By Meg King, Special to CNN
Editor's note: Meg King is the national security adviser to the president and CEO of the Woodrow Wilson International Center for Scholars.
People operate computer systems that monitor power grids, nuclear power plants and air traffic control systems and do it through e-mail, company networks and government networks. People write the code that tells one computer to speak with another and to carry out various tasks from financial exchanges to changing traffic lights.
Somewhere in the mass of 1s and 0s, there is bound to be a mistake. One that a terrorist is eager to abuse.
Many information technology experts suggest that terror groups aren’t now - and might never be - capable of carrying out an act of cyberterror. It’s true that terror groups won’t be likely to craft a damaging computer virus such as the ILOVEYOU Virus (2001), The Klez (2001), Code Red Worm (2002), Blaster Virus (2004) or Conficker Worm (2008). FULL POST