The information age in which we live brings with it enhanced capabilities for individuals to communicate securely without expending great amounts of money, using fairly sophisticated and easily accessible technologies. Describe these capabilities, and how they are being used today for nefarious purposes. Provide recommendations for countering these methods.
Please provide 300-400 words and cite references used.