Our communications vacation across a complex network of networks to be able to get from position A to point B. In the course of that journey they are susceptible to interception by unintended recipients who know how to control the networks. Similarly, we’ve arrive at count on moveable equipment that happen to be much more than just phones—they