While the vast majority of hackers may be disinclined towards violence, it would only take a few to turn cyber terrorism into reality.
Dorothy E. DenningI favor strategies that encourage industry to include some sort of key recovery capability in their systems which would also address user requirements for access.
Dorothy E. DenningIf we take as given that critical infrastructures are vulnerable to a cyber terrorist attack, then the question becomes whether there are actors with the capability and motivation to carry out such an operation.
Dorothy E. DenningWe have never really had absolute privacy with our records or our electronic communications - government agencies have always been able to gain access with appropriate court orders.
Dorothy E. Denning