Understanding the psychology of threat actors. Can be leveraged against operators and can be used to exhaust them