Mr. Chair, this is part of the complex environment, and this is why it's so important to work with the institutions.
We've seen attacks through traditional espionage activities. We see it through cyber-espionage. We've seen it through collaboration on research projects. Sometimes we'll have people with different affiliations come in overtly and have access to information that should probably be kept a bit more discreet. We also have seen people misrepresenting themselves to have access to that information.
What you're looking at is an ecosystem with the clear intent of trying to get information, and whatever tool is at the disposal of the foreign state will be used to get to that information. I think this is what represents the most significant challenge for all of us: We need to be able to address and mitigate the threat coming from many different vectors at the same time.