... holes in the network perimeter, deliberately disabling their firewalls, deliberately interconnecting ...
... snooping on network traffic, deliberately breaking their machines, deliberately punching ...