Recognizing Threat Indicators (part 2)