Part one. Espionage: Exploiting home-field advantage
Defeating encryption
Building a backdoor
Strategic espionage
Counterintelligence
Part two. Attack: Strategic sabotage
Targeted disruption
Coercion
Testing and demonstration
Part three. Destabilization: Election interference
Exposure
Theft, ransom, and manipulation
Widespread disruption.