Asymmetric Winning

Asymmetric Winning

Share this post

Asymmetric Winning
Asymmetric Winning
When Foreign Spies Target You: How Ordinary People Become Unwitting Assets

When Foreign Spies Target You: How Ordinary People Become Unwitting Assets

Karim Hijazi's avatar
Karim Hijazi
Jun 28, 2025
∙ Paid
2

Share this post

Asymmetric Winning
Asymmetric Winning
When Foreign Spies Target You: How Ordinary People Become Unwitting Assets
Share

Most people think espionage only happens in movies or involves high-ranking officials with classified documents. The reality is far more unsettling: foreign intelligence services routinely target everyday citizens, turning unsuspecting individuals into sources of information or tools for broader operations. Understanding these tactics isn't just academic—it's essential for protecting yourself, your workplace, and your country.

Why You're More Valuable Than You Think

Modern espionage isn't just about stealing state secrets. Nation-state actors need three things: access, information, and influence. You might provide any of these without realizing it.

The Access You Provide: Your job at a defense contractor, university, or tech company gives you building access, computer credentials, and knowledge of internal processes. Even as a janitor, you can observe who meets with whom, what documents are left on desks, and when security is lightest.

The Information You Hold: Your LinkedIn profile reveals your company's organizational structure. Your social media posts show when executives travel. Your casual conversations at conferences expose strategic priorities. Individually, these seem insignificant—collectively, they paint a detailed intelligence picture.

The Influence You Wield: Foreign agents don't just want what you know; they want what you can do. Can you recommend vendors? Influence hiring decisions? Access certain databases? Introduce people to colleagues? These everyday professional activities become powerful tools in the wrong hands.

How Nation-State Actors Find and Target You

The Digital Dragnet

Foreign intelligence services don't randomly approach people. They use sophisticated targeting methods that begin with your digital footprint.

Social media platforms become intelligence gold mines. An adversary's analysts scan LinkedIn for employees at target companies, noting job titles, connections, recent promotions, and posted content. They cross-reference this with Facebook posts showing personal interests, family situations, financial pressures, or political views. Twitter reveals your opinions and who influences your thinking.

Consider "Sarah," a cybersecurity analyst at a major defense contractor. Her LinkedIn showed her recent promotion, her conference presentations on network vulnerabilities, and her connections to senior engineers. Her Instagram revealed her expensive hobby of competitive horseback riding, suggesting financial pressures from a middle-class salary. Her Twitter showed frustration with her company's slow promotion process. To a foreign intelligence service, Sarah became a prime target: valuable access, potential financial motivation, and existing grievances to exploit.

Keep reading with a 7-day free trial

Subscribe to Asymmetric Winning to keep reading this post and get 7 days of free access to the full post archives.

Already a paid subscriber? Sign in
© 2025 Karim Hijazi
Privacy ∙ Terms ∙ Collection notice
Start writingGet the app
Substack is the home for great culture

Share