
Once the attacker has access to the machine all bets are off. This is just common security practice, only those with the necessary security clearance have access and then are watched from the outside.
I think the researchers are looking for a problem to fit their solution and are also looking for additional funding to produce the device that will find these rogue transmissions which they can then sell for vast amounts of money.