Thank you, Mr. Chair, for the question.
As was mentioned, we can't speak to the specifics, but what we can say is that when we become aware of what a cybercriminal's traits look like or what their profile is and that's something we are able to declassify, we definitely want to share that with industry.
That was witnessed in the bulletin we put out in January in particular. We went out and told private industry what Russia might be capable of in the critical infrastructure space just to provide a warning in general about what one should be concerned about, because we know they can operate in a sophisticated manner.
For industry, in relation to hostile states in general and not just Russia in particular, when we understand a profile, such as the one we've been watching for Russia, we give them the necessary advice so they can patch their systems to prevent them from being vulnerable and to really monitor them. That's the other piece that's really important—always keeping an eye on whether things are going as they are supposed to be going.
We offer information sessions, as well as bulletins with advice, on a regular basis. As soon as we are able to provide information that is transparent to the public, we do so.
That goes to the question asked previously about how we really work hard at trying to find ways in which we can declassify the information and make it more public so people are made aware of what the Russians are possibly capable of doing.
Unfortunately, that's about the extent of what I can say.