Gaining access to well-protected information or systems in closed networks remains a resource-intensive effort involving traditional espionage tradecraft. Such operations do not require the simultaneous access to large numbers of systems needed for a strategic attack and thus are within reach of a much larger array of foreign adversaries.
| Graph IRI | Count |
|---|---|
| http://dbkwik.webdatacommons.org | 7 |