posted on Feb, 29 2012 @ 06:35 AM
1. Nothing of any sensitivity on a true secure network is connected to the internet, online, or even connected to any other computers.
2. Regardless the security measures in place, a vulnerability universal to every information network, most prone to compromise is the people that use
the information network. Press the right people shaped buttons, and You can own any network, or 'hack' any system.
Since all the sensitive information that's REALLY sensitive is not connected to any other computers, and probably not on any computers at all, but
living on paper, Anon would likely have to work in pushing those people shaped buttons.
I'm confident that's not going to happen any time soon.
If, however, you come up with a remote methodology for 'hacking' file cabinets, books, and locked safe rooms all hundreds of feet below ground,
surrounded and guarded by live eyeball human security of a highly trained military variety, then, please, let us know.
edit on 29-2-2012 by nineix because: (no reason given)