(TOWNHALL) – Not long ago I was targeted in a computer hack. The experience showed how the origin of a hack can be faked or spoofed in order to direct the blame elsewhere and muddy the waters.
The hacker initially did some reconnaissance that was traceable to an IP address in Tel Aviv, Israel, but then donned an electronic cloak of proxies in other countries before trying to crack my accounts. Most of the breach attempts over the next three days were launched through a proxy service with servers in multiple countries, from Russia to the Netherlands.
The proxy service provider was featured in an FBI flash alert and a Wired magazine article three years ago. Some experts believed there were "Russian fingerprints" on attacks directed at Illinois and Arizona board of elections websites in the run-up to the 2016 U.S. presidential election simply because the address of the attacker's proxy cloak was Russian. But the location of a proxy address proves nothing, as my situation illustrated.
Advertisement - story continues below
We've seen that technology can be untrustworthy and exploitable. So why do intelligence agencies such as the CIA rely so heavily on it?