|
The Web has a very rich source
of information. It has practically information about everything you want
to find out about. Furthermore, the information could be accessed
anytime, any day.
could occur due to the rich and easily accessible information on the
Web. When a hacker-turned-Cyberterrorist, hacks into government and
military sites to steal information, the hacker could actually sell the
information to real-life terrorists. Cyberterrorists can also remotely
alter the formulas of medication at pharmaceutical manufacturers. The
potential loss of life is unfathomable. We must not forget that
computers control a lot of daily activities. For example, the bullet
trains in Japan and the communication systems around the world. A
Cyberterrorist will attack the next generation of air traffic control
systems, and collide two large civilian aircraft. The Cyberterrorist can
do the same to the rail lines too.
In short,
Cyberterrorists can make use of the Web environment to make certain that
the population of a nation will not be able to eat, to drink, to move or
to live in peace.
The above are just examples on how a Cyberterrorist can wreck people’s
lives through the computer. To make things worse, the Cyberterrorist is
way ahead in this technology area than the authorities. The
Cyberterrorist has to be ahead if he or she wants to succeed in the
mission. Even if the Cyberterrorist fails, he or she will not admit
defeat or simply fades away. Like a phoenix, the Cyberterrorist will
rise again. The Cyberterrorist will learn from the mistakes and use that
information against the authorities at the very next opportunity (Barry
C. Collin, The Future of CyberTerrorism).

|