{"id":6448,"date":"2025-10-29T00:18:28","date_gmt":"2025-10-28T13:48:28","guid":{"rendered":"https:\/\/www.orderoo.com.au\/blog\/?p=6448"},"modified":"2025-10-29T00:20:16","modified_gmt":"2025-10-28T13:50:16","slug":"when-love-isnt-just-love-how-human%e2%80%91espionage-is-morphing-and-what-it-means-for-tech","status":"publish","type":"post","link":"https:\/\/www.orderoo.com.au\/blog\/when-love-isnt-just-love-how-human%e2%80%91espionage-is-morphing-and-what-it-means-for-tech\/","title":{"rendered":"When Love Isn\u2019t Just Love: How Human\u2011Espionage Is Morphing And What It Means For Tech"},"content":{"rendered":"\n<p>According to a recent report by <a href=\"https:\/\/www.thetimes.com\/us\/american-politics\/article\/silicon-valley-spy-china-russia-2v03676kl\" target=\"_blank\" rel=\"noreferrer noopener\">The Times<\/a>, foreign intelligence services are deploying increasingly sophisticated human espionage tactics to access technology secrets, especially in innovation hubs like Silicon Valley. Rather than relying solely on cyberattacks or technical surveillance, agencies in countries such as China and Russia are allegedly sending operatives to develop personal, romantic, and even marital relationships with individuals in the tech industry.<\/p>\n\n\n\n<p>This method, often referred to as &#8220;honeypotting,&#8221; isn&#8217;t new. But what&#8217;s changing is its scale, subtlety, and the evolving landscape of global tech competition that makes such tactics alarmingly effective. One source quoted by The Times described cases where individuals formed long-term relationships, even having children, while covertly collecting sensitive business or strategic intelligence.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">From Malware to Marriages: The Shift from Code to Connection<\/h3>\n\n\n\n<p>Concerns about non-traditional espionage tactics in the tech sector are not entirely new. In October 2024, <a href=\"https:\/\/abcnews.go.com\/US\/top-us-official-warns-large-uptick-foreign-spies\/story?id=115229723\" target=\"_blank\" rel=\"noreferrer noopener\">ABC News<\/a> reported that Michael Casey, Director of the U.S. National Counterintelligence and Security Center, had warned of a &#8220;large uptick&#8221; in foreign spies attempting to infiltrate American technology companies. His warning emphasized that adversaries were increasingly targeting not just networks and servers, but people and relationships within the innovation ecosystem.<\/p>\n\n\n\n<p>While traditional cyberattacks remain a serious threat, Casey&#8217;s remarks highlighted how adversaries are evolving their methods\u2014leveraging social connections, business affiliations, and even personal relationships to gain strategic access. This broader infiltration strategy aligns closely with more recent reports from <a href=\"https:\/\/www.thetimes.com\/us\/american-politics\/article\/silicon-valley-spy-china-russia-2v03676kl\" target=\"_blank\" rel=\"noreferrer noopener\">The Times<\/a> and <a href=\"https:\/\/www.firstpost.com\/explainers\/sex-warfare-russian-chinese-spies-us-techies-stealing-silicon-valley-secrets-13944778.html\" target=\"_blank\" rel=\"noreferrer noopener\">Firstpost<\/a>, which outline the use of romantic entanglements and long-term personal relationships as vehicles for human intelligence gathering.<\/p>\n\n\n\n<p>In today&#8217;s startup-driven economy, where founders, developers, and investors frequently intermingle across both personal and professional settings, such vulnerabilities are especially pronounced. Networking events, informal meetings, and collaborative spaces foster creativity\u2014but they also create fertile ground for social engineering. What might begin as a coffee chat or mentorship opportunity can gradually evolve into deeper access to sensitive information.<\/p>\n\n\n\n<p>This trust-rich environment, though central to innovation, has become a subtle but significant gateway for foreign operatives.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">The Concept of Relational Vulnerability<\/h3>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"683\" src=\"https:\/\/www.orderoo.com.au\/blog\/wp-content\/uploads\/2025\/10\/Relational-vulnerability-1024x683.png\" alt=\"Illustration of a man and woman shaking hands in a professional setting while another woman looks at her phone; background silhouettes and a city skyline suggest a networking event, symbolizing how informal business interactions can create unseen vulnerabilities.