What I’m trying to say is just that when the harms are gradually being assembled and aggregated, as long as it conforms to the format of the MITRE ATT&CK, the cybersecurity institutions in private and public sectors know how to address and coordinate responses if it’s of that format.