today, it's as easy, if not easier, to insert or intrude into various systems and exfiltrate the information you need and with far less risk to the individuals. and then the third area, which has been alluded to here, is the growth of cyber and all of its iterations. and by that i mean a criminal robbing banks, the theft of intellectual property, exfiltration of information from dod or others. it is not lost upon us that several years ago, a group of individuals brought estonia to its knees as a result of a displeasure at actions that the estonian government had undertaken. and, more recently, in georgia, before the russians attacked georgia, it's no secret that they went a far ways to dismantling the command- andcontrol capabilities of the georgian authorities. and so in terms of terrorism, that would be a high priority, but also protecting our secrets from those governments and other individuals who want to steal them and then preparing -- particularly nsa and others -- the cyber -- i don't want to call it a battlefield -- but the cyber arena which has both offensive as well as defensive r