





CYBER CRIME: Hackers Turned Terrorists Are Now Targeting Cellphones, Computers, and Data in Cyber Attacks
OPINION
June 1, 2025
PHOENIX (AGN.News) – Reliable sources have informed us about the alleged cyber terror group dubbed ‘Smoky Bear’. This is now active in local valley communities and nationwide.
‘Smoky Bear’ specializes in destroying websites, stealing personal information, identity theft, home burglaries, auto burglaries, mail theft, data theft, trademark and digital information theft, theft of personal property, computer theft, mobile phone data theft, bank fraud, robbery, extortion, and attempted murder.
WHAT HAVE THEY DONE?
There are alleged accusations against this group. First, ‘Smoky Bear’ generally searches for their next victim via computer data theft and mobile phone data theft. What everyone needs to know is this: smartphones are not just phones they’re miniature laptop computers. Any data you place on your mobile phone can be hacked.
Mobile phones have a volume of personal data and mobile apps that store gigabytes of data. A lot of that data contains personal information, travel data, personal accounts, banking information and so on. If they can’t get your secure data, they may simply lock some of your phone features so you can’t use the mobile data or Wi-Fi data, block incoming calls and outbound calls.
If you attempt to access the internet the page will not load. Your phone has been blocked by hackers. Don’t panic, it can be unblocked.
Unscrupulous actors like ‘Smoky Bear’ wants that data. Cyber security is one of the number one concerns in many people’s lives. One cyber security firm says they “resolve an average of 715 billion DNS requests daily, we see more data security threats, more malware, and more cyberattacks than any other security.”
Their services are in high demand because cyber criminals are very busy targeting individuals and businesses whose security may be venerable to attacks.
This ‘Smoky Bear’ hacking group are always looking for their next victim. One recent analysis of their crimes in real time showed they were very active. The facts revealed their contact with this group displayed some real-time facts about some of their tactics.
Keep in mind they’re primarily a cyber terror group. It appears that all of the other crimes started with that one specific crime. From there extortion or bribery schemes unfolded. If you’re a business owner, you may be approached by one of their members with an offer to protect your business in exchange for a piece of the profits.
Having failed to succeed in this ongoing cybercriminal scheme, ‘Smoky Bear’ “Managers” have allegedly instructed their “Street Team” of imported “agents” to stage single-car accidents of the targeted vehicle of the business owner by forcing the vehicle off the road or into head-on collisions before speeding off and away from the scene. This alleged (attempted murder-by-accident) scheme is a clear and present danger to both the business owners and the general public.
Since they have allegedly studied your business and secured your financial data their next move is to harass you into paying up (even if you have no money to pay). One of their specialties or ‘trademarks’ is to make your life a living ‘h**l’ until you pay them to stop.
CRIMES OTHER THAN CYBER CRIMES
As stated earlier, it appears like they start with cybercrimes and go on from there. They’ve been known to take their crimes from the internet to the street. This involves aggravated stalking and threats to your loved ones or your business. One group actually placed an ad online offering to sell the business to the highest bidder.
A family member may come home and tell you their cellphone is working properly. Or it can’t get online, or the mobile data isn’t working. You may go out to your car or truck only to find out it was broken into.
Another ‘trademark’ of this group is to hack into your devices in the middle of the night while you sleep. A phone may display a page you did not access yourself. Now, you see text messages on your phone when the last thing you saw was a news story. That may indicate it was hacked overnight.
WHAT IS CORPORATE ESPIONAGE?
They have been known to compensate your friends, neighbors, coworkers, relatives or even your partner, spouse or ex-spouse for any information about you or your business or trade secrets. That’s called corporate espionage.
If you own a restaurant with a very tasty recipe this group may attempt to steal the recipe using insiders. Unknown to you a coworker may attempt to locate the book or computer data which may contain the secret recipe. Think the handwritten “eleven herbs and spices” recipe from KFC. How much is that original handwritten recipe worth? Search online “how much is the eleven herbs and spices recipe value today” and see the value. 4>
What is corporate espionage? This refers to the act of taking a company’s proprietary information, intellectual property, or trade secrets without consent and giving them to another party, typically for financial or commercial gain. It is also known as industrial espionage or corporate spying.
There are criminal networks who specialize in corporate espionage or corporate spying.
WHAT ABOUT PEOPLE YOU KNOW?
The best source of corporate information about your business is always the people close to you. One case of corporate espionage involved an ex-girlfriend. Every few months she would drop by to see her ex and after some small talk, ask questions about his company. How is it going? Are you going to release any new products? What’s your best seller? And so on. One thing he noticed was she never asked how he personally was doing. Red flag!
A year later, all of his best sellers were being sold in a look-alike store across town. His customers thought it was his store. He later found out his ex-girlfriend worked there. The lesson here is to exercise caution around people you don’t trust 100 + percent.
YOUR MOBILE PHONE VUNERABILITIES
Many crimes start with cybercrimes involving your phone. Always know the location your phone. Never trust strangers with your phone. Even if it’s an emergency, don’t call a number you don’t know or let someone use you phone to make a call unknown to you. You will know it’s a plot when they hang up and say no one answered. The scammer just needed to get that number.
What happens next? The person who was called may be working with a group containing a “licensed private investigator” who has legal access to computer software that can read every single text message on your device. Read your email. Access your location data and so on. Do you want anyone to have all that information?
YOUR NEIGHBOR WANTS TO KNOW…
Are you sure your neighbor isn’t working for a cyber terror group for money? Some people will sell out the mother for money! So, exercise caution when people ask you questions about you, your family, your personal finances or family business.
Exercise caution when using online dating sites. That ‘beautiful lady’ may or may not be a lady after all or she may be working for a group of scammers. He may be part of ‘Smokey Bear” or he may be after your money or other valuables. He may or may not be a knight in shining armor but a walking cyberterrorist.
Since no one knows the identity of this ‘Smoky Bear’ group everyone is advised to increase their personal, home, and business security as a precaution. Stay alert, don’t sleep! Be prepared for the unknown!
If you feel you’re a victim of cybercrimes like identity theft, cyberattacks on your websites, fraud, extortion or any other cybercrime contact the Federal Law Enforcement at IC3.gov and file a complaint. This will put you in touch with your local FBI office. They have agents who specialize in solving cybercrimes.
#GoldOverBlack
#TheAlphabetCompany
ALPHABET GLOBAL NEWS

Reliable. Trusted. Local. News.
On Mobile … Fast!
Written by
AGN.News Team
Disclaimer: This post does not represent the views or viewpoint of the owner of AlpLocal.com, AGN News or its representatives or reporters. Any content which references any person, entity or group with similar names, descriptions, or business interest in any geographical location or similar businesses is merely a coincidence and not directed at said business. AGN News is compiled from submissions by contributors or other sources.