Only Text Quote

In the future, we will probably see cyber operations that change or manipulate electronic information to compromise its integrity instead of simply deleting the access to it.