Electrical utility security and national security are closely related, sharing many of the same characteristics and needs. Effective critical asset protection and proactive defense against a variety of threats are high among these common needs. Military Intelligence has more than a 225-year history of protecting critical national assets. The Intelligence Community pioneered the concept of "Defense in Depth" and directly shaped modern security practices. Until the 9/11 attacks, an assault against a utility facility was considered a possibility only during a time of declared war. Various groups now consider themselves permanently at war with the United States and its allies, prompting the U.S. government to mandate extensive security measures for critical infrastructure protection (CIP). This paper explores what can be learned from the Intelligence Community to facilitate securing utility facilities. Beginning with the "Defense in Depth" strategy, followed by a discussion of Intercept, Destroy, Disrupt, and Takeover (IDDT) analysis-a method that identifies and classifies threats-and using classic historical examples, this paper makes practical suggestions about how to evaluate and strengthen the defense of a utility facility against intelligence gathering, intrusion, and disruption of utility operations. 1.0 Introduction On Nov. 28, 2008 a single intruder scaled two electrified ten-foot-high razor wire protected fences at the Kingsnorth coal-powered generation station in Kent, England [1]. After bypassing the ₤12M perimeter defenses, and in full view of CCTV cameras, the man entered through an unlocked door and manually shut down a 500MW generator. The intruder, dubbed the "green Banksy," then exited the station in the same manner he entered. The note left by the man indicated that his motivations were political and that he wished to reduce carbon emissions from "dirty" coal. Despite the expensive protection mechanisms, no lock was placed on the door to the critical and sensitive asset. Defenses were concentrated at the perimeter. Once breached, there were no further barriers to prevent the intruder from carrying out his plans. There was no, in military terms, "Defense in Depth." This paper explores what can be learned from the Intelligence Community to facilitate securing utility facilities. Beginning with a detailed discussion of the "Defense in Depth" strategy and then exploring the concept of IDDT analysis, practical suggestions are made to evaluate and strengthen the defense of a utility facility against intelligence gathering, intrusion, and disruption of utility operations. The paper will examine historic cases where military organizations both used and ignored defense in depth strategies with predictably varying results. 2.0 Background Information Assurance (IA), a term used synonymously with information security, is concerned with the management of risks to information. IA seeks to identify and control risks to the confidentiality, integrity, availability, and non-repudiation of information [2]. Rather than concentrating on the mechanisms and tools needed to implement protection, IA focuses on the policies, procedures and governance necessary to minimize risk and provide for the restoration of information.