, much illegal activity, particularly in the arenas of economic espionage and trade secret theft, is still predicated on, or instigated by, insiders of one kind or another. Furthermore, this is true regardless ...

Get Secrets Stolen, Fortunes Lost now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.