Showing posts sorted by relevance for query US. Sort by date Show all posts
Showing posts sorted by relevance for query US. Sort by date Show all posts

The US military Calls Julian Assange & WikiLeaks 'Enemy of State'


The US military Calls Julian Assange & WikiLeaks 'enemy of state'

The US military has designated Julian Assange and WikiLeaks as enemies of the United States - the same legal category as the al-Qaeda terrorist network and the Taliban insurgency. Declassified US Air Force counter-intelligence documents, released under US freedom-of-information laws, reveal that military personnel who contact WikiLeaks or WikiLeaks supporters may be at risk of being charged with "communicating with the enemy", a military crime that carries a maximum sentence of death. The documents, some originally classified "Secret/NoForn" - not releasable to non-US nationals - record a probe by the air force's Office of Special Investigations into a cyber systems analyst based in Britain who allegedly expressed support for WikiLeaks and attended pro-Assange demonstrations in London. The counter-intelligence investigation focused on whether the analyst, who had a top-secret security clearance and access to the US military's Secret Internet Protocol Router network, had disclosed classified or sensitive information to WikiLeaks supporters, described as an "anti-US and/or anti-military group".
The suspected offence was "communicating with the enemy, 104-D", an article in the US Uniform Code of Military Justice that prohibits military personnel from "communicating, corresponding or holding intercourse with the enemy". The analyst's access to classified information was suspended. However, the investigators closed the case without laying charges. The analyst denied leaking information. Mr Assange remains holed up in Ecuador's embassy in London. He was granted diplomatic asylum on the grounds that if extradited to Sweden to be questioned about sexual assault allegations, he would be at risk of extradition to the US to face espionage or conspiracy charges arising from the leaking of hundreds of thousands of secret US military and diplomatic reports.
US Vice-President Joe Biden labelled Mr Assange a "high-tech terrorist" in December 2010 and US congressional leaders have called for him to be charged with espionage. Sarah Palin and Mike Huckabee - both once involved in presidential campaigns - have both urged that Mr Assange be "hunted down".
Mr Assange's US attorney, Michael Ratner, said the designation of WikiLeaks as an "enemy" had serious implications for the WikiLeaks publisher if he were to be extradited to the US, including possible military detention. US Army private Bradley Manning faces a court martial charged with aiding the enemy - identified as al-Qaeda - by transmitting information that, published by WikiLeaks, became available to the enemy. Mr Ratner said that under US law it would most likely have been considered criminal for the US Air Force analyst to communicate classified material to journalists and publishers, but those journalists and publishers would not have been considered the enemy or prosecuted.
"However, in the FOI documents there is no allegation of any actual communication for publication that would aid an enemy of the United States such as al-Qaeda, nor are there allegations that WikiLeaks published such information," he said.
"Almost the entire set of documents is concerned with the analyst's communications with people close to and supporters of Julian Assange and WikiLeaks, with the worry that she would disclose classified documents to Julian Assange and WikiLeaks. "It appears that Julian Assange and WikiLeaks are the 'enemy'. An enemy is dealt with under the laws of war, which could include killing, capturing, detaining without trial, etc."










SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

NASA & UFO Hacker Gary McKinnon Will Not Face Prosecution in UK

NASA & UFO Hacker Gary McKinnon Will Not Face Prosecution in UK

Infamous NASA hacker Gary McKinnon who broke into US government computer system, while hunting for evidence of UFOs and fought a long fight against extradition, has been told that he will now not face prosecution in the UK. After discussing the case with US Department of Justice and the police, The Crown Prosecution Service (CPS) has decided the appropriate jurisdiction for the McKinnon case to be heard is the US. According to Karen Todner, McKinnon's solicitor, the decision on Friday is an "interesting" one given that he was first arrested and questioned by UK police.

The reasons for that decision were:
  1. The harm occurred in the US - the activity was directed against the military infrastructure of the US;
  2. An investigation had already been launched in the US;
  3. There were a large number of witnesses, most of whom were located in the US;
  4. All of the physical evidence (with the exception of Mr McKinnon's computer) was located in the US;
  5. The US prosecutors were able to bring a case that reflected the full extent of Mr McKinnon's alleged criminality; and
  6. The bulk of the unused material was located in the US. Given the nature of the offences, this inevitably included highly sensitive information and the US courts were best placed to deal with any issues arising in relation to this material.

