Showing posts sorted by date for query Syria. Sort by relevance Show all posts
Showing posts sorted by date for query Syria. Sort by relevance Show all posts

Chinese Hackers Eavesdropping European Diplomats Before G20 Summit

Researchers At FireEye Found -Chinese Hackers Snitching  Europeans Before G20 Summit 
Story of cyber espionage by Chinese hackers used to remain one of most highest pick of breakneck. Yet again another breathtaking issue of  eavesdropping by Chinese hackers get spot light, when  California-based renounced computer security firm FireEye Inc have figured out that a group of Chinese hackers eavesdropped on the computers of five European foreign ministries before last September's G20 Summit, which was dominated by the Syrian crisis. From the detailed analysis we came to know that the hackers have infiltrated the ministries' computer networks by sending emails to staff containing tainted files with titles such as "US_military_options_in_Syria," which sells virus fighting technology to companies. Whenever the targeted recipients opened those documents, they loaded malicious code on to their personal computers. Researchers of FireEye said that they were able to monitor the "inner workings" of the main computer server used by the hackers to conduct their reconnaissance and move across compromised systems for about a week in the late August. But suddenly they lost access to the hackers after they moved to another server shortly before the G20 Summit in St. Petersburg, Russia
Though the company has declined in open press to identify the nations whose ministries were hacked, although it said they were all members of the European Union. But FireEye informed the FBI about the whole issue in details. FireEye also confirmed that the hackers where from China, but they did not find evidence which may link those hackers to the Chinese government. Not surprisingly and obviously like earlier the Chinese government has distanced itself from any claim that it might have hacked foreign governments for data. FireEye also successfully monitor several dozen hacking groups operating in China, most of which they suspect of having ties to the government. The firms also suspect the hacking groups of stealing intellectual property for commercial gain. The researchers had been following the hackers behind the Syria-related attack for several years, but this is the first time the group's activities have been publicly documented. The company calls the group "Ke3chang," after the name of one of the files it uses in one of its pieces of malicious software"The theme of the attacks was U.S. military intervention in Syria," said FireEye researcher Nart Villeneuv. 
On reaction Chinese Foreign Ministry spokesman Hong Lei said- "U.S. internet companies are keen on hyping up the so-called hacker threat from China, but they never obtain irrefutable proof, and what so-called evidence they do get is widely doubted by experts. This is neither professional nor responsible," 
While talking in this story of Chinese eavesdropping, I also want to dig some points from decent parts where we all became very habituated of seeing Europe & U.S. countries blaming China for engaging cyber attacks; and China also do the same for accusing U.S. like vice versa. I am reviving your memories of last few years where If you look at the story of major cyber attacks of this year we will find that the name of China has been involved several times for engaging cyber attacks against several high profile websites and organization of U.S. including New York TimesTwitterNBC and so on. And if you refresh our memory then then we will find the scenario of big cyber attack and espionage by Chinese hackers have been spotted several times. In 2012 Chinese hackers had  breached Telvent's corporate network & gained control of US Power Grid. Also in the middle of last year, we have seen that Chinese hackers have broken into Indian Navy's Computer System & stolen sensitive data. Few months before this hack, Tokyo based computer security firm Trend Micro confirmed that Chinese hackers were responsible for biggest cyber-espionage in India, Japan & Tibet. Also the director of National Security Agency (NSA) General Keith Alexander confirmed that hackers from China was responsible for the serious attack on one of the leading IT security & cyber security company RSA. Also in 2011 China was responsible behind the attack on US Chamber of CommerceSatellite System of U.SNortel Network & so on.  But few days ago National Computer Network Emergency Response Coordination Center of China (CNCERT/CC), China's primary computer security monitoring network claimed that China fallen victim of one of biggest cyber attacks originated from US, Japan & South Korea. We must have to say that this statement is truly irrelevant. Cyber crime investigator have found that China was directly responsible for the hack into Japan's Biggest Defense Contractor MitsubishiJapan Aerospace Exploration Agency (JAXA) & Parliament of Japan. In case of South Korea  more than 13 Million of MapleStory players data has been stolen, there also hackers from China was responsible.  

