Home ] Up ] Games ] EL3209 ] Introduction ] Latest Update ]

 

 

 

 

         The Web has a very rich source of information. It has practically information about everything you want to find out about. Furthermore, the information could be accessed anytime, any day.

            could occur due to the rich and easily accessible information on the Web. When a hacker-turned-Cyberterrorist, hacks into government and military sites to steal information, the hacker could actually sell the information to real-life terrorists. Cyberterrorists can also remotely alter the formulas of medication at pharmaceutical manufacturers. The potential loss of life is unfathomable. We must not forget that computers control a lot of daily activities. For example, the bullet trains in Japan and the communication systems around the world. A Cyberterrorist will attack the next generation of air traffic control systems, and collide two large civilian aircraft. The Cyberterrorist can do the same to the rail lines too.

            In short, Cyberterrorists can make use of the Web environment to make certain that the population of a nation will not be able to eat, to drink, to move or to live in peace.

            The above are just examples on how a Cyberterrorist can wreck people’s lives through the computer. To make things worse, the Cyberterrorist is way ahead in this technology area than the authorities. The Cyberterrorist has to be ahead if he or she wants to succeed in the mission. Even if the Cyberterrorist fails, he or she will not admit defeat or simply fades away. Like a phoenix, the Cyberterrorist will rise again. The Cyberterrorist will learn from the mistakes and use that information against the authorities at the very next opportunity (Barry C. Collin, The Future of CyberTerrorism).

Are there any advantages to hacking at all?