Your real problems free me from my imaginary anxieties
I purchased 75 cheap laptop computers and, with trusted help, installed invisible keystroke logging software on all of them—the kind that calls home (to me) and disgorges the text files. It also, on command, turns on, and off, the microphone and camera—and sends these files on command. I had the computers re-packaged as if new. I began giving these away as presents to select people—government employees, police officers, Cabinet Minister’s assistants, girlfriends of powerful men, boyfriends of powerful women. I hired four trusted people full time to monitor the text files and provide myself with the subsequent passwords for everyone’s e-mail, Facebook, private message boards, and other passworded accounts. The keystroke monitoring continued after password collection, in order to document text input that would later be deleted. So nothing was missed.
I next collected my human resources for the complex social engineering I would have to do. I arranged with 23 women and six men to be my operatives. Eight of the women were so accomplished that they ended up living with me. It was amazingly more efficient and they were easily convinced to check up on each other. One was so accomplished (Marcia) that she became a double agent and nearly got me killed.
{ John McAfee/Ars Technica | Continue reading | Thanks Tim }