2- FOREIGN OR DOMESTIC COMPETITORS

A frequent scenario is one in which an employee leaves his company and goes to work for the competitor, taking proprietary information with him.

3- THROUGH UNWITTING ACCOMPLICES

Sometimes persons who want to collect information in cyberspace through economic espionage try to find a way into opportunities in which they can collect critical information. Another poly is to create situations in cyberspace which the employees of a targeted company can be included to give their information away, in the mistaken belief that the individuals requesting the information have been properly authorized to receive it[1].

4- FROM FOREIGN INTELLIGENCE SERVICES

Intelligence services have professional specialists in the techniques of collecting secret information from cyberspace which they can use of their abilities for economic espionage.

5- THE INSIDER TREAT

Most of the people imagine espionage as a special agent with horrible equipment; but in reality espionage happen by an ordinary employee inside the company who approaches an outsider to sell his organization secrets.

Three surveys conducted between 1988 and 1994 by the American Society of Industrial Security determined that approximately 75 percent of all reported incident of cyberspace economic espionage were attributable to employee or former employees with access to sensitive information. The figure for losses attributable to vendors, consultants, joint venture partners and subcontractors was at that time just 15 percent, but by 1999 a similar survey identified on-site contractor employees and original equipment manufacturers as the main source of concern for U.S companies[2].

IN CONTINUE........


[1] Lewis. e. Jonathan (2008), The economic espionage act and the threat of chinese espionage in the united states
[2]Annual Report to Congress on Foreign Economic Collection and Industrial Espionage-2005(2006) published by the office of the national counterintelligence executive.