locations; is that correct? >> yes. and i think you've succinctly illustrated the complexities that you run into here. >> that is why, as thrilling as somebody who has written precursors the fishing code and stolen passwords as part of ethical hacking, i was paid to do this, that underscores the need for us to really be educated about the nature of this battle space, and how more often than not, it's probably more prudent to speak a response that isn't a cyber response, given the fluid nature. we're in an environment now where we see a threat and we build a weapons system. it's on the water, it's in the air, it's on the ground. and then we kind of counter that threat and come up with war plans to use that capability. in cyber space, major weapons systems get created in 24-hour cycles. you have no earthly idea whether or not you have a defensive