I used to pretty much assume that every time I run "yum update" or "yum upgrade" a CIA officer could be in some RedHat (or mirror site) office telling some techie "Yes, that's the guy. He gets the worm/trojan".
Basically that they could target, everyone else getting a perfectly normal copy of whatever thing they wanted me to have a backdoored copy of while I get the backdoor.
-MarkM-
Some interesting ideas in this thread and this one seems quite believable. Keep it "open source" but plant upgrades into certain IP addresses. Do people have access to the upgrade systems of these open source software companies? Seems like a trusted download site would be a bit more secure, but anything is possible - man in the middle type of things are always there.
I imagine though, that the orders come from few and it certainly looks like the empire is having its challenges (e.g. Syria) to expand it's bringing of "Democracy" and "Stability", particularly the latter. All these wars now seem to be less about "winning" and more about just bringing instability. Not to go off tangent but I get the feeling, things are connected somehow. The software issue is probably key for very obvious reasons. And as others have mentioned, we can't forget hardware. (And how does one even look into it?)
It's About Sharing