ABSTRACT

Cyber Threat Vignettes   [open pdf - 512KB]

This guide from the U.S. Army Office of the Provost Marshal General in collaboration with the U.S. Army Cyber Command examines cyber threats. From the document: "Adversaries will use cyberspace to commit espionage, subversion (including insider threat), and sabotage. […] Adversaries gain intelligence and access via cyberspace in order to: [1] Recruit insiders (subversion) [2] Commit acts of sabotage (stop Army missions; crash networks, electric power, water facilities) [3] Harm Army personnel, families, units, and operations [4] Commit criminal actions against Army installations, facilities, units, personnel, and/or family members [5] Enable conventional threat capabilities [6] Identify U.S. vulnerabilities in weapons systems, facilities, and tactics, techniques, and procedures[.]"

Publisher:
Date:
2012-11
Copyright:
Public Domain
Retrieved From:
Public Intelligence: http://www.publicintelligence.net/
Media Type:
application/pdf
URL:
Help with citations