To confirm a competitor was spying via an internal mole, Rippling's team crafted a fake, tantalizing Slack message. They included a screenshot of it in a routine legal letter sent only to the competitor's senior leadership. When their mole searched for the fake terms in Slack, they had definitive proof.

Related Insights

Use one-on-one breakout meetings to gather intel you can't get in a group setting. Ask directly about competitors, pricing, and evaluation status. The private, trusted environment makes stakeholders more likely to share candid details, effectively turning them into your internal informant on the deal.

To evade detection by corporate security teams that analyze writing styles, a whistleblower could pass their testimony through an LLM. This obfuscates their personal "tells," like phrasing and punctuation, making attribution more difficult for internal investigators.

To make ghostwritten content sound authentic, train a custom ChatGPT on an executive's past writing, such as emails or Slack messages. This helps capture their unique voice and tone, making drafts significantly closer to their natural style.

Prediction markets like Polymarket operate in a regulatory gray area where traditional insider trading laws don't apply. This creates a loophole for employees to monetize confidential information (e.g., product release dates) through bets, effectively leaking corporate secrets and creating a new espionage risk for companies.

A sophisticated threat involves state-sponsored actors from the DPRK using AI interview tools and virtual backgrounds to pass hiring processes. They get hired, receive company laptops, and then operate as insider threats, creating a significant and often undetected security risk for organizations.

In a major cyberattack, Chinese state-sponsored hackers bypassed Anthropic's safety measures on its Claude AI by using a clever deception. They prompted the AI as if they were cyber defenders conducting legitimate penetration tests, tricking the model into helping them execute a real espionage campaign.

To find a competitor's real weaknesses, go beyond their marketing. Message their ex-employees on LinkedIn for operational insights and analyze their 1-star G2/Capterra reviews to identify the persistent product flaws that anger customers the most.

To prove unauthorized data use, Reddit created a fake post visible only within Google's search results. When Perplexity's AI incorporated this "honeypot" content, it provided irrefutable evidence that Perplexity was scraping Google for Reddit data against its terms, creating a clever legal strategy for content owners.

When competitors falsely claim your unique features, don't abandon the message. Instead, teach prospects specific questions (e.g., "How many logins are there?") to expose the lie. Customers are delighted to call out vendors on their false claims, which solidifies your position and accelerates the sales cycle.

A key stakeholder within a client account may actively create friction and gaslight your team, not for legitimate business reasons, but to steer the contract towards a competitor where a friend works. This form of psychological warfare can derail renewals despite strong performance.