Quote Originally Posted by JeffC View Post
I'm not sure how much value this report would still have today. Software development is done using completely different models. Hacks seem to be the best and safest way to disrupt our technical infrastructure. Web 2.0 applications, and social networks are used by terrorists for recruitment and training.
To disrupt infrastructure an all vector approach is best. Multiple threads and depths of attack will cause a likely cascading outage across vast areas. Coordination of such doesn't take much. Just the right target at the right time in the right way.