I will let John answer that.
But I can say that when associated data is threat-related, an operational report is produced. We are able to establish the link, that is, to go back to the operational report and find the associated data that was used to produce the report. That is how we work.
John, do you want to add anything more specific?