They can have my router when they pry it from my cold dead hands.
Incidentally, I am currently logging all my network traffic. It logs which external IP address is connecting with which internal IP address and how much data is being transferred. I do this so I can "spy" on my own network. (Mainly to track bandwidth use and raise redflags for anything weird or suspicious...and because I can and I was curious.

)