That's what we're trying to do now. It is extremely complex to go back—and I can ask John to explain why—into that data bank of associated data and to do that analysis of what is threat related and non-threat related, what was used before, what was not, and what could be safely destroyed.
We have to take the time to do that analysis before we start destroying that information, if that's the decision.