51 nations to sign UN treaty outlawing nuclear weapons

Agencies
September 20, 2017

United Nations, Sept 20: With the North Korean nuclear crisis looming large, 51 countries are to sign a new treaty outlawing nuclear weapons that has been fiercely opposed by the United States and other nuclear powers.

The treaty on the prohibition of nuclear weapons was adopted by 122 countries at the United Nations in July, following negotiations led by Austria, Brazil, Mexico, South Africa and New Zealand.

None of the nine countries that possess nuclear weapons -- the United States, Russia, Britain, China, France, India, Pakistan, North Korea and Israel -- took part in the negotiations.

But, Guterres acknowledged that much work was needed to rid the world of its stockpile of 15,000 atomic warheads.

"Today, we rightfully celebrate a milestone. Now we must continue along the hard road towards the elimination of nuclear arsenals," said Guterres.

The treaty will enter into force when 50 countries have ratified it.

Brazilian President Michel Temer was the first to sign the treaty during the ceremony held on the sidelines of the UN General Assembly.

The signing ceremony came a day after President Donald Trump threatened to "totally destroy North Korea" if the United States is forced to defend itself or its allies.

North Korea has triggered global alarm over its rapidly- progressing drive to develop nuclear weapons, following its sixth and most powerful nuclear test and the firing of two intercontinental ballistic missiles (ICBMs).

Nuclear powers argue their arsenals serve as a deterrent against a nuclear attack and say they remain committed to the nuclear Non-Proliferation Treaty (NPT).

The United States, Britain and France have dismissed the treaty as being out of step with the realities of the global security and argue the North Korea crisis shows that nuclear deterrence is still needed.
The decades-old NPT seeks to prevent the spread of atomic weapons but also puts the onus on nuclear states to reduce their stockpiles.

Impatience, however, is growing among many non-nuclear states over the slow pace of disarmament as are worries that weapons of mass destruction will fall into the wrong hands.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
News Network
June 27,2020

Jun 27: Alittle-known Indian IT firm offered its hacking services to help clients spy on more than 10,000 email accounts over a period of seven years.

New Delhi-based BellTroX InfoTech Services targeted government officials in Europe, gambling tycoons in the Bahamas, and well-known investors in the United States including private equity giant KKR and short seller Muddy Waters, according to three former employees, outside researchers, and a trail of online evidence.

Aspects of BellTroX's hacking spree aimed at American targets are currently under investigation by U.S. law enforcement, five people familiar with the matter told Reuters. The U.S. Department of Justice declined to comment.

Reuters does not know the identity of BellTroX's clients. In a telephone interview, the company's owner, Sumit Gupta, declined to disclose who had hired him and denied any wrongdoing.

Muddy Waters founder Carson Block said he was "disappointed, but not surprised, to learn that we were likely targeted for hacking by a client of BellTroX." KKR declined to comment.

Researchers at internet watchdog group Citizen Lab, who spent more than two years mapping out the infrastructure used by the hackers, released a report that BellTroX employees were behind the espionage campaign.

"This is one of the largest spy-for-hire operations ever exposed," said Citizen Lab researcher John Scott-Railton.

Although they receive a fraction of the attention devoted to state-sponsored espionage groups or headline-grabbing heists, "cyber mercenary" services are widely used, he said. "Our investigation found that no sector is immune."

A cache of data reviewed by Reuters provides insight into the operation, detailing tens of thousands of malicious messages designed to trick victims into giving up their passwords that were sent by BellTroX between 2013 and 2020. The data was supplied on condition of anonymity by online service providers used by the hackers after Reuters alerted the firms to unusual patterns of activity on their platforms.

The data is effectively a digital hit list showing who was targeted and when. Reuters validated the data by checking it against emails received by the targets.

On the list: judges in South Africa, politicians in Mexico, lawyers in France and environmental groups in the United States. These dozens of people, among the thousands targeted by BellTroX, did not respond to messages or declined comment.

Reuters was not able to establish how many of the hacking attempts were successful.

BellTroX's Gupta was charged in a 2015 hacking case in which two U.S. private investigators admitted to paying him to hack the accounts of marketing executives. Gupta was declared a fugitive in 2017, although the U.S. Justice Department declined to comment on the current status of the case or whether an extradition request had been issued.

Speaking by phone from his home in New Delhi, Gupta denied hacking and said he had never been contacted by law enforcement. He said he had only ever helped private investigators download messages from email inboxes after they provided him with login details.

"I didn't help them access anything, I just helped them with downloading the mails and they provided me all the details," he told Reuters. "I am not aware how they got these details but I was just helping them with the technical support."

