Invading the fortress: how to besiege reinforced information bunkers | IEEE Conference Publication | IEEE Xplore