In a statement, the CPS's Director of Public Prosecutions (DPP), Kier Starmer QC, and Mark Rowley, Assistant Commissioner of the Metropolitan Police Service, said that they had convened a joint panel to discuss the issue and decide whether a new criminal investigation should take place. They decided that the original reasoning for the trial being held in the US still held, and looked into the possibility of holding the trial in the UK. This would have involved transferring witnesses and sensitive physical evidence to the UK. The panel consulted with the US Department of Justice as to whether this would be possible, given that they believed that "the prospects of a conviction against Mr McKinnon, which reflects the full extent of his alleged criminality, are not high".
According to the statement, the US authorities "indicated to us that they would be willing to co-operate with a prosecution in England and Wales if that would serve the interests of justice." However, the US authorities did not feel that transferring all the witnesses and evidence to the UK would be in that interest, given the panel's representations. The statement goes on to say: "That is a decision the US authorities are fully entitled to reach and we respect their decision." On that basis, the panel concluded that a new criminal investigation should not be started and the Assistant Commissioner accepted that advice.





SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

US House of Intelligence Committee Warn American Companies Doing Business with Huawei & ZTE

US House of Intelligence Committee Warn American Companies Doing Business with Huawei & ZTE

Though US is very much advance and updated on cyber security but after facing so many large cyber attacks from China, now American government taking few steps to avoid any kind of cyber espionage. Recently the US House Intelligence Committee says that the American companies should avoid doing business with two of China's leading technology firms, ZTE and Huawei. Many of us will not agree with this decisions  but while keeping in mind latest cyber attacks and damages, the authorities have no other way left. 
The Chairman and Ranking Member of the House Intelligence Committee, Mike Rogers (R-MI) and C.A. Dutch Ruppersberger released a report recommending to U.S. companies considering doing business with Chinese telecommunications companies Huawei and ZTE to find another vendor.  The report encourages U.S. companies to take into account the long-term security risks associated with either company providing equipment or services to our telecommunications infrastructure.  Additionally, the report recommends that U.S. government systems, particularly sensitive systems, exclude Huawei or ZTE equipment or component parts. The report highlights the interconnectivity of U.S. critical infrastructure systems and warns of the heightened threat of cyber espionage and predatory disruption or destruction of U.S. networks if telecommunications networks are built by companies with known ties to the Chinese state, a country known to aggressively steal valuable trade secrets and other sensitive data from American companies.  Additionally, the report notes that modern critical infrastructure is incredibly connected, everything from electric power grids to banking and finance systems to natural gas, oil, and water systems to rail and shipping channels. All of these entities depend on computerized control systems. The risk is high that a failure or disruption in one system could have a devastating ripple effect throughout many aspects of modern American living.
The report, released in a Capitol Hill news conference, states that Huawei and ZTE provided incomplete, contradictory, and evasive responses to the Committee’s core concerns.  The report comes after a year-long investigation into the national security dangers posed by Huawei and ZTE, the two largest Chinese telecommunications companies doing business in the United States.

The Report Includes Five Recommendations:-
  1. US government systems and US government contractors, particularly those working on sensitive systems, should exclude any Huawei or ZTE equipment or component parts.  Additionally, the Committee on Foreign Investments in the United States (CFIUS) must block acquisitions, takeovers, or mergers involving Huawei and ZTE given the threat to U.S. national security interests.
  1. U.S. network providers and systems developers are strongly encouraged to seek other vendors for their projects.
  1. Unfair trade practices of the Chinese telecommunications sector should be investigated by committees of jurisdiction in U.S. Congress and enforcement agencies in the Executive Branch.  Particular attention should be paid to China’s continued financial support of key companies.
  1. Chinese companies should quickly become more open and transparent. Huawei, in particular, must become more transparent and responsive to U.S. legal obligations.
  1. Committees of jurisdiction in Congress should consider potential legislation to better address the risk posed by telecommunications companies with nation-state ties or otherwise not clearly trusted to build critical infrastructure, including increasing information-sharing among private sector entities and expanding a role for the CFIUS process to include purchasing agreements.

