Our communications travel throughout a complex community of networks in order to get from stage A to issue B. During that journey they are vulnerable to interception by unintended recipients who know how to manipulate the networks. In the same way, we’ve come to depend upon transportable units which have been far more than just phones—they have