Before I conclude, I request you to closely look at the above mentioned stories, you will find China majorly responsible for eavesdropping & security breach. On the same side China also been effected by the same way. So in conclusion, we cant put a full stop in this chain of cyber attacks, hackingeavesdropping, as it comes from both end. So this exciting episode will be continued like it does. If you want to stay updated then don't forget to stay tuned with VOGH



SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

WikiLeaks Uncovered Secret Trans Pacific Partnership Agreement (TPP), Incoming Threat For Internet

WikiLeaks Uncovered Secret Trans Pacific Partnership Agreement (TPP), Incoming Threat For Internet 
After SOPA, PIPA & ACTA now the Internet is about to face another ferocious challenge named Trans-Pacific Partnership Agreement (TPP). I am sure that many of you are unaware of this TPP, as it is still on process, but WikiLeaks have uncovered ad released secret negotiated draft text for the entire TPP (Trans-Pacific Partnership) which is a multilateral free-trade treaty currently being negotiated in secret by 12 Pacific Rim nations. The current TPP negotiation member states are the United States, Japan, Mexico, Canada, Australia, Malaysia, Chile, Singapore, Peru, Vietnam, New Zealand and Brunei. "This Trans Pacific “Partnership” is really, really bad News. #WikiLeaks" -said the twitter feed of WikiLeaks. From the leaked draft we came to know that  TPP will take time for all the corporate rigging in this lengthy document to be understood, but already it is evident that Internet freedom will be curtailed, access to health care will become more expensive and access to information will be undermined. In short the more you know about the odious Trans-Pacific Partnership, the less you’ll like it. It’s made for corporate intellectual property and profits. According to WikiLeaks official website -"The TPP is the largest-ever economic treaty, encompassing nations representing more than 40 per cent of the world’s GDP. The WikiLeaks release of the text comes ahead of the decisive TPP Chief Negotiators summit in Salt Lake City, Utah, on 19-24 November 2013. The chapter published by WikiLeaks is perhaps the most controversial chapter of the TPP due to its wide-ranging effects on medicines, publishers, internet services, civil liberties and biological patents. Significantly, the released text includes the negotiation positions and disagreements between all 12 prospective member states." 

In the words of WikiLeaks’ Editor-in-Chief Julian Assange, “If instituted, the TPP’s IP regime would trample over individual rights and free expression, as well as ride roughshod over the intellectual and creative commons. If you read, write, publish, think, listen, dance, sing or invent; if you farm or consume food; if you’re ill now or might one day be ill, the TPP has you in its crosshairs.” To download the entire TPP (Trans-Pacific Partnership) draft click here

While talking about Jullian Assange and WikiLeaksand this sensational leak of TPP, I would like to give you reminder that in this year we got several leaks from WikiLeaks, among them -'Detainee Policies' containing more than 100 classified or otherwise restricted files from the United States Department of Defense covering the rules and procedures for detainees in U.S. military custody. SpyFilesGI Files (Global Intelligence Files & Five Million E-mails From Stratfor) & The Syria Files Containing 2.5 Million Emails of Syrian Politicians, Govt, Ministries & Companies. 



SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Several Twitter Accounts of CBS News (60Minutes, 48Hours & CBSDenver) Hacked

Several Twitter Accounts of CBS News (60Minutes48Hours & CBSDenver) Hacked By Syrian Electronic Army [#twithackery]

Yet again CBS one of the major commercial broadcasting television network of United States faced cyber attack. First it was hacker collective Anonymous who targeted CBS and managed to hack the TV network of CBS in January last year. The attack was done under the banner of Operation Megaupload. And now CBS have fallen victim of what it called twithackery, where hacker managed to gain temporary access of popular twitter accounts and broadcast fake tweets. This Sunday such twithackery targeted and compromised several twitter account of CBS. Infamous hacker community going by the name of Syrian Electronic Army claimed to have hijacked the twitter accounts of CBS, the list of the hijacked accounts include "60 Minutes" and "48 Hours" which is maintained by CBS news program. Later it has been reported that another twitter account @CBSDenver has also been hacked, during this ongoing cyber attack. CBS acknowledged the whole phenomena and later a CBS spokeswoman confirmed that the accounts had been compromised. "PLEASE NOTE: Our Twitter account was compromised earlier today. We are working with Twitter to resolve." - said the CBS spokesman. Another message from CBS said, "A message that was posted earlier to this account was not written or sent by @60Minutes or its staff."

