What two methods are used to disseminate information that has been processed, analyzed, and exploited?
a) In-person briefings and secure email
b) Social media and printed newsletters
c) Video conferences and radio broadcasts
d) Online portals and encrypted messaging platforms