Reuters could not determine why the private investigators might need Gupta to download emails. Gupta did not return follow-up messages. Spokesmen for Delhi police and India's foreign ministry did not respond to requests for comment.

HOROSCOPES AND PORNOGRAPHY

Operating from a small room above a shuttered tea stall in a west-Delhi retail complex, BellTroX bombarded its targets with tens of thousands of malicious emails, according to the data reviewed by Reuters. Some messages would imitate colleagues or relatives; others posed as Facebook login requests or graphic notifications to unsubscribe from pornography websites.

Fahmi Quadir's New York-based short selling firm Safkhet Capital was among 17 investment companies targeted by BellTroX between 2017 and 2019. She said she noticed a surge in suspicious emails in early 2018, shortly after she launched her fund.

Initially "it didn't seem necessarily malicious," Quadir said. "It was just horoscopes; then it escalated to pornography."

Eventually the hackers upped their game, sending her credible-sounding messages that looked like they came from her coworkers, other short sellers or members of her family. "They were even trying to emulate my sister," Quadir said, adding that she believes the attacks were unsuccessful.

U.S. advocacy groups were also repeatedly targeted. Among them were digital rights organizations Free Press and Fight for the Future, both of whom have lobbied for net neutrality. The groups said a small number of employee accounts were compromised, but the wider organizations' networks were untouched. The spying on those groups was detailed in a report by the Electronic Frontier Foundation in 2017, but has not been publicly tied to BellTroX until now.

Timothy Karr, a director at Free Press, said his organization "sees an uptick in breach attempts whenever we're engaged in heated and high-profile public policy debates." Evan Greer, deputy director of Fight for the Future, said: "When corporations and politicians can hire digital mercenaries to target civil society advocates, it undermines our democratic process."

While Reuters was not able to establish who hired BellTroX to carry out the hacking, two former employees said the company and others like it were usually contracted by private investigators on behalf of business rivals or political opponents.

Bart Santos of San Diego-based Bulldog Investigations was one of a dozen private detectives in the United States and Europe who told Reuters they had received unsolicited advertisements for hacking services out of India - including one from a person who described himself as a former BellTroX employee. The pitch offered to carry out "data penetration" and "email penetration."

Santos said he ignored those overtures, but could understand why some people didn't. "The Indian guys have a reputation for customer service," he said.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
News Network
June 30,2020

Beijing, June 30: China said on Tuesday it was concerned about India’s decision to ban Chinese mobile apps such as Bytedance’s TikTok and Tencent’s WeChat and was making checks to verify the situation.

Chinese foreign ministry spokesman Zhao Lijian told reporters during a daily briefing that (the Prime Minister Narendra Modi-led government of) India has a responsibility to uphold the rights of Chinese businesses.

India on Monday banned 59, mostly Chinese, mobile apps in its strongest move yet targeting China in the online space since a border crisis erupted between the two countries this month.

The apps are “prejudicial to the sovereignty and integrity of India, the defence of India, the security of state and public order", the ministry of information technology said in a statement, which came two weeks after 20 Indian Army personnel were killed in a violent clash on the India-China border in Ladakh.

The companies have been invited to offer clarifications before a government panel, which will decide whether the ban can be removed or will stay.

The move also came ahead of military and diplomatic talks between India and China scheduled this week.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
News Network
January 28,2020

Mumbai, Jan 28: Flag carrier Air India has kept one of its 423-seater jumbo planes ready in Mumbai for the evacuation of Indian citizens from Wuhan in China in the wake of the coronavirus outbreak in that country, an official source said on Tuesday.

The airline is awaiting necessary approvals from the ministries of external affairs and health to operate the special flight, the source said. The health ministry's nod is required because the operating crew has to fly in a virus outbreak territory.

"We have kept a Boeing 747-400 ready in Mumbai to operate an evacuation flight to China whenever we get a go ahead from the government," the source said.

Some 250 Indians are to be evacuated.

At a meeting of top secretaries called by the cabinet secretary on Monday, the government decided to be prepared for possible evacuation of Indian nationals in Wuhan.

Accordingly, Ministry of External Affairs will make a request to the Chinese authorities for evacuation of Indian nationals, mostly students, stuck in Wuhan city. The Ministry of Civil Aviation and Ministry of Health will make arrangements for transport and quarantine facilities respectively, an official release said on Monday.

Wuhan along 12 other cities have been completely sealed by the Chinese authorities to stop the virus from spreading. The death toll climbed to 80 with 2,744 confirmed cases.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.