\" class=\"wp-image-6452\" srcset=\"https:\/\/www.orderoo.com.au\/blog\/wp-content\/uploads\/2025\/10\/Relational-vulnerability-1024x683.png 1024w, https:\/\/www.orderoo.com.au\/blog\/wp-content\/uploads\/2025\/10\/Relational-vulnerability-300x200.png 300w, https:\/\/www.orderoo.com.au\/blog\/wp-content\/uploads\/2025\/10\/Relational-vulnerability-768x512.png 768w, https:\/\/www.orderoo.com.au\/blog\/wp-content\/uploads\/2025\/10\/Relational-vulnerability.png 1536w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>Relational vulnerability in professional settings: trust formed through everyday networking can become a subtle entry point for espionage.<\/em><\/figcaption><\/figure>\n\n\n\n<p>One unique lens through which to view this trend is what some experts call &#8220;relational vulnerability.&#8221; It&#8217;s the idea that personal trust, not just digital security, becomes the breach point. For example, a tech executive dating someone they met through a business accelerator may unknowingly share sensitive information over time, from strategic plans to investor interests.<\/p>\n\n\n\n<p>This isn&#8217;t about paranoia; it&#8217;s about understanding that the nature of espionage has evolved. It no longer solely involves spies in trench coats tapping phones or bugging offices. Instead, it might involve a helpful advisor who becomes a friend, then a confidante, then something more.<\/p>\n\n\n\n<p>According to <a href=\"https:\/\/www.firstpost.com\/explainers\/sex-warfare-russian-chinese-spies-us-techies-stealing-silicon-valley-secrets-13944778.html\" target=\"_blank\" rel=\"noreferrer noopener\">Firstpost<\/a>, these operatives are trained to exploit Western cultural openness, especially the lack of scrutiny surrounding personal relationships in professional environments. Unlike formal vetting processes for business deals or tech partnerships, most people don&#8217;t apply similar due diligence to personal relationships.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Why This Works So Well<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Trust bypasses controls<\/strong>: Human relationships provide access to unfiltered conversations, strategy insights, and behind-the-scenes dynamics.<\/li>\n\n\n\n<li><strong>Western norms don\u2019t expect it<\/strong>: As noted by The Times, Western culture and regulation often avoid monitoring personal relationships, creating blind spots.<\/li>\n\n\n\n<li><strong>It\u2019s harder to detect<\/strong>: Unlike data exfiltration, information leaked through conversations or influence is harder to trace.<\/li>\n\n\n\n<li><strong>Slow, steady intel gathering<\/strong>: Instead of one-time breaches, these relationships offer drip-fed access to sensitive knowledge over time.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">What Startups and Tech Professionals Should Do<\/h3>\n\n\n\n<p><strong>1. Treat relationships as part of the threat model<\/strong>: Especially for founders and C-suite leaders, it\u2019s important to consider who has access to informal or non-public company information.<\/p>\n\n\n\n<p><strong>2. Foster a culture of trust hygiene<\/strong>: This doesn&#8217;t mean being suspicious of everyone, but it does mean being aware of how much is shared casually with new acquaintances.<\/p>\n\n\n\n<p><strong>3. Apply informal vetting<\/strong>: Just as you might screen a new business partner or investor, consider doing informal checks when someone becomes a frequent presence in strategic conversations or personal spaces.<\/p>\n\n\n\n<p><strong>4. Educate staff<\/strong>: Without creating fear, teams should understand that foreign espionage today doesn\u2019t just involve hacking \u2014 it might involve social engineering through friendships or relationships.<\/p>\n\n\n\n<p><strong>5. Maintain separation of concerns<\/strong>: Especially in early-stage companies where roles blur, make conscious efforts to keep strategic information in protected channels and limit its casual spread.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">A Unique Take: Social Capital as a Vector<\/h3>\n\n\n\n<p>While most coverage of espionage focuses on either cybersecurity or geopolitical intrigue, the under-discussed issue is how social capital becomes a new kind of vulnerability. Founders, advisors, even influencers within tech ecosystems trade heavily on access, introductions, and informal relationships.