The hackers broke through the B security model, so no more role level security; all critical data must use access control lists from now on.