Securing these 'weapons' is particularly tricky since the very same people that establish and use them have the abilities to exfiltrate copies without the need of leaving traces — often by using the very same 'weapons' in opposition to the businesses that contain them. You will discover sizeable price incentives for presidency hackers and consult