Information Technology for Counterterrorism: Immediate Actions and Future Possibilities