Good and bad terrorists in Syria

December 26, 2012

salami

Terrorism is terrorism and it cannot be defined otherwise unless the interests of one party tilt the scale in disfavor of another and the dichotomization of the terrorists in Syria into good and bad by the West casts doubt on its claim on democracy.

In a somber political tone, Russian Foreign Minister Sergei Lavrov lashed out as “absolutely unacceptable” the West's support for the terrorists in Syria in his exclusive interview with Russia Today.


Lavrov said the West has divided the terrorists into “bad” and “acceptable,” throwing its support behind the latter.

“It's absolutely unacceptable, and if we follow this logic it might lead us to a very dangerous situation not only in the Middle East but in other parts of the world, if our partners in the West would begin to qualify terrorists as bad terrorists and acceptable terrorists,” the Russian foreign minister said.


The dichotomization of such a grave issue by the West is almost nothing new. The delisting of MKO, a long-considered terrorists group, by Washington is in line with this process of redefining well-established concepts and terms by the West.

Paradoxically, the MKO has been supported by Washington even when it was on the terrorist list. They even received their training at the hands of the Bush administration.

In a rare article, Seymour Hersh revealed that US Joint Special Operations Command (JSOC) trained members of the Iranian Mujahideen-e-Khalq (MKO) at a secretive site in Nevada from 2005 to at least 2007. According to Hersh, MKO members “were trained in intercepting communications, cryptography, weaponry and small unit tactics at the Nevada site up until President Obama took office.”

In a separate interview, a retired four-star general said that he had been privately briefed in 2005 about the training of MKO members in Nevada by an American involved in the program. He said that they got “the standard training in commo, crypto [cryptography], small-unit tactics, and weaponry-that went on for six months. They were kept in little pods.” He also was told, he said, that the men doing the training were from JSOC, which, by 2005, had become a major instrument in the Bush Administration's global war on terror.

To the dismay and disappointment of many, US State Department decided in September to remove the MKO from the terror lists.


US State Department said its decision to delist the group was made because the group has not committed any terrorist acts for a decade and brashly whitewashed the fact that the group has been to all intents and purposes instrumental in carrying out nuclear assassinations in the last few years in Iran. Although the group has never officially assumed responsibility for the assassinations (which is quite natural), there is solid evidence suggesting that it has been complicit in these terrorist acts.

The terrorist group made unrelenting efforts for years to be removed from the terror list and enlisted a number of Republican and Democratic officials to lobby on its behalf. Instead of paying lobbying fees to them, “it offered honoraria ranging from $10,000-$50,000 per speech to excoriate the US government for its allegedly shabby treatment of the MEK.

Among those who joined the group's gravy train are former Pennsylvania governor Ed Rendell, Rudy Giuliani, Alan Dershowitz, and former FBI director Louis Freeh. Many of them profess to have little interest in the money they have collected” (Richard Silverstein, The Guardian September 22, 2012).

MKO has long been engaging in a series of sabotage and terrorist activities against the Islamic Republic in league with Israeli intelligence agencies.

In January 2012, Benny Gantz, the Israeli Defense Forces chief of staff, told a parliamentary committee: "For Iran, 2012 is a critical year in combining the continuation of its nuclearisation, internal changes in the Iranian leadership, continuing and growing pressure from the international community and things which take place in an unnatural manner."
Just 24 hours after Israeli military chief warned of unnatural events for Iran, Iranian nuclear scientist Mostafa Ahmadi Roshan was assassinated in broad daylight. It soon transpired to be a joint Mossad-MKO operation.

The MKO has reportedly assassinated over 12,000 Iranian citizens, seven American citizens, and tens of thousands of Iraqi nationals.


Anyhow, to dichotomize 'terrorists' into good and bad is an ugly apartheid.

