What are two or three current practices available to investigate and prevent cyberterrorism? What unique challenges does investigating
cyberterrorism present for law enforcement?
In relation to cyberterrorism, are missions of an intelligence agency and a law enforcement agency competing or compatible? How do they
distinguish jurisdiction related to cyberterrorism? Explain your response.