Utilizing Cyber Espionage to Combat Terrorism