This document discusses various tools and threats related to cybercrime and cyberterrorism, as well as countermeasures taken by governments. It outlines how technologies like mobile devices, digital currency software, and cyber espionage have created new vulnerabilities but also new tools for criminal acts. The document also examines laws and policies enacted post-9/11 to combat terrorism, such as the 2010 Protecting Cyberspace as a National Asset Act, which aims to enhance cyber and critical infrastructure security in the US. Overall, the document analyzes the growing threats in cyber space and how governments and security infrastructures must continue adapting to address vulnerabilities from new technologies and non-physical forms of attack.