They mostly, I think, do it in the information layer, not so much on the hard cybersecurity layer. That is to say we don’t see, for example, breaking into candidates’ emails or things like that. We don’t see that yet. It’s mostly on the information operation level.

Keyboard shortcuts

j previous speech k next speech