. . . "Whether you???re protecting an anonymous source inside the Beltway or working in a conflict zone, you need to protect your data, emails, contacts, instant messages and other important information." . .