Attackers had power to shut networks down but chose to snoop on users instead.