9

Click here to load reader

Industrial Security, Cyber Operations, and Asymmetric Warfare: Domestic Intelligence Threats in Post-9/11 America

Embed Size (px)

Citation preview

Page 1: Industrial Security, Cyber Operations, and Asymmetric Warfare: Domestic Intelligence Threats in Post-9/11 America

7/30/2019 Industrial Security, Cyber Operations, and Asymmetric Warfare: Domestic Intelligence Threats in Post-9/11 America

http://slidepdf.com/reader/full/industrial-security-cyber-operations-and-asymmetric-warfare-domestic-intelligence 1/9

Bnlz}|uba` ]jmzub|r, Mreju Dwjua|bdn}, anl A}rhhj|ubm [aufauj

Ldhj}|bm Bn|j``bkjnmj \cuja|} bn Wd}|(2$11 Ahjubma

er

Udeju| K. Fjuuj``

Azkz}|, 5715

Page 2: Industrial Security, Cyber Operations, and Asymmetric Warfare: Domestic Intelligence Threats in Post-9/11 America

7/30/2019 Industrial Security, Cyber Operations, and Asymmetric Warfare: Domestic Intelligence Threats in Post-9/11 America

http://slidepdf.com/reader/full/industrial-security-cyber-operations-and-asymmetric-warfare-domestic-intelligence 2/9

Bnlz}|uba` ]jmzub|r, Mreju Dwjua|bdn}, anl A}rhhj|ubm [aufaujLdhj}|bm Bn|j``bkjnmj \cuja|} bn Wd}|(2$11 Ahjubma

5

\cj hdljun ea||`jfbj`l b} jvd`vbnk luaha|bma``r a{ar fudh |cj |ualb|bdna`

}rhhj|ubm }|uzkk`j ej|{jjn dwwd}bnk wudfj}}bdna` auhbj} df |{d du hduj }dvjujbkn

na|bdn} a`dnk ljfbnjl ea||`j fudn|} |d an a}rhhj|ubm kzjub``a hdlj` {cjuj a| `ja}| dnj df

|cj wubhaur mdhea|an|} ca} nd ujmdknb jl }|a|j }zwwdu| anl jhw`dr} ndnmdnvjn|bdna`

|am|bm} a| |uan}bjn| f`a}c wdbn|} bn du njau }|ua|jkbm |aukj|} df dwwdu|znb|r. [cb`j |cb} hdlj

df mdnf`bm| ca} nd ldze| jsb}|jl fdu a} `dnk a} czhan mdhea|, b| ca} a}}zhjl a

mdn}bljuae`r cbkcju wudfb`j bn ujmjn| ljmalj} anl man nd `dnkju ej ujkauljl a} an

dwjua|bdna` andha`r.\ualb|bdna` auhbj} auj `bhb|jl bn }b j er `dkb}|bma` mdn}bljua|bdn}? wudvb}bdn},

ha|jubj`, fzj`, anl fbj`l hjlbma` famb`b|bj} ejbnk ahdnk |cj hd}| muzmba`. \cj a}rhhj|ubm

mdhea| fdumj jscbeb|} hzmc `j}} uj`banmj dn }j`f(}zww`bjl bnfua}|uzm|zuj} anl lzj |d |cjbu

uj`a|bvj`r }ha`` fuakhjn|aub`r lb}wju}jl znb|} man jhw`dr a ‐war(a}(rdz(kd‘ awwudamc |d

uj}zww`r nd| avab`ae`j |d `aukju hb`b|aur wuj}jnmj} ljw`drjl bn |cja|ju. A mdhebna|bdn df

fduakbnk, mdhhjumj {b|c `jkb|bha|j }rhwa|cj|bm du njz|ua` `dma`}, anl ‐e`ami hauij|‘

mcannj`} }zffbmj} |d }zwwdu| |cj cbkc`r hdeb`j }|ubij |jah} hd}| mdhhdn`r ljw`drjl er

cd}|b`j} bn a}rhhj|ubm dwjua|bdn}.

