I'm going to vote on the ghost in the shell side of things.
When you are no longer able to insert a fake into the system it becomes necessary to steal a valid ID from someone else.
The fact that IDs are getting more complex is not a significant impediment to any modern intelligence organization that can devote the needed resources to reverse engineering it.
-Terry
-----
"so listen up boy, or pornography starring your mother will be the second worst thing to happen to you today"
TF2: Spy
When you are no longer able to insert a fake into the system it becomes necessary to steal a valid ID from someone else.
The fact that IDs are getting more complex is not a significant impediment to any modern intelligence organization that can devote the needed resources to reverse engineering it.
-Terry
-----
"so listen up boy, or pornography starring your mother will be the second worst thing to happen to you today"
TF2: Spy