The document discusses various methods for policing illegal activity on the internet, including how individuals can protect themselves by using secure passwords and browsers, and how law enforcement addresses challenges like the transnational nature of cyber crimes and limited resources. It also evaluates the strengths and weaknesses of different policing methods, and asks questions about their effectiveness and how policing of the internet could be improved.