We ranked threats by category in our June 2017 report.
Here's an example that goes to your question. Synchronization and subcontracting do occur between states and perhaps between criminal entities.
In reality, we constantly monitor all threats. Threat prevention and detection measures and ways to react to threats are based on each group, not on a more dominant group. We monitor all groups. We, of course, observe any interconnections that didn't previously exist. People employed by others become threats without knowing it. Some firms even believe they're operating entirely legally in executing contracts, but are in fact being used to conduct research on others. This phenomenon is real, and we're aware of it. We're doing what we can.
Mr. Rogers, do you want to add something on the subject of threats?