TURNING PLOWSHARES INTO SWORDS: “Computer network security personnel are encountering more and more ugly surprises when they take apart the hacker programs that are planted in PCs. . . . While most of these super-payloads are being used for stealing money or salable information from individuals or companies, these tools can also be turned into military weapons.”