To Download the Full 60 Page Report Click Here




SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

The First Cyberspace Strategy By U.S. Defense


Cyberspace is a defining feature of modern life. Individuals and communities worldwide connect, socialize, and organize themselves in and through cyberspace. From 2000 to 2010, global Internet usage increased from 360 million to over 2 billion people. As Internet usage continues to expand, cyberspace will become increasingly woven into the fabric of everyday life across the globe. 
U.S. and international businesses trade goods and services in cyberspace, moving assets across the globe in seconds. In addition to facilitating trade in other sectors, cyberspace is itself a key sector of the global economy. Cyberspace has become an incubator for new forms of entrepreneurship, advances in technology, the spread of free speech, and new social networks that drive our economy and reflect our principles. The security and effective operation of U.S. critical infrastructure – including energy, banking and finance, transportation, communication, and the Defense Industrial Base – rely on cyberspace, industrial control systems, and information technology that may be vulnerable to disruption or exploitation. 
Along with the rest of the U.S. government, the Department of Defense (DoD) depends on cyberspace to function. It is difficult to overstate this reliance; DoD operates over 15,000 networks and seven million computing devices across hundreds of installations in dozens of countries around the globe. DoD uses cyberspace to enable its military, intelligence, and business operations, including the movement of personnel and material and the command and control of the full spectrum of military operations. 
The Department and the nation have vulnerabilities in cyberspace. Our reliance on cyberspace stands in stark contrast to the inadequacy of our cybersecurity – the security of the technologies that we use each day. Moreover, the continuing growth of networked systems, devices, and platforms means that cyberspace is embedded into an increasing number of capabilities upon which DoD relies to complete its mission. Today, many foreign nations are working to exploit DoD unclassified and classified networks, and some foreign intelligence organizations have already acquired the capacity to disrupt elements of DoD’s information infrastructure. 
Moreover, non-state actors increasingly threaten to penetrate and disrupt DoD networks and systems. We recognize that there may be malicious activities on DoD networks and systems that we have not yet detected. 

DoD, working with its interagency and international partners, seeks to mitigate the risks posed to U.S. and allied cyberspace capabilities, while protecting and respecting the principles of privacy and civil liberties, free expression, and innovation that have made cyberspace an integral part of U.S. prosperity and security. How the Department leverages the opportunities of cyberspace, while managing inherent uncertainties and reducing vulnerabilities, will significantly impact U.S. defensive readiness and national security for years to come. 

DOD’S STRENGTHS AND OPPORTUNITIES IN CYBERSPACE:-

As does the nation as a whole, DoD relies on a secure and reliable cyberspace that protects fundamental freedoms, privacy, and the free flow of information. In support of both U.S. core commitments and national security, DoD has significant strengths and opportunities in cyberspace. The U.S. military’s ability to use cyberspace for rapid communication and information sharing in support of operations is a critical enabler of DoD missions. More broadly, DoD’s depth of knowledge in the global information and communications technology sector, including its cybersecurity expertise, provides the Department with strategic advantages in cyberspace. 
The quality of the United States’ human capital and knowledge base in both the public and private sectors provides DoD with a strong foundation on which to build current and future cyber capabilities. DoD has played a crucial role in building and leveraging the technological prowess of the U.S. private sector through investments in people, research, and technology. DoD will continue to embrace this spirit of entrepreneurship and work in partnership with these communities and institutions to succeed in its future cyberspace activities. 
Given the dynamism of cyberspace, nations must work together to defend their common interests and promote security. DoD’s relationship with U.S. allies and international partners provides a strong foundation upon which to further U.S. international cyberspace cooperation. Continued international engagement, collective self-defense, and the establishment of international cyberspace norms will also serve to strengthen cyberspace for the benefit of all. 

CYBER THREATS:-

The Internet was designed to be collaborative, rapidly expandable, and easily adaptable to technological innovation. Information flow took precedence over content integrity; identity authentication was less important than connectivity. The Internet’s original designers could not have imagined the extent of its vital and growing role for DoD and its operations. The global scope of DoD networks and systems presents adversaries with broad opportunities for exploitation and attack. 
Low barriers to entry for malicious cyber activity, including the widespread availability of hacking tools, mean that an individual or small group of determined cyber actors can potentially cause significant damage to both DoD and U.S. national and economic security. Small-scale technologies can have an impact disproportionate to their size; potential adversaries do not have to build expensive weapons systems to pose a significant threat to U.S. national security.
In developing its strategy for operating in cyberspace, DoD is focused on a number of central aspects of the cyber threat; these include external threat actors, insider threats, supply chain vulnerabilities, and threats to DoD‘s operational ability. DoD must address vulnerabilities and the concerted efforts of both state and non-state actors to gain unauthorized access to its networks and systems. 
Foreign cyberspace operations against U.S. public and private sector systems are increasing in number and sophistication. DoD networks are probed millions of times every day, and successful penetrations have led to the loss of thousands of files from U.S. networks and those of U.S. allies and industry partners. Moreover, this threat continues to evolve as evidence grows of adversaries focusing on the development of increasingly sophisticated and potentially dangerous capabilities. 
The potential for small groups to have an asymmetric impact in cyberspace creates very real incentives for malicious activity. Beyond formal governmental activities, cyber criminals can control botnets with millions of infected hosts. The tools and techniques developed by cyber criminals are increasing in sophistication at an incredible rate, and many of these capabilities can be purchased cheaply on the Internet. Whether the goal is monetary, access to intellectual property, or the disruption of critical DoD systems, the rapidly evolving threat landscape presents a complex and vital challenge for national and economic security. 

