
Computing
How U.S. "Cyber Bombs" against Terrorists Really Work
Clusters of software and hardware are being aimed at ISIS and other outlaw groups
Support science journalism.
Thanks for reading Scientific American. Knowledge awaits.
Already a subscriber? Sign in.
Thanks for reading Scientific American. Create your free account or Sign in to continue.
Create Account