
A competing lab recently made a run at scientific espionage by illegally cloning one of our researchers, and sending the clone in to incapacitate then impersonate the researcher.
However, our lab has fairly effective security that accounts for this specific type of corporate espionage, and the clone was captured in the archival room before she could get away with any information.