profile, on the computer so that it would be some data. you want to have something there so people have something that they want to steal. and very quickly, within a minute, there were probing attacks, if you will. people just checking out, who is this, who owns this new machine? what kind of computer is this? how well defended is it? someone is checked into the room on the 14th floor of this hotel. who is it? then a short time later i got a very specific e-mail based on data that was collected from this machine. hello, richard engel. we see you are coming to sochi to cover the games. here is some information that you might want. as soon as i clicked on that, that first computer was compromised. the other computer was a popup window that said, oh, by the way, you're going to need this extra software. each device was different, but each, all of the attacks were quite sophisticated and once you