Attackers being diverse and hard to distinguish in a crowd. "Figure 1-10: Attackers" (page 17), Pfleeger, Charles P., et al. Security in Computing. Prentice Hall, 2015.