Here is the list of those fake tweets came from the hijacked accounts of CBS:- 
From @60Minutes account we got the following message -
  • "The US government is hiding the real culprit of the Boston bombing"
  • "The US government is sponsoring a coup in Venezuela and a terrorist war in Syria"
  • "Your duty is to protect your nation from the parasites that have taken your government"
  • "Obama wants to destroy the Syrian and American people. We must stop this beast" 

Other messages claimed: "Syrian Electronic Army Was Here via @SyrianCyberArmy" and suggested the action was in response to the suspension of the @Official_SEA account. Tweets sent out on the @48Hours account reportedly included: "General Dempsey calls for #Obama's arrest under new anti-terror laws #48hours" As soon as the issue get spotted, CBS regain those hijacked accounts and immediately deleted those rouge messages. Later the two accounts @60Minutes and @48Hours has been suspended. 
While talking about twitter hacking, widely known as #twithackery; we would like to remind you the following names, WWE champion John CenaStar Rita OraJustin BieberTeyana Taylor,American pop singer KeshaNBC NewsFox News PoliticsUSAToday, Lady Gaga’s Twitter AccountAnders BreivikMahesh Bhatt, Huffington Postthese are the famous names who have fallen victim to twithackery before CBS. 



-Source (BBC & Reuters)





SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Anonymous & RedHack Breached Israeli Intelligence Agency 'Mossad' Leaked Personal Data of 35K Officials

AnonymousRedHack Breached Israeli Intelligence Agency 'Mossad' Claimed to Have Personal Data of 35K Officials (#OpIsrael)

A week ago infamous hacker collective group Anonymous called for Operation Israel (#OpIsrael) second phase, where they vows to engage massive cyber attack against Israeli cyberspace in order to interrupt all the necessary service, which the hacker called a complete outage. The main phase of attack was planned at 7th April, but now it looks that those hacker collectives changed their strategy, or may be they can't wait till April, and as result anti-Israel hacking collective affiliated with Anonymous managed to breach several Israeli government servers, causing a big data leak of more than 35,000 Israeli government officials, including politicians, military leaders, and police officers. The hack was done under the banner of #OpIsrael, and from the twitter feed of Anonymous, the hacker group took responsibility of the cyber attack. A comprehensive spreadsheet purporting to include the information of all 35,000 Israeli officials was published by the website Cryptome, though it did not independently verify the information. The coalition of hackers appears to have ties to the Iranian government, Pakistan, Syria, Egypt, and the terror group Hezbollah, according to a report published by Cryptome. 
In our last report on this story we covered that, the attack will be organized as Anon ask other hackers and other underground communities to join the campaign. As expected, it happens; RedHack, a Turkey-based Marxist hacker group responded to Anonymous and they claimed to breach Israeli intelligence agency known as 'Mossad.' RedHack claimed to gain access inside Mossad's server; which lead them release personal information including phone numbers, emails and addresses of Mossad officials"Yes, we realize we are sailing in dangerous water but we like swimming,” said hackers of RedHack. From a report of RT we came to know that not only data breach but also hackers performed massive denial of service attack against Mossad. In spite of RedHack’s claims, some argue that the names and information do not belong to Mossad officers or informants. 
“Whatever they stole, it probably wasn’t secure details of top Israeli brass, either from the army or the Mossad,” internet researcher Dr. Tal Pavel told the media. “There is no doubt that they got some identification information about Israelis, but the claims that they hacked the Mossad site and got a list of Mossad agents is most likely psychological warfare, and not a hack into an important database,” Pavel added. 
Whether those leaks are not that classified, whether those data does not belongs to Mossad, but one thing is clear and that is in-spite of having precaution, Israel government yet again failed to protect themselves from massive attack which caused a massacre. And from this story it is also predictable that hackers around the globe came under one shade or one unity, in order to target Israel over Gaza issue. As 7th April is still a week away from today so lets wait for the time, and stay tuned with VOGH to get all the latest update on this story and also other cyber issues.







SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Julian Assange Started His Journey For Australian Senate on Behalf of WikiLeaks Party

Julian Assange Started His Journey For Australian Senate on Behalf of WikiLeaks Party

The world knows Julian Paul Assange, as the editor-in-chief and founder of WikiLeaks, which publishes submissions of secret information, news leaks and classified media from anonymous news sources and whistleblowers, will now see a different avatar as Mr. Assange have taken the first step toward a Senate run in the Australian state of Victoria as a member of the newly formed WikiLeaks Party. According to sources, Assange's electoral enrollment application was submitted to the Australian Electoral Commission in Melbourne by WikiLeaks supporters, including Assange's father, John Shipton. Mr Shipton said Mr Assange's enrolment was ''a first step'' in a political campaign that would focus on ''the democratic requirement of truthfulness from government''. The party, not yet registered with the Australian Electoral Commission, has an initial 10-member national council comprised of close associates of Mr Assange and pro-WikiLeaks activists. Its constitution highlights the promotion of openness and transparency in government and business. Mr Assange has nominated his mother's home in Mentone, in the federal electorate of Isaacs, as his address for eligible enrolment before his most recent trip overseas in June 2010 -reported a reputed Australian daily. 
According to post of The Age we came to know that --Australian citizens living overseas can enrol to vote as an overseas elector, and consequently run as a Senate candidate if they left Australia within the past three years and intend to return within six years of their date of departure.
Mr Assange has indicated that if elected and unable to return to Australia to take up a seat in the Senate, a WikiLeaks Party nominee would fill the vacancy. Opinion polls last year by UMR Research, the company the Labor Party uses for its internal polling, suggest that Mr Assange could be a competitive Senate candidate in Victoria. 
But the WikiLeaks founder has been living at the Ecuadorian Embassy in London for more than six months — eluding Swedish authorities, who have an outstanding arrest warrant for him in connection to a sexual assault investigation.
Assange spoke of his political ambitions in December, when he said he was interested in running for Senate, adding that "a number of very worthy people admired by the Australian public" had signaled they'd be willing to join him on a party ticket. A representative for the Australian Electoral Commission said the application for electoral enrollment is a private matter between the applicant and the commission, so he would not discuss individual cases.