A comparatively similar story is being repeated in Syria. Washington has branded the Qatar-funded Al-Nusra Front as a terrorist organization. But why? They are fighting against the government of Bashar al-Assad together with other militants in Syria who are chiefly composed of foreign mercenaries. The former are considered terrorists simply because they to a large extent fly in the face of Washington's policies in Syria. So, it is Washington or the US-led West which decides who is a terrorist and who is not.

A most misinterpreted word, terrorism is defined and refined by the West according to the context where it proves deleterious or beneficial to those who define the term.



Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
May 22,2020

Kochi, May 22: During the nationwide COVID-19 lockdown, Kerala recorded the highest number of cyber attacks followed by Punjab and Tamil Nadu, a study by anti-virus software firm K7 Computing said on Thursday.

In a statement issued in Chennai, the company said its K7 Computing's Cyber Threat Report, a comprehensive analysis of cyber attacks during the lockdown has found that Kerala recorded the highest number of cyber attacks during this period. The report analyses various cyber attacks within India during the pandemic and reveals that threat actors targeted the state with COVID-themed attacks aimed at exploiting user trust.

In Kerala, regions like Kottayam, Kannur, Kollam, and Kochi saw the highest hits with 462, 374, 236, and 147 attacks respectively, while the state as a whole saw around 2,000 attacks during the period - the highest thus far in the country.

This was followed by Punjab with 207 attacks and Tamil Nadu with 184 attacks, the company said.

The sudden surge in the frequency of attacks witnessed from February 2020 to mid-April 2020 indicates that scamsters across the world were exploiting the widespread panic around coronavirus at both the individual and corporate level.

These attacks aimed to compromise computers and mobile devices to gain access to users' confidential data, banking details, and cryptocurrency accounts.

The key threats seen during this period ranged from phishing attacks to rogue apps disguised as COVID-19 information apps that targeted users' sensitive data. Phishing attacks were noticed more in Tier-II and Tier-III cities while the metros fared better. Smaller cities saw over 250 attacks being blocked per 10,000 users.

Users from Ghaziabad and Lucknow seem to have faced almost 6 and 4 times the number of attacks as Bengaluru users.

According to the statement, a majority of the recorded attacks were phishing attacks with sophisticated campaigns that could easily snare even the most educated users. These attacks were aimed at heightening users' fears and creating a sense of urgency to take action.

K7 Labs noticed phishing attacks where scamsters posed as representatives of the United States Department of Treasury, the World Health Organization (WHO), and the Centres for Disease Control and Prevention (CDC), the company said.

Users were encouraged to visit links that would automatically download malware on the host computer such as the Agent Tesla keylogger or Lokibot information-stealing malware, infamous banking Trojans such as Trickbot or Zeus Sphinx, and even disastrous ransomware.

Other attacks included infected COVID-19 Android apps like CoronaSafetyMask that scam users with promises of masks for an upfront payment; the spyware app Project Spy; and seemingly genuine apps that are infected with dangerous malware like banking Trojans such as Ginp, Anubis and Cerberus.

"Covid-19 has created an ideal situation for various threat actors to target individuals and enterprises alike. The panic caused by the stringent lockdown measures and rapid spread of this virus has left many people looking for more information on the situation," J. Kesavardhanan, Founder and CEO of K7 Computing was quoted as saying in the statement.

"Threat actors exploit this fear to their advantage and scam users into downloading malicious software and divulging sensitive information like banking codes. The need to be cyber cautious has never been greater. This is more so in the case of corporates who have adopted a work from home policy hurriedly without adequate cyber hygiene. We have seen an increase in attacks on enterprises and SME employees as well," he added.

Such attacks are expected to continue till normalcy returns. Social engineering attacks targeted at winning users' trust will gain momentum.

Healthcare institutions, well-known government offices, and international organisations will continue to be a prime target throughout the pandemic, the statement said.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
January 3,2020

Giving each and every app access to personal information stored on Android smartphones such as your contacts, call history, SMS and photos may put you in trouble as bad actors can easily use these access to spy on you, send spam messages and make calls anywhere at your expense or even sign you up for a premium "service", researchers from cybersecurity firm Kaspersky have warned.

