ACI Books & Book Chapters

Document Type

Book

Files

Download

Download Full Text (4.9 MB)

Contributing USMA Research Unit(s)

Army Cyber Institute

Description

In an ever more connected world the possibilities for bad-actors to hijack, subvert, and exploit existing systems grow numerous. In this publication, a worst-case-scenario is explored when the bad guys win, how this might occur, and what developing elements of our world enabled this hypothetical disaster.

Publication Date

2018

Keywords

supply chain, supply chain attacks, Internet of Things, IoT, Terrorism

Two Days After Tuesday

Share

COinS
 
 

To view the content in your browser, please download Adobe Reader or, alternately,
you may Download the file to your hard drive.

NOTE: The latest versions of Adobe Reader do not support viewing PDF files within Firefox on Mac OS and if you are using a modern (Intel) Mac, there is no official plugin for viewing PDF files within the browser window.