lets agree on the following:
a rogue intelligence service wanting to hack the pentagon would want to know stuff about methods and technologies used to protect it. correct?
a spy or mole would be able to supply the intelligence service some (not all) of the required data to hack the pentagon. even data lacking technological information, such as names and dates of contracts and contingency plans.
a rogue intelligence service will have a much easier time, planting spies among his own nationals, or with people who come into daily contact with his own nationals.
bring it all together and you have a conclusion that this elevates risk.
a rogue intelligence service wanting to hack the pentagon would want to know stuff about methods and technologies used to protect it. correct?
a spy or mole would be able to supply the intelligence service some (not all) of the required data to hack the pentagon. even data lacking technological information, such as names and dates of contracts and contingency plans.
a rogue intelligence service will have a much easier time, planting spies among his own nationals, or with people who come into daily contact with his own nationals.
bring it all together and you have a conclusion that this elevates risk.
Comment