Eight Identity Management Practices for Stopping State Sponsored Cyber Attacks on Washington