No IT system is unbreakable. Period.


1) It would be difficult to pinpoint the origination address since proxies ( even multiple ones )
are stupidly simple to setup and operate. Thus the whole " Those Chinese sons o beeches R hackin us ! "
may or may not be true. ( But it probably is. See # 4 as to why )

2) One insider can bypass your security in a hurry. Attach a modem to their machine, connect a wi-fi
router to the network, fire up a VPN or SSH tunnel to a remote site, plug in a USB stick they " found "
in their mailbox, hell the list is nearly endless.

3) There is a delicate balance you have to strike between real network security and a network that is
useless for most things.

4) If you think, for one moment, that we're not doing the same thing to other countries, you're naive :D