<s>
Wireless_NN1 technology_NN1 is_VBZ increasingly_RR important_JJ ,_, but_CCB major_JJ problems_NN2 with_IW it_PPH1 include_VV0 information_NN1 security_NN1 and_CC privacy_NN1 ._. 
</s>
<s>
As_II31 well_II32 as_II33 being_VBG a_AT1 status_NN1 symbol_NN1 ,_, wireless_NN1 technology_NN1 (_( i.e._REX ,_, mobile_JJ phones_NN2 ,_, Palm_NN1 Pilots_NN2 )_) is_VBZ a_AT1 great_JJ convenience_NN1 of_IO the_AT modern_JJ world_NN1 ._. 
</s>
<s>
It_PPH1 makes_VVZ communications_NN2 and_CC information_NN1 storage_NN1 much_RR easier_RRR and_CC more_RGR efficient_JJ ._. 
</s>
<s>
However_RR ,_, questions_NN2 of_IO security_NN1 and_CC privacy_NN1 remain_VV0 ._. 
</s>
<s>
Most_DAT people_NN want_VV0 their_APPGE conversations_NN2 and_CC personal_JJ information_NN1 to_TO remain_VVI private_JJ ._. 
</s>
<s>
While_CS security_NN1 efforts_NN2 such_II21 as_II22 government_NN1 monitoring_NN1 could_VM help_VVI prevent_VVI other_JJ citizens_NN2 from_II illegally_RR listening_VVG to_II or_CC viewing_VVG other_JJ peoples_NN2 information_NN1 ,_, most_RGT also_RR find_VV0 such_DA governmental_JJ monitoring_NN1 undesirable_JJ ._. 
</s>
<s>
Herein_RR lies_VVZ the_AT contradiction_NN1 ._. 
</s>
<s>
Fortunately_RR ,_, methods_NN2 of_IO security_NN1 that_CST do_VD0 not_XX invoke_VVI government_NN1 interference_NN1 exist_VV0 ._. 
</s>
<s>
E-mails_NN2 can_VM be_VBI sent_VVN via_II secure_JJ links_NN2 ,_, anti-virus_JJ programs_NN2 are_VBR available_JJ for_IF Internet_NN1 browsers_NN2 ,_, and_CC passwords_NN2 allow_VV0 selective_JJ access_NN1 to_II various_JJ mediums_NN2 ._. 
</s>
<s>
While_CS the_AT above_JJ provide_VV0 a_AT1 modicum_NN1 of_IO security_NN1 ,_, nothing_PN1 is_VBZ foolproof_JJ ._. 
</s>
<s>
Military_JJ history_NN1 teaches_VVZ that_CST advances_VVZ in_II projectiles_NN2 will_VM always_RR defeat_VVI advances_NN2 in_II armor_NN1 ,_, and_CC this_DD1 rule_NN1 applies_VVZ to_II wireless_NN1 technology_NN1 as_CSA it_PPH1 does_VDZ to_TO chain_VVI mail_NN1 or_CC tanks_NN2 ._. 
</s>
<s>
Despite_II this_DD1 ,_, wireless_NN1 technology_NN1 should_VM be_VBI utilized_VVN because_II21 of_II22 its_APPGE advantages_NN2 ._. 
</s>
<s>
No_AT method_NN1 of_IO communication_NN1 or_CC information_NN1 storage_NN1 is_VBZ completely_RR secure_VV0 ,_, and_CC wireless_NN1 technology_NN1 is_VBZ relatively_RR safe_JJ ._. 
</s>
