?_______ try, on a daily basis, to gain unauthorized access to a number of important and sensitive sites, such as the computers at the British, French, Israeli, and United States foreign intelligence agencies.
Fill in the blank(s) with the appropriate word(s).
Cyberterrorists
Computer Science & Information Technology