In the future, we will probably see cyber operations that change or manipulate electronic information to compromise its integrity instead of simply deleting the access to it.— James Clapper
In the future, we will probably see cyber operations that change or manipulate electronic information to compromise its integrity instead of simply deleting the access to it.