Keywords :
security of data; cyberattacks; cyberhuman security; tool shape; Computer crime; Computer security; Internet; Internet of anything; Security; Singularity; United States Intelligence Community; complex adaptive system; cyberattacks; cyberhuman security; cybersecurity;