ISIS uses encrypted communication methods to reach sympathizers over the Internet. Drugs are sold in decentralized markets in the hidden corners of the Web. People who want to exploit children have anonymous forums where posts are very difficult to trace.
THE NEWLY ENACTED CYBER SECURITY INFORMATION SHARING ACT (CISA)—GOOD OR BAD POLICY?