<\/p>\n\n\n\n<p>These networks, rich in goodwill, are now being targeted not to steal passwords but to extract insight, influence decisions, or build long-term leverage. It\u2019s not just code that needs guarding \u2014 it\u2019s conversations, contacts, and communities.<\/p>\n\n\n\n<p>As the <a href=\"https:\/\/www.orderoo.com.au\/blog\/category\/tech-innovation\/\" target=\"_blank\" rel=\"noreferrer noopener\">tech<\/a> world continues to globalize, and as emerging technologies become central to national strategies, this softer form of espionage will likely increase. The burden isn&#8217;t just on governments to respond, but on companies and individuals to recognize that in the world of high-stakes <a href=\"https:\/\/www.orderoo.com.au\/blog\/tesla-fsd-supervised-launches-in-australia-and-new-zealand-a-milestone-for-autonomous-driving-down-under\/\" target=\"_blank\" rel=\"noreferrer noopener\">innovation<\/a>, even love can be weaponized.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Final Thought<\/h3>\n\n\n\n<p>As The Times reported, the era of romantic and social infiltration is already here. In a business culture that prizes openness, ambition, and human connection, the next breach may not come through a compromised server but a compromised trust. Being human doesn&#8217;t mean being naive. A bit of awareness may go a long way.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>According to a recent report by The Times, foreign intelligence services are deploying increasingly sophisticated human espionage tactics to access technology secrets, especially in innovation hubs like Silicon Valley. Rather than relying solely on cyberattacks or technical surveillance, agencies in countries such as China and Russia are allegedly sending operatives to develop personal, romantic, and [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":6450,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_themeisle_gutenberg_block_has_review":false,"footnotes":""},"categories":[1],"tags":[212],"class_list":["post-6448","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-misc","tag-featured"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.0 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How Human Espionage Is Targeting Tech Through Relationships<\/title>\n<meta name=\"description\" content=\"Foreign spies are using romance and trust to infiltrate tech firms. Discover how human espionage exploits social networks in today\u2019s innovation economy.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.orderoo.com.au\/blog\/when-love-isnt-just-love-how-human\u2011espionage-is-morphing-and-what-it-means-for-tech\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How Human Espionage Is Targeting Tech Through Relationships\" \/>\n<meta property=\"og:description\" content=\"Foreign spies are using romance and trust to infiltrate tech firms. Discover how human espionage exploits social networks in today\u2019s innovation economy.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.orderoo.com.au\/blog\/when-love-isnt-just-love-how-human\u2011espionage-is-morphing-and-what-it-means-for-tech\/\" \/>\n<meta property=\"og:site_name\" content=\"Orderoo Blog\" \/>\n<meta property=\"article:published_time\" content=\"2025-10-28T13:48:28+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-10-28T13:50:16+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.orderoo.com.au\/blog\/wp-content\/uploads\/2025\/10\/When-love-isnt-love-1024x683.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"683\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Ankush\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Ankush\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.orderoo.com.au\/blog\/when-love-isnt-just-love-how-human%e2%80%91espionage-is-morphing-and-what-it-means-for-tech\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.orderoo.com.au\/blog\/when-love-isnt-just-love-how-human%e2%80%91espionage-is-morphing-and-what-it-means-for-tech\/\"},\"author\":{\"name\":\"Ankush\",\"@id\":\"https:\/\/www.orderoo.com.au\/blog\/#\/schema\/person\/32ec5f114d8c2519336f5eb6af57830b\"},\"headline\":\"When Love Isn\u2019t Just Love: How Human\u2011Espionage Is Morphing And What It Means For