How do you know they haven't used it against you? Have you run checks on the data packets? Have you scanned your systems and traced intrusions? Do you know anything about information technology? You sound like you do, but do you know the inner workings of networks and administration? It's so easy. Especially systems…