The roots of cyber terrorism can be traced back to the early 1990s when the Internet began to emerge. The introduction of the “information society” sparked many studies which focused on the potential risks faced by the highly networked and the high-tech-dependant, United States. Initially the concerns were of a cyber attack, an attack which could result in denial of service, system malfunction or unauthorized intrusion. Such an attack could be the result of a domestic hacker or an employee upset with working conditions. Now, the threat of a cyber attack is much more prevalent and the damage could be on a much larger scale and could manifest in the form of cyber terrorism. The threat of cyber terrorism has grabbed national attention, either by the media, the information technology (IT) industry, journalists, politicians or experts elsewhere.
The growing reliance the United States has on information technology has created a new form of vulnerability, which allows terrorists indirect access to approach systems which would otherwise be completely inaccessible. The threat to the public and the government lies in the fact that cyber terrorists possess the ability to shut down major systems which the
Cited: Kosovo cyber war intensifies: Chinese hackers targeting U.S. sites. CNN. www.cnn.com/TECH/computing/9905/12/cyberwar.idg/. 1999 May 12. Cyberterrorism: How real is the threat?