Although an act of cyberterrorism has not yet occurred, officials and scholars continually study the possibilities of such an attack. As our physical and virtual worlds continue to intertwine, the risk of such an event increases rapidly. Everything from our transportation systems to pharmaceutical manufacturing is computer controlled. The closest we came to an act of cyberterrorism occurred in 2000. Known as the Maroochy Shire case in Queensland, Australia, it was committed by Vitek Boden. Boden was an engineer for Pacific Paradise, a wastewater pumping company in Australia. He successfully hacked into a control system, changing operations and dumping millions of gallons of raw sewage into local waterways. Boden's motivation was the only reason the act was not classified as cyberterrorism. It was personal rather than political or religious in nature (Sharp Parker, 2009). The only reason this wasn't the first act of cyberterrorism was motivation. As companies invest in upgrading their technological capabilities, they too must invest in security frameworks to protect their systems and the public from terrorist threats. Our government must also decide how to address public safety with respect to cyberterrorism. On September 11, 2001, America was reminded of how vulnerable we are when it comes to acts of terrorism. The sheer complexity and varying design of attacks often make it very difficult to create an all-encompassing defense in the fight against terrorism. To improve the dismantling of terrorist activities by government agencies in the United States, many laws have had to be updated to include the latest areas of electronic communications. In response to the attack on the World Trade Center in New York City, Congress passed.... .. middle of paper ......orism. Agents can successfully track cyber intruders, share intelligence and operate globally, aiding their efforts to protect Americans at home and abroad. Works cited in the 107th Congress. (2001, October 26). Retrieved March 1, 2010, from the U.S. Government Printing Office home page: http://frwebgate.access.gpo.gov/cgi-bin/getdoc.cgi?dbname=107_cong_public_laws&docid=f:publ056.107.pdfDepartment of Justice. (n.d.). What is Patriot Web USA. Retrieved March 1, 2010, from Department of Justice: http://www.justice.gov/archive/ll/highlights.htmDoyle, C. (2002, April 15). Retrieved March 1, 2010, from Federation of American Scientists: http://fas.org/irp/crs/RL31377.pdfSharp Parker, A. (2009). Cyberterrorism: the emerging global threat. In D. Canter, The faces of terrorism: Multidisciplinary perspectives (pp. 245-255). Malden: John Wiley & Sons Ltd.
tags