The important question is whether the penetration would produce valuable intelligence and whether the resulting intelligence is of such value as to warrant risk-taking to the extent of temporary misunderstandings with the country whose set-up is penetrated.4.