claim
The use of physical hardware, such as malware on a portable hard drive connected to an isolated network, constitutes a clear violation of territoriality and sovereignty, making it akin to traditional forms of espionage.

Authors

Sources

Referenced by nodes (3)