]bnmj |cj }|ua|jkbm deojm|bvj} df a}rhhj|ubm {aufauj auj df|jn `bhb|jl |d `dma` du

ujkbdna` }dmbdwd`b|bma` lj}|aeb`b a|bdn, ua|cju |can bhhjlba|j fz`` mdn|ud` df a`` mbvb`ban

anl hb`b|aur bnfua}|uzm|zuj, |cj mub|juba er {cbmc hb`b|aur }zmmj}} b} hja}zujl bn |cj}j

dwjua|bdn} auj mdn}bljuae`r `j}} }|ubnkjn| |can |cd}j aww`bmae`j |d |ualb|bdna` auhbj}. \cj

alvju}j jffjm|} df a``d{bnk jnjhbj} |d amcbjvj |cd}j deojm|bvj} auj nd `j}} }bknbfbman| fdu

|cjbu ndn(mdhwujcjn}bvj na|zuj, cd{jvju. Js|ujhb}| bljd`dkbj} |cubvj bn a m`bha|j df

Page 3: Industrial Security, Cyber Operations, and Asymmetric Warfare: Domestic Intelligence Threats in Post-9/11 America

7/30/2019 Industrial Security, Cyber Operations, and Asymmetric Warfare: Domestic Intelligence Threats in Post-9/11 America

http://slidepdf.com/reader/full/industrial-security-cyber-operations-and-asymmetric-warfare-domestic-intelligence 3/9

Bnlz}|uba` ]jmzub|r, Mreju Dwjua|bdn}, anl A}rhhj|ubm [aufaujLdhj}|bm Bn|j``bkjnmj \cuja|} bn Wd}|(2$11 Ahjubma

=

fjau, znmju|abn|r, anl |cj mdn}|an| |cuja| df vbd`jnmj, anl b| b} wujmb}j`r |cj}j mdnlb|bdn}

|ca| a}rhhj|ubm {aufauj |am|bm} jsmj` bn eubnkbnk aedz|.

\cj va}| haodub|r df bnndva|bdn} bn {aufauj auj kjnjua|jl nd| er hb`b|aur

wju}dnnj`, ez| er wubva|j bnlz}|ur {duibnk znlju mdn|uam| |d |cj vaubdz} hb`b|aur

dukanb a|bdn} {du`l{blj. Bn |cj Znb|jl ]|a|j} |cj}j mdn|uam|du} fa`` wubhaub`r znlju |cj

ajkb} df |cj Na|bdna` Bnlz}|uba` ]jmzub|r Wudkuah Dwjua|bnk Hanza`, du NB]WDH #LdL

:557.55(H". \cj wzuwd}j df |cb} ldmzhjn| b} |d wudvblj eudal }jmzub|r }afjkzaul} znlju

{cbmc |jmcnd`dkbj} df hb`b|aur }bknbfbmanmj ujqzbubnk ammj}} |d m`a}}bfbjl bnfduha|bdn

har ej ljvj`dwjl {cb`j hbnbhb bnk |cj |cuja| df mdhwudhb}j df |ca| bnfduha|bdn ercd}|b`j bn|juj}|}. \cj Ljfjn}j ]jmzub|r ]juvbmj #L]]", znlju |cj lbujm|bdn df |cj Znlju

]jmuj|aur df Ljfjn}j fdu Bn|j``bkjnmj, wudvblj} kdvjunhjn|a` dvju}bkc| fdu |cd}j

mdn|uam|du} }zeojm| |d |cj NB]WDH.

Uj}jaumc anl ljvj`dwhjn| bn |cj hb`b|aur |jmcnd`dkbj} aujna ujqzbuj} an

jnduhdz} mdhhb|hjn| df ed|c fbnanmba` anl czhan mawb|a`. ]|a|j(}zwwdu|jl j}wbdnakj

jffdu|} er cd}|b`j bn|juj}|} auj qzb|j na|zua``r an auja df }bknbfbman| mdnmjun anl

mdzn|jubn|j``bkjnmj dwjua|bdn} |d njz|ua`b j |cj}j jffdu|} auj {j``(ljfbnjl af|ju hanr

rjau} df fbj`l jswjubjnmj. Cd{jvju, |cj dukanb a|bdna` }|uzm|zuj df a}rhhj|ubm {aufauj

dwjua|bvj} b} `bij`r |d ej fau `j}} |ankbe`j anl {b`` uj`r dn j}wbdnakj |aukj|} df

dwwdu|znb|r ua|cju |can fduha``r fznljl `dnk |juh bn|j``bkjnmj(ka|cjubnk bnb|ba|bvj}.

