the first is the hack to this, the anonymous lulsec. endously capable, but aren't necessarily stealing information for stealing information's sake, but want to embarrass you. secondly, you have the criminals, the targets, and the like. thirdly, you have the theft of intellectual property and the espionage. fourth, you have the terrorists and potential use of cyberby terrorists. and fifth, you have the military using cyber as several years ago when the russians sent the tanks into georgia, they knocked out georgia's command and control before they sent the tanks out. those are the five vectors of threats in the bureau that we deal with. >> lots. >> it is, but in order to be successful in addressing those threats, you have to know who's behind the keyboard. is it somebody from anonymous, or is it that russian hacker out of russia or the ufment k.? >> and can you identify that? >> yes, you can, yes, but it takes a combination of investigative skills, which we have traditionally had, coupled with the use of this new medium in the cyberarena.