Some cyber threats also may come from insiders. Malicious insiders may exploit their access at the behest of foreign governments, terrorist groups, criminal elements, unscrupulous associates, or on their own initiative. Whether malicious insiders are committing espionage, making a political statement, or expressing personal disgruntlement, the consequences for DoD, and national security, can be devastating. 
Software and hardware are at risk of malicious tampering even before they are integrated into an operational system. The majority of information technology products used in the United States are manufactured and assembled overseas. The reliance of DoD on foreign manufacturing and development creates challenges in managing risk at points of design, manufacture, service, distribution, and disposal. 
Potential U.S. adversaries may seek to exploit, disrupt, deny, and degrade the networks and systems that DoD depends on for its operations. DoD is particularly concerned with three areas of potential adversarial activity: theft or exploitation of data; disruption or denial of access or service that affects the availability of networks, information, or network-enabled resources; and destructive action including corruption, manipulation, or direct activity that threatens to destroy or degrade networks or connected systems. 

Cyber threats to U.S. national security go well beyond military targets and affect all aspects of society. Hackers and foreign governments are increasingly able to launch sophisticated intrusions into the networks and systems that control critical civilian infrastructure. Given the integrated nature of cyberspace, computer-induced failures of power grids, transportation networks, or financial systems could cause massive physical damage and economic disruption. DoD operations—both at home and abroad—are dependent on this critical infrastructure. 
While the threat to intellectual property is often less visible than the threat to critical infrastructure, it may be the most pervasive cyber threat today. Every year, an amount of intellectual property larger than that contained in the Library of Congress is stolen from networks maintained by U.S. businesses, universities, and government departments and agencies. As military strength ultimately depends on economic vitality, sustained intellectual property losses erode both U.S. military effectiveness and national competitiveness in the global economy. 

CONCLUSION:-


National security is being redefined by cyberspace. In addition to opportunities, DoD faces significant cyberspace challenges. The Department’s military, intelligence, and business operations all depend upon cyberspace for mission success. The “Department of Defense Strategy for Operating in Cyberspace” assesses these challenges and opportunities and sets a strategic approach for DoD’s cyber mission. 
The Department’s five strategic initiatives offer a roadmap for DoD to operate effectively in cyberspace, defend national interests, and achieve national security objectives. Each initiative is distinct, yet necessarily connected with the other four. Across the strategy, activities undertaken in one initiative will contribute to DoD’s strategic thinking and lead to new approaches in the others.
By pursuing the activities in this strategy, DoD will capitalize on the opportunities afforded to the Department by cyberspace; defend DoD networks and systems against intrusions and malicious activity; support efforts to strengthen cybersecurity for interagency, international, and critical industry partners; and develop robust cyberspace capabilities and partnerships. This strategy will guide the Department’s defense of U.S. interests in cyberspace so that the United States and its allies and partners may continue to benefit from the innovations of the information age.

To read the full Department of Defense Strategy for Operating in Cyberspace Click HERE




-News Source (Defence Professionals)

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

White House Calls China to Stop Hacking & Cyber Espionage Against U.S.

White House Calls China to Stop Hacking & Cyber Espionage Against U.S.

