Effects-based Targeting for Critical Infrastructure

  • Tuesday, February 25, 2014 | 4:00 PM – 5:00 PM | West | Room: 3002

View all Sessions

This session describes effects-based targeting per U.S. military doctrine. Relying on surprising ex-post OSINT analysis of Stuxnet, it describes how the U.S.A. delivered malware to industrial objectives within Iran (it wasn't just via USB). Presenters show how target analysis can be used against critical infrastructure in the U.S.A., and introduce the concept of Reconnaissance Surface Management.


This document was retrieved from on Mon, 25 Sep 2017 07:45:25 -0400.
© 2017 EMC Corporation. All rights reserved.