The document discusses unconventional approaches to cybersecurity threats. It notes that conventional testing methods only find known vulnerabilities but cannot discover unknown exposures ("unknown unknowns") that can enable compromises. It provides examples where unknown unknowns were discovered, including a bank with compromised servers and a government agency with an insecure configuration. The document argues that people are often a weak link ("wet targets") that are ignored. It advocates threat modeling like attackers to identify potential vulnerabilities through open source intelligence and dark web monitoring before threats go public. The approach seeks to emulate "minority reporting" styles to discover unknown risks and assume systems are already compromised.