Slide Show: 8 Egregious Examples Of Insider Threats

Real-world case studies from the CERT Insider Threat Center

Dark Reading logo in a gray background | Dark Reading

Already have an account?

A manufacturing firm that was having a hard time designing a process to produce a certain widget had a dastardly idea -- why not spy on a customer it knew produced a similar type of product by asking for a visit to that company's manufacturing floor to "inspect" equipment on customer premises. The manufacturing company sent two employees, one as lookout and the other as a photographing spy, to take pictures of the customer's manufacturing operation with a cell phone. The employees were successful in spite of security policies around that area that should have kept the spies from walking around without escort or carrying cameras.

"No matter how good your security is, it's only as good as how well it is enforced," Cappelli says.

Photo Credit: stock.xchng

About the Author

Ericka Chickowski, Contributing Writer

Ericka Chickowski specializes in coverage of information technology and business innovation. She has focused on information security for the better part of a decade and regularly writes about the security industry as a contributor to Dark Reading.

Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

You May Also Like


More Insights