Terrorists must go beyond Web page defacements, simple hacks or pranks. To gain publicity for their cause, cyber terrorists must cause widespread damage, destruction, or death. An example of how this could be accomplished already has occurred. In 1998, a 12-year-old hacker broke into the SCADA computer systems that run Arizona’s Roosevelt Dam. Federal authorities said the hacker had complete control of the dam’s massive floodgates. This dam holds back as much as 489 trillion gallons of water above a flood plain inhabited by more than a million people. More than 3 million SCADA devices are in use today.
Members of council have communicate concern. “There is a 50 percent chance that the next time al Qaida terrorists strike the United States, their attack will include a cyber attack,” Rep. Lamar Smith (R-TX) said. Al Qaida has the capacity’s, has the objective, has a history of conference surveillance and has targeted the United States. This makes the management a very severe cyber threat.
…show more content…
Nearly 60 percent said they expect a major cyber-attack against the associated authority within one year. A February 2002 CIA directive demonstrates that al Qaida had far more interest in cyber terrorism than previously believed and had speculate the use of hackers for hire to speed the recovery of capacity’s.
As a approximately new importance of rivalry, the cyber surroundings must be thoroughly studied and evaluated. The events of September 11 caught the United States by surprise. Unless appropriate tracks are taken to protect the country against cyber-attacks now, it surely will suffer tragic cyber terrorist attacks that could include loss of life. Terrorists are ensuing this capacity. Major cyber terror attacks against the United States will occur. It is a element of when, not