I wonder how many ex-intelligence-agency counterintelligence people Apply employs. Probably at least a few.
Question for those who've gone through CI training: Do Apple leaks all fit into one of the MICE categories? I don't think there is any new motivation.
(Money, Ideology, Conscience, Ego)
Would be very interested to see what programs they have developed to intentionally generate false but plausible information internally, get it into the hands of specific people or workgroups, and see if/where/how/when it leaks. Usually done for the purpose of identifying specific leakers or compartments that are leaking.
Given the scale/size/financial scope of Apple I would be entirely unsurprised if they had an entire TSCM group recruited from ex-three-letter-agency people and a group of HUMINT experts functionally equivalent to CI, but with a different name.
Question for those who've gone through CI training: Do Apple leaks all fit into one of the MICE categories? I don't think there is any new motivation.
(Money, Ideology, Conscience, Ego)
Would be very interested to see what programs they have developed to intentionally generate false but plausible information internally, get it into the hands of specific people or workgroups, and see if/where/how/when it leaks. Usually done for the purpose of identifying specific leakers or compartments that are leaking.