TY - BOOK AU - CLARKE Michael TI - Weaponising the internet PY - 2018/// KW - CYBER KW - ATTACKS N2 - Cyber attackers are known to have broken into sensitive military installations in other countries by penetrating systems operating subsidiary services. The article examines cyber terror attacks and asks if they are certainly virtual or virtually certain? ER -