True that. You should see some of the online & inline security systems I've built the last seven years. We can do stateful packet inspection on-the-fly without slowing down application traffic and predict behaviors before they happen now.
I was recruited by DHS four years ago to run one of their data collection points (I won't say hwere...) but they simply did'nt pay enough and I don't consider it my "patriotic duty" to take a huge pay cut just to work for the gub'mint.
We do that over here. I got busted in 2011 for a packet from ShowMyPC that would have possibly allowed for remote computer access. I was severely reprimanded, and told that if they EVER see that packet again, and it is NOT from one of the two sanctioned groups, I would be escorted off the campus by Security.
I honestly didn't know I had violated until two grim-expressioned men showed up at my cubicle, within one hour of allowing an Ohio state government user to view my PC for instructions on how to use the system I wrote.
Thank God I was being 100% cool and was 100% honest about what happened. I still was severely reprimanded. And, I learned our guys peek at the packet level in real-time.
I actually went ahead with it, because OTrauma was elected in 2008. I figured many businesses would go belly up. I was right, many of my peers ended up with pink slips when their firm shut down.
The downside is I am paid 40k less per year than I am worth in the open marketplace.
The upside is I am still working, and, having significant talent like I do, I am advancing to Architect role in 2015.