\cj}j |aukj|} df dwwdu|znb|r auj bncjujn|`r |uan}bjn|, cbkc(va`zj, anl hduj lbffbmz`| |d

wujlbm| z}bnk mdnvjn|bdna` |cuja| ana`r}b} hdlj`}.

A} a uj}z`| df |cj znbqzj lar(|d(lar wau|nju}cbw ej|{jjn L]] fbj`l akjn|} anl |cj

Na|bdna` Bnlz}|uba` ]jmzub|r Wudkuah mdn|uam|du} {cdh |cjr }zwwdu|, |cj L]] b} blja``r

Page 4: Industrial Security, Cyber Operations, and Asymmetric Warfare: Domestic Intelligence Threats in Post-9/11 America

7/30/2019 Industrial Security, Cyber Operations, and Asymmetric Warfare: Domestic Intelligence Threats in Post-9/11 America

http://slidepdf.com/reader/full/industrial-security-cyber-operations-and-asymmetric-warfare-domestic-intelligence 4/9

Bnlz}|uba` ]jmzub|r, Mreju Dwjua|bdn}, anl A}rhhj|ubm [aufaujLdhj}|bm Bn|j``bkjnmj \cuja|} bn Wd}|(2$11 Ahjubma

<

}b|za|jl |d fduh |cj fudn| `bnj df ljfjn}j akabn}| bn|j``bkjnmj(ka|cjubnk dwjua|bdn}

mdnlzm|jl er |cj}j a}rhhj|ubm cd}|b`j bn|juj}|}. [cb`j d|cju kdvjunhjn| dukanb a|bdn}

hz}| uj`r dn |cj mdn|uam|du} |cjh}j`vj} nd| dn`r fdu ujwdu|bnk df }z}wbmbdz} am|bvb|r ez|

fdu bhw`jhjn|bnk wujvjn|a|bvj }jmzub|r hja}zuj}, |cj L]] wudvblj} lbujm| dn}b|j

`dkb}|bma` }zwwdu| |d |cj}j mdn|uam|du} bn |cj fduh df }jmzub|r vz`njuaeb`b|r a}}j}}hjn|}

anl alvb}j anl a}}b}| vb}b|}.

Bn |ualb|bdna` mdnf`bm|} |cj ez`i df |cj }jmzub|r |cuja| b} fdmz}jl bn |cd}j auja}

{cjuj |cj dwwd}bnk fdumj} auj bn m`d}j wcr}bma` wudsbhb|r. [cb`j CZHBN\ anl

w}rmcd`dkbma` dwjua|bdn} cavj a`{ar} ejjn wau| df |cj dvjua`` |am|bma` wbm|zuj, |cj}jhb}}bdn} {juj `bhb|jl bn }mdwj anl ujqzbujl mdn}bljuae`j `dkb}|bma` }zwwdu|, ed|c

amind{`jlkjl anl mdvju|, |d mauur dz|. [b|c kud{bnk hb`b|aur uj`banmj dn zebqzb|dz}

mdhwz|ju nj|{dui}, cd{jvju, |jmcnd`dkbma``r aljw| mdhea|an|} man `aznmc a {blj uankj

df ed|c bn|j``bkjnmj(ka|cjubnk anl mreju dffjn}bvj dwjua|bdn} fudh ujhd|j, wcr}bma``r

}jmzuj `dma|bdn}. Mdhwudhb}j df mub|bma` la|a, ljnba` df }juvbmj a| }|ua|jkbma``r }bknbfbman|

wdbn|} df fab`zuj, anl hduj }ze|`j |cuja|} |d |am|bma` la|a bn|jkub|r“{cbmc man md``jm|bvj`r

ej |juhjl –mreju|am|bma` dwjua|bdn}‒“auj ejmdhbnk bnmuja}bnk`r mdhhdnw`amj a}

mreju{aufauj a}}zhj} b|} ud`j a} an bn|jkua` lbhjn}bdn df ea||`j}wamj.