The story of cyber espionage by Chinese hackers used to remain on the spot light due to its consistency, but now the situation get nasty and takes a new way as the national security adviser of U.S. President Obama directly pointed his finger to China. Many of our readers might take this issue lightly as earlier China has been blamed for engaging cyber attacks against different countries for many times. But this time there is a twist as the U.S. government vows to take the issue in a very serious manner. In his speech the national security advisory Tom Donilon said that "The international community cannot afford to tolerate such activity from any country," Like earlier China has denied any type of involvement and condemned the report for lack of hard evidence. But this time such reaction will not at all be entertained as the president said in the State of the Union, "we will take action to protect our economy against cyberthreats." The above two statements can be taken in both friendly warning or also in a serious threat. The White House already warned China to end the campaign of cyber espionage against U.S. companies, saying in its toughest language yet on the issue that the hacking activity threatens to derail efforts to build stronger ties between the two countries. 
Donilon did not directly accuse the Chinese government of launching the attacks on U.S. computer systems, only noting that the attacks are coming from inside the country. "Increasingly, U.S. businesses are speaking out about their serious concerns about sophisticated, targeted theft of confidential business information and proprietary technologies through cyber intrusions emanating from China on an unprecedented scale," he said. Another important message came from the Obama administration saying United States “will not accept North Korea as a nuclear state” and called on Chinese leaders to get serious about cracking down on cyber-related crimes. 
While covering this story we would like to remind you that couple of weeks ago Chinese officials issued a same complain against United States where they blamed U.S. for engaging massive cyber attacks against Chinese military and defense system. If you look at the story of major cyber attacks of last few days we will find that the name of China has been involved several times for engaging cyber attacks against several high profile websites and organization of U.S. including New York TimesTwitterNBC and so on. And if you refresh our memory then then we will find the scenario of big cyber attack and espionage by Chinese hackers have been spotted several times. In 2012 Chinese hackers had  breached Telvent's corporate network & gained control of US Power GridAlso in the middle of last year, we have seen that Chinese hackers have broken into Indian Navy's Computer System & stolen sensitive data. Few months before this hack, Tokyo based computer security firm Trend Micro confirmed that Chinese hackers were responsible for biggest cyber-espionage in India, Japan & Tibet. Also the director of National Security Agency (NSA) General Keith Alexander confirmed that hackers from China was responsible for the serious attack on one of the leading IT security & cyber security company RSAAlso in 2011 China was responsible behind the attack on US Chamber of Commerce, Satellite System of U.S, Nortel Network & so on.  But few days ago National Computer Network Emergency Response Coordination Center of China (CNCERT/CC), China's primary computer security monitoring network claimed that China fallen victim of one of biggest cyber attacks originated from US, Japan & South Korea. We must have to say that this statement is truly irrelevant. Cyber crime investigator have found that China was directly responsible for the hack into Japan's Biggest Defense Contractor Mitsubishi, Japan Aerospace Exploration Agency (JAXA) & Parliament of Japan. In case of South Korea  more than 13 Million of MapleStory players data has been stolen, there also hackers from China was responsible. 


-Source (The Hill, Cnet & WT)




SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Wikileaks said US offered to bankroll New Zealand piracy crackdown



Making your country's views known is a principal function of foreign embassies, but the US goes much further. According to cables released by WikiLeaks, the US embassy in New Zealand urged Uncle Sam to fork over about half a million New Zealand dollars back in 2005 to bankroll a private intellectual property enforcement unit run by major rightsholders in the region.
Operated on an informal basis by the Recording Industry Association of New Zealand (RIANZ) and the Australasian Mechanical Copyright Owners Society (AMCOS), the US identified the "unit" as the only potential bulwark against music piracy in the region.
"It is developing an intelligence framework to identify local producers of pirated works, distributors, criminal networks and recipients and to work with relevant government, law enforcement, customs and other authorities and stakeholders," the embassy's cable noted. "The unit aims to prevent piracy by sharing intelligence with other organizations and agencies, lobbying political parties and the judiciary on the harm to industry and supporting public awareness campaigns."
The outfit would also launch "enforcement operations" targeting makers and distributors of illegal material, and it would "train law enforcement and other agencies in the implementation of intellectual property legislation through identifying offenses and disrupting piracy activities."
The cable drew up a recommended budget of NZ$533,000 (US $386,158) for the operation, with over $200,000 going to salaries and the rest funding start-up and operating costs.
A proposed US budget for the New Zealand/South Pacific IP enforcement program.
Did any of this money get spent? If it had, it would have come from the US's Intellectual Property Rights Training Program, mentioned as the proper source in the cable. We did an IPR database search for RIANZ and AMCOS, but couldn't find either group listed, although a slew of other training programs popped up.

Repeated offers

But this isn't the only way that the US tried to wield influence on the region; it's also willing to help countries write their laws. A May 2009 cable indicates that the US pretty much offered carte blanche help to New Zealand as it was rethinking its "three strikes" illegal file sharing law. "Embassy in the meantime has repeated its offer of assistance to [Government of New Zealand] officials to offer consultations with [United States Government] copyright experts through a [Digital Video Conference]," the missive explained.
As we reported at the time, New Zealand's government eventually yanked the punitive Section 92A of the bill, denounced by content providers and ISPs as vague and impossible to implement. But the US seemed confident at the time that New Zealand would eventually come through with a new edition of the law.
Embassy officials also made clear their irritation with those who opposed industry-friendly copyright changes.
In the meantime, the IPR community has engaged the services of Price Waterhouse consultants to do a cost-benefit analysis on the potential losses to the NZ economy if the new S92A fails to be enacted. The IPR industry wants to be prepared to counter any false claims by opponents of the new provision who successfully managed to monopolize the local media's attention in the last round.
In the end, the US Trade Representative decided not to put New Zealand on its Special 301 Priority list—the watchdog list for countries of whose IP standards the US does not approve.
"While there is additional work to be done to strengthen the law and enhance enforcement," a March 2009 cable concluded, "Post recommends the better course of action is to continue engagement with the GNZ and monitor the progress of IP legislation rather than place New Zealand on this year's watch list."

