Electronic attacks are sneak attacks on another nations infrastructure.



"The newest sets of viruses software are made individually for every type of target, on the basis of unique features of attacked machines. The virus is spread by target attacks on computers by sending an electronic message, containing a malicious attachment, or by visiting a website, or by using in-built tools in the operating system, like re-route Windows update. As the software gets inside the system, it launches necessary modules and becomes able to intercept the network traffic, listen to it, make screenshots, turn on web cameras and PC microphones, mobile devices, to record audio and video files, and it also reports the victims keystrokes, showing everything that he or she types, and so forth."
These viruses are quite common and many are infected without knowing.

CYBERTERRORISM is the use of modern communication technology in the commission of terrorist activities. Although not strictly limited to the Internet (since there are military/corporate/private computer networks that can be attacked), there is still a strong bias toward using the Internet to exercise or exemplify (for others) the concept of cyberterrorism. Cyberterrorism does not have a single definition: In some instances, it refers to use of the Internet to disrupt information systems by formal, recognized terrorist organizations. In other instances, cyber-terrorism refers to Internet use by recognized governments that may be seen as supporting or encouraging terrorist activities. When states launch attacks using the Internet, it is usually referred to as cyber-warfare. Sometimes cyberterrorism refers strictly to activities carried out by organizations, other times to activities carried out by individuals pursuing a common goal but without a formal organization. Cyberterrorism may refer to activities executed across international borders or within a single country. Cyberterrorists go beyond the law and the general norms of the countries they attack to accomplish a political agenda agreed on by only a small minority within the country, and with which the majority of the country usually disagrees. Cyber-terrorism is undertaken through such avenues as worms, viruses, and back-doors and has several important purposes for which it is undertaken, including extortion, the creation of economic disruption, and identity theft. The actual use of the Internet in cyberterrorism ranges from preparative acts to propaganda to carrying out an act of terrorism. Preparative acts of cyberterrorism include buying airline tickets, researching building plans, and acquiring weapons. Propaganda acts of cyberterrorism are generally limited to exhorting potential recruits into joining terrorist organizations and exhorting sympathizers to contribute money and resources. Carrying out acts of cyberterrorism on the Internet is generally limited to deluging opponents with threats or attacking computers and networks.

Cyberterrorism and cyberwarfare

Most cyberterrorism acts are international in nature.
Many groups recruit from and are active in a number of countries, and try to change the international activities of a specific country. Individuals within one country, or a small number of countries, use cyberterrorism to try to exact vengeance against another country for a perceived affront against either their homeland or their own social group. Rebels fighting within one country, but who actually live and work outside of the country, use the Internet to continue fighting against the government of the country through correspondence and recruitment and propaganda activities. This last situation usually occurs when a demographically identifiable group within a country fights for independence from that country or for equal or special rights. This does not negate the existence of cyberterrorist activities by groups within a single country.

As a result of the frequently international nature of cyberterrorism, many countries have started working together to combat it. Governments trying to stop cyberterrorism have used a combination of tools. Whenever possible, existing laws have been applied in the combat to stop cyberterrorism. For example, purchasing illegal weapons on the Internet equates to purchasing illegal weapons in person or through other means. There are also specific treaties aimed at halting cyberterrorism internationally. The creator of malware (malignant software) is no longer punished solely according to the laws of the country of residence. Now, when malware goes international, the country that either suffered the most damage or has the harshest punishment, depending on the specifics of the treaty being applied, issues the punishment. Law enforcement agencies and sometimes militaries, from several countries, are now working much more closely, when pursuing cyberterrorists.

Examples of cyberterrorism come from around the world. In the United States, abortion opponents use e-mail to harass doctors providing abortions. Al-Qaida operatives in Europe, the Middle East, and the United States have used the Internet to research bombing targets, purchase supplies, and recruit members. A female al-Qaida operative in Belgium used the Internet to exhort people to join and participate in bombings. Palestinians, Israelis, Chinese, Taiwanese, Russians and Americans are known to have used the Internet to hack into and attack business and government Internet sites.

Even though the respective governments often get the blame when this happens, complete total evidence or proof of this type of government-related cyberterrorism or cyberwarfare, is not exactly available to the public right now, but it comes very close to be able, to really be proven in a court process. The biggest problem is that the perpetrators and offenders are in a nation, other than that exposed to the cyberattacks, and the fact that they are sometimes ordered to commit these crimes by their superiors. And therefore they get protected by their respective governments at all levels. And of course, we are referring to the perpetrating country's own aces, the 'morality law-bending' decision-makers that are protecting their decisions and friends in their political group. Although their actions probably may also be illegal even in their own country, they continue!

-To round things up a little bit, for you!

-When internet freaks or wiz-kid youngsters practice minor forms of cyber-terrorism, alone or together in a group, and try to become so-called 'hackers', it' s publicly often referred to the term hactivism, or the little longer, computer hacking as activism.

