Participants of Cyber Storm II, which also include about 40 private-sector companies, will enact a scenario in which ???persistent, fictitious adversaries??? launch an extended attack using websites, email, phones, faxes and other communications systems.