After reading the attached articles, choose TWO of the following questions and respond. 1. Based on the articles, how long do you think these attacks have been going on? 2. Compare and contrast Chinas ability for computer network attack capabilities to the United States network attack capability. 3. How do you develop strategies or tactics to defend against these attacks? 4. Should the public be made more aware of this activity? Why or why not? 5. Based on the articles, do you feel there is significant evidence for solid attribution?