DCSINT Handbook No. 1.02, Critical Infrastructure Threats and Terrorism 10 August 2006
This handbook is one in a series of supplements to TRADOC DCSINT Handbook No. 1,
A Military Guide to Terrorism in the Twenty-First Century,
which is a basic terrorism primer prepared under the direction of the U.S. Army Training and Doctrine Command, AssistantDeputy Chief of Staff for Intelligence-Threats. This handbook supersedes the 2005
CyberOperations and Cyber Terrorism handbook 1.02
. The terrorist threat confronting our militaryspans foreign and domestic threats of nation-states, rogue states with international or transnational agent demonstrations, and actors with specific strategies, tactics, and targets. Anarea that is most threatened and easily fits into the targeting criteria of the terrorist is our CriticalInfrastructures. Critical Infrastructures are those systems or assets, whether physical or virtual,that if incapacitated or destroyed would have a debilitating affect on U.S. security, health, or overall safety. Although the forms and methods under which terrorism takes places are coveredin the capstone terrorism handbook, this supplement provides detail and insight into the targets of the terrorist “behind the tip of the spear.”
This informational document supplements the basic terrorism handbook and supportsoperational and institutional training, and professional military education for U.S. military forcesand Government Civilians within the Global War on Terrorism (GWOT). This document provides an introduction to the Threats to Critical Infrastructures; starting at the macro-level, thehandbook addresses the Critical Infrastructure as defined by the Federal Government and thoseareas the government views as “critical” as well as Critical Infrastructures as defined by DoD.The second half of the handbook uses a “threats” viewpoint by looking at the three subsets withineach infrastructure, the physical, human, and cyber assets of each area, and how the terroristwould damage or disrupt critical infrastructures through attacks on these areas of an installationor garrison.
This document exists primarily for U.S. military forces, however, as larger portions of installations and garrisons are controlled by civilian employees and contractors thishandbook is very applicable to groups including interagency; intergovernmental; civilian contractor;and, non-governmental and private volunteer organization. Compiled from open source materials, thissupplement promotes a “Threats” perspective on Critical Infrastructure Protection. This supplement isneither a counter-terrorism directive nor an anti-terrorism manual, but it complements and does notreplace training and intelligence products on terrorism.
Study of contemporary terrorist behavior and motivation, terrorist goals andobjectives, and a composite of probable terrorist tactics, techniques, and procedures (TTP) improvereadiness of U.S. military forces. As a living document, this supplement will be updated as necessaryto ensure a current and relevant resource. A selected bibliography presents citations for detailed studyof the topic. Unless stated otherwise, masculine nouns or pronouns do not refer exclusively to men.
Headquarters, U.S. Army Training and Doctrine Command (TRADOC)is the proponent for this publication. Periodic updates will accommodate emergent user requirements on terrorism. Send comments and recommendations on DA Form 2028 directly toTRADOC Assistant Deputy Chief of Staff for Intelligence – Threats at the following address:Director, TRADOC ADCSINT – Threats, ATTN: ATIN-L-T (Bldg 53), 700 Scott Avenue, FortLeavenworth, Kansas 66027-1323. This handbook will be available at Army Knowledge Online(