Gaining access to well-protected information or systems in closed networks remains a resource-intensive effort involving traditional espionage tradecraft. Such operations do not require the simultaneous access to large numbers of systems needed for a strategic attack and thus are within reach of a much larger array of foreign adversaries.
| Attributes | Values |
|---|---|
| rdfs:label |
|
| rdfs:comment |
|
| dcterms:subject | |
| abstract |
|