i think we had some testbeds but i want to hear from mr. yardley about your thoughts. >> i think there's really two key issues. when is the physical attack on the communications, blocking spectrum, radio snubbing available, lines being down, et cetera. there's also the cyber. what if they are all there but you can't use because you can't trust them? they have been attacked themselves. what do you do? and further, it's one thing to support the normal operations, but how do you support the forensic response as well? how do you enable that channel of communication may be completely different than traditional operations, at its same time you're number one priories to support the normal operations? .gif to weigh that against the ability of forensically communicating to be able to support the operation and enable it in the first place. the second aspect is that with calms under attacked themselves, we are good at defending our communication networks. the internet is defended every day from attack and subversion but we see it happen still. what's