Describe 3 ways terrorists may use the internet, Malicious Code, or computer sabotage.
For each method identified, discuss the negative consequences that would result.
How do you balance the right to privately communicate and the government’s responsibility to monitor cyber space for potential terrorist activity?