Although cyber attacks have caused billions of dollars in damage and affected the lives of millions, few if any can be characterized as acts of terrorism: fraud, theft, sabotage, vandalism, and extortion - yes, but terrorism - no. |
Computer worms like Code Red can be used to find potential zombies and automatically install the attack software. |
Conversely, terrorists who are motivated to cause violence seem to lack the capability to cause that degree of damage in cyberspace. |
Cyber protests have emerged in a climate where computer network attacks have become a serious and growing threat. |
Cyber terrorism could also become more attractive as the real and virtual worlds become more closely coupled, with automobiles, appliances, and other devices attached to the Internet. |
Everyone is a proponent of strong encryption. |
Further, the next generation of terrorists will grow up in a digital world, with ever more powerful and easy-to-use hacking tools at their disposal. |
Generally I'm against regulation. |
However, leaving everything to the market is not necessarily good for society. |
I don't have a particular recommendation other than that we base decisions on as much hard data as possible. We need to carefully look at all the options and all their ramifications in making our decisions. |
I favor strategies that encourage industry to include some sort of key recovery capability in their systems which would also address user requirements for access. |
I prefer leaving things to the market as much as possible. |
I think everybody agrees that we need encryption to protect personal, proprietary and other sensitive information. |
I think most organizations have an interest in key recovery, at least with respect to stored data. |
If we take as given that critical infrastructures are vulnerable to a cyber terrorist attack, then the question becomes whether there are actors with the capability and motivation to carry out such an operation. |