In the future, cybercrime will become the primary threat to the safety and security of the American people. Cybercrime experts agree that cybercrime is an issue that needs to be focused more deeply because the widespread use of computers by the global economy has made the use of computers and the Internet vital to the everyday life (Siegel, 2009; FBI, 2011). There are 3 main types of cyber crime which include: cyber fraud, cyber vandalism and cyber terrorism (Seigel, 2009; Thio, 2010). Cyber terrorism, the most dangerous of the 3, is defined as the use of digital equipment to take down a country by accessing its computer programs and dismantling its infrastructure which includes but is not limited to: banking networks, air traffic control systems , gas and oil production, transportation and emergency services which all rely on computer networks to function (Thio, 2010). Director of National Intelligence Dennis Blair and Thio (2010) both agree that it is America's enormous dependence on the cyber world for its critical life support functions that makes it gravely vulnerable to succumbing to electronic attack unprecedented. Just like a traditional attack, cyber terrorism can lead to death or personal injury, explosions, plane crashes, water contamination, or severe economic losses (Thio, 2010). First, what makes cyberterrorism inherently different from standard terrorist attacks is that it is barrier-proof and that terrorists can circumvent American law because they can operate in countries that do not have laws against cyberterrorism (Siegel, 2009) . Cyberterrorists can also use the Internet as a complement to regular attacks because they can obtain information about targeted countries and...... middle of paper ......d War Is Raging". 2011. CNNMoney. Retrieved July 31 , 2011. Nakashima, Ellen (2010). “FBI Director Warns of Rapidly Expanding Cyberterrorism Threat,” Washingtonpost.com Retrieved July 23, 20011. http://www.washingtonpost.com/wpdyn/content/article/ 2010/ 03/04/AR2010030405066.html"News Corp. to NY Post Staff: 'Preserve' Info Related to Hacks, Bribes.”2011.CNN.com Retrieved July 25, 2011. Sproles, Jimmy, and Will Byars. "Cyber Terrorism". 1998. Retrieved July 30, 2011. Thio, Alex 2010. Deviant Ally and Beacon: Boston 3rd ed. Weimann, Gabriel.2004 "Cyberterrorism: How real is the Threat?" U.S. Institute of Peace Special Report, Spring 2004 p.(1-12)
tags