Which of the following is an example of a successful cyber terrorist attack?

A. the sharing of military plans on a public website

B. a hacker stealing classified government information

C. an informant revealing government spying to the media

D. the widespread collection of data from social media sites