ortunately, criminal hackers definitely have the upper hand when it comes to computer crime. Today, this crime is still new enough that federal government lacks sufficient laws to put an end to the reign of technological terror plaguing American Society (Parker, 97). Furthermore, law enforcement agencies lack the manpower necessary to utilize existing laws in their efforts to fight computer crime. In addition to the concerns of non-physical hacking attacks, terrorist groups have found other ways to delay or completely shutdown the flow of information. Cyber terrorists have not limited their attacks to the digital side of computers; they have realized that a small bomb or fire at a computer facility can do more damage in a shorter amount of time than hacking into whole systems. Terrorist groups have followed through on this approach: as of 1992, they had attacked more than 600 computer facilities using bombs and other physical means to destroy the computers (Campbell, 1). While most of these attacks have occurred over-seas, the threat of an attack happening in the United States is very real. Many of the largest computer facilities in the United States are virtually unprotected physically; though their computer systems are guarded by the most secure systems know to the world. It would b easy for a terrorist group to conduct bombings on computer facilities and cause extensive damage to computer information systems in the United States, that Campbell claims in his paper A Detailed History of Terrorist and Hostile Intelligence Attacks against Computer Resources That a well directed attack against 100 key computer facilities could bring the American economy to its knees (Campbell, 2). Computer crime and terrorism has indeed become a grave concern for the United States and the global community. The society of the world is in a serious transition time in which every area of our lives is being affected, and quickly controlled, by co...