"You get the idea here: If there ever was an activity that amplified both the probability and significance of these kinds of security anomalies, it is the various cyber missions, passive or active, offensive or defensive, sensitive or routine." . . . .