US, Britain, France step up push for UNSC to blacklist Jaish-e-Mohammad chief Masood Azhar

Agencies
March 28, 2019

Mar 28: The United States (US), Britain and France stepped up a push for the United Nations Security Council (UNSC) to blacklist the head of Pakistan-based militant group Jaish-e-Mohammad (JeM) on Wednesday after China prevented an earlier move two weeks ago.

The United States circulated a resolution - drafted with British and French support - to the 15-member council that would designate JeM leader Masood Azhar, subjecting him to an arms embargo, travel ban and asset freeze, diplomats said.

JeM said it was responsible for a February 14 attack that killed at least 40 Indian paramilitary police, making it the deadliest in Kashmir during a 30-year-long insurgency, increased tensions between Pakistan and India. The nuclear-armed neighbours both said they had shot down each other`s fighter jets last month.

The United States, Britain and France initially asked the Security Council`s Islamic State and al-Qaeda sanctions committee, which operates by consensus, to blacklist Azhar. However, China prevented the move.

Chinese Foreign Ministry spokesman Lu Kang said that China had conducted a "comprehensive and thorough evaluation" but still needed more time to consider the proposal. China had previously prevented the committee from sanctioning Azhar in 2016 and 2017.

Instead of consensus, a resolution only needs nine votes in favour and no vetoes by China, Russia, the United States, France or Britain to pass. It was not immediately clear when the draft resolution to designate Azhar could be put to a vote.

The Chinese mission to the United Nations did not immediately respond to a request for comment on the draft text.

JeM is a primarily anti-India group that forged ties with al Qaeda and was blacklisted by the UN Security Council in 2001. In December 2001, Jaish fighters, along with members of another Pakistan-based militant group, Lashkar-e-Taiba, attacked India`s parliament, which almost led to a fourth war between the two countries.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
July 15,2020

Huawei will be completely removed from the UK's 5G networks by the end of 2027, the UK government announced on Tuesday after a review by the country's National Cyber Security Centre (NCSC) on the impact of US sanctions against the Chinese telecommunications giant.

In the lead up to this complete removal of all Huawei kit from UK networks, there will be a total ban on the purchase of any new 5G kit after December 31, 2020.

The decision was taken at a meeting of the UK's National Security Council (NSC) chaired by Prime Minister Boris Johnson, in response to new US sanctions against the telecom major imposed in May which removed the firm's access to products which have been built based on US semiconductor technology.

5G will be transformative for our country, but only if we have confidence in the security and resilience of the infrastructure it is built upon, said Oliver Dowden, UK Secretary of State for Digital, Culture, Media and Sport (DCMS).

Following US sanctions against Huawei and updated technical advice from our cyber experts, the government has decided it necessary to ban Huawei from our 5G networks. No new kit is to be added from January 2021, and UK 5G networks will be Huawei free by the end of 2027. This decisive move provides the industry with the clarity and certainty it needs to get on with delivering 5G across the UK, he said.

The minister, who laid out the details of the UK's ban on Huawei in the House of Commons, said the government will now seek to legislate with a new Telecoms Security Bill to put in place the powers necessary to implement the tough new telecoms security framework.

By the time of the next election (2024) we will have implemented in law an irreversible path for the complete removal of Huawei equipment from our 5G networks, said Dowden.

The new law will give the government the national security powers to impose these new controls on high risk vendors and create extensive security duties on network operators to drive up standards, DCMS said.

Technical experts at the NCSC reviewed the consequences of the US sanctions and concluded that Huawei will need to do a major reconfiguration of its supply chain as it will no longer have access to the technology on which it currently relies and there are no alternatives which we have sufficient confidence in.

They found the new restrictions make it impossible to continue to guarantee the security of Huawei equipment in the future.

After a ban on the purchase of new Huawei kit for 5G from next year, the aim is to completely remove the Chinese vendor's influence on 5G networks across the UK by the end of 2027.

The DCMS said Tuesday's decision takes into account the UK's specific national circumstances and how the risks from these sanctions are manifested in the country.

The existing restrictions on Huawei in sensitive and critical parts of the network remain in place, it highlighted.

The DCMS said the US action also affects Huawei products used in the UK's full fibre broadband networks. However, the UK has managed Huawei's presence in the UK's fixed access networks since 2005 and we also need to avoid a situation where broadband operators are reliant on a single supplier for their equipment.

As a result, following security advice from experts, DCMS is advising full fibre operators to transition away from purchasing new Huawei equipment. A technical consultation will determine the transition timetable, but it is expect this period to last no longer than two years.

The government said its new approach strikes the right balance by recognising full fibre's established presence and supporting the connections that the public relies on, while fully addressing the security concerns.

It stressed that its new policy in relation to high risk vendors has not been designed around one company, one country or one threat but as an enduring and flexible policy that will enable the UK to manage the risks to the network, now and in the future.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
News Network
June 27,2020

Jun 27: Alittle-known Indian IT firm offered its hacking services to help clients spy on more than 10,000 email accounts over a period of seven years.

New Delhi-based BellTroX InfoTech Services targeted government officials in Europe, gambling tycoons in the Bahamas, and well-known investors in the United States including private equity giant KKR and short seller Muddy Waters, according to three former employees, outside researchers, and a trail of online evidence.

Aspects of BellTroX's hacking spree aimed at American targets are currently under investigation by U.S. law enforcement, five people familiar with the matter told Reuters. The U.S. Department of Justice declined to comment.

Reuters does not know the identity of BellTroX's clients. In a telephone interview, the company's owner, Sumit Gupta, declined to disclose who had hired him and denied any wrongdoing.

