• Home
  • Latest
  • Fortune 500
  • Finance
  • Tech
  • Leadership
  • Lifestyle
  • Rankings
  • Multimedia
CommentaryCybersecurity

Raytheon CEO: Why Your Own Employees Could Be Your Greatest Threat

By
Thomas A. Kennedy
Thomas A. Kennedy
Down Arrow Button Icon
By
Thomas A. Kennedy
Thomas A. Kennedy
Down Arrow Button Icon
August 14, 2018, 2:13 PM ET

Is there a bounty on your intellectual property?

It’s more likely than you think. Earlier this month, news broke that FBI agents investigating a case of corporate cyber theft seized a handbook revealing what China was willing to pay to “individuals or entities who can provide certain technologies.”

Nation-states have been using cyber hacking to actively target valuable intellectual property, or IP, for years. However, what may be startling to the public is that state-sponsored IP theft is so organized and methodical; criminal hackers receive catalogs of the most-wanted technologies, referred to as “collection requirements,” each with associated bounties.

For business, university, and research lab leaders, it begs a couple of questions: Do any of your employees have such handbooks? And if they were stockpiling and exporting sensitive data, would you know before it was too late?

This most recent cyber theft report is a classic example of what we call the “insider threat,” a term encompassing cyber problems that originate from authorized users of a network. It also demonstrates the increasingly sophisticated tactics bad actors use to steal corporate IP. The employee in this example was accused of smuggling highly sensitive technical documents by placing an encrypted file into the coding of a digital image of a sunset. He then emailed this image to a personal address.

According to the criminal complaint, both federal investigators and corporate IT experts said this was the first time they had seen these types of sophisticated tactics (known as steganographic exfiltration) used to steal corporate IP. This incident is a good reminder that the insider threat—indeed, all cyber threats—continue to adapt and evolve to defeat security measures.

Not all insider threats to your IP are malicious. Some are employees who practice poor cyber hygiene, such as visiting unsafe websites, clicking on links in emails from people they don’t know, or plugging outside USBs into their work computers without confirming those devices aren’t compromised. Any of these activities could introduce a virus or malware into your system, undermining the stoutest network protections.

But sometimes insiders can go rogue, prompted by dissatisfaction, jealousy, greed, or other factors. Earlier this summer, Tesla CEO Elon Musk wrote in a company email that an employee had admitted to “quite extensive and damaging sabotage of our operations.” The employee was upset he had not received a promotion, Musk wrote.

A knowledgeable insider using a new generation of hacking tools could steal terabytes worth of valuable IP in a matter of minutes. This is why, according to Raytheon’s 2018 Study on Global Megatrends in Cybersecurity, IT professionals across the globe are more worried about malicious or criminal insiders (36%) than they are about nation-state attackers (30%) or hacktivists (27%).

A primary step every organization should take to address insider risks is to implement a clear set of policies governing technology usage. For example, not every employee should have access to sensitive IP files. Your IT teams should know which sections of your networks are off-limits and monitor for attempts at inappropriate access. Employees should also be trained and reminded about risky online work behaviors, and how their actions could impact the company.

In addition, organizations need to increasingly take a user-centric approach to cybersecurity. A data-centric approach, which limits who can access what information, may stop unauthorized visitors from downloading sensitive files. But a user-centric focus uses artificial intelligence and other technologies to help identify early-warning signs that an employee has gone rogue and may be trying to collect a bounty on your IP. These programs flag aberrant user behaviors, such as stockpiling documents or sudden changes in the way an employee types on a keyboard, which could indicate that someone has hijacked their credentials.

Your employees and your IP are likely your organization’s most valuable assets. With the help of some proactive policies and technology, you can prevent one asset from stealing the other and hurting your organization’s value, reputation, customers, and employees.

Thomas A. Kennedy is the chairman and CEO of Raytheon, a defense and cybersecurity company.