M`jaujl Ljfjn}j Mdn|uam|du}, du MLM}, auj }bknbfbman| |aukj|} fdu cd}|b`j

mreju|am|bma` dwjua|bdn} bn |ca| |cjr kjnjua``r wuj}jn| a eudal Bn|junj|(fambnk |cuja|

cdub dn a} a uj}z`| df ez}bnj}} mdhhznbma|bdn} ujqzbujhjn|}. [cb`j bn |cjdur mub|bma`

la|a b} nd| ammj}}be`j vba |cb} vjm|du, bn wuam|bmj |ca| eauubju b} }jhbwjuhjae`j. \cj ljkujj

df wjuhjaeb`b|r b} ljwjnljn| dn a nzheju df fam|du}, bnm`zlbnk |cj `dkbma` wudsbhb|r df

|cj wze`bm(fambnk ka|j{ar |d }jn}b|bvj bnfduha|bdn ujwd}b|dubj}, |cj |rwj} df |jmcnbma` la|a

Page 5: Industrial Security, Cyber Operations, and Asymmetric Warfare: Domestic Intelligence Threats in Post-9/11 America

7/30/2019 Industrial Security, Cyber Operations, and Asymmetric Warfare: Domestic Intelligence Threats in Post-9/11 America

http://slidepdf.com/reader/full/industrial-security-cyber-operations-and-asymmetric-warfare-domestic-intelligence 5/9

Bnlz}|uba` ]jmzub|r, Mreju Dwjua|bdn}, anl A}rhhj|ubm [aufaujLdhj}|bm Bn|j``bkjnmj \cuja|} bn Wd}|(2$11 Ahjubma

:

avab`ae`j dn |cj znm`a}}bfbjl }r}|jh}, anl |cj dvjua`` }jmzub|r wd}|zuj df |cj famb`b|r.

]dhj df |cj hd}| va`zae`j la|a fdu mreju|am|bma` md``jm|du}, bn fam|, b} znm`a}}bfbjl mdn|am|

bnfduha|bdn fdu jnkbnjju}, |jmcnbmban}, anl mdn|uam|du `jalju}cbw, a} |cb} ind{`jlkj

jnae`j} |cjh |d mdnlzm| hduj jffjm|bvj }dmba` jnkbnjjubnk dwjua|bdn}. \cj}j uzn |cj

kahz| fudh –}wjau(wcb}cbnk‒ #jsw`bmb|`r |aukj|jl bnfduha|bdn }d`bmb|a|bdn} awwjaubnk |d

dubkbna|j fudh a |uz}|jl }dzumj" |d –odj(odeebnk‒ #}wddfbnk |cj cauvj}|jl jhab` alluj}}j}

a} |cj }jnlju df ha}} zn}d`bmb|jl jhab`} bn an a||jhw| |d j`bmb| uj|a`ba|dur am|bdn} akabn}|

anl$du |aunb}c |cj ujwz|a|bdn df |cj }wddfjl }jnlju" |d awwaujn| |uz}|jl mdn|am|} lbujm|bnk

ujmbwbjn|} |d }b|j} {cjuj ha`bmbdz} }df|{auj har ej bn}|a``jl dn |cjbu hamcbnj} erjsw`db|bnk dwjua|bnk }r}|jh du aww`bma|bdn(}wjmbfbm vz`njuaeb`b|bj}.

Bn a}rhhj|ubm {aufauj dnj du hduj df |cj mdhea|an|} df|jn ca} nd fduha` #du a|

`ja}| amind{`jlkjl" }zwwdu| fudh a }dvjujbkn }|a|j. \cb} lb}jnfuanmcb}jhjn| {dui} bn

|cjbu favdu lzubnk mreju|am|bma` dwjua|bdn}, j}wjmba``r, }bnmj avdblbnk nj|{dui wa|c} |ca|

man ja}b`r ej |uamjl eami |d |cjh b} |cjujer kuja|`r famb`b|a|jl. [cb`j hanr dwjua|bdna`

mdn}bljua|bdn} ujkaulbnk |cj ud`j df MLM} auj mdhhdn |d ed|c a}rhhj|ubm anl

mdnvjn|bdna` {aufauj, |cj znbqzj mdhwdnjn|} df |cj uj`a|bdn}cbw ej|{jjn MLM} anl

a}rhhj|ubm mdhea| dwjua|bdn} hjub| m`d}ju jsahbna|bdn.

