Which of the following is an example of a successful cyber terrorist attack?
A. the sharing of military plans on a public website
B. a hacker stealing classified government information
C. an informant revealing government spying to the media
D. the widespread collection of data from social media sites