Massive attack on the military and governmental (command and control) information infrastructures, with perhaps collateral attacks against important civilian networks that aid and support military, governmental, and social stability.
Trend along the line of the opposition force altering, damaging, or destroying data and services in a protracted campaign; attacks are unannounced, leaving the question of trust completely unsettled.
Perversion; end of 'trust' Beginning of the conflict
Is the conflict Surprise lost once engagement initiated
Continual moral and material surprise Direct force
Espionage, sabotage, coercion Not 'subtle'
Insidious Attacks force projection capability
Attacks decision capacity, command
structure Government targets or collateral
Opportunistic targets; greater degrees of
separation; attacks dependencies
Long term Concentrated
Human oriented Significant resources
Leveraged Intense effort
Selective effort Centralized
Independent Intelligence 'hard' targets
Soft targets; open source intelligence Crisis management
Defense-in-depth Top down approach
Bottom up approach Oriented around LEA/IC/MIL solutions
Free market solutions