A}rhhj|ubm mdhea|an| mdhhanl} hd}| df|jn `ami |cj bnfua}|uzm|zuj anl fbnanmba`

uj}dzumj} |d mdnlzm| }bknbfbman| {jawdn} du |j`jmdhhznbma|bdn} uj}jaumc anl

ljvj`dwhjn| dn |cjbu d{n. A} a uj}z`|, |cjr auj a`hd}| jn|buj`r ljwjnljn| dn

}rhwa|cj|bm }|a|j} anl$du |cj ‐e`ami hauij|‘ fdu ha|jubj`. \cb} muja|j} a m`bha|j bn {cbmc

|cj }|ua|jkbm va`zj df bnlz}|uba` j}wbdnakj b} jvjn hduj wudndznmjl |can |ca| fdu

|ualb|bdna` }dvjujbkn(}|a|j hb`b|aubj} {cbmc jnodr |cj `zszur df }|a|j(}zwwdu|jl uj}jaumc

Page 6: Industrial Security, Cyber Operations, and Asymmetric Warfare: Domestic Intelligence Threats in Post-9/11 America

7/30/2019 Industrial Security, Cyber Operations, and Asymmetric Warfare: Domestic Intelligence Threats in Post-9/11 America

http://slidepdf.com/reader/full/industrial-security-cyber-operations-and-asymmetric-warfare-domestic-intelligence 6/9

Bnlz}|uba` ]jmzub|r, Mreju Dwjua|bdn}, anl A}rhhj|ubm [aufaujLdhj}|bm Bn|j``bkjnmj \cuja|} bn Wd}|(2$11 Ahjubma

6

anl ljvj`dwhjn| am|bvb|bj}. Wcb}cbnk, }dmba` jnkbnjjubnk, anl d|cju fduh} df Bn|junj|(

ea}jl cauvj}|bnk auj blja` bn|j``bkjnmj(ka|cjubnk vjm|du} fdu cd}|b`j bn|juj}|} {b|c `bhb|jl

hanwd{ju anl fb}ma` uj}dzumj}. Nd uja` |jmcnd`dkbma` aw|b|zlj b} ujqzbujl ejrdnl |ca|

njmj}}aur fdu uznnbnk anr df a nzheju df jsw`db| |dd`} fujj`r du uj`a|bvj`r bnjswjn}bvj`r

avab`ae`j dn |cj Bn|junj|.

Jsfb`|ua|bdn df m`a}}bfbjl, wudwubj|aur, anl d|cju{b}j }|ua|jkbma``r }bknbfbman|

bnfduha|bdn b} anl {b`` mdn|bnzj |d ej a haodu |cuja| |d na|bdna` }jmzub|r. Hzmc df |ca|

bnfduha|bdn b} bn |cj canl} df MLM}. M`a}}bfbjl bnfduha|bdn #ed|c md``a|jua` anl ]MB"

kjnjua|jl du }afjkzauljl er MLM} b} znlju |cj }jmzub|r dvju}bkc| df |cj L]], LBA, du |cj kdvjunhjn| mdn|uam|bnk am|bvb|r #KMA" |ca| d{n} |cj bnfduha|bdn. Cd{jvju, a kuja|

lja` df Mdn|ud``jl Znm`a}}bfbjl Bnfduha|bdn #MZB" jsb}|} ujkaulbnk {jawdn }r}|jh},

dwjua|bdn}, anl }zwwdu| }juvbmj}. [cb`j nd| m`a}}bfbjl wju }j , |cb} bnfduha|bdn mdz`l

ndnj|cj`j}} ej js|ujhj`r z}jfz` |d dzu alvju}aubj} anl b|} `d}} {dz`l cavj a }bknbfbman|

njka|bvj bhwam| dn na|bdna` bn|juj}|}. Wud|jm|bdn df |cb} va`zae`j bnfduha|bdn b} `jf|

`aukj`r |d |cj bnlbvblza` MLM {b|c `b||`j |d nd dvju}bkc|9 |cj uj}z`| b} |ca| wud|jm|bvj

hja}zuj} vaur {blj`r fudh dnj dukanb a|bdn |d |cj njs|.

