Based on Chapter 14, the most likely to come true is Forecast 6. The forecast addresses terrorist groups which interrupt computer systems for certain reasons (Taylor et al., 2014). Notable, terrorism is intense and poses one of the greatest disasters or threats in any geographical area. One of the reasons why Forecast 6 is the most accurate is that ISIS has utilized social media to hire people and convert them to a Jihadist lifestyle. The other reason is that terrorists’ camps such as Hezbollah and Hamas fund their institutions by kidnapping people for ransom (Freeman, 2011). For cyber terrorism, healthcare centers such as Med Star in Baltimore could not have their systems hacked by Iranian hackers for no apparent reason. Indeed, these hackers often need people’s critical and personal information, such as security clearance aimed at an increased cyber-attack.
The biggest challenge based on Forecast 6 is that the criminal justice system would face ineffective communication and no power for proper functioning due to the attack. The backup generators could also fail since they do not work for long durations. The criminal justice system would not help since everything depends on modern technology (Berk, 2012). If compromised, multiple law enforcement experts may not know how to deal with their tasks due to over-reliance on computers. The terrorist groups using global networking tools for the cyber-attack to achieve their objectives would compromise traffic lights leading to failure to assist the affected victims due to massive gridlocks. The nation’s economy could collapse instantly since every aspect runs on the electrical grid, including the water supply, gas pumps, and credit cards, among others. As a result, the economy becomes chaotic as the cyber threat cripples the nation.
Delegate your assignment to our experts and they will do the rest.
References
Berk, R. (2012). Criminal justice forecasts of risk: A machine learning approach . Springer Science & Business Media.
Freeman, M. (2011). The sources of terrorist financing: Theory and typology. Studies in Conflict & Terrorism , 34 (6), 461-475.
Taylor, R. W., Fritsch, E. J., & Liederbach, J. (2014). Digital crime and digital terrorism . Prentice Hall Press.