Quote:
Originally Posted by dimbulb
[*]Mailings promoting ID-Theft (not the phishing variety, but the ones offering genuine services)
|
Could you give an example for this one?
__________________
Through counter-intelligence, it should be possible to pinpoint potential trouble makers, and neutralize them.
|