I suggest they are missing what is really going on as well. Look at the link I provided and dig deep on it. Look at the source of it. Look at who funded it's creation (In-Q-Tel and Google). The Machine (from Person of Interest) actually exists and is used by them as a pre-crime division.
That's just one example of the larger structure of SIGINT that most people, even those in security, are completely oblivious about.
Our security is compromised at the OS level. It is compromised at the hardware level. There is not a single device that exists on this planet built after say, year 2000, that is not compromised completely. If you are connected to the internet ever on a device, the built in keylogger, microphone (even if "turned off*), and camera are sending them everything, all the time and it is being analyzed by an AI in real time.
I suggest they are missing what is really going on as well. Look at the link I provided and dig deep on it. Look at the source of it. Look at who funded it's creation (In-Q-Tel and Google). The Machine (from Person of Interest) actually exists and is used by them as a pre-crime division.
That's just one example of the larger structure of SIGINT that most people, even those in security, are completely oblivious about.
Our security is compromised at the OS level. It is compromised at the hardware level. There is not a single device that exists on this planet built after say, year 2000, that is not compromised completely. If you are connected to the internet ever on a device, the built in keylogger, microphone (even if "turned off*), and camera are sending them everything, all the time and it is being analyzed by an AI in real time.