The document appears to be a presentation on mobile security and advanced persistent threats. It discusses security issues in the mobile ecosystem including vulnerabilities in mobile networks, devices, and operating systems. It also covers the evolution of mobile malware and how advanced persistent threats are now targeting mobile devices. The presentation concludes by asking what new undisclosed techniques may be used in the future.