\cj ae}jnmj df a znbfduh wud|jm|bvj }|ua|jkr fdu znm`a}}bfbjl ez| }|ua|jkbma``r

bhwdu|an| bnfduha|bdn muja|j} bnnzhjuae`j wdmij|} df dwwdu|znb|r fdu k`janbnk am|bvb|r

er alvju}auba` fam|bdn}, df|jn {b|c dn`r a }ha`` wudeaeb`b|r df lj|jm|bdn. [cb`j bnlbvblza`

jsfb`|ua|bdn jwb}dlj} har nj| dn`r a }ha`` ahdzn| df la|a, hz`|bw`j dwjua|bdn} lbujm|jl a|

a kbvjn wudkuah har jvjn|za``r uj}z`| bn |cj `d}} df jn|buj la|a}j|} |cudzkc mzhz`a|bvj

mdhwb`a|bdn. ]jvjua` akjnmbj} cavj fbj`l dwjua|bvj} {cd w`ar lbujm| du anmb``aur ud`j} bn

|cj jffdu| |d mzu|ab` `d}} df mub|bma` bnfduha|bdn er MLM}, bnm`zlbnk |cj FEB, |cj hb`b|aur

Page 7: Industrial Security, Cyber Operations, and Asymmetric Warfare: Domestic Intelligence Threats in Post-9/11 America

7/30/2019 Industrial Security, Cyber Operations, and Asymmetric Warfare: Domestic Intelligence Threats in Post-9/11 America

http://slidepdf.com/reader/full/industrial-security-cyber-operations-and-asymmetric-warfare-domestic-intelligence 7/9

Bnlz}|uba` ]jmzub|r, Mreju Dwjua|bdn}, anl A}rhhj|ubm [aufaujLdhj}|bm Bn|j``bkjnmj \cuja|} bn Wd}|(2$11 Ahjubma

;

mdhwdnjn| bnvj}|bka|bvj akjnmbj}, anl LC]. Ndnj df |cj}j wd}}j}}j} |cj ljw|c df

uj`a|bdn}cbw {b|c ijr MLM }jmzub|r anl hanakjhjn| wju}dnnj` jnodrjl er L]],

cd{jvju. A} a uj}z`|, L]] Bnlz}|uba` ]jmzub|r, Bnfduha|bdn ]jmzub|r, anl

Mdzn|jubn|j``bkjnmj Fbj`l Dwjua|bdn} akjn|} auj znbqzj`r anl blja``r wd}b|bdnjl |d |aij a

`jal ud`j bn ed|c }jmzub|r hja}zuj} jlzma|bdn anl hb|bka|bdn df |cuja|} wuj}jn|jl |d |cj

M`jaujl Bnlz}|uba` Ea}j er a}rhhj|ubm mreju alvju}aubj}.

[cb`j a||ami} dn MLM}‒ m`a}}bfbjl }r}|jh} auj `bhb|jl a`hd}| jsm`z}bvj`r |d

bn}blju} {b|c ammj}}, m`jauanmj, njjl |d ind{, anl hd|bva|bdn} uankbnk fudh bljd`dkbma`

fjuvdu |d }bhw`j avaubmj, znm`a}}bfbjl la|a wudmj}}bnk b} }zeojm| |d |cuja|} amud}} a hzmc eudalju cdub dn. \cj m`a}}bfbjl jnvbudnhjn| b} |bkc|`r mdn|ud``jl, {b|c js|jn}bvj }jmzub|r

ujqzbujhjn|} mdvjubnk a`` a}wjm|} df dwjua|bdn, ez| |cjuj jsb}| nd k`dea``r bhw`jhjn|jl

}jmzub|r }|anlaul} fdu znm`a}}bfbjl mdhwz|bnk. [cb`j |cj NB]WDH, BML :7=, NB]\ 377

}jubj}, LB]A ]\BK}, anl d|cju }|anlaul} ldmzhjn|} bhwd}j a uj`a|bvj`r znbfduh }j| df

ujqzbujhjn|} dn mdn|uam|du} wudmj}}bnk m`a}}bfbjl bnfduha|bdn, B\ }jmzub|r wd`bmbj} anl

wudmj}}j} dn |cj znm`a}}bfbjl }blj auj hauijl`r bnmdn}b}|jn| amud}} bnlz}|ur anl df|jn

jvjn {b|cbn a mduwdua|j jn|b|r.

