encryption-protected and social-media-driven cyber operations