While talking about Jullian Assange and WikiLeaks, we would like to give you reminder that in this year we got several leaks from WikiLeaks, among them -'Detainee Policies' containing more than 100 classified or otherwise restricted files from the United States Department of Defense covering the rules and procedures for detainees in U.S. military custody. SpyFilesGI Files (Global Intelligence Files & Five Million E-mails From Stratfor) & The Syria Files Containing 2.5 Million Emails of Syrian Politicians, Govt, Ministries & Companies.




SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

More Leaks are Coming in 2013 Said WikiLeaks Founder Julian Assange

More Leaks are Coming in 2013 Said WikiLeaks Founder Julian Assange

The government are trying their best to dominate WikiLeaks founder Julian Assange, while blocking public search containing WikiLeaks, blocking banking donations, keeping him in under house arrest. But its is a undeniable that the enthusiasm and the will power of Assange can never be ruled or dominated. Again the above fact came into light when Julian Assange announced in a defiant speech from the balcony of Ecuadorian embassy here as his supporters shouted, and sang Christmas carols. In his speech Assange said that WikiLeaks have planned to release over one million new secret documents that would affect "every country in the world" 
It was his second ``balcony’’ address since he sought refuge there six months ago to avoid extradition to Sweden over allegations of sexual assault. And he made clear he had no intention of leaving the cramped mission which he described as ``my home, my office and my refuge’’ until ``this immoral investigation continues’’.
Referring to the impasse over his extradition, Mr Assange said that as long as long as the American government sought to prosecute him and his native country, Australia, refused to defend his journalism, he would remain in the embassy. But, he said, he was open to negotiations. "However, the door is open, and the door has always been open, for anyone who wishes to use standard procedures to speak to me or guarantee my safe passage," he said.
Mr Assange has been given asylum by Ecuador but is prevented by the British Government from leaving the country arguing that it is under a legal obligation to extradite him to Sweden. He will be arrested the minute he steps out of the embassy. Police say he broke his bail conditions when he sought refuge in the Ecuadorian embassy without informing them. Mr Assange claims the case against him is politically motivated and fears that Sweden would hand him over to Americans who have threatened to prosecute him for publishing confidential diplomatic cables.

While talking about Jullian Assange and WikiLeaks, we would like to give you reminder that in this year we got several leaks from WikiLeaks, among them -'Detainee Policies' containing more than 100 classified or otherwise restricted files from the United States Department of Defense covering the rules and procedures for detainees in U.S. military custody. SpyFiles, GI Files (Global Intelligence Files & Five Million E-mails From Stratfor) & The Syria Files Containing 2.5 Million Emails of Syrian Politicians, Govt, Ministries & Companies.



-Source (The Hindu)






SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

WikiLeaks Releases 'Detainee Policies' The Dark History of U.S. Post-9/11 Military Prisoners

WikiLeaks Releases 'Detainee Policies' The Dark History of U.S. Post-9/11 Military Prisoners 

