Abstract

<p>This paper highlights one concrete example of how the power of <em>Hoaxes</em> can provide an extra-ordinary significant impact to the country. The term<em> </em>of <em>the Trojan Horse Affairs</em> make this issue more interesting for the author to discuss. The term of <em>Trojan Horse </em>generally used in technological science to describe the existence of the <em>malware </em>or <em>viruses</em> activity, whos hiding in suspicious forms and then damage the core systems on a computer or steal its data. The damage caused by the <em>Trojan Horse</em> is usually very severe (<em>Trojan Horses</em>, 2019).</p><p>In the study of international relations, the term of <em>Trojan Horse </em>was also recently introduced to defined the “terrorist operations”. This is because, terrorist operations are also use hidden movements on their actions to attack or stealing data which resulted in fatal damage. For that kind of reason, in the study of international relations, the term of <em>Trojan Horse</em> is also synonymous with serious crime, which are usually carried out by the opponents, enemies, or international criminal syndicate (<em>Trojan Horses</em>, 2019).</p>Tracing the origin history the use of the term of <em>The Trojan Horse</em> will remind back with the Ancient Greek War, between the <em>Achaena</em> (Greek) and Trojan people. This history become phenomenal after the <em>Achaena </em>win the war with their clever trick of smuggling its soldier into an unsuspecting wooden horse statue, soon called <em>“The Trojan Horse”</em>statue. The Trojan people immediately got killed in the night, when their soldiers were unaware and sleeping. The Achenian soldiers came out from their hiding place and then ended this storys (Mogra, n.d.).

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call