Did I miss something here? Why worry about such a sophisticated
'intrusion', when some of the most successful intrusions aren't even
based on technology? Point in fact... the truly successful intrusion
attempts aren't even detected. Who did that *nix guru you hired last
year work for the year before? What about that bright young Phd.
candidate that came in to do a consulting job for you last month?
Remember 'Occam's Razor'.. Or as someone else stated... K.I.S.S.