The WikiLeaks website began publishing the 'Detainee Policies' on Thursday what it said more than 100 classified or otherwise restricted files from the United States Department of Defense covering the rules and procedures for detainees in U.S. military custody. “The Detainee Policies,” a collection of more than a hundred once-secret files outlining America’s military detainee practices from Guantanamo to Iraq since 2002. WikiLeaks says it plans to release the files in chronological order to paint a picture of the evolution of America’s military detainee practices since September 11th in prisons from Guantanamo to Iraq to Europe. Unlike other recent releases, with the Detainee Policies WikiLeaks seems to be focusing on history more than news: Its first release is the 2002 Guantanamo Camp Delta standard operating procedure manual, a kind of prequel to the 2003 and 2004 manuals from camp it’s already published in past years. Other documents in the collection, WikiLeaks says, will show American attempts to “disappear” detainees by delaying the process of entering them into the detainment system’s records, or detail psychological torture methods. According to WikiLeaks official site - "Over the next month, WikiLeaks will release in chronological order the United States’ military detention policies followed for more than a decade. The documents include the Standard Operating Procedures (SOPs) of detention camps in Iraq and Cuba, interrogation manuals and Fragmentary Orders (FRAGOs) of changes to detainee policies and procedures. A number of the ’Detainee Policies’ relate to Camp Bucca in Iraq, but there are also Department of Defense-wide policies and documents relating to Abu Ghraib, Guantanamo Bay and European U.S. Army Prison facilities." 
According to the press release of WikiLeaks :-  The previously unpublished 2002 manual went on to shape successive years in the Guantanamo Bay prison complex and other U.S. military prisons around the world, such as Abu Ghraib. "This document is of significant historical importance. Guantanamo Bay has become the symbol for systematised human rights abuse in the West with good reason," said WikiLeaks founder Julian Assange. "But how is it that WikiLeaks has now published three years of Guantanamo Bay operating procedures, but the rest of the world’s press combined has published none?"
In relation to Iraq, the release includes Operation Orders (OPORD) regarding policies for screening and interrogating detainees. The documents also include routine instructions relating to staffing, scheduling of legal visitation, procedures for administering medical treatment, how medical records and daily staff journals are to be kept, cigarette rationing and what items are "authorised for detainee possession".
A number of what can only be described as ’policies of unaccountability’ will also be released. One such document is the 2005 document ’Policy on Assigning Detainee Internment Serial Numbers’. This document is concerned with discreetly ’disappearing’ detainees into the custody of other U.S. government agencies while keeping their names out of U.S. military central records – by systematically holding off from assigning a prisoner record number (ISN). Even references to this document are classified "SECRET//NOFORN". Detainees may be disposed of in this manner without leaving a significant paper trail.
Another formal policy of unaccountability is a 2008 Fragmentary Order that minimises the record-keeping surrounding interrogations. Following revelations of torture tapes and pictures from Abu Ghraib and the political scandal over the destruction of Central Intelligence Agency interrogation tapes, the FRAGO eliminates "the requirement to record interrogation sessions at Theatre Internment Facilities". Although the FRAGO goes on to state that interrogations that take place at Division Internment Facilities and Brigade Internment Facilities must be recorded, it then states that these should be "purged within 30 days". This policy was subsequently reversed by the new Obama administration.
WikiLeaks founder Julian Assange said: "The ’Detainee Policies’ show the anatomy of the beast that is post-9/11 detention, the carving out of a dark space where law and rights do not apply, where persons can be detained without a trace at the convenience of the U.S. Department of Defense. It shows the excesses of the early days of war against an unknown ’enemy’ and how these policies matured and evolved, ultimately deriving into the permanent state of exception that the United States now finds itself in, a decade later."
A number of documents relate to the policies surrounding the interrogation of detainees (2004, 2005, 2008). Direct physical violence is prohibited, in writing, but a formal policy of terrorising detainees during interrogations, combined with a policy of destroying interrogation recordings, has led to abuse and impunity. We learn of policies that apply to international forces: a 13-page interrogation policy document from 2005 relates to all personnel in the Multi-National Force–Iraq (MNF–I). It details "approved" "interrogation approaches". The documents detail the promotion of exploitative techniques such as the "Emotional Love Approach: Playing on the love a detained person has for family, homeland or comrades". In the "Fear Up (Harsh)" approach, by contrast, "the interrogator behaves in an overpowering manner with a loud and threatening voice in order to convince the source he does indeed have something to fear; that he has no option but to co-operate".
The ’Detainee Policies’ provide a more complete understanding of the instructions given to captors as well as the ’rights’ afforded to detainees. We call upon lawyers, NGOs, human rights activists and the public to mine the ’Detainee Policies’ and investigate important issues such as the denial of access to the ICRC (International Committee of the Red Cross) to detainee facilities, as well as to research and compare the different generations of SOPs and FRAGOs to help us better understand the evolution in these policies and why they have occurred. Publicise your findings using the hashtag #WLfindDP
Here we want to give you reminder that earlier in this year we got several leaks from WikiLeaks, among them -SpyFilesGI Files (Global Intelligence Files & Five Million E-mails From Stratfor) & The Syria Files Containing 2.5 Million Emails of Syrian Politicians, Govt, Ministries & Companies.  


