Part 9/16:
The real threat involves the collection of technical data, infrastructure vulnerabilities, and political insights. These agents might liaise with foreign handlers or operate independently but ultimately serve the strategic interests of their home nations or clandestine organizations. Bustamante points out that, once inside the system, the rights granted to individuals complicate detection and enforcement efforts, creating vulnerabilities that adversaries exploit.