Sun works for a private cleared defense contractor. Her facility recently experienced suspicious network activity, but they have not located the source. Could the facility be the victim of adversarial targeting?