I'm at 0:33 :awesome:
https://www.youtube.com/watch?v=_tXrr-SQn2k
And, yes, there were people giving directions on how to break into their own networks to a guy with a video camera.
:facepalm2:
You can neither confirm nor deny? What are you, the NSA media spokesperson lol.
Edited out was my bit about requiring all hackers to submit a request in the form of an IT-344/a form, "Request for Unauthorized Access." We then process the request and schedule a time for the hacker to breach the network. We have lots of attackers, so we try our best to accommodate all their needs. If the IT-344/a form is incomplete or in error, we send it back and temporarily deny the request.