31 Information technology might be the instrument of a terroristic threat aimed at conventional property or person, or a computer system might be the target, e.g. if a terrorist threatened to disable or corrupt a system for managing financial transactions.