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Iran Accused For Engaging Cyber Attacks Against Persian Gulf Oil & Gas Companies in U.S. (Full Story)

Iran Accused For Engaging Cyber Attacks Against Persian Gulf Oil & Gas Companies in U.S. (Full Story)

The conflict and tussle between Iran and United States continues, as U.S. authorities believe that Iranian-based hackers were responsible for cyberattacks that devastated Persian Gulf oil and gas companiesJust hours later the attack was discovered, Defense Secretary Leon Panetta said the cyberthreat from Iran has grown, and he declared that the Pentagon is prepared to take action if American is threatened by a computer-based assault.
The former government official, who is familiar with the investigation, said U.S. authorities believe the cyberattacks were likely supported by the Tehran government and came in retaliation for the latest round of American sanctions against Iran. Before Panetta's remarks on Thursday, U.S. officials had said nothing publicly about the Gulf attacks or the investigation. But Panetta described them in a speech to business leaders in New York City, saying they were probably the most destructive cyber assault the private sector has seen to date. A current U.S. official acknowledged Thursday that the Obama administration knows who launched the cyberattacks against the Gulf companies and that it was a state actor. U.S. agencies have been assisting in the Gulf investigation and concluded that the level of resources needed to conduct the attack showed there was some degree of involvement by a nation state, said the former official. The officials spoke on condition of anonymity because the investigation is classified as secret. While Panetta chose his words carefully, one cybersecurity expert said the Pentagon chief's message to Iran in the speech was evident.  
It was all about what U.S. Authorities are claiming or in other word blaming, but like earlier; this time also Iran completely denies the whole matter, besides they blamed Israel & America for engaging cyber attacks on Iran's Nuclear SystemIranian officials denied any role in recent cyberattacks against oil and gas companies in the Persian Gulf and said they welcomed a probe of the case.  Mahdi Akhavan Bahabadi, secretary of the National Center of Cyberspace, denounced as "politically motivated" American allegations of an Iranian link to the Shamoon virus that hit Saudi Arabian state oil company Aramco and Qatari natural gas producer RasGas, according to remarks carried by ISNA. "We interpret the issue politically and in light of U.S. domestic issues as well as the (U.S. presidential) election," he said. The Iranian official said Tehran has already offered help to boost the companies' cybersecurity, asIran has itself recently been the victim of cyberattacks on its offshore oil platforms. Iran periodically reports the discovery of viruses and other malicious programs in government, nuclear, oil and industrial networks. On Monday, Tehran said it had successfully blocked a cyberattack on the computer network of its offshore drilling platforms. It briefly shut down part of its oil facilities because of a cyberattack in May. Iran blames Israel and the United States for the attacks. Israel has done little to deflect suspicion it uses viruses against Iran.
While talking about the cyber attacks on  Persian Gulf oil and other gas companies, we like to remind you that couple of weeks ago U.S. Authorities also blamed Iran for engaging cyber attacks on U.S. leading banking and financial sector. There also Iran official denies the attack and said "We officially announce that we haven't had any attacks,". So far its not clear whether these two attacks are linked or not. Whatever, for all the latest update on stories like this & also other updates on cyber domain stay tuned with VOGH

-Source (MPR News & Yahoo) 




SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Cyber Shield deal Between India & US


