
Cyberconicts, Cyberwars and Cyberpower 173
"688>&,.-D6&$16604J$'8-,0B$.2-14B$
&'I40'L'(4B$46.,-0$50-p6(84B$I'K4,1'4E$
H6&'*$(-,4,&)$$
F(64'0*DZ,&)B$,C'606)*$-I-('&'44$
<'.(>,18'&1B$'1.9$
Figure 6.14 Internet as an enabling tool for terrorists.
A question of interpretation
It is necessary to be extremely careful about the origins of computing attacks
that harm symbols and are reported as the work of cyber-terrorists, because
the events could be part of a wider effort of manipulation. There is a funda-
mental difference between the theoretical possibility of an attack and actual
performance of such an attack. There is a lack of quantitative elements ...