First page Back Continue Last page Summary Text
The bad actors who use these tools range from
.the recreational hacker -- who thrives on the thrill and challenge of breaking into anothers computer
... to the national security threat of information warriors intent on achieving strategic advantage.
Common to all threats is the insider. We could spend millions on technology to protect our infrastructures, but a well-placed insider -- whether suborned by an enemy, or a disgruntled employee acting alone -- could render nearly all protection useless.
Hence, the special attention we paid to the insider problem in the Commissions report.