TL;DR: When attackers probe government systems, they often begin not with stolen credentials or phishing emails but with aging routers and firewalls left running long past their expiration dates.
Some results have been hidden because they may be inaccessible to you
Show inaccessible results