Describes the cyclical nature of terrorism; identifies several terrorist groups that have disbanded or been decimated, explaining why and how; and discusses terrorist groups that still exist.
Provides an overview of cybercrime; discusses hacking, malware, cyber and identity theft, phishing, cyberstalking, cyberbullying, and online pornography; and describes how law enforcement officials respond to crimes committed in cyberspace.