"Transnational terrorist organizations, insurgents, and jihadists have used the Internet as a tool for planning attacks, radicalization and recruitment, a method of propaganda distribution, and a means of communication."
"Characteristic of this threat agent group is the indiscriminate use of violence in order to influence decisions/actions of states towards their politically or relationally motivated objectives. Activities of this threat group are mostly impact oriented and may affect or harm large parts of society, just to generate necessary pressure. Cyber terrorists may use technology both as the means and target of their attacks, while critical infrastructures comprise one of the main targets. Further targets of this group may be traffic control, military infrastructures, government systems, etc. Information collection, reconnaissance and social engineering are methods that may belong to the key capabilities of this group, while access to high tech tools and methods are also considered within their capabilities, especially due to blurring lines between this and other threat agent groups."
- ↑ The 2013 Cybersecurity Executive Order: Overview and Considerations for Congress, at 2.
- ↑ Id.
- ↑ ENISA Threat Landscape 2013–Overview of Current and Emerging Cyber-Threats, at 37 (citations omitted).