India and the US today inked a pact on cybersecurity to intensify information exchange on threats to computers and networks and initiate joint work on technologies against cyber-attacks.
A joint statement on the India-US strategic dialogue has announced the cybersecurity agreement among new initiative by the two countries. These initiatives also include a plan to develop a software platform to make available non-sensitive government data to the public and to award $3 million each year to entrepreneurial projects that commercialise technologies to improve health.
A memorandum of understanding between the Indian and the American Computer Emergency Response Teams (CERT) is expected to lead to routine exchange of information on vulnerabilities and co-operation on cybersecurity technologies, Indian CERT officials said.
“This comes at a time when cybersecurity-related incidents are increasing in number and becoming more and more sophisticated,” said Gulshan Rai, director-general of the Indian CERT, a division of the ministry of communications and information technology.
Rai said the MoU is expected to lead to greater exchange of information between Indian and US CERTs about known and emerging threats, specific vulnerabilities of computers and networks and open opportunities for joint technology development.
The CERTs track and catalogue threats, advocate protective mechanisms, and respond to attacks on computer systems in the two countries.
The latest monthly security bulletin from India’s CERT says 151 computer security-related incidents were reported during May 2011 alone, among which more than half involved “phishing” — an attack or an intrusion that involves some form of identity theft.
Last year, unidentified hackers, believed to be based in China, had penetrated computers in sensitive Indian government offices, including the National Security Council secretariat, and stolen documents on missiles, and personal and financial data of Indian officials.
India already has cybersecurity pacts, primarily for the exchange of information, with Japan and Korea and is planning to develop one with Finland.
The cybersecurity pact followed consultations led by the Indian and the US National Security Councils on prospects for bilateral co-operation on cybersecurity issues, held on Monday, a joint statement on the India-US strategic dialogue said.
The joint statement also said the Nasa has “reiterated its willingness to discuss potential co-operation with the Indian Space Research Organisation on human spaceflight”.
While the Nasa offer comes on the eve of the retirement of the US Space Shuttle, space experts believe Nasa has accumulated enormous expertise on human spaceflight — for instance, in the area of onboard life support systems — that could help India in its own long-term plans to develop a space capsule large enough to carry two astronauts into a low-earth orbit for a short mission.
The open source software platform that India and the US plan to create is intended to help make available to the public all non-sensitive government information through a user-friendly website.
It is expected to be patterned on the lines of America’s own government data websitewww.data.gov which began with 47 government data sets in May 2009, but has more than 392,000 data sets today.
“We have all kinds of data there — data sets on infant car seats, airline statistics, hospitals,” said Aneesh Chopra, the chief technology officer in the US, who is also assistant to US President Barack Obama.
An Indian government official said India is preparing a policy initiative to get myriad government departments into making non-sensitive data — from education to health to public infrastructure — public through a so-called National Data Sharing Access Policy (NDSAP). The official who spoke on condition of anonymity said this NDSAP is yet to be approved by the Union cabinet.
Among other initiatives, the India-US science and technology endowment board established in 2009 has decided to award $3 million annually to projects proposed by entrepreneurs for commercialisation of technologies to improve health and empower citizens.
The first call for proposals has already attracted more than 380 joint India-US proposals and the first set of awards will be announced in September this year.

                                     
                                                                                                                                                                             -News Source (The Telegraph)

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

US National Archives Has Blocked Search Containing 'WikiLeaks'

US National Archives Has Blocked Search Containing 'WikiLeaks'

The movement of WikiLeaks faced another bar, as the searches for “WikiLeaks” in the public search engine for the US National Archives have been blocked. Any search containing the word “WikiLeaks (like “Congress” and “WikiLeaks”; "Obama" and "WikiLeaks") turns up an error message saying "The page you have requested has been blocked, because the URL is banned" as shown the picture below.

The whistle blowing website of WikiLeaks already lashed out at the move, saying the Archives has  literally turned into “Orwell’s Ministry of Truth.” In a tweet the official twitter account of WikiLeaks said “The US state is literally eating its own brain by censoring its own collective memories about WikiLeaks.” And, in another tweet WikiLeaks said, “The US National Archives censoring searches for its records containing the word ‘WikiLeaks’ is absolutely absurd.” 
The block is likely to be in line with the “Protecting Cyberspace as a National Asset Act,” a form of internet censorship the US adopted back in 2010. It did not become law, but it prompted various US government agencies such as the White House Office of Management and Budget and the US Air Force to advise their employees not to read or access classified documents being made available by sites like WikiLeaks. The Library of Congress went further by blocking access to WikiLeaks content from its server in 2010. According to the official blog post of  Library of Congress “The Library decided to block Wikileaks because applicable law obligates federal agencies to protect classified information.  Unauthorized disclosures of classified documents do not alter the documents’ classified status or automatically result in declassification of the documents.” The White House’s Office of Management and Budget today provided the guidance that “federal agencies collectively, and each federal employee and contractor individually, are obligated to protect classified information pursuant to all applicable laws, as well as to protect the integrity of government information technology systems.” -said Matt Raymond in the blog post of LOC. 
Though it is unknown when the Archives began blocking searches, but according to diplomatic cables released over the past months the US Justice Department’s investigation targeting of both Assange and WikiLeaks is real. So may be this block has connection or may be a return from the U.S. Govt of the last release of WikiLeaks that is  'Detainee Policies'  in what it said more than 100 classified or otherwise restricted files from the United States Department of Defense covering the rules and procedures for detainees in U.S. military custody. At the moment WikiLeaks founder Julian Assange is holed up in the Ecuadorian embassy in London as the UK has forcefully asserted that it will deny him safe passage to Ecuador. Ecuador granted Assange political asylum in August over fears that if extradited to Sweden, Assange could be transferred to the US and once there, face execution.



