Introduction
Imagine yourself as a computer hacker. However, you are legitimately entitled to this role by your own government. Your mission is twofold: protect your nation's communications from the enemy and intercept foreign intelligence by using your code-breaking skills. The latter part of your mission is probably the most exciting; listening to telephone conversations between foreign political and military leaders and hacking encrypted foreign communications are just a couple of the day-to-day routines of your job. What sort of government agency provides for such hush-hush activit…