Tech\",\"datePublished\":\"2025-10-28T13:48:28+00:00\",\"dateModified\":\"2025-10-28T13:50:16+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.orderoo.com.au\/blog\/when-love-isnt-just-love-how-human%e2%80%91espionage-is-morphing-and-what-it-means-for-tech\/\"},\"wordCount\":932,\"publisher\":{\"@id\":\"https:\/\/www.orderoo.com.au\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.orderoo.com.au\/blog\/when-love-isnt-just-love-how-human%e2%80%91espionage-is-morphing-and-what-it-means-for-tech\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.orderoo.com.au\/blog\/wp-content\/uploads\/2025\/10\/When-love-isnt-love.png\",\"keywords\":[\"Featured\"],\"articleSection\":[\"Misc\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.orderoo.com.au\/blog\/when-love-isnt-just-love-how-human%e2%80%91espionage-is-morphing-and-what-it-means-for-tech\/\",\"url\":\"https:\/\/www.orderoo.com.au\/blog\/when-love-isnt-just-love-how-human%e2%80%91espionage-is-morphing-and-what-it-means-for-tech\/\",\"name\":\"How Human Espionage Is Targeting Tech Through Relationships\",\"isPartOf\":{\"@id\":\"https:\/\/www.orderoo.com.au\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.orderoo.com.au\/blog\/when-love-isnt-just-love-how-human%e2%80%91espionage-is-morphing-and-what-it-means-for-tech\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.orderoo.com.au\/blog\/when-love-isnt-just-love-how-human%e2%80%91espionage-is-morphing-and-what-it-means-for-tech\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.orderoo.com.au\/blog\/wp-content\/uploads\/2025\/10\/When-love-isnt-love.png\",\"datePublished\":\"2025-10-28T13:48:28+00:00\",\"dateModified\":\"2025-10-28T13:50:16+00:00\",\"description\":\"Foreign spies are using romance and trust to infiltrate tech firms. Discover how human espionage exploits social networks in today\u2019s innovation economy.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.orderoo.com.au\/blog\/when-love-isnt-just-love-how-human%e2%80%91espionage-is-morphing-and-what-it-means-for-tech\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.orderoo.com.au\/blog\/when-love-isnt-just-love-how-human%e2%80%91espionage-is-morphing-and-what-it-means-for-tech\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.orderoo.com.au\/blog\/when-love-isnt-just-love-how-human%e2%80%91espionage-is-morphing-and-what-it-means-for-tech\/#primaryimage\",\"url\":\"https:\/\/www.orderoo.com.au\/blog\/wp-content\/uploads\/2025\/10\/When-love-isnt-love.png\",\"contentUrl\":\"https:\/\/www.orderoo.com.au\/blog\/wp-content\/uploads\/2025\/10\/When-love-isnt-love.png\",\"width\":1536,\"height\":1024,\"caption\":\"Illustration of a couple talking in the foreground with a shadowy figure in a trench coat and hat lurking behind them, symbolizing hidden espionage. Text on the left reads: 'WHEN LOVE ISN\u2019T LOVE.' Set against a deep blue background, the image conveys the theme of romantic deception used in modern spy tactics.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.orderoo.com.au\/blog\/when-love-isnt-just-love-how-human%e2%80%91espionage-is-morphing-and-what-it-means-for-tech\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.orderoo.com.au\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"When Love Isn\u2019t Just Love: How Human\u2011Espionage Is Morphing And What It Means For Tech\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.orderoo.com.au\/blog\/#website\",\"url\":\"https:\/\/www.orderoo.com.au\/blog\/\",\"name\":\"Orderoo Blog | On Demand Services Updates\",\"description\":\"Discover, Learn, and Explore\",\"publisher\":{\"@id\":\"https:\/\/www.orderoo.com.au\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.orderoo.com.au\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.orderoo.com.au\/blog\/#organization\",\"name\":\"Orderoo Blog | On Demand Services Updates\",\"url\":\"https:\/\/www.orderoo.com.au\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.orderoo.com.au\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.orderoo.com.au\/blog\/wp-content\/uploads\/2023\/06\/cropped-aSDasdASD.png\",\"contentUrl\":\"https:\/\/www.orderoo.com.au\/blog\/wp-content\/uploads\/2023\/06\/cropped-aSDasdASD.png\",\"width\":200,\"height\":50,\"caption\":\"Orderoo Blog | On Demand Services Updates\"},\"image\":{\"@id\":\"https:\/\/www.orderoo.com.au\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.orderoo.com.au\/blog\/#\/schema\/person\/32ec5f114d8c2519336f5eb6af57830b\",\"name\":\"Ankush\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.orderoo.com.au\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/bd6f484bf4f4006badec1fed67ae7ec9?