Discussion Response

| December 31, 2015

What are two or three current practices available to investigate and prevent cyberterrorism? What unique challenges does investigating

cyberterrorism present for law enforcement?

In relation to cyberterrorism, are missions of an intelligence agency and a law enforcement agency competing or compatible? How do they

distinguish jurisdiction related to cyberterrorism? Explain your response.

Category: Essay

About the Author (Author Profile)