Corporate computers are fair game for snooping in the U.S. (Some European countries have stricter privacy rules.) So in-house spooks can divert copies of incoming and outgoing e-mail to a separate file for monitoring.
FORBES: Get Hunt and Liddy on the Phone
And what if the leaker is determined to siphon out a rarer, seldom-accessed file without flagging network monitoring technologies?
FORBES: My Take On Evgeny Morozov's Review Of My Book, 'This Machine Kills Secrets'
应用推荐
模块上移
模块下移
不移动