Cyber terrorism is the world’s newest threat against the United States. The FBI defines cyber terrorism as "The premeditated, politically motivated attack against information, computer systems, computer programs, and data which result in violence against noncombatant targets by sub-national groups or clandestine agents" (Elmusharaf, 2004). This definition provided by the FBI can be broken down into several layers. The first layer is that of the actors, their motives are political in nature and are thought out and planned. They are targeting computer systems which would include vital infrastructures that allow the US to function. Their wanted result is that of causing panic, mayhem, and even death to innocent civilians as well as US forces. The battle landscape against the United States has changed from the normal battle fields of sand and dirt to that of the information super highway. This allows for terrorist attacks that no longer target physical assets, but instead targets our computer systems, cyber infrastructure, and other computer based systems. These systems can include municipal systems, nuclear power plants, hospitals, and financial sectors.
The biggest threat from cyber terrorism is to the United States critical infrastructures (Piggin, 2010). These infrastructures include power grids, nuclear power plants, communications systems, water, food production, health care, financial and transportation (Piggin, 2010). Each one of these systems has its own vulnerabilities and own consequences if they are exploited.
Power grids are an obvious target; they provide power to the US and allow us to function normally throughout our day. Many people take this luxury for granted however once it fails it can throw an entire city into chaos. Such as the incident in August of 2003 in New York City and much of the New England area when the power grid failed leaving millions without power and entire cities gridlocked with traffic unable to move.
References: Hayes, J. J. (2010). The terrors and the errors [cyber-terrorist attack]. Engineering & Technology (17509637), 5(14), 52-53. doi:10.1049/et.2010.1413 Hinde, S Korchenko, O., Vasiliu, Y., & Gnatyuk, S. (2010). MODERN QUANTUM TECHNOLOGIES OF INFORMATION SECURITY AGAINST CYBER-TERRORIST ATTACKS. Aviation (1648-7788), 14(2), 58-69. Retrieved from EBSCOhost. Mann, P. (2002). Cyber Security 'Missing ' From Travel Defenses. Aviation Week & Space Technology, 157(2), 41. Retrieved from EBSCOhost. Neil, S. (2009). NON-PROFIT TARGETS CYBER-SECURITY IN PLANTS. Managing Automation, 24(9), 10-12. Retrieved from EBSCOhost. PATEL, S. C., BHATT, G. D., & GRAHAM, J. H. (2009). Improving The Cyber Security of Scada Communication Networks. Communications of the ACM, 52(7), 139-142. Retrieved from EBSCOhost Piggin, R Saini, H. H., & Saini, D. D. (2007). Proactive Cyber Defense and Reconfigurable Framework for Cyber Security. International Review on Computers & Software, 2(2), 89-97. Retrieved from EBSCOhost. State Drug Database Held Hostage Stevens, T., & Jusko, J. (2001). Cyber-terrorists under attack. Industry Week/IW, 250(2), 11. Retrieved from EBSCOhost. Tsuchiya, M. (2009). Defense against Cyber Terrorism: Head War and Body War. Conference Papers -- International Studies Association, 1-10. Retrieved from EBSCOhost. UK 'COULD BE TARGET FOR CYBER-TERRORISTS '. (2003). IEE Review, 49(2), 15. Retrieved from EBSCOhost.