7/30/2023 0 Comments Modern espionage techniquesAs of this writing, one can easily purchase small portable devices capable of holding 10TB or more of data.įigure 7.3 Low-tech espionage is portable. These drives can plug into any USB port and store a tremendous amount of data. And the new USB flash drives, smaller than your average key chain, are a dream come true for corporate spies. Even disgruntled employees who wish to undermine the company or make a profit for themselves will find it easier to burn a wealth of data onto a CD and carry that out in their coat pocket rather than attempt to photocopy thousands of documents and smuggle them out. This technology can include using universal serial bus (USB) flash drives, compact discs (CDs), or other portable media to take information out of the organization. Some incidents of industrial espionage are conducted with technology that requires little skill on the part of the perpetrator, as illustrated in Figures 7.2 and 7.3. Whatever the motive, any organization has to be cognizant of the fact that it has any number of employees who may be unhappy with some situation and have the potential to divulge confidential information.Ĭertainly, one can obtain information without the benefit of modern technology however, computer technology (and various computer-related tactics) can certainly assist in corporate espionage, even if only in a peripheral manner. Others may elect to reveal company secrets merely because they are angry about some injustice (real or imagined). Some engage in such acts for obvious financial gains. Just as with military and political espionage, the employees’ motives for divulging information vary. A corporate spy need not hack into a system in order to obtain sensitive and confidential information if an employee is willing to simply hand over the information. In fact, whether the method used is technological or not, disgruntled employees are the single greatest security risk to any organization. Disgruntled former (or current) employees can copy sensitive documents, divulge corporate strategies and plans, or perhaps reveal sensitive information. Low-Tech Industrial EspionageĬorporate espionage can occur without the benefit of computers or the Internet. There are also other technological methods we will discuss. The second, more technology-oriented method is for individuals to use spyware, which includes the use of cookies and key loggers. An easy, low-technology avenue would be for current or former employees to simply take the data or for someone to use social engineering methods (discussed in Chapter 3, “Cyber Stalking, Fraud, and Abuse”) to extract data from unsuspecting company employees. There are two ways that espionage can occur. Learn More Buy How Does Espionage Occur? Computer Security Fundamentals, 5th Edition
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |