In this case, i.e.,
intentionally caused disasters by attackers, special attention needs
to be paid when re-enabling communications as temporary, somewhat un-
reliable communications with potential limited security features may
be anticipated and abused by attackers (e.g., to circulate false
messages to cause further intentional chaos among the human
population).
Another risk to standing up an infrastructure with limited security during a
“intentionally caused disasters by attackers” beyond just false messages is
that these attackers could leverage this less secure infrastructure to refine
targeting and track the response of security/police forces (if these parties
are using this infrastructure).
Per Section 6,
In this case, i.e., intentionally caused disasters by attackers, special attention needs to be paid when re-enabling communications as temporary, somewhat un- reliable communications with potential limited security features may be anticipated and abused by attackers (e.g., to circulate false messages to cause further intentional chaos among the human population).
Another risk to standing up an infrastructure with limited security during a “intentionally caused disasters by attackers” beyond just false messages is that these attackers could leverage this less secure infrastructure to refine targeting and track the response of security/police forces (if these parties are using this infrastructure).