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/bd6f484bf4f4006badec1fed67ae7ec9?s=96&d=mm&r=g\",\"caption\":\"Ankush\"},\"description\":\"Ankush is a contributor at Orderoo and the founder of a local food delivery platform in South Australia. With a background in education, technology, and food delivery, he writes clear and practical content that helps Australians discover local food options and better understand food delivery services.\",\"sameAs\":[\"http:\/\/orderoo.com.au\/blog\"],\"url\":\"https:\/\/www.orderoo.com.au\/blog\/author\/orderoo\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How Human Espionage Is Targeting Tech Through Relationships","description":"Foreign spies are using romance and trust to infiltrate tech firms. Discover how human espionage exploits social networks in today\u2019s innovation economy.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.orderoo.com.au\/blog\/when-love-isnt-just-love-how-human\u2011espionage-is-morphing-and-what-it-means-for-tech\/","og_locale":"en_US","og_type":"article","og_title":"How Human Espionage Is Targeting Tech Through Relationships","og_description":"Foreign spies are using romance and trust to infiltrate tech firms. Discover how human espionage exploits social networks in today\u2019s innovation economy.","og_url":"https:\/\/www.orderoo.com.au\/blog\/when-love-isnt-just-love-how-human\u2011espionage-is-morphing-and-what-it-means-for-tech\/","og_site_name":"Orderoo Blog","article_published_time":"2025-10-28T13:48:28+00:00","article_modified_time":"2025-10-28T13:50:16+00:00","og_image":[{"width":1024,"height":683,"url":"https:\/\/www.orderoo.com.au\/blog\/wp-content\/uploads\/2025\/10\/When-love-isnt-love-1024x683.png","type":"image\/png"}],"author":"Ankush","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Ankush","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.orderoo.com.au\/blog\/when-love-isnt-just-love-how-human%e2%80%91espionage-is-morphing-and-what-it-means-for-tech\/#article","isPartOf":{"@id":"https:\/\/www.orderoo.com.au\/blog\/when-love-isnt-just-love-how-human%e2%80%91espionage-is-morphing-and-what-it-means-for-tech\/"},"author":{"name":"Ankush","@id":"https:\/\/www.orderoo.com.au\/blog\/#\/schema\/person\/32ec5f114d8c2519336f5eb6af57830b"},"headline":"When Love Isn\u2019t Just Love: How Human\u2011Espionage Is Morphing And What It Means For Tech","datePublished":"2025-10-28T13:48:28+00:00","dateModified":"2025-10-28T13:50:16+00:00","mainEntityOfPage":{"@id":"https:\/\/www.orderoo.com.au\/blog\/when-love-isnt-just-love-how-human%e2%80%91espionage-is-morphing-and-what-it-means-for-tech\/"},"wordCount":932,"publisher":{"@id":"https:\/\/www.orderoo.com.au\/blog\/#organization"},"image":{"@id":"https:\/\/www.orderoo.com.au\/blog\/when-love-isnt-just-love-how-human%e2%80%91espionage-is-morphing-and-what-it-means-for-tech\/#primaryimage"},"thumbnailUrl":"https:\/\/www.orderoo.com.au\/blog\/wp-content\/uploads\/2025\/10\/When-love-isnt-love.png","keywords":["Featured"],"articleSection":["Misc"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.orderoo.com.au\/blog\/when-love-isnt-just-love-how-human%e2%80%91espionage-is-morphing-and-what-it-means-for-tech\/","url":"https:\/\/www.orderoo.com.au\/blog\/when-love-isnt-just-love-how-human%e2%80%91espionage-is-morphing-and-what-it-means-for-tech\/","name":"How Human Espionage Is Targeting Tech Through Relationships","isPartOf":{"@id":"https:\/\/www.orderoo.com.au\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.orderoo.com.au\/blog\/when-love-isnt-just-love-how-human%e2%80%91espionage-is-morphing-and-what-it-means-for-tech\/#primaryimage"},"image":{"@id":"https:\/\/www.orderoo.com.au\/blog\/when-love-isnt-just-love-how-human%e2%80%91espionage-is-morphing-and-what-it-means-for-tech\/#primaryimage"},"thumbnailUrl":"https:\/\/www.orderoo.com.au\/blog\/wp-content\/uploads\/2025\/10\/When-love-isnt-love.png","datePublished":"2025-10-28T13:48:28+00:00","dateModified":"2025-10-28T13:50:16+00:00","description":"Foreign spies are using romance and trust to infiltrate tech firms. Discover how human espionage exploits social networks in