Headlines
  • At least five ballistic missile launches from Iran have been detected by the Israelis since midnight.
  • Mehrabad Airport in Tehran is hit by strikes
  • The Prince Sultan Air Base was the target of a ballistic missile that Saudi Arabia's military intercepted and destroyed, according to the country's defense ministry.
  • Heavy gunfire on Friday injured three peacekeepers from the United Nations Interim Force in Lebanon inside their base in southwest Lebanon.
  • To put an end to the bloodshed, UN Secretary-General António Guterres urged serious diplomatic negotiations..
  • In a social media post, President Trump said that "no deal" other than "unconditional surrender" will be with Iran.
  • Iran reportedly receives intelligence from Russia on US targets.

More Details

The constructive theory

By Saron Obia

Seeking to overcome the many shortcomings of the theory of technological enabled crime and the triangular theory of crimes posit link between the power of the state, multinational organizations and security expert and consultant, specialist in cyber security, counter terrorism and jihadist tendencies.. When the state seeks to combat organized crimes, others use their power to secure certain individuals to extort foreign investors, which sparks a countervailing reaction on socio-economic and political order.

The theory is applicable for investigation related to company scam, where group solidarity (cybercriminals), technological advancement and inadequate cyber security training are challenges of the criminal justice system in some Sub Saharan African countries.

The proliferation of social networking sites, several startups and the availability of security software in the dark market, is a major cause for the geometric evolution of fictitious companies operated by cybercriminals. They advertise killer post of contracts, recruitment of workers in renowned companies (engage in website defacement) for international projects operating with forge letterhead of international companies.Information of profiled individuals (chief executive officers and ministers) is gotten from social networking sites (professional networking sites), which is use for the production of fake documents (business card, identity card, and even scan documents with signature), to apply for contracts. 

Following a field survey, staff dishonesty and usurpation are major aspects for breach of contract, as well as unfinished state projects. Companies are created and forcibly engage in state projects, with no respect of international and national canons cooperate with financial institutions which issue bank statement in order to lobby for contracts.

An individual creates an account, and funds from another account is been transferred for a period of time to attest the financial stance (bank statement) of the person lobbying for the contract to dissuade the organization. 

With the evolution of e-commerce, the scope of cybercriminals has changed. They  now focus engage in company scam, operate virtual non-governmental organizations requesting for donors for certain projects like educational funds, internally displaced persons, and other basic necessities rural areas. They rent infrastructures in strategic locations to dissuade their clients, expose photos of real estate in a town, and propose a guide, as well as showcase their virtual agency abroad for reliability.

Registration required for the service solicited by an individual or multinational organization, which extend to an agreement between a representative of the company abroad via mail, with a receipt requesting for the name of the individual or enterprise, job description, phone number, resident area, and if payment will be effectuated via bank to bank, before they engage in criminal patterns (phishing, smishing and hack clients bank account) from the information gathered. 

In conclusion, the theory appeals for proper state control in relation to foreign investment as well as intelligence on companies soliciting projects. Companies must verify tenders online and request for information from state institutions before submitting inquiry forms for projects posted on social networking sites. Multinational organizations should inquire about sub-contractors proposing services and verify it the company adhere to the principles of public contracts. The state should ensure that any organization lobby for any public contract must fulfill all requirements as per international and national laws. 

(The Author is a security expert and consultant, specialist in cyber security, counter terrorism and jihadist tendencies)

Identify the Dog Breed

What type of dog is it? 2. What type of dog is it? 3.What type of cat is it? 4.What type of dog is it? 5.What type of dog is it? Basset Hound 2. Borde
Read More

Fileless Malware

A type of malicious software known as “fileless malware” infects a computer by using reliable apps. As it doesn’t rely on files and leaves no trace, i
Read More

Ragdoll Cats

Large and sturdy, ragdoll cats have a soft, semi-long coat and blue eyes originated in Maine, United States. Coat colors are gold, silver, white, and
Read More

Process Hollowing

Using the covert malware injection technique known as “process hollowing,” an attacker suspends a legitimate process, removes its original code, and r
Read More

Subscribe Our You Tube Channel

Fighting Fake News

Fighting Lies






Related Article

“Iranian Authorities Use Live Fire, Arbitrary…

In response to the nationwide protests that started on December 28, Iranian authorities have drastic ...
January 7, 2026

UN Urges Iran to Stop Executing…

Despite years of physical and sexual abuse during her marriage as a child bride, Goli Kouhkan, a 25- ...
December 4, 2025

Myanmar Junta Says it Seized 30…

Myanmar’s junta said on Monday it raided one of the country’s most notorious cyberscam centers a ...
October 21, 2025

Myanmar Junta Admits it’s Unable to…

The European Union’s Special Representative for Human Rights Kajsa Ollongren said on Thursday that ...
October 17, 2025

South Korea Issues Travel Ban After…

South Korea issued a “code-black” travel ban for parts of Cambodia on Oct. 15 and dispatched a t ...
October 16, 2025

US, UK Sanction Cambodian Conglomerate, Alleging…

The U.S. and British governments on Tuesday announced a sweeping crackdown on cyber-scam networks in ...
October 15, 2025

Other Article

Pick of the Day

UN Permanent Representative of Iran Briefs…

Amir Saeid Iravani, Permanent Representative of the Islamic Republic of Iran to the United Nations, ...
March 7, 2026
Bizzare News

Malaysian Man Holds Record for Having…

Malaysian Prathab Muniandy has ten more teeth than the typical human. This indicates that he has the ...
March 6, 2026
Pet Corner

Identify the Dog Breed

Identify dog and cat breeds using pictures.ideal match for you.Consider about these facts before pur ...
Prevent Cyber Crime

Fileless Malware

A type of malicious software known as "fileless malware" infects a computer by using reliable apps. ...
Pick of the Day

UN Security Council Meets on Energy,…

Chris Wright, Secretary of Energy of the United States and President of the United Nations Security ...
Bizzare News

Just Before it Collapses, New Jersey…

A horrifying collapse happened minutes after four Jersey Shore police officers were captured on came ...
March 5, 2026

Top