Information technology (IT) is essential to virtually all of the nationAs critical infrastructures making them vulnerable by a terrorist attack on their IT system. An attack could be on the system itself or use the IT system to launch or exacerbate another type of attack. IT can also be used as a counterterrorism tool. The report concludes that the most devastating consequences of a terrorist attack would occur if it were on or used IT as part of a broader attack. The report presents two recommendations on what can be done in the short term to protect the nationAs communications and information systems and several recommendations about what can be done over the longer term. The report also notes the importance of considering how an IT system will be deployed to maximize protection against and usefulness in responding to attacks.World Trade Center On the morning of September 11, 2001, a few minutes after the South Tower of the World Trade Center had collapsed, ... Transmitted 21 minutes before the North Tower fell, these messages were relayed to police officers, most of whom managed to escape. ... The Fire Department radio system had proven unreliable that morning, and it was not linked to the police radio system. ... (World Trade Center): Adapted from Jim Dwyer, Kevin Flynn, and Ford Fessenden.
|Title||:||Information Technology for Counterterrorism:|
|Author||:||Committee on the Role of Information Technology in Responding to Terrorism, National Research Council, Division on Engineering and Physical Sciences, Computer Science and Telecommunications Board|
|Publisher||:||National Academies Press - 2003-03-07|