An attacker disrupts the supply chain lifecycle by manipulating computer system hardware, software, or services for the purpose of espionage, theft of critical data or technology, or to disrupt mission-critical operations or infrastructure. Supply chain operations are usually multi-national with parts, components, assembly, and delivery occurring in countries outside the United States. The economics of computer crime are increasingly favoring supply chain attacks as data theft and extortion, theft of technology covered by export controls, and industrial espionage can be carried out through modifications in technologies typically regarded as harmless. Manipulating a technology, component, or product, such as USB Thumb Drive, digital camera, or digital projector can provide a direct means for compromising targeted organizations with very little risk to the attacker.