I think that people are looking at a very real threat and looking for ways to protect themselves and their families from that threat.
The problem is that the people that are doing it are not only exploiting vulnerabilities, they are actually hacking them and they are using them for their own personal gain.
So that is the problem.
They are doing this in a way that is so illegal that they can’t be prosecuted.
It is very hard to prove that somebody has hacked into your computer.
And it is very difficult to prove they have done it to your spouse or your child.
And so the only way to prove it is to go to court and get a conviction.
I think it is more important to look at how these criminals are using vulnerabilities that have already been exposed.
They have already made it into public view and they have already stolen money.
They do not have to go out and exploit those vulnerabilities to further their own interests and make money.
So it is a very different situation than people seeing these videos of hackers hacking cars or hacking into people’s homes or their kids’ school computers or their personal computers.
And I think there are people who are trying to use these exploits to get their own money and profit, but we have to stop that from happening.
This is not about stealing cars, this is about stealing people’s money.
This isn’t about trying to get people to buy your products.
This video is about trying a very serious charge of cybercrime against a person and his family and his business.
That is what we are trying here, to show that people who exploit vulnerabilities are doing a very, very serious, very dangerous thing that is against the law.
So, if you are in the business of stealing cars or your spouse’s money or your children’s money, then we want you to know that you can’t do that and that you have to pay the consequences.
That includes jail time.
It includes the loss of all of your business and your livelihood.
So we want to put people in jail for that.
I mean, I think if you do this and you are caught and you go to jail, you are going to have to take a lot of time in jail and it is going to take quite a long time to recover.
We are very clear about that.
We have a very clear code of conduct that we have set up for people that break into our systems, we have rules about who can be in our system, who can do what, how many people can be there, who has access to what information and who has to give up the information, so you have got to pay a huge price for this and we are doing that.
But we also want people to know, if someone is stealing your car, it is not your car.
It belongs to somebody else and if you know about it, if somebody else is in your car and is doing it, you should be able to stop them.
So this is a case that is being handled by a judge, a federal prosecutor and a prosecutor at the Department of Justice, and we would like to make sure that the charges are really serious.
If you are able to identify and bring to justice the people who actually do this, and they know that it is against our laws, then they can be held accountable for that and they can go to prison and they will have to give it up.
We want to make it very clear that the penalties that are on the table are for the person who did it and they do not include anybody else.
We just want to do what we can to make this as difficult as possible for them to do this.
Russ Roberts: So let me ask you a very specific question.
I know that a lot people in this business have this idea that they have a lot more control over the things that they do than they think they do.
I am not sure that is necessarily true.
And what you are saying about the idea of a cyber-attack is that they might be able, but you would have to know the details of what they do, you would need to know who they are and where they work.
And the only reason why you might want to go after somebody that you know is doing something illegal is that you are not able to prove to the court that they are doing something wrong.
So what are your thoughts about this?
And if I have this right in the context of these other hacks, are there other reasons that you think that this is just going to get worse and worse?
And do you think there is a way to stop it?
Or do you have any suggestions that might be helpful to people that might want this information to be in the public domain?
And also, is there any other information that you would like the public to know about these hacks?
And then, what kind of information would you like to get out about these other hacking operations that you and your colleagues have been involved in?
Let me go to one last question. If the