Quote Originally Posted by JeffC View Post
I'm not sure how much value this report would still have today. Software development is done using completely different models. Hacks seem to be the best and safest way to disrupt our technical infrastructure. Web 2.0 applications, and social networks are used by terrorists for recruitment and training.
I didn't read this report as being something that is narrowly focused on infrastructure vulnerabilities or cyber-terrorism, and thus rapidly dated by the passage of time. I read it more as musings on organizational learning and innovation by terrorist organizations, with a broad application.