The Different Techniques

(Used to commit cyber related crimes, cyber attacks and cyber realted threats):

[The Type and description follows below]

The name comes from “freak” but with the f replaced by ph as in phone. The verb “phreaking” describes hacking phone systems.
The history of phreaking is very important for the general development of hacking.

Sending unsolicited commercial e-mail advertising for products, services, and Web sites. Spam can also be used as a delivery mechanism for malware and other cyber threats.

A high-tech scam that frequently uses spam or pop-up messages to deceive people into disclosing their credit card numbers, bank account information, Social Security numbers, passwords, or other sensitive information. Internet scammers use e-mail baits, among other things, to “phish” for passwords and financial data from the big sea of Internet users.

Creating a fraudulent Web site to mimic an actual, well-known Web site run by another group, organisation or criminal party.

E-mail spoofing
Occurs when the sender address and other parts of an e-mail header are altered to appear as though the e-mail originated from a different source. Spoofing hides the origin of an e-mail message.

A method used by phishers to deceive users into believing that they are communicating with a legitimate Web site. Pharming uses a variety of technical methods to redirect a user to a fraudulent or spoofed Web site when the user types in a legitimate Web address. For example, one pharming technique is to redirect users —without their knowledge—to a different Web site from the one they intended to access. Also, software vulnerabilities may be exploited or malware employed to redirect the user to a fraudulent Web site when the user types in a legitimate address.

Denial-of-service attack
An attack in which one user takes up so much of a shared resource that none of the resource is left for other users. Denial-of-service attacks compromise the availability of the website or other resource.

Distributed denial-of-service
A variant of the denial-of-service attack that uses a coordinated attack from a distributed system of computers rather than from a single source. It often makes use of worms to spread to multiple computers that then can then attack the target together.

A computer program that “infects” other computer files, usually executable programs, by inserting a copy of itself into the original file on the computer. These copies are usually executed when the infected file is loaded into the computers memory, allowing the virus to infect other computer files. A virus requires human involvement or action (who/which mostly is unwitting/unknowing/unintentional) to multiply or propagate itself.

Trojan horse
A computer program that conceals harmful code. It usually masquerades as a useful program that a user would wish to execute. Governments are known (by us) to spread this via download sites and torrents.

An independent computer program that reproduces by copying itself from one system to another across a network. Unlike computer viruses, worms do not require human involvement to propagate.

Malicious software designed to carry out annoying or harmful actions. Malware often masquerades as useful programs or is embedded into useful programs so that users are induced into activating them. Malware can include viruses, worms, and spyware.

Malware installed without the user’s knowledge to surreptitiously track and/or transmit data to an unauthorized third party.

A network of remotely controlled systems used to coordinate attacks and distribute malware, spam, and phishing scams.

(Short for “robots”) are programs that are covertly installed on a targeted system allowing an unauthorized user to remotely control the compromised computer for a variety of malicious purposes.

Electronic attacks are sneak attacks on another nations infrastructure.

Add new comment

Plain text

  • No HTML tags allowed.
  • Web page addresses and e-mail addresses turn into links automatically.
  • Lines and paragraphs break automatically.
This question is for testing whether or not you are a human visitor and to prevent automated spam submissions.
4 + 4 =
Solve this simple math problem and enter the result. E.g. for 1+3, enter 4.

Recommended reading [ Posts, articles, documents ]


COPIAGUE, NY - A Lindenhurst man was arrested after he was caught recklessly driving an ATV on Sunrise Highway in Copiague on Saturday evening, according to Suffolk Police.


The Florida man who gained instant internet fame for choosing jail instead of removing the “I eat a–” decal on his car said Wednesday that only “sour apples” don’t like his raunchy sticker — which he will continue to drive around with, intact, since free speech “...


Background history: We needed the best newsticker on the market for our own websites, and we bought all of them, but none of them was advanced enough, easy to use, and worked on all computers and systems. They always had flaws somewhere.


The definition of "political avenue" are built on the fact that a political decision affects the road of life-choices people have access to when they 'travel' through their lifes or the options politicians make available to them.

Report internet garbage on this webpage 24 hours. Apr 16 0 By POLITICAL AVENUE

On this page you can report the worst and shitty online garbage content that made it's way up to the internet.


Police in the Netherlands are investigating the brutal torture of a bitcoin trader, whose home was raided by criminals looking for cryptocurrency.


The Department of Justice on Thursday announced a criminal charge against Wikileaks co-founder Julian Assange, accusing him of conspiring to hack into a classified U.S. government computer.


Honestly, check the CNBC headline:
'Alexa, find me a doctor': Amazon Alexa adds new medical skills

Amazon is moving more deeply into the $3.5 trillion health care sector.


