An
attacker gets a job in order to gain insider access to a facility. Examples
include getting a maintenance job by under-bidding opponents and then
stealing and selling inside information to make up for the cost difference,
the planting of spies in intelligence agencies of competitors, and other
similar sorts of moles.
Complexity: This issue is as complex as the general
problem of insider attacks. It appears to be uncharacterizable
mathematically, but may be modeled by statistical techniques.
fc@red.a.net