When considering the prospect of a cyberterrorism, defense officials are forced to acknowledge that the enemy holds the cards of “stealth, anonymity and unpredictability.” Even if the general location of an attack’s origin can be determined, it is practically impossible to discover whether it was commercially, politically, or individually motivated. As such, it is difficult to say when a military...