How Cyber Criminals Collect Confidential Intelligence From ICS