Unwitting Collaborators, Part 2: Identity Theft and Impersonation
Introduction
Gathering information on your competitors is a fact of life in business. And you can bet they do the same to you. But when probing your information network for corporate espionage turns to criminal use of your network to gain access to sensitive information, such intrusions can help malicious individuals or organizations facilitate attacksboth virtual and physicalon our nation's infrastructure.
The problem is that gaining access to your network is easier than you think. It could happen with as little as one phone call.