Give me an example of a legitimate threat, then an example of it being applied proportionally to that threat?
I will also provide an example and let me know how you think it should be applied to this example:
http://apple.news/AYuGGzW0zQLuXraFlMBL8yA
Very early Thursday, just after midnight...