It's a risk, but could potentially be an opportunity as well. What if you could identify a compromised system/computer and start feeding it bad information? The new owner would be torn between wanting to use the intel provided and the risk that it was setting him up for ambushes, artillery/CAS kill zones, etc.
|