Watch Your Step
Watch Your Step
In the world of hacking, whether it is government or private, new techniques are discovered daily. The best methods are sold or subsidized through Pay-For-Results systems.
Over time most humans trust the technology that they come to use regularly and often without question. The telephone gave rise to the wiretap and pen register. Telegraphs were read by people at both ends. The internet is no different.
I have a good friend that spent 25 years in the CIA in the electronics eavesdropping division. His specialty was finding bugs. He said that the agency always managed to have technology about 5-10 years before it hit the public market.
And remember that if you hit the radar you'll have no secrets:
http://blog.webroot.com/2012/03/02/new-service-converts-malware-infected-hosts-into-anonymization-proxies/
http://blog.webroot.com/2012/04/05/new-underground-service-offers-access-to-hundreds-of-hacked-pcs/
Watch Your Step
In the world of hacking, whether it is government or private, new techniques are discovered daily. The best methods are sold or subsidized through Pay-For-Results systems.
Over time most humans trust the technology that they come to use regularly and often without question. The telephone gave rise to the wiretap and pen register. Telegraphs were read by people at both ends. The internet is no different.
I have a good friend that spent 25 years in the CIA in the electronics eavesdropping division. His specialty was finding bugs. He said that the agency always managed to have technology about 5-10 years before it hit the public market.
And remember that if you hit the radar you'll have no secrets:
http://blog.webroot.com/2012/03/02/new-service-converts-malware-infected-hosts-into-anonymization-proxies/
http://blog.webroot.com/2012/04/05/new-underground-service-offers-access-to-hundreds-of-hacked-pcs/