Cascade-based attack vulnerability on the US power grid

Authors: Jian-Wei Wang and Li-Li Rong

Safety Science, Vol. 47, No. 10. (16 December 2009), pp. 1332-1336

The vulnerability of real-life networks subject to intentional attacks has been one of the outstanding challenges in the study of the network safety. Applying the real data of the US power grid, we compare the effects of two different attacks for the network robustness against cascading failures, i.e., removal by either the descending or ascending orders of the loads. In one case, our investigation by the numerical simulations leads to a counterintuitive finding on the US power grid that the attack on the nodes with the lowest loads is more harmful than the attack on the ones with the highest loads. In addition, the almost same effect of two attacks may be useful in furthering studies on the control and defense of cascading failures in the US power grid.

The Peoples Liberation Army and China in Transition Stephen J. Flanagan and Michael E. Marti, Center for the Study of Chineses Military Affairs, National Defense University

Preemptive Strikes Crucial in Limited High-Tech Wars. Lu Linzhi
Unrestricted Warfare. Qiao Liang and Wang Xiangsui

Company Intelligence Support Teams by Rod Morgan

The mission of the company intel cell is to describe the effects of the weather, enemy, terrain, and local population upon friendly operations in order to reduce the commander’s uncertainty
and aid in his decision making.
- Headquarters, Department of the Navy, U.S. Marine Corps X-File 2-1.1, Company Intelligence Cell in Stability and Support Operations (SASO), GPO, Washington, DC, 17 December 2004.

Overwatch Tactical Operations Company Intelligence Support Team (CoIST) software suite: It is generally accepted that while conducting counterinsurgency (COIN) operations killing the enemy is relatively easy; however, finding him is much more difficult. In fact, finding the enemy is rapidly becoming a process of think-to-contact versus actual movement-to-contact to develop the timely (actionable) intelligence traditionally lacking at the lowest tactical levels. Even more difficult is not creating more insurgents than you kill or capture. Full spectrum operations, both lethal and non-lethal, are the key to successful COIN operations. Such operations rely on accurate, timely information derived from the bottom up through patrol debriefings, sensitive site exploitation, tactical questioning, tips, and other sources, analyzed and exploited at the lowest level.

National Intelligence Support Teams
JP 2-01 Joint and National Intelligence Support to Military Operations