How cyber terrorist is being used?