-Source (RT)





SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Pakistan Government's & 12 American Websites Hacked by Minhal & NoTty_rAJ

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Aafia Siddiqui Court Case Leaked, US Government Exposed ByTeaMp0isoN


There is a terrorist Network that stretches the length and breadth of this very ill earth of ours - That Terrorist Network belongs to the Terrorist Empire that is The United States Of America!
In Dr. Afia Siddique, this Terrorist Empire has decided that the very 'small' and 'slight' mother, Dr. Afia Siddique, is a Jihadist! A Threat to their 'peace', a threat to their 'way of life' and lest we forget the incredulous mantra 'a threat to their freedom' - Such was the fear of the Terrorist Empire of Dr Afia Siddique, they decided to do as all criminals against humanity do; they fabricated evidence, planted bogus witnesses, and with the help of the shameful 'free press', they chose to demonize her - demonize her so much that people of conscious did not even ask 'why was it necessary to murder her baby in prison?'

The human tragedy of Dr. Afia Siddique will not be in vain! Justice will be demanded and Justice will prevail! America will pay for its crimes against Dr Afia Siddque and its crimes against humanity!
The Terrorist Empire refuses to listen, educate, and learn from the mistakes of Terrorist Empires of history - in the indomitable words of Malcolm X - 'The Chickens are coming home to roost'
"Let no man deceive you by any means: for that day shall not come, except there come a falling away first, and that man of sin be revealed......“

Americans who read this; it is the epitome of Patriotism to resist the crimes of ones nation - do not let your children pay for the sins of their fathers!

Apparently she fired a rifle at the US nationals & the US Army yet there was no fingerprints found on the rifle, furthermore aafia was the only person on the scene who suffered from bullet wounds when allegedly she was the one holding the gun - the main questions till date are "why was she captured? "why has she been given 85years?" and "why has she been tortured" - all these questions will be answered.

Firstly we need to know why the US Government wanted her and what she knew that made her special, i have compiled a series of screenshots from the official US Court Case related to this case:

- Peace between the taliban and American
- AIDS Vaccine
- Cure for aging
If this idea worked it would have been implemented right across the middle-east and asia especially in Palestine and Pakistan where drone attacks are increasing yet the USA Government stopped this idea from spreading by capturing aafia. 
Now we know of some of the things she was capable of but the next question we must ask ourselves is why would USA stop her from expanding her ideas and studies? her ideas would clearly make the world a better place right?
1. Why would the US Government not want a AIDS vaccine? Because the US Government created AIDS, its all over the internet, google it.
2. Why would the US Government not want peace with the Taliban? The US Government created Taliban, they funded them with money and weapons and trained them them to fight the Soviet Union.
2. Why would Zionist Jews of Israel want to get rid of African Americans and Hispanics living in the US?
Israel is the puppeteer and the US is the puppet, Israel uses USA for security & money, deep down Israel hates everyone and anyone who is not apart of their state, but why would they target African Americans and Hispanics living in america? prisons in America are private businesses, The US Government gets paid 50,000 per year for every inmate in prison, now who are the stereotypical races that represent American prisons? African Americans and Hispanics - therefore if Zionist Jews were to affect African Americans and hispanics in anyway America would be loosing a lot of money.
We know now why she was a threat to the US Government, now i will show you what they done to her to ensure that she wouldn't be able spread her findings & knowledge :
- They tortured her, they raped her, they stripped and put images and videos of her naked on the internet, they tortured her children, they told her she was a psycho and that she was crazy, they used illegal torture methods to obtain information from her, they abused her right to practice religion by breaking her fast/Ramadan. - for what? for outsmarting the suit wearing power hungry faggots of the United States government, for wanting to make the world a better place, for wanting to protect her country and religion from corruption, from wanting to save lives, for wanting to stop diseases and viruses. 

To Download The official Case Click HERE
For More Info About Aafia Click Here

-News Source (ZHC & Team Poison)


SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Related Posts Plugin for WordPress, Blogger...