Image: Protocol
How to catch a Silicon Valley spy

Good morning! This Thursday, the FBI is warning Silicon Valley companies of insider threats of economic espionage, T-Mobile confirms the cyberattacks and Facebook launches a metaverse meeting tool.
(Was this email forwarded to you? Sign up here to get Source Code every day.)
When FBI special agent Nick Shenkin starts talking about spies in Silicon Valley, he's not describing a James Bond movie or even what people have seen on "The Americans." Instead, he's there to warn the tech sector about something less dramatic, but perhaps more insidious: insider threats of economic espionage and intellectual property theft.
The risk to tech companies is employees being persuaded, or more typically, coerced by foreign autocratic governments into purloining information.
The FBI has been quietly briefing tech about the threat. It has spent a few years withventure firms, startups, academics and tech industry groups that might be of interest to foreign actors. After Protocol heard about the briefings from multiple sources, the FBI agreed to an interview about the content of the briefings and shared its framework, called the "Delta Protocol" (no relation to COVID-19 or this publication), that the agency developed to distribute to startups so they can learn to protect themselves.
It's not your HR department's job to catch a spy. Instead, one way to fight economic espionage is to treat it like a phishing email: Train your employees to spot it, learn their vulnerabilities and install backup security systems to limit the damage if it does happen.
Some companies may be more valuable than others, but at the end of the day, any vulnerability can make a company a target. "If you're a quantum computing company, or a biotech company, or a green tech company, you are a juicier zebra on the Serengeti," Shenkin said. "But they're also going for just the slowest zebra on the Serengeti."
— Biz Carson (email | twitter)
A version of this story appeared today on Protocol.com.
Ransomware victims paid over $416 million worth of cryptocurrency to attackers in 2020, more than quadrupling 2019 totals. As of July 2021, we know that ransomware attackers have taken in at least $210 million worth of cryptocurrency from victims. Shouldn't we just ban crypto? The answer is no. Cryptocurrency is actually instrumental in fighting ransomware.
Huawei is hurting from U.S. sanctions, but chair Guo Ping hasn't lost hope:
Geely's Gan Jiayue can't say when the global chip shortage will subside:
The metaverse only works if it works for everybody, Roblox's Dave Baszucki said, and that's a tall order:
On Protocol | Workplace: A company's "head of remote" will eventually be much more focused on the evolving workplace, GitLab's Darren Murph says:
GlobalFoundries is planning to go public. The chipmaker confidentially filed for an IPO that could value the company at around $25 billion.
Ken Kurson is facing cybercrime charges (again). New York state prosecutors charged the former Trump ally with eavesdropping and computer trespass.
It seems like the more people talk about the metaverse, the more puzzling it gets. How can going to a concert online really feel like it would in person? How can an avatar of ourselves try on clothes just like we would at a store?
Sure, there are nonfiction books about all this. But to make it make sense, look to the science-fiction novels that painted a picture of this world before Silicon Valley tried to make it a reality. Goodreads lists over a 100 books about the topic, from "Otaku" by Chris Kluwe to "The Private Eye" by Brian Vaughan, that take you into every possible corner of the metaverse, and, hopefully, help you see the future of tech more clearly.
The key to tackling ransomware is disrupting the ransomware supply chain — developers, affiliates, infrastructure services providers, launderers and cashout points — and the blockchain is the only data source that ties these actors together. So while it may seem counterintuitive at first, ransomware groups' use of cryptocurrency for ransom payments is actually beneficial to ransomware investigations.
Are you tired of explaining the tech news of the day to your co-workers every morning? Let us do the heavy lifting and refer them to Source Code.
Send them your referral link via Slack, text, email or carrier pigeon and we'll send you your very own Protocol mug after you refer five friends!
Your referral link:*|RH_REFLINK|*
Thoughts, questions, tips? Send them to sourcecode@protocol.com, or our tips line, tips@protocol.com. Enjoy your day, see you tomorrow.
Correction: We made an update in yesterday's newsletter to reflect changes in Bloomberg's reporting about Palantir accepting gold as payment.
To give you the best possible experience, this site uses cookies. If you continue browsing. you accept our use of cookies. You can review our privacy policy to find out more about the cookies we use.