But one can restrict access to such information as Android lets you configure app permissions. 

Giving an app any of these permissions generally means that from now on it can obtain information of this type and upload it to the Cloud without asking your explicit consent for whatever it intends to do with your data.

Therefore, security researchers recommend one should think twice before granting permissions to apps, especially if they are not needed for the app to work. 

For example, most games have no need to access your contacts or camera, messengers do not really need to know your location, and some trendy filter for the camera can probably survive without your call history, Kaspersky said. 

While decision to give permission is yours, the fewer access you hand out, the more intact your data will be.

Here's what you should know to protect your data.

SMS: An app with permission to send and receive SMS, MMS, and WAP (Wireless Application Protocol) push messages, as well as view messages in the smartphone memory will be able to read all of your SMS correspondence, including messages with one-time codes for online banking and confirming transactions.

Using this permission, the app can also send spam messages in your name (and at your expense) to all your friends. Or sign you up for a premium "service." You can see and conrol which apps have these rights by going to the settings of your phone.

Calendar: With permission to view, delete, modify, and add events in the calendar, prying eyes can find out what you have done and what you are doing today and in the future. Spyware loves this permission.

Camera: Permission to access the camera is necessary for the app to take photos and record video. But apps with this permission can take a photo or record a video at any moment and without warning. Attackers armed with embarrassing images and other dirt on you can make life a misery, according to Kaspersky.

Contacts: With permission to read, change, and add contacts in your address book, and access the list of accounts registered in the smartphone, an app can send your entire address book to its server. Even legitimate services have been found to abuse this permission, never mind scammers and spammers, for whom it is a windfall.

This permission also grants access to the list of app accounts on the device, including Google, Facebook, and many other services.

Phone: Giving access to your phone means permission to view and modify call history, obtain your phone number, cellular network data, and the status of outgoing calls, add voicemail, access IP telephony services, view numbers being called with the ability to end the call or redirect it to another number and call any number.

This permission basically lets the app do anything it likes with voice communication. It can find out who you called and when or prevent you from making calls (to a particular number or in general) by constantly terminating calls. 

It can eavesdrop on your conversations or, of course, make calls anywhere at your expense, including to pay-through-the-nose numbers, Kaspersky warned.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
News Network
February 21,2020

London, Feb 21: Scientists have discovered a new species of land snail, and have named it Craspedotropis Greta Thunberg in honour of the Swedish activist Greta Thunberg for her efforts to raise awareness about climate change.

According to the study, published in the Biodiversity Data Journal, the newly discovered species belongs to the so-called caenogastropods -- a group of land snails known to be sensitive to drought, temperature extremes, and forest degradation.

The scientists, including evolutionary ecologist Menno Schilthuizen from Naturalis Biodiversity Center in the Netherlands, said the snails were found very close to the research field station at Kuala Belalong Field Studies Centre in Brunei.

They added that the snails were discovered at the foot of a steep hill-slope, next to a river bank, foraging at night on the green leaves of understorey plants.

The effort aided by amateur scientist J.P. Lim, who found the first individual of the snail said, "Naming this snail after Greta Thunberg is our way of acknowledging that her generation will be responsible for fixing problems that they did not create."

"And it's a promise that people from all generations will join her to help," Lim said.

The researchers said they approached Thunberg who said that she would be "delighted" to have this species named after her.

The study work including, fieldwork, morphological study, and classification of identified specimen was carried out in a field centre with basic equipment and no internet access, the scientists said.

According to the study, the work was done by untrained ‘citizen scientists’ guided by experts, on a 10-day taxon expedition.

"While we are aware that this way of working has its limitations in terms of the quality of the output (for example, we were unable to perform dissections or to do extensive literature searches), the benefits include rapid species discovery and on-site processing of materials," the researchers wrote in the study.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.