© 2014 Springer Science+Business Media New York. All rights reserved.Chapter Overview: Threat assessments of cyberterrorism have so far tended to focus upon on two kinds of question. First, the extent to which such a construct really 'exists'- or at least exists in any way substantively different from other forms of terrorism. Second, its destructive potentials and the kinds of targets this might involve. This chapter considers a more basic set of questions about the cyberterrorist threat. These centre upon the very thing considered to make it a distinctive form of offending: (information) technology and its relationships with the intentions of potential terrorists. Central to this analysis is an attempt to clarify some recurring confusions...