More from the article...
... At the same time, I had already applied for a janitorial position at a local police department to steal credentials for logging into the National Criminal Information Center (NCIC).
A year later, I obtained employment with a private security company and used it to gain physical access to the networks of a mainstream clothing company at their financial division's office. Then, I moved on to backdooring a local television network and ended up sabotaging their Voice over Internet Protocol (VoIP) servers, taking them offline from inside their server room.
As an insider threat, I knew each facility's internal and external layout, had physical and remote access to its CCTVs, and could erase and replace footage copied from previous shifts.
I could copy RFID access badges for privilege escalation as I seamlessly bypassed access controls. I had intimate knowledge of the daily routines of all these businesses, the names and faces of contractors and employees, and bugged virtually every computer system on their networks.
This meant I could enable microphones and web cameras at each workstation and eavesdrop on their daily operations, scrub each system for credentials, and even sell proprietary information to competitors " if that was my goal.
Put simply, I was an insider threat and the last person you'd ever suspect of criminal mischief. This was my lifestyle. As a consequence, I was secretly the worst employee in human history.
As for you, if you were unfortunate enough to buy into my charm and hire me, your business and network fell under my control. ...