Return to Article Details Five myths about cryptoterrorism