The letters of potential threat actors have been scrambled. Work out the names of the potential threat actors and write them into the box.
NB Where 2 words are used, each word will only contain the letters associated with that word. EG For ‘cyber security’ the scrambled word ‘cyber’ would only contain letters c,y,b,e,r (bryec)
