Between now and 2015 terrorist tactics will become increasingly sophisticated and designed to achieve mass casualties. The trend toward greater lethality in terrorist attacks is expected to continue. Some potential adversaries will seek ways to threaten the U.S. national infrastructure-communication, transportation, financial transactions, energy networks-is vulnerable to disruption by physical and electronic attack, because of its interdependent nature, and by cyber attacks, because of their dependence on computer networks (CIA Homepage).
When the former President Bill Clinton took office, he has made the fight against terrorism a top national security objective. The former President Clinton has worked to strengthen law enforcement's counter terrorism tools and improve security on airplanes and at airports. .
Government Security 3.
These efforts have paid off as major terrorists" attacks have been foiled and more terrorists have been apprehended, tried and punished to the fullest extent of the law (Presidential Decision Directive).
What are the consequences that will occur if the Government decides to use the technology that is developed? The Coordinator for Counter-Terrorism for the United States Department of State said "we anticipate that terrorist will make greater use of high technology in their attacks" (Michael A. Sheenan). The problem for the Security Administrator is that terrorist already realize that by using a small bomb or setting fire to a computer center can do more damage in a shorter length of time than any other single event. Terrorist have historically established a need to continue their destruction of computer resources. To date "terrorist and activist have bombed more than 600 computer facilities. Terrorism is a pervasive threat against computer facilities worldwide" (Michael A. Sheenan).
The idea of a National I.D. card has been debated since the 1930s, but Ellison's proposal in the wake of September 11 terrorist attacks has reignited the dispute over the privacy and security.