For detailed information & to download to latest release by WikiLeaks on 'Detainee Policies' Click Here



SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

WikiLeaks Again Under DDoS Attack For Last 5 Days

WikiLeaks Again Under DDoS Attack For Last 5 Days

Yet again Wikileaks official website faced denial of service attack. Earlier we have seen two similar attack, first it was in 2011 when  an Anonymous member took responsibility of that Attack on Wikileaks website. That  time the attacker executed a massive Denial of Service while using newly developed tool #refref. In an exlusive report by Corero Network Security said the attack on Wikileaks site was one of the largest DDoS attack ever took place in 2011. Back in May this year, Wikileaks was also taken down by a DDoS attack which also infected controversial file sharing site "The Pirate Bay". As per sources the site has been down for the last five days, during which it has been experiencing a massive Distributed Denial of Service (DDoS) attack. So far it was the longest attack ever happened against Wikileaks. The most notable thing is that according the organisation already claimed a government entity is behind the hit. Many of other unofficial sources are connecting this attack with a recent story, which restarted the WikiLeaks donation. At the time of the attack team VOGH took the following screen shot which clearly showing that Wikileaks.org was indeed inaccessible

The first tweet was sent out on August 3:-
WikiLeaks.org is down for unknown reasons. We are investigating. wikileaks.org is still up.
#WikiLeaks donation page and FDNN portal down. You can still donate via supporter merchandise: http://wikileaks.spreadshirt.com/ http://www.cdbaby.com/cd/wikileaksbeattheblockade2
WikiLeaks has been under sustained large scale DDoS attacks since August 3. Help us purchase more bandwidth: http://shop.wikileaks.org/donate
Speculation on DDoS attack against WikiLeaks timing: 1. Olympics cover 2. Upcomng release. 3. Ongoing Syria, Stratfor releases
Wikileaks est actuellement sous le feu d’une attaque DDOS d’ampleur.
wlcentral.org and http://justice4assange.com are now down.
Update: http://wikileaks.org https://secure.fdn2.org/fdn2/nouser http://cabledrum.net/ still down. http://wlcentral.org/ http://justice4assange.com/ back online.
UPDATE: WikiLeaks battles ongoing DDoS attack
#WikiLeaks .onion mirror available: http://isax7s5yooqgelbr.onion/ Accessible only through Tor

Most WikiLeaks mirrors have been brought offline as well, with some coming back today. Even sites simply related to WikiLeaks have been targeted. These include the WikiLeaks-endorsed website Cabledrum, including its mirror of the WikiLeaks website, and French non-profit FDNN, which hosts a WikiLeaks' donation portal. The latter was attacked shortly after WikiLeaks linked to it as an alternative to donate while the WikiLeaks website is down. WL Central and Justice for Assange were also attacked for a short period of time. According to Zdnet a hacker group calling themselves 'AntiLeaks' is claiming responsibility for the attack, and has issued the following statement:-
"You can call me DietPepsi. I am the leader of AntiLeaks. We are not doing this to call attention to ourselves. We are young adults, citizens of the United States of America and are deeply concerned about the recent developments with Julian Assange and his attempt at aslyum in Ecuador.
Assange is the head of a new breed of terrorist. We are doing this as a protest against his attempt to escape justice into Ecuador. This would be a catalyst for many more like him to rise up in his place. We will not stop and they will not stop us."




SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Reuters Blogging Platform Hacked, A Fake Interview of Syrian Rebel Leader Posted

Reuters Blogging Platform Hacked, A Fake Interview of Syrian Rebel Leader Posted 

Thomson Reuters has confirmed the Reuters News blogging platform was compromised and a false interview with a Syrian rebel leader was posted on a Reuters' journalist's blog. "Reuters.com was a target of a hack on Friday," the company said in a statement. "Our blogging platform was compromised and fabricated blog posts were falsely attributed to several Reuters journalists." The phony interview was with Riad al-Assad, the head of the Free Syrian Army, who apparently said his forces were pulling back from the northern province of Aleppo after repeated battles with the Syrian Army. As far as we know, this is completely false, Reuters did not carry out such an interview and the posting has been deleted." -the Reuters statement said. So far Thomson Reuters had no immediate information on who was behind the hacking. While Reuters confirmed the hack, the firm said it does not yet have any information on the party responsible for the fake news. The publication took down its blogging platform on Friday to fix the problem. 
According to a report of Zdnet -The ongoing massive uprising in Syria began in January 2011, as part of the wider Arab Spring. The opposition is dominated by Sunni Muslims, whereas the leading government figures are Alawite Muslims. Protesters are demanding the resignation of President Bashar al-Assad, want to overthrow his government, and are looking to end nearly five decades of Ba'ath Party rule. In response, the Syrian government has deployed the Syrian Army, resulting in the death of more than 10,000 civilians and soldiers. Many more have been injured, and tens of thousands of protesters have been imprisoned.


