... snooping on network traffic, deliberately breaking their machines, deliberately punching ...
... holes in the network perimeter, deliberately disabling their firewalls, deliberately interconnecting ...