About the Author
By Thomas A. Kennedy
See full bioRight Arrow Button Icon

Latest in Commentary

Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025

Most Popular

Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Fortune Secondary Logo
Rankings
  • 100 Best Companies
  • Fortune 500
  • Global 500
  • Fortune 500 Europe
  • Most Powerful Women
  • Future 50
  • World’s Most Admired Companies
  • See All Rankings
Sections
  • Finance
  • Fortune Crypto
  • Features
  • Leadership
  • Health
  • Commentary
  • Success
  • Retail
  • Mpw
  • Tech
  • Lifestyle
  • CEO Initiative
  • Asia
  • Politics
  • Conferences
  • Europe
  • Newsletters
  • Personal Finance
  • Environment
  • Magazine
  • Education
Customer Support
  • Frequently Asked Questions
  • Customer Service Portal
  • Privacy Policy
  • Terms Of Use
  • Single Issues For Purchase
  • International Print
Commercial Services
  • Advertising
  • Fortune Brand Studio
  • Fortune Analytics
  • Fortune Conferences
  • Business Development
About Us
  • About Us
  • Editorial Calendar
  • Press Center
  • Work At Fortune
  • Diversity And Inclusion
  • Terms And Conditions
  • Site Map
Fortune Secondary Logo
  • About Us
  • Editorial Calendar
  • Press Center
  • Work At Fortune
  • Diversity And Inclusion
  • Terms And Conditions
  • Site Map
  • Facebook icon
  • Twitter icon
  • LinkedIn icon
  • Instagram icon
  • Pinterest icon

Latest in Commentary

world's fair
CommentaryRobots
Something big is happening in AI, but panic is the wrong reaction
By Peter CappelliFebruary 28, 2026
22 hours ago
putin
CommentaryRussia
Exclusive analysis: we looked at the 400 western firms still in Russia. Their paltry size strips Putin’s bluff bare naked
By Jeffrey Sonnenfeld, Stephen Henriques, Jake Waldinger and Giuseppe ScottoFebruary 27, 2026
2 days ago
roth
CommentaryLeadership
The AI resource reallocation challenge: How can companies capture the value of time?
By Erik RothFebruary 27, 2026
2 days ago
will
CommentaryAdvertising
I’m one of America’s top pollsters and I’ve got a warning for the AI companies: customers aren’t sold on ads
By Will JohnsonFebruary 27, 2026
2 days ago
the pitt
CommentaryDEI
‘The Pitt’: a masterclass display of DEI in action 
By Robert RabenFebruary 26, 2026
3 days ago
david booth
CommentaryMarkets
3 lessons from investing’s ‘moneyball’ moment
By David BoothFebruary 25, 2026
4 days ago

Most Popular

placeholder alt text
Success
Japanese companies are paying older workers to sit by a window and do nothing—while Western CEOs demand super-AI productivity just to keep your job
By Orianna Rosa RoyleFebruary 27, 2026
2 days ago
placeholder alt text
Middle East
Iran is now on 'death ground' amid existential threat from U.S. attacks and could 'go big' in retaliation, former NATO commander warns
By Jason MaFebruary 28, 2026
16 hours ago
placeholder alt text
AI
The week the AI scare turned real and America realized maybe it isn't ready for what's coming
By Nick LichtenbergFebruary 28, 2026
23 hours ago
placeholder alt text
Success
Walmart exec says U.S. workforces needs to take inspiration from China where ‘5 year-olds are learning DeepSeek’
By Preston ForeFebruary 27, 2026
2 days ago
placeholder alt text
Personal Finance
Current price of gold as of February 27, 2026
By Danny BakstFebruary 27, 2026
2 days ago
placeholder alt text
Middle East
Dubai’s worst nightmare unfolds as Iran strikes Gulf neighbors
By Dana Khraiche, Fiona MacDonald and BloombergFebruary 28, 2026
11 hours ago

© 2026 Fortune Media IP Limited. All Rights Reserved. Use of this site constitutes acceptance of our Terms of Use and Privacy Policy | CA Notice at Collection and Privacy Notice | Do Not Sell/Share My Personal Information
FORTUNE is a trademark of Fortune Media IP Limited, registered in the U.S. and other countries. FORTUNE may receive compensation for some links to products and services on this website. Offers may be subject to change without notice.