that there are digital fingerprints, and the code, in effect, of these hacks. one example being the use of cyrillic key boards, that being the russian alphabet, something you would use there and not here. there is the impression that this evidence is somehow secret or murky. as an example, the fbi and department of homeland security released what's in effect a schematic of exactly how the hacks were done. flow charts, they have a code name for it. grizzly step, a name for russian malicious cyber activity. a lot of the ways the hacks were carried out is now being made public so that companies, both private and public, can use the information to prevent acts in the future. >> you know, it's very interesting, the u.s. has identified foreign countries hacking the u.s. before, hasn't it? >> no question. they've done this before with confidence. you may remember in 2013 they were able to identify a specific