]|a|j(}wdn}dujl jsfb`|ua|bdn dwjua|bdn} hd}| df|jn |aukj| ma|jkdubj} df la|a ind{n

er mdzn|jubn|j``bkjnmj akjnmbj} |d ej df bn|juj}| |d a wau|bmz`au na|bdn a} a uj}z`| df

ldmzhjn|jl du }z}wjm|jl |jmcnd`dkr kaw}. A} an jsahw`j, |cj Z]]U {a} ind{n |d fbnl

mub|bma` hb`b|aur |jmcnd`dkbj} |d ej df wau|bmz`au bn|juj}| lzubnk |cj md`l {au. Af|ju |cj

md``aw}j df |cj ]dvbj| Znbdn, cd{jvju, cauvj}|bnk jffdu|} }cbf|jl luaha|bma``r a{ar fudh

hb`b|aur wudlzm|} |d mbvb`ban |j`jmdhhznbma|bdn} anl bnfduha|bdn wudmj}}bnk

|jmcnd`dkbj}.

Page 8: Industrial Security, Cyber Operations, and Asymmetric Warfare: Domestic Intelligence Threats in Post-9/11 America

7/30/2019 Industrial Security, Cyber Operations, and Asymmetric Warfare: Domestic Intelligence Threats in Post-9/11 America

http://slidepdf.com/reader/full/industrial-security-cyber-operations-and-asymmetric-warfare-domestic-intelligence 8/9

Bnlz}|uba` ]jmzub|r, Mreju Dwjua|bdn}, anl A}rhhj|ubm [aufaujLdhj}|bm Bn|j``bkjnmj \cuja|} bn Wd}|(2$11 Ahjubma

3

A}rhhj|ubm alvju}aubj} auj caulju |d wudfb`j bn |cb} ujkaul anl auj hzmc hduj

wudnj |d }jji {blj(}wjm|uzh |aukj|} df dwwdu|znb|r. Cd}|b`j jn|b|bj} mdnlzm|bnk mreju

dwjua|bdn} akabn}| MLM} auj df|jn `ddibnk fdu anr avab`ae`j bnfduha|bdn, ua|cju |can

ijrbnk dn dnj du a }ha`` nzheju df }wjmbfbm la|a |aukj|}. \cb} bnlb}mubhbna|j cauvj}|bnk

muja|j} an zukjn| njjl fdu udez}| bnfduha|bdn }jmzub|r mdn|ud`} dn znm`a}}bfbjl }r}|jh}

amud}} |cj jn|buj MLM mdhhznb|r. Uanibnk a wau|bmz`au famb`b|r du wudkuah ea}jl dn cd{

`bij`r |cjbu |jmcnd`dkbj} auj |d ej |aukj|jl anl aww`rbnk bnfduha|bdn }jmzub|r mdn|ud`}

dn`r dn |cd}j }r}|jh} mdn|abnbnk hduj –a||uam|bvj‒ la|a b} nd| an jffjm|bvj |cuja|

hb|bka|bdn hdlj` {cjn a}rhhj|ubm dwwdnjn|} auj mdn}bljujl anl b} hjuj`r a fduh df ‐}jmzub|r |cudzkc de}mzub|r.‘

Hb|bka|bdn df |cuja|} |d AB] b} ej}| awwudamcjl z}bnk cd`b}|bm wudam|bvb|r, ua|cju

|can ujam|bvj`r. Ujam|bvj hb|bka|bdn b} hduj aibn |d lahakj mdn|ud`, {cbmc bhw`bj}

lahakj ca} ejjn }z}|abnjl. \cj blja` uj}wdn}j |d mreju |cuja|} har ej |juhjl

–ea}|bdnbnk,‒ {cjuj `arjujl ljfjn}j} bnm`zlbnk ujlzm|bdn df a||ami vjm|du}, bn|uz}bdn

lj|jm|bdn$mdzn|juhja}zuj}, anl }d`bl dwjua|bdna` }jmzub|r wuam|bmj} mdhebnj |d muja|j a

cauljnjl |aukj| {b|c hbnbha` ub}i df mdhwudhb}j. [cb`j fduha``r j}|ae`b}cjl bnmbljn|

uj}wdn}j hja}zuj} auj awwudwuba|j {cjn |cj ea}|bdn ca} ejjn eujamcjl, |cjr }cdz`l nd|

ej hb}|aijn fdu mdn}|b|z|bnk an aljqza|j ljfjn}bvj wd}|zuj bn |cjh}j`vj}.

