The document discusses the anatomy of data integrity attacks in industrial control systems. It begins by introducing the authors and their backgrounds in process control and security. It then discusses challenges in understanding industrial control system protocols and data. The document uses examples from power systems and distributed control systems to illustrate how process data is collected, scaled, and transmitted at different levels. It emphasizes that point configurations and data scaling are customized for each unique system. The goal is to help security researchers better understand operational technology in order to identify vulnerabilities and challenges from an attacker's perspective.