That is especially true in instances in which commercial espionage or other acts of intellectual property theft enable the well-heeled to file faster than the actual inventor.
Social media, especially when coupled with public information sources, can enable attackers to build employee profiles for identity theft and unauthorized access.