\cj L]] fbj`l mdzn|jubn|j``bkjnmj ud`j b} mzuujn|`r `bhb|jl |d wudvblbnk |cuja|

eubjfbnk} anl md``jm|bnk vd`zn|aub`r }zww`bjl la|a mdnmjunbnk }z}wbmbdz} mdn|am|}

|aukj|bnk a famb`b|r du b|} wju}dnnj`. Cd{jvju, kbvjn |cj akjnmr‒} znwaua``j`jl ammj}} |d

anl m`d}j {duibnk uj`a|bdn}cbw} {b|c MLM Famb`b|r ]jmzub|r Dffbmju} anl Bnfduha|bdn

]r}|jh} ]jmzub|r Hanakju}, a uj`a|bvj`r }ha`` bnvj}|hjn| abhjl a| bnmuja}bnk |cj L]]

Page 9: Industrial Security, Cyber Operations, and Asymmetric Warfare: Domestic Intelligence Threats in Post-9/11 America

7/30/2019 Industrial Security, Cyber Operations, and Asymmetric Warfare: Domestic Intelligence Threats in Post-9/11 America

http://slidepdf.com/reader/full/industrial-security-cyber-operations-and-asymmetric-warfare-domestic-intelligence 9/9

Bnlz}|uba` ]jmzub|r, Mreju Dwjua|bdn}, anl A}rhhj|ubm [aufaujLdhj}|bm Bn|j``bkjnmj \cuja|} bn Wd}|(2$11 Ahjubma

2

mdzn|jubn|j``bkjnmj wuj}jnmj bn |cj fbj`l ⎤ wudvblbnk mreju mdzn|jubn|j``bkjnmj }wjmba`b}|}

anl mdzn|jubn|j``bkjnmj ana`r}|} fdu jvjur fbj`l dffbmj, a} {j`` a} }bknbfbman|`r bnmuja}bnk

|cj nzheju df fbj`l mdzn|jubn|j``bkjnmj }wjmba`b}|} #FMB]", fdu jsahw`j ⎤ {dz`l ujaw

wd|jn|ba``r jnduhdz} ejnjfb|}. [cjn |cj famb`b|r$FMB] ua|bd b} ujlzmjl |d |cj wdbn| {cjuj

|cj FMB] man ljvj`dw fznm|bdna` uawwdu| {b|c jamc bnlbvblza` Famb`b|r ]jmzub|r Dffbmju,

|cj qzan|b|r df }z}wbmbdz} am|bvb|r bnfduha|bdn ujwdu|jl bnmuja}j} luaha|bma``r. [b|c

ana`r}|} bn |cj fbj`l dffbmj |d ujvbj{ anl mduuj`a|j |cb} bnmdhbnk la|a, wa}}bnk zw |d

cjalqzau|ju} dn`r |cj |uz`r z}jfz` bnfduha|bdn, |cj mdn}bljuae`j bnmuja}j bn NB]W |cuja|

ana`r}b} anl uj}wdn}j mawaeb`b|bj} df |cj L]], anl |cjujfduj |cj LDL, {dz`l ja}b`r

oz}|bfr |cj bnvj}|hjn|.

[j man |uami jnjhr hdvjhjn|} anl mdzn|ju |cjbu dwjua|bdn} vjur jffjm|bvj`r dn

|cj ea||`jfbj`l9 b|‒} |bhj {j |aij |cj}j j}}jn|ba` }|jw} |d{aul} bnmuja}bnk |cd}j mawaeb`b|bj}

cjuj a| cdhj, ejfduj |cj uj}z`|} df |cd}j dwjua|bdn} wd}j allb|bdna` |cuja|} |d |uddw} bn

cauh‒} {ar. An jsfb`|ua|bdn wujvjn|jl b} a {aufbkc|ju }avjl.