How the Network Is Used to Unmask the Adversary