in the house of assistant police on james acton, explains what happens next. if you find malicious towed in your network, it's very hard to know what that code does. it takes a long time to analyze the code, understand what the other site is doing. and this makes it very hard to know whether malicious code is just or is also for a sensitive opperation as well. and it just isn't crisis. yeah, had a chance. even if that code is used for the purposes, there is a danger that the u. s. might conclude that it's preparations for an attack on an early morning. s a malware sprint. the u. s. also has to work out and planted. that's a process called attribution time. and it is not easy. adding pressure to this fear and di did various countries that could have incentives to the side, the f, b, or path to cyber attacks by searching malware against us. so the warning system korea would haven't, instead of doing china would have an incentive doing. russia would have an incentive for doing it, maybe others took a me all that on certainty with the latvian crisis on going, russ