Effects-based Targeting for Critical Infrastructure

  • Tuesday, February 25, 2014 | 4:00 PM – 5:00 PM | West | Room: 3002

View all Sessions

This session describes effects-based targeting per U.S. military doctrine. Relying on surprising ex-post OSINT analysis of Stuxnet, it describes how the U.S.A. delivered malware to industrial objectives within Iran (it wasn't just via USB). Presenters show how target analysis can be used against critical infrastructure in the U.S.A., and introduce the concept of Reconnaissance Surface Management.


This document was retrieved from on Sat, 22 Sep 2018 23:09:27 -0400.