Can the security community change to “go after” bad actors, not merely “defend” the cyber territory. What if we designed the defenses to record the attacker to the extent possible? Then deploy offensive counter measures and civil and if possible criminal actions as part of the “security program.”?