Want to learn more about SIGINT? -Read this.
Here's the evidence from within the NSA organization. Even when the original document is dated a bunch of years back in time, we think of it as a schoolbook example of what USA is up to.


Twenty-nine-year old Devon Alexander, of Coraopolis, worked as a behavioral specialist at the Pace Special Education School in Churchill. The drugs included suspected cocaine, crack cocaine, raw and packaged heroin, a plastic bag of Xanax, marijuana and ecstasy.


Why is it a brown-red ring-of-light around the moon! You know, we don't have brown-red clouds in Sweden. What causes the brown-red light around it, never seen before? The shining lasted for a total of 2-3 days and was not constant.


World's most powerful nuclear submarines, Arkhangelsk and Severstal, are to be dismantled after 2020. The Russian federal nuclear power watchdog, Rosatom, found their further exploitation unprofitable.

-None property have space for gardens.. Mar 3 0 By POLITICAL AVENUE

The Yerdelen brothers, construction entrepreneurs from Istanbul was riding a real estate boom, and had plans to build more than 700 minicastles.


CYBERTERRORISM is the use of modern communication technology in the commission of terrorist activities.


At the height of his power, Escobar was said to be the seventh richest man in the world, with his Medellin drugs cartel thought to be behind -up to- 80 percent of all the cocaine shipped to the United States.


NEW DELHI: Gearing up for its most challenging space mission, Indian Space Research Organisation (Isro) is leaving no stone unturned to make the Chandrayaan-2 (lunar-2) mission a success.


Abwehr scored perhaps its greatest victories in the area of industrial espionage, as agents managed to steal the blueprint for every major American airplane produced in the war effort.


Shorn on the sides, thick on top for the Kim Jong-un look; bright and blonde for the Donald Trump-loving customers. -A creative Hanoi barber is offering free cuts ahead of the leaders’ meeting in the next week in their Vietnamese capital.


Time for a history lesson ! - Here's some old newspaper frontpages you might recognize in memory lane! *Hitler is dead* *Hindenburg* etc.
This is a relatively new post, and it will be updated later with more frontpage material.


Hello. My name is Ed Snowden. A little over one month ago, I had family, a home in paradise, and I lived in great comfort. I also had the capability without any warrant to search for, seize, and read your communications. Anyone’s communications at any time.

Most of the news published here, you can read in tomorrow's newspaper,
or watch on your television news first in 2 - 3 hours. It's a fast robot to pick up all news fast.
Most often within 30 seconds from when the news first got released or published the first time in any part of the world.
So all news reports, from all news agencies, you have here within the same minute of release. Really quick!
We could adjust it to update every second (technically possible), but it will be considered overload of the news agencies websites, and not popular at all.
So you will have to be okey with one or two intel and news robot automatic updates per minute. Which is still the best news reporting on the market.
Considering the amount of sources we update on (over 100 https:// news channels) per minute. Everything automated 24 hours and 7 days per week.
The goal is to provide the best global overview. And to program the best free Internet tool to stay globally updated at all times.
Example: A nuclear plant outside Oslo, Norway, has a major accident. You want to know more about the situation.
Here you can follow many newsreports from several reporting sources like Reuters, AP, TASS, BBC and CNN to quickly and without to much trouble, asses more information about the accident and get a better overview of the whole situation fast! That's the greatness of this intelligence and news website.
And although some of our clients already work in intelligence agencies and have excellent reporting, they are not always at work having that access.
So when not at work and you wish to have a global update, you are of course welcome here, as the rest of us! Just type NSAROBOT.COM
Hold your mousepointer here in the grey window, or dot it, if you have touchscreen.

Click on the orange button to subscribe to the WORLD NEWS AS REPORTED - RSS FEED!

It works great if you want to have a VERY good up-to-date check of what's happening globally. This delivers all the main news directly to your computer via RSS functions. RSS is an acronym for Really Simple Syndication or Rich Site Summary. It is an XML-based method for distributing the latest news and information from a website that can be easily read by a variety of news readers or aggregators. All the world news in one easy to read RSS source / or / website intel category page, Sir & Ma'm!
We have developed the world/&/political news RSS with 1000 news items for supplying foreign intelligence agencies with global information and important intel newsitems dating up to 3 days back in time.
[ Works perfect with net/surf/software Firefox & MS Edge ]
You get all intel/newsitems delivered directly to your computer!

Updates automatically by our news and intel robot every minute.

https://www.politicalavenue.com - All the world news as reported from Washington Post.All the Reuters News Directory at https://www.politicalavenue.comAll the CNN NEWS -click here!The BEST ACCOMPLISHED website WE KNOW of /says NSA about the political avenue - https://www.politicalavenue.com.Politicians are trustworthy says politicalavenue.comhttp://www.politicalavenue.com/TASS news agency page.