The nation has decided to stand by and covertly monitor these terrorist groups rather than deploy a more forceful approach. The strategy encompasses ease dropping on terrorist communications to gain valuable information on future operations. Proponents of this method argue that if the United States shut down websites belonging to Islamic extremists, that more would pop-up in a matter of days. However, some researchers argue that by covert monitoring, the United States is allowing communications between terrorists to continue and therefore operations to continue. One suggestion would be to shut down the cyber world to terrorist and force them to find a slower and more complicated means to communicate (Arquilla
The nation has decided to stand by and covertly monitor these terrorist groups rather than deploy a more forceful approach. The strategy encompasses ease dropping on terrorist communications to gain valuable information on future operations. Proponents of this method argue that if the United States shut down websites belonging to Islamic extremists, that more would pop-up in a matter of days. However, some researchers argue that by covert monitoring, the United States is allowing communications between terrorists to continue and therefore operations to continue. One suggestion would be to shut down the cyber world to terrorist and force them to find a slower and more complicated means to communicate (Arquilla