div class=ts-pagebuttonPage 1button div class=ts-image amp-img class=ts-thumb alt=Page 1: WHITE PAPER 2015Difficulty identifying perpetrators Perpetrators use Yd-party computers as a tool: enabling attacks DDos attack Spear phishing email attack approx 1406 billion src=https:reader034vdocumentinreader034viewer2022052017603010ebbeb369423a0cbfd8html5thumbnails1jpg width=142 height=106 layout=responsive amp-img divdivdiv class=ts-pagebuttonPage 2button div class=ts-image amp-img class=ts-thumb alt=Page 2: WHITE PAPER 2015Difficulty identifying perpetrators Perpetrators use Yd-party computers as a tool: enabling attacks DDos attack Spear phishing email attack approx 1406 billion src=https:reader034vdocumentinreader034viewer2022052017603010ebbeb369423a0cbfd8html5thumbnails2jpg width=142 height=106 layout=responsive amp-img divdivdiv class=ts-pagebuttonPage 3button div class=ts-image amp-img class=ts-thumb alt=Page 3: WHITE PAPER 2015Difficulty identifying perpetrators Perpetrators use Yd-party computers as a tool: enabling attacks DDos attack Spear phishing email attack approx 1406 billion src=https:reader034vdocumentinreader034viewer2022052017603010ebbeb369423a0cbfd8html5thumbnails3jpg width=142 height=106 layout=responsive amp-img divdiv