Anyone who dealt with government contracts and/or internet knows that those 2 statements don't align in any way. This data has to be extremely, extremely, extremely limited and/or useless.
I have had access to this type of data before commercially for purpose. It's useful for knowing "who" has established connections to "who", but at just an IP level. Powerful for combining with other analysis on either the sender or receiver. You won't know what they said, but you know what ports they used.
So if I see a sudden spike in IP addresses geocoded as being in the United States, and the destination is an unusual but specific port hosted in Belarus, it might be worth looking at a new C2 malware.
Anyone who dealt with government contracts and/or internet knows that those 2 statements don't align in any way. This data has to be extremely, extremely, extremely limited and/or useless.