Other Methods of the RBN - Cyber Assassination
(Page 4 of 4 )
While there have been no known attempts at cyber assassination by the Russian Business Network, I decided to include it here for its possibility. For those of you who have never heard the term, in its simplest format, it is character assassination. Examples of character assassination date back thousands of years, so it's no surprise that it should cross over to the Internet.
Examples of cyber assassination would be a hacker hacking into someone's personal computer/work computer and planting illegal material, such as underage pornography. The hacker would then tip off the authorities, and a search would ensue, whereby the law enforcement officials would find the material and at the very least, the victim's reputation would be smeared.
A tactic such as this could be used against a senator, a presidential candidate, or even the president himself. A scenario where the president orders an attack on a country harboring terrorists, and hackers from that country plant material on his computer to get a less hawkish president, is not out of the question.
That wraps up my coverage of the Russian Business Network. In the coming weeks I will be doing articles on the different varieties of malware out there, including their origins and how they work, and further, how to remove them from your system. So be sure to check back often.
| DISCLAIMER: The content provided in this article is not warranted or guaranteed by Developer Shed, Inc. The content provided is intended for entertainment and/or educational purposes in order to introduce to the reader key ideas, concepts, and/or product reviews. As such it is incumbent upon the reader to employ real-world tactics for security and implementation of best practices. We are not liable for any negative consequences that may result from implementing any information covered in our articles or tutorials. If this is a hardware review, it is not recommended to open and/or modify your hardware. |