• Skip to main content
  • Skip to secondary menu
  • Skip to primary sidebar
  • Skip to footer
  • Home
  • About
    • Our Mission
      • Political Islam
    • Areas of Expertise
      • Economic Warfare
        • Cyber Security
      • U.S. Policy
      • Anti-Corruption
      • Foreign Election Observing
      • Supporting Free Speech
        • Legislation
      • Impact of ACD’s Work
      • Free Speech Celebration, U.S. Senate
    • Board of Directors & Advisors
    • Our Team
    • Contact Us
    • Subscribe
  • Our Impact
    • Endorsements
    • Additional Praise
  • Media
    • Recent Interviews
    • Events
      • Coming Events
    • Radio
    • Television
    • Rumble / Youtube
  • Publications
    • All Posts Archive
    • ACD Presentations
    • Articles
    • Books
    • Papers
    • Recommended Readings
  • Free Speech
    • Legislation & Support
    • Impact of ACD’s Work
      • FREE SPEECH Act Celebration, U.S. Senate, September 20, 2010
      • Some Congressional Testimonies
  • Economic warfare
    • The Impact of Purposeful Interference on U.S. Cyber Interests
    • Cyber/Space, EMP Insecurity- Current and Future Threats
    • The Existential EMP Threat
    • New Strategies to Secure U.S. Economy from Cyber Attacks
    • Economic Warfare Subversions July 9, 2012
    • CyberSpace Security – Papers And Articles
    • Cyber Security
    • Da’esh “lite” North America Islamist – Sources
    • The Muslim Brotherhood and Da’esh “Lite” in North America
  • Support ACD
    • Donate
    • Subscribe
    • Contact
American Center for Democracy

American Center for Democracy

  • facebook
  • twitter
  • youtube
  • linkedin
  • Free Speech
  • U.S. Policy
    • U.S. Foreign Policy
  • Political Islam
    • Canada
    • Hamas
    • Iran
    • Islam
    • Muslim Brotherhood
    • Palestinian
    • United States
  • Narco-Terrorism
  • Middle East Conflicts
    • Iran
    • Israel
  • Global Conflicts
    • China
    • North Korea
    • Russia
    • Ukraine
  • Soros
You are here: Home / ACD/EWI Blog / Cyber Security And The Second Oldest Profession

Cyber Security And The Second Oldest Profession

February 7, 2013 by Rachel Ehrenfeld

The Federal Reserve’s internal computer systems’ recent hacking was attributed to “a temporary vulnerability in a website vendor product.” Perhaps.

Likewise, hacking into U.S. government agencies , American industries, financial institution, universities and media, are most often attributed to the vulnerabilities and deficiencies of existing security systems. This in turn creates the impression that the U.S. is loosing its technological edge.

True or false, such impressions cause further damage the U.S. economy.  However, a major contributing factor to the surge of cyber attacks on the U.S., the human factor, seems to be overlooked.

What’s Yours Is Mine: How Employees are Putting Your Intellectual Property at Risk, a survey published by California-based Symantec,  shows that “most employees don’t worry much about the security of corporate data — and many of them are just fine with stealing it.”

The report’s findings highlighted that

“*  50 percent of employees who left or lost their jobs in the last year have kept confidential corporate data, and 40 percent of them admitted to planning to use that content in their new jobs.

*  56 percent of employees don’t believe it’s a crime to use a competitor’s trade secret information.

*  44 percent think that a software developer who develops source code for a company has some ownership in his or her work and inventions.

42 percent don’t believe it’s a crime to reuse those source codes, without permission, in projects for other companies.”

Ironically, Symantec’s recommendations focus on technical issues, such as, enhanced employee education, stricter enforcement of non-disclosure agreements and employment of advanced protection and monitoring technology, leaving the most important contributing factor — the accountability of the employee — untouched.

Yet, as the survey demonstrated, the quality of security system depends on the people who manage it, not only the machines.

Growing economic uncertainty and declining commitment between the employee and the company, creates perfect opportunities to buy/sell information and access.

We accept the notion that commercial competitors are scouting for such opportunities, but seem reluctant acknowledge similar and most likely better funded recruiting activity by enemies such as China, Iran and others.

Lest we forget, economic incentives have long led to spying, the second oldest profession.

Further Readings: 

1.  REPORT: EMPLOYEES THE BIGGEST THREAT TO CYBERSECURITY 

2. BUSINESSES OVERCONFIDENT ABOUT CYBER SECURITY, SAYS DELOITTE 

3. CYBERSECURITY STARTS AT THE BOTTOM OF THE TOTEM POLE 

4. TOP CYBERSECURITY CONCERNS: MALICIOUS CODE,EMPLOYEES RUN  AMOK

5. The Alarming Trend of Cybersecurity Breaches and Failures in the U.S. Government Continue  

Filed Under: ACD/EWI Blog, ACD/EWI Exclusive, Cyber

Primary Sidebar

Spotlight

website capture islamist incitement quote by j.woolsey obama signing Rachel's law chemical terrorism transportation terrorism nuclear threats on the rise winning the cyberwar gps concepts and misconceptions libel tourism

Search ACD

Recent Appearances

[9/29/2025] The Shilling Show

[9/2/2025] Wake Up Patriots

[8/29/2025] Decoding Soros

[5/1/2025] National Talk Radio with Shawn Moore

[3/11/2025] Shaun Thompson Interview

[3/10/2025] Larry Conners Interviews Rachel Ehrenfeld

[2/3/2025] The Truth About George Soros - Grey Matter Podcast

[1/22/2025] Fighting Terrorism Funding - SAM Podcast

[1/8/2025] COUNTER NARRATIVE Interview on PATRIOT.TV

[10/2/2024] The Shaun Thompson Show: Dr. Rachel Ehrenfeld

[9/30/2024] Counter Narrative: Soros Power Grab: Media Takeover & Election Manipulation |

See All Appearances

The Soros Agenda

g. soros

Soros: The Man Who Would Be Kingmaker, Part I

Rachel Ehrenfeld & Shawn Macomber

Soros: The Man Who Would Be Kingmaker, Part II

Soros: The Man Who Would be Kingmaker, Part III

Soros: The Man Who Would be Kingmaker, Part IV

More about Soros...
ORDER THE SOROS AGENDA →
Buy The Soros Agenda

Tags

antisemitism Caliphate Canada capital punishment China Christians Daniel Haqiqatjou Dawah Disinformation genocide Hamas Iran ISIS Islam Islamic Party of Ontario Islamic Relief Canada Islamic Relief Worldwide Islamization Islamophobia Israel J. Millard Burr Jews jihad Justin Trudeau LGBT liberalism Muslim Brotherhood Muslims NCCM Norman Bailey Palestine Political Islam Quran Russia Salaheddin Islamic Centre Saudi Arabia Sharia Sol W. Sanders SOROS Syria Terrorism Toronto US USA women's rights

Footer

About ACD

ACD is a New York-based 501(c)(3) not-for-profit organization, which monitors and exposes the enemies of freedom and their modus operandi, and explores pragmatic ways to counteract their methods.

Endorsements

"The ACD/EWI ability to predict future threats is second to none"

- R. James Woolsey, former Director of Central Intelligence

- - - More Endorsements - - -

Follow ACD!

  • facebook
  • twitter
  • youtube
  • linkedin

Copyright © 2025 | The American Center for Democracy is a 501(c)(3) non-profit organization. Your contribution is tax-deductible to the fullest extent of the law.