Certainly, in terms of defending our networks, the networks that we operate, we have quite a good understanding of what enemy capabilities are. We think we can deal with those attacks or events as they would arise.
One of the distinctions we talked about a bit earlier was, what is an attack? What is just looking, inspecting, spying? We are under constant spying, if you will, or attempts to get into our networks to try to map them. We note that and we react to that also.