zObservations
yIT
is in the control loop of every other element of the
nation’s critical infrastructure
yIT
can be a target
yIT
can also be a weapon: can be exploited
to launch or exacerbate an attack, or to interfere with
a response
yIT
has an additional key role in counter-terrorism (e.g.,
datamining) and in response to terrorism (communication)