*hacking top-level security encrypted government databases can be done with just a few keystrokes...hell even children can do it!!!!!
*cell phones can be cloned & infiltrated by simply removing the sim card & copying it to a new device regardless of the age/style of the phone, cell phone brand, or service provider