- Sending out false, negative, or harmful information via websites, social networking, or blogs
- Distracting or misleading the public or authorities about someone’s true identity, either to harm their reputation , to hide a criminal or to hide a secret agent
- "Hacktivists" use illegally obtained information from computers networks and intranets for political, social, or activist causes
- Bombarding a website with data until it is overwhelmed and incapable of completing basic and essential functions
In August 2012, I decided to speak up about my political file with the Saudi National Security Department in Ministry Interior Federal HeadQuarters in Riyadh, Saudi Arabia since March 5th 2005. Since that day, I began to receive almost ten spam e-mails on daily basis and to be targeted by impostors on Youtube, Facebook , Twitter and more recently here on my blog.
No matter what form cyber sabotage takes, the effects are always harmful, and if it continues, cyber sabotage can lead to defamation of character, slander, libel, financial loss, and diminished moral. Cyber sabotage investigations by ICS are taken very seriously, with the goal of locating the perpetrator of the sabotage and providing proof of the methods used. It is also important to look for any additional information or materials stolen that have not yet been released. A thorough investigation by ICS may involve data recovery and deleted files recovery.
All those impostors are united together telling me to get out of Saudi Arabia immediately, because I would be killed or beaten. Most of the time they pretend to be governmental officials from the Government of Canada. They also hacked my Facebook account and send black propaganda messages to my friends.
Cell phones are a likely to become a bigger target for cyber sabotage in the future as they are used more and more for financial transactions, information and purchasing, and are heavily used for workplace functions. The increased popularity of tablets will make them a bigger target in the near future they are more easily hacked than regular computers. Cyber sabotage can ruin your reputation and your company, so please feel comfortable calling ICS to begin a cyber sabotage investigation right away.
An impostor on Twitter send me too many messages in order to spy on me. He wanted to have informations from me and to play with my mind. I know he is an agent from an organization and he is professionnal for hacking. He is as well very good for cyber sabotage. After I told him to leave me alone on Twitter, he sent me six messages under fake profiles on my blog trying to let get out of Saudi Arabia with threat of beating and killing. He called me a liar, but at the same time told me to bite my lips. ! He saw that I won't get out never and that is why he went to Facebook and hacked my friends. He sent a private message to one of my friend telling her that he is a woman in Riyadh and he ate breakfast with the wife of Canadian Consul. ...... And he wrote everything to ruin my reputation.
One of his Twitter account is gurlygurl2013.