The camera will likely still have an I/O port that is open for calibration tasks so it is unlikely to be totally locked down but activation may require either a 'secret' key sequence or the correct 'Open Sesame' command from a host computer. There are so many ways to slam the door shut on users by denying them the attack vectors that are needed to 'probe' the OS and firmware. Sadly when a manufacturer goes for a nice tight lock-down, you often have to move from a close case, to open case hack involving direct access to key chips in the system. There is the RS232 port on the motherboard but FLIR know that this was discovered and exploited by Mike. It may end up with someone having to open their new E4 to see what, if anything, has changed since HW 1.0 and 1.1L. It would be a real shocker to see a LEPTON core sat where once a 320x240 microbolometer had resided ! Panic not, it's unlikely that this has been done. The FPGA config files are what would worry me. As others have stated, reverse engineering an FPGA is not a real option and so any countermeasure that involved the FPGA could be very effective.