Sourcing a threat assessment