Do militant groups use encryption to communicate, and, if so, what can the security services do? Continue reading...