Cyber criminals use Trojans to steal information. But are the same techniques of electronic surveillance being used by the agencies set up to protect us?

More...