No software—whether on a secure or non-secure (dirty-line) government computer—can be installed without IT being alerted within milliseconds. Likewise, absolutely no unauthorized hardware can be connected to a military system without immediate detection.
There is simply no realistic scenario in which PH could have operated an unknown system with unapproved software inside one of the most secure facilities in the United States without it being known and approved. If I’m proven wrong, I’ll gladly apologize for doubting. But when it’s confirmed I’m right, I hope you’ll extend the same courtesy to those your post may have misled or unfairly accused.
No software—whether on a secure or non-secure (dirty-line) government computer—can be installed without IT being alerted within milliseconds. Likewise, absolutely no unauthorized hardware can be connected to a military system without immediate detection.
There is simply no realistic scenario in which PH could have operated an unknown system with unapproved software inside one of the most secure facilities in the United States without it being known and approved. If I’m proven wrong, I’ll gladly apologize for doubting. But when it’s confirmed I’m right, I hope you’ll extend the same courtesy to those your post may have misled or unfairly accused.