On completion of our attacks, we debriefed agencies with our specific findings. We also requested log
files to determine whether the agencies had logged our activity. Log files are essential in the case of a
real cyber attack as part of the evidence required by Police to support a prosecution.