Under the pressure from law enforcement agencies and security researchers, hackers are experimenting with increasingly novel command-and-control structures for malware. The author assesses some of the techniques that have been uncovered and examines the implications for the authorities.