10
zObservations
yIT is in the control loop of every other element of the nation’s critical infrastructure
yIT can be a target
yIT can also be a weapon:  can be exploited to launch or exacerbate an attack, or to interfere with a response
yIT has an additional key role in counter-terrorism (e.g., datamining) and in response to terrorism (communication)