So, moving on, their second step is to send a spoofed e-mail (one that looks like it comes from a trusted friend or client) to one of your key employees or partners and the e-mail includes an infected attachment.
He says a policy of key escrow - placing the keys to encrypted data with Trusted Third Parties - would have to be global to be effective and there is no prospect of this.
The key is to be familiar enough with these communities, to know and be trusted enough by their leaders, so those man and women will alert law enforcers when someone appears to have become radicalized.