Interfering with infrastructure so as to disrupt services
and/or redirect activities. Examples include creating an accident on a
particular road at a particular place and time in order to cause a shipment
to be rerouted through a checkpoint where components are changed, taking
down electrical power in order to deny information services, modifying a
domain name server on the Internet in order to alter the path through which
information flows from point to point, and cutting a phone line in order to
sever communications.
Complexity: Although no mathematical analysis has
been published on this issue to date, it appears that analyzing
infrastructure interference is quite complex and involves analysis of all of
the infrastructure dependencies if the attack is to be directed and
controlled. Similarly, the detection and countering of such an attack
appears to be quite complex. It would appear that this is at least as
complex as solving multiple large min-cut problems. Some initial analysis
of U.S. information infrastructure dependencies has been done and has led to
a report of about 1,000 pages which only begins to touch the surface of the
issue.
[SAIC-IW95]
fc@red.a.net