3/4/15How about "Don't plug another hacker's computer directly into your spy organization's network"?