The development of cyber warfare in the US – part 5