Conducting Network Penetration and Espionage in a Global Environment