Muddy Waters founder Carson Block said he was "disappointed, but not surprised, to learn that we were likely targeted for hacking by a client of BellTroX." KKR declined to comment.

Researchers at internet watchdog group Citizen Lab, who spent more than two years mapping out the infrastructure used by the hackers, released a report that BellTroX employees were behind the espionage campaign.

"This is one of the largest spy-for-hire operations ever exposed," said Citizen Lab researcher John Scott-Railton.

Although they receive a fraction of the attention devoted to state-sponsored espionage groups or headline-grabbing heists, "cyber mercenary" services are widely used, he said. "Our investigation found that no sector is immune."

A cache of data reviewed by Reuters provides insight into the operation, detailing tens of thousands of malicious messages designed to trick victims into giving up their passwords that were sent by BellTroX between 2013 and 2020. The data was supplied on condition of anonymity by online service providers used by the hackers after Reuters alerted the firms to unusual patterns of activity on their platforms.

The data is effectively a digital hit list showing who was targeted and when. Reuters validated the data by checking it against emails received by the targets.

On the list: judges in South Africa, politicians in Mexico, lawyers in France and environmental groups in the United States. These dozens of people, among the thousands targeted by BellTroX, did not respond to messages or declined comment.

Reuters was not able to establish how many of the hacking attempts were successful.

BellTroX's Gupta was charged in a 2015 hacking case in which two U.S. private investigators admitted to paying him to hack the accounts of marketing executives. Gupta was declared a fugitive in 2017, although the U.S. Justice Department declined to comment on the current status of the case or whether an extradition request had been issued.

Speaking by phone from his home in New Delhi, Gupta denied hacking and said he had never been contacted by law enforcement. He said he had only ever helped private investigators download messages from email inboxes after they provided him with login details.

"I didn't help them access anything, I just helped them with downloading the mails and they provided me all the details," he told Reuters. "I am not aware how they got these details but I was just helping them with the technical support."

Reuters could not determine why the private investigators might need Gupta to download emails. Gupta did not return follow-up messages. Spokesmen for Delhi police and India's foreign ministry did not respond to requests for comment.

HOROSCOPES AND PORNOGRAPHY

Operating from a small room above a shuttered tea stall in a west-Delhi retail complex, BellTroX bombarded its targets with tens of thousands of malicious emails, according to the data reviewed by Reuters. Some messages would imitate colleagues or relatives; others posed as Facebook login requests or graphic notifications to unsubscribe from pornography websites.

Fahmi Quadir's New York-based short selling firm Safkhet Capital was among 17 investment companies targeted by BellTroX between 2017 and 2019. She said she noticed a surge in suspicious emails in early 2018, shortly after she launched her fund.

Initially "it didn't seem necessarily malicious," Quadir said. "It was just horoscopes; then it escalated to pornography."

Eventually the hackers upped their game, sending her credible-sounding messages that looked like they came from her coworkers, other short sellers or members of her family. "They were even trying to emulate my sister," Quadir said, adding that she believes the attacks were unsuccessful.

U.S. advocacy groups were also repeatedly targeted. Among them were digital rights organizations Free Press and Fight for the Future, both of whom have lobbied for net neutrality. The groups said a small number of employee accounts were compromised, but the wider organizations' networks were untouched. The spying on those groups was detailed in a report by the Electronic Frontier Foundation in 2017, but has not been publicly tied to BellTroX until now.

Timothy Karr, a director at Free Press, said his organization "sees an uptick in breach attempts whenever we're engaged in heated and high-profile public policy debates." Evan Greer, deputy director of Fight for the Future, said: "When corporations and politicians can hire digital mercenaries to target civil society advocates, it undermines our democratic process."

While Reuters was not able to establish who hired BellTroX to carry out the hacking, two former employees said the company and others like it were usually contracted by private investigators on behalf of business rivals or political opponents.

Bart Santos of San Diego-based Bulldog Investigations was one of a dozen private detectives in the United States and Europe who told Reuters they had received unsolicited advertisements for hacking services out of India - including one from a person who described himself as a former BellTroX employee. The pitch offered to carry out "data penetration" and "email penetration."

Santos said he ignored those overtures, but could understand why some people didn't. "The Indian guys have a reputation for customer service," he said.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
News Network
July 10,2020

Lahore, Jul 10: The Punjab government enforced smart lockdown in seven cities of the province for 15 days with an immediate effect from Thursday night, The News International reported.

The Primary and Secondary Healthcare Department on Thursday issued a notification under the Punjab Infectious Diseases Ordinance 2020, about enforcement of lockdown in Lahore, Multan, Faisalabad, Gujranwala, Sialkot, Gujrat and Rawalpindi, till July 24 midnight.

In Lahore, the lockdown will be enforced in A2 Block Township, EME Society, Main Bazaar Chungi Amr Sadhu, Punjab Government Servants Housing Scheme, Wapda Town, C-Block Jauhar Town and Green City.

The basic necessities of life will remain available in smart lockdown areas. "The purpose of the smart lockdown is to minimise movement of people in hotspots of positive coronavirus cases," said Capt (retd) Muhammad Usman, Secretary, Primary and Secondary Healthcare Department.

The country registered 2,751 new COVID-19 cases during the last 24 hours, taking the tally to 243,599 on Friday. The province-wise breakup includes 85,261 cases in Punjab, 100,900 cases in Sindh, 29,406 in Khyber Pakhtunkhwa, 11,099 in Balochistan, 13,829 in Islamabad, 1,619 in Gilgit-Baltistan and 1,485 in Pakistan-occupied Kashmir.

The death toll due to the virus reached 5,058 with 75 more deaths reported over the last 24 hours, as per data cited by Radio Pakistan.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.