today\u2019s innovation economy.","breadcrumb":{"@id":"https:\/\/www.orderoo.com.au\/blog\/when-love-isnt-just-love-how-human%e2%80%91espionage-is-morphing-and-what-it-means-for-tech\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.orderoo.com.au\/blog\/when-love-isnt-just-love-how-human%e2%80%91espionage-is-morphing-and-what-it-means-for-tech\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.orderoo.com.au\/blog\/when-love-isnt-just-love-how-human%e2%80%91espionage-is-morphing-and-what-it-means-for-tech\/#primaryimage","url":"https:\/\/www.orderoo.com.au\/blog\/wp-content\/uploads\/2025\/10\/When-love-isnt-love.png","contentUrl":"https:\/\/www.orderoo.com.au\/blog\/wp-content\/uploads\/2025\/10\/When-love-isnt-love.png","width":1536,"height":1024,"caption":"Illustration of a couple talking in the foreground with a shadowy figure in a trench coat and hat lurking behind them, symbolizing hidden espionage. Text on the left reads: 'WHEN LOVE ISN\u2019T LOVE.' Set against a deep blue background, the image conveys the theme of romantic deception used in modern spy tactics."},{"@type":"BreadcrumbList","@id":"https:\/\/www.orderoo.com.au\/blog\/when-love-isnt-just-love-how-human%e2%80%91espionage-is-morphing-and-what-it-means-for-tech\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.orderoo.com.au\/blog\/"},{"@type":"ListItem","position":2,"name":"When Love Isn\u2019t Just Love: How Human\u2011Espionage Is Morphing And What It Means For Tech"}]},{"@type":"WebSite","@id":"https:\/\/www.orderoo.com.au\/blog\/#website","url":"https:\/\/www.orderoo.com.au\/blog\/","name":"Orderoo Blog | On Demand Services Updates","description":"Discover, Learn, and Explore","publisher":{"@id":"https:\/\/www.orderoo.com.au\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.orderoo.com.au\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.orderoo.com.au\/blog\/#organization","name":"Orderoo Blog | On Demand Services Updates","url":"https:\/\/www.orderoo.com.au\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.orderoo.com.au\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.orderoo.com.au\/blog\/wp-content\/uploads\/2023\/06\/cropped-aSDasdASD.png","contentUrl":"https:\/\/www.orderoo.com.au\/blog\/wp-content\/uploads\/2023\/06\/cropped-aSDasdASD.png","width":200,"height":50,"caption":"Orderoo Blog | On Demand Services Updates"},"image":{"@id":"https:\/\/www.orderoo.com.au\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.orderoo.com.au\/blog\/#\/schema\/person\/32ec5f114d8c2519336f5eb6af57830b","name":"Ankush","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.orderoo.com.au\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/bd6f484bf4f4006badec1fed67ae7ec9?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/bd6f484bf4f4006badec1fed67ae7ec9?s=96&d=mm&r=g","caption":"Ankush"},"description":"Ankush is a contributor at Orderoo and the founder of a local food delivery platform in South Australia. With a background in education, technology, and food delivery, he writes clear and practical content that helps Australians discover local food options and better understand food delivery services.","sameAs":["http:\/\/orderoo.com.au\/blog"],"url":"https:\/\/www.orderoo.com.au\/blog\/author\/orderoo\/"}]}},"_links":{"self":[{"href":"https:\/\/www.orderoo.com.au\/blog\/wp-json\/wp\/v2\/posts\/6448","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.orderoo.com.au\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.orderoo.com.au\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.orderoo.com.au\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.orderoo.com.au\/blog\/wp-json\/wp\/v2\/comments?post=6448"}],"version-history":[{"count":3,"href":"https:\/\/www.orderoo.com.au\/blog\/wp-json\/wp\/v2\/posts\/6448\/revisions"}],"predecessor-version":[{"id":6453,"href":"https:\/\/www.orderoo.com.au\/blog\/wp-json\/wp\/v2\/posts\/6448\/revisions\/6453"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.orderoo.com.au\/blog\/wp-json\/wp\/v2\/media\/6450"}],"wp:attachment":[{"href":"https:\/\/www.orderoo.com.au\/blog\/wp-json\/wp\/v2\/media?parent=6448"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.orderoo.com.au\/blog\/wp-json\/wp\/v2\/categories?post=6448"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.orderoo.com.au\/blog\/wp-json\/wp\/v2\/tags?post=6448"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}