There are quite a few elements to that question. The first piece is that, when we're procuring, we procure for requirements, so we need a certain capacity or capability to do some aspect. That's what we'll look for. As part of that, there is also a security assessment that's done. We work with our partners at the Communications Security Establishment to ensure supply chain integrity, to make sure that the ownership....
Then lastly, it's how those tools are used and how we deploy them, so for example, any tools like this we use in an isolated lab so that the data stays under our control, in our physical possession and physically isolated as well.