Influence Operations in Cyber: Characteristics and Insights