First page Back Continue Last page Summary Graphics
Closed source
Professional thieves for economic rivals
- Open source doesn't fill in the whole matrix
- Augment open source with less legal methods
- Plant bugging devices in cell phones, brief cases, apparel, conference rooms, etc.
- Extort after illicit affair with agent at conference
- Steganographic exfiltration over computer networks using Trojans in software upgrades for collection
- Have an agent hired in to provide assistance in external access
Notes: