"You can see why we prefer to detect rather than prevent. The payoff is in deep understanding of their methods. The opposition has little to gain with a successful penetration. They potentially reveal covert status and methods to achieve it, though."
"The strange behavior we just observed remains a mystery. A public wi-fi, not password protected was nearly inoperable. Tethering to the cell seems to not be working either. Are these related to the newly discovered trojan?"
Both of them knew that the recent flurry of activity (chatter, if you will) could be attributed to getting close to a hidden operation of the opposition. The general public paranoia regarding cyber threats had become an effective cover for the surveillance supporting special ops.
She was maturing quickly. No longer at the mercy of her natural hypersensitivity. With the help of the others, she had turned it into an asset for the benefit of the group.
"The strange behavior we just observed remains a mystery. A public wi-fi, not password protected was nearly inoperable. Tethering to the cell seems to not be working either. Are these related to the newly discovered trojan?"
Both of them knew that the recent flurry of activity (chatter, if you will) could be attributed to getting close to a hidden operation of the opposition. The general public paranoia regarding cyber threats had become an effective cover for the surveillance supporting special ops.
She was maturing quickly. No longer at the mercy of her natural hypersensitivity. With the help of the others, she had turned it into an asset for the benefit of the group.
© 2012 Buzz Hill
No comments:
Post a Comment