Cybercriminals have reportedly made alliances with drug traffickers in Afghanistan, the Middle East, and elsewhere where profitable illegal activities are used to support terrorist groups. This book discusses options open to nation states, extremists, or terrorist groups for obtaining malicious technical services from cybercriminals.