-Source (Reuters)




SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

"The Syria Files" By WikiLeaks Containing 2.5 Million Emails of Syrian Politicians, Govt, Ministries & Companies

"The Syria Files" By WikiLeaks Containing 2.5 Million Emails of Syrian Politicians, Govt, Ministries & Companies
The WikiLeaks website said on Thursday it had begun publishing more than 2.5 million e-mails from Syrian politicians, government ministries and companies dating back to 2006. This leak named "The Syria Files" which contain 2.5 million emails from 680 Syria-related entities and domain names “including those of the Ministries of Presidential Affairs, Foreign Affairs, Finance, Information, Transport and Culture.” According to WikiLeaks, the file dump will be “embarrassing to Syria, but it is also embarrassing to Syria’s opponents.” The Syria Files come mere days after Human Rights Watch revealed that the Syrian government was operating at least 27 torture chambers around the country and using 20 torture techniques against Syrian dissidents.
WikiLeaks founder Julian Assange said
“The material is embarrassing to Syria, but it is also embarrassing to Syria’s opponents. It helps us not merely to criticise one group or another, but to understand their interests, actions and thoughts. It is only through understanding this conflict that we can hope to resolve it.” WikiLeaks said the emails, which it has called "The Syria Files", would shine a light on the inner workings of the Syrian government and economy, and "also reveal how the West and Western companies say one thing and do another".
We would also like to give you reminder that earlier in this year we got Spy Files  & GI Files (Global Intelligence Files & Five Million E-mails From Stratfor)
According to Wikileaks Release :-
"The database comprises 2,434,899 emails from the 680 domains. There are 678,752 different email addresses that have sent emails and 1,082,447 different recipients. There are a number of different languages in the set, including around 400,000 emails in Arabic and 68,000 emails in Russian. The data is more than eight times the size of ’Cablegate’ in terms of number of documents, and more than 100 times the size in terms of data. Around 42,000 emails were infected with viruses or trojans. To solve these complexities, WikiLeaks built a general-purpose, multi-language political data-mining system which can handle massive data sets like those represented by the Syria Files..."

Full Release Of "The Syria Files" By Wikileaks Can Be Found Here






SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Syrian President Bashar Assad's E-mail-Id Hack Could Lead To "Cyber Warfare"

Syrian President Bashar Assad's E-mail-Id Hack Could Lead To "Cyber Warfare"
Earlier in a operation called #OpSyria hacker collective Anonymous has targeted the Syrian Cyber fence. First they hacked and defaced the Syrian Ministry of Defence then TV Network Of Syrian Pro-Government & finally Syrian president Bashar Assad been targeted by the hacker. Anonymous gained access to 78 different e-mail accounts at the Syrian Ministry of Presidential Affairs, including that of the Minister of Presidential Affairs, Mansour Fadlallah Azzam, and Assad's media adviser, Bouthaina Shaaban. Sadly, it's clear that no one bothered to give Assad's office a lesson in basic computer security, because several of the accounts apparently had the password 12345. Britain's newspaper  Guardian gathered 3,000 emails passed on by a source in the Syrian opposition reveals a wealth of private information – including family photographs and videos, a scan of the president's identity card and a birth certificate belonging to a family member – that would be difficult for even the best resourced hoaxer or intelligence agency to gather or fabricate. The sam@alshahba.com and ak@alshahba.com accounts that activists say were used by Bashar al-Assad and his wife, Asma, communicate regularly and in affectionate terms with the wider family and advisers, some of whose email addresses are easily verified. Events and speeches mentioned in the emails tally with the timings of real events. The "sam" and "ak" accounts were also monitored contemporaneously by activists who say the protagonists reacted in real time to events on the ground in Syria.
Review:- 
Cyber warfare in coming years, experts increasingly believe, could be as much about trying to protect or disseminate particularly sensitive pieces of information as about plotting cyber attacks on essential national infrastructure. "It's the first time insurgents have gained access to a regime's high-level communications during an uprising," says John Bassett, a former senior official at British signals intelligence agency GCHQ and now a senior fellow at the Royal United Services Institute.
"That could possibly be a significant turning point in the development of cyber warfare."
Some security experts doubt Syria's fragmented opposition would have had the capacity to access the e-mails without outside help, but others say those in power in Damascus may simply have been careless. The Syrian opposition say they were given details of the passwords by an internal regime source. It is a tool that could become increasingly popular.  According To Guardian:-
There are several email conversations in which "Sam" and Bashar are clearly identified as the same person. In November, for example, Hadeel al-Ali, Assad's press assistant, emailed sam@alshahba.com about an interview Assad had given to a student activist, Hussam Arian, six months earlier. She attached a picture of Arian with Assad, and screenshots of the student's Facebook page, which featured the article. She said to "Sam": "I took many shots of the page of Hussam Arian and the article he wrote about you."
Another email to the address from Asma relates: "Fares closed all your twitter accounts!" Fares Kallas is Asma al-Assad's assistant, and other emails in the chain show that he had asked Twitter to close several fake accounts purporting to belong to Bashar.
In Asma's case, there are a host of emails sent between ak@alshahba.com and Asma al-Assad's family which offer compelling proof. Many emails sent to "ak" from her family begin "Hi Asma", and one of her family's email header lists ak@alshahba.com as Asma Akhras, Asma al-Assad's maiden name.
There are many other examples of family members sending affectionate emails to Asma at the "ak" account. On 21 November 2011, one of her brothers sent her photos of their father's recent birthday party, with the subject line "Dad's birthday 2011". The photos show Asma together with identifiable family members standing in a kitchen. The brother also circulated the photos to her other brother.




SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Syrian President Bashar Assad's E-mail-Id Hacked (#OpSyria)

Syrian President Bashar Assad's E-mail-Id Hacked By Anonymous (#OpSyria)
In Operation Syria (#OpSyria) not only the TV Network of Pro-Government get penetrated but also Syrian president Bashar Assad been targeted by the hacker. Late on Sunday night, Anonymous gained access to 78 different e-mail accounts at the Syrian Ministry of Presidential Affairs, including that of the Minister of Presidential Affairs, Mansour Fadlallah Azzam, and Assad's media adviser, Bouthaina Shaaban. Sadly, it's clear that no one bothered to give Assad's office a lesson in basic computer security, because several of the accounts apparently had the password 12345.
The e-mails from Assad's press advisers suggest the president knew otherwise, and coached Assad on specific ways to deflect common American criticisms:
"It is hugely important and worth mentioning that 'mistakes' have been done in the beginning of the crises because we did not have a well-organized 'police force.' American psyche can be easily manipulated when they hear that there are 'mistakes' done and now we are 'fixing it.' It's worth mentioning also what is happening now in Wall Street and the way the demonstrations are been suppressed by policemen, police dogs and beatings."

Some of those hacked Emails can be read for this link (Posted by The Israeli news organization Haaretz)



SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

TV Network Of Syrian Pro-Government Compromised

TV Network Of Syrian Pro-Government Compromised  

Pro-Government TV news Network of Syria has been compromised. Syria's state broadcaster confirmed this on Sunday that the text message news service of a separate, pro-government TV station had been hacked. A headline displayed on state Syria tv said: "The administration of Addounia draws the attention of its subscribers to the fact that it has temporarily halted its SMS service, and calls citizens to be wary of the false messages being sent now."
Separate headlines on Addounia cautioned against a text message asking people "to avoid public squares for security reasons," and advised that its subscribers ignore all SMS messages on its service until further notice. The station was the target of European Union sanctions imposed on Syria in September, in response to President Bashar al-Assad's bloody crackdown on mass protests - and, increasingly, an armed insurgency - against his rule.
Few days ago Anonymous has hacked the CBS Broadcasting of US. They managed to gain access on CBS Server and deleted everything.


-Source (Reuters)


SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Syrian Cabinet Approved Combating Cybercrime Bills

Syrian Cabinet Approved Organizing Internet Communication & Combating Cybercrime Bills

Not only US, Japan but also Syria is not paying attention to cyber security. Recently Syrian Cabinet approves Bill for Internet Communication & Cybercrime. Prime Minister Adel Safar & Syrian Cabinet approved on Tuesday a bill on organizing internet communication and combating cybercrime. In an exclusive repost Dp-news said:- The bill aims at organizing internet communication and combating cybercrimes as well as specifying the responsibilities of internet providers.The bill stipulates for establishing a department at the Ministry of Interior tasked with investigating such crimes and setting specific conditions concerning the relationship between this bill and international law as cybercrimes are considered trans-border crimes. The cabinet also discussed the new environment bill which aims at establishing the basic rules for environment safety and protection and achieving environmental development.


SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Related Posts Plugin for WordPress, Blogger...