In the future, we will probably see cyber operations that change or manipulate electronic information to compromise its integrity instead of simply deleting the access to it.

James Clapper

Quotes to Explore