Resolve tensions with India bilaterally: Trump to Imran

Agencies
August 17, 2019

Washington, Aug 17: US President Donald Trump on Friday conveyed the importance of India and Pakistan reducing tensions through bilateral dialogue on the Kashmir issue during a phone call with Prime Minister Imran Khan, the White House said.

The phone conversation between Trump and Khan took place before the close-door-consultation of the 15 members of the UN Security Council in New York. The White House readout of the call was issued after the meeting concluded at the UN headquarters in New York.

“The President conveyed the importance of India and Pakistan reducing tensions through bilateral dialogue regarding the situation in Jammu and Kashmir,” Deputy press secretary Hogan Gidley said in a statement.

The White House said Trump spoke with Khan to “discuss regional developments” and to follow up on the latter’s visit to Washington, DC, last month.

“The two leaders further discussed how they will continue to build on the growing relationship between the United States and Pakistan and the momentum created during their recent meeting at the White House,” Gidley said.

In Islamabad, Pakistan Foreign Minister Shah Mehmood Qureshi said Khan took the US President "into confidence" regarding the UN Security Council meeting at the UN headquarters after the Indian government revoked the special status of Jammu and Kashmir.

"Prime Minister Khan conveyed Pakistan's concern on recent developments in Kashmir and the threat they pose to the regional peace," Qureshi was quoted as saying by state-run Radio Pakistan.

The Foreign Minister said the conversation between the two leaders was held in a "cordial environment". They also agreed to remain in contact over the Kashmir issue, he said.

They also discussed the situation in Afghanistan. Prime Minister Khan said Pakistan has been playing a "constructive role to bring peace in Afghanistan and it made efforts in the past and will do so in future too."

Qureshi said Pakistan has contacted four of the five permanent members of the UN Security Council and are "also trying to contact French President so that his country understands our position".

The UN Security Council on Friday held a rare closed-door meeting to discuss India revoking the special status of Jammu and Kashmir after Pakistan, backed by its all-weather ally, China, requested "closed consultations" on the issue.

The meeting was open only to the five permanent members and 10 non-permanent members.

China, a permanent member of the UNSC and close ally of Pakistan, had asked for "closed consultations" in the Council.

On August 5, India revoked Article 370 of the Constitution removing special status to Jammu and Kashmir, and also bifurcated the state into two Union Territories -- Jammu and Kashmir, and Ladakh.

Reacting to India's decision, Pakistan expelled the Indian High Commissioner soon after deciding to downgrade diplomatic ties with New Delhi.

India has categorically told the international community that its move to scrap Article 370 of the Constitution revoking the special status to Jammu and Kashmir was an internal matter and has also advised Pakistan to accept the reality.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
News Network
June 27,2020

Jun 27: Alittle-known Indian IT firm offered its hacking services to help clients spy on more than 10,000 email accounts over a period of seven years.

New Delhi-based BellTroX InfoTech Services targeted government officials in Europe, gambling tycoons in the Bahamas, and well-known investors in the United States including private equity giant KKR and short seller Muddy Waters, according to three former employees, outside researchers, and a trail of online evidence.

Aspects of BellTroX's hacking spree aimed at American targets are currently under investigation by U.S. law enforcement, five people familiar with the matter told Reuters. The U.S. Department of Justice declined to comment.

Reuters does not know the identity of BellTroX's clients. In a telephone interview, the company's owner, Sumit Gupta, declined to disclose who had hired him and denied any wrongdoing.

Muddy Waters founder Carson Block said he was "disappointed, but not surprised, to learn that we were likely targeted for hacking by a client of BellTroX." KKR declined to comment.

Researchers at internet watchdog group Citizen Lab, who spent more than two years mapping out the infrastructure used by the hackers, released a report that BellTroX employees were behind the espionage campaign.

"This is one of the largest spy-for-hire operations ever exposed," said Citizen Lab researcher John Scott-Railton.

Although they receive a fraction of the attention devoted to state-sponsored espionage groups or headline-grabbing heists, "cyber mercenary" services are widely used, he said. "Our investigation found that no sector is immune."

A cache of data reviewed by Reuters provides insight into the operation, detailing tens of thousands of malicious messages designed to trick victims into giving up their passwords that were sent by BellTroX between 2013 and 2020. The data was supplied on condition of anonymity by online service providers used by the hackers after Reuters alerted the firms to unusual patterns of activity on their platforms.

The data is effectively a digital hit list showing who was targeted and when. Reuters validated the data by checking it against emails received by the targets.

On the list: judges in South Africa, politicians in Mexico, lawyers in France and environmental groups in the United States. These dozens of people, among the thousands targeted by BellTroX, did not respond to messages or declined comment.

Reuters was not able to establish how many of the hacking attempts were successful.

BellTroX's Gupta was charged in a 2015 hacking case in which two U.S. private investigators admitted to paying him to hack the accounts of marketing executives. Gupta was declared a fugitive in 2017, although the U.S. Justice Department declined to comment on the current status of the case or whether an extradition request had been issued.

Speaking by phone from his home in New Delhi, Gupta denied hacking and said he had never been contacted by law enforcement. He said he had only ever helped private investigators download messages from email inboxes after they provided him with login details.

"I didn't help them access anything, I just helped them with downloading the mails and they provided me all the details," he told Reuters. "I am not aware how they got these details but I was just helping them with the technical support."

Reuters could not determine why the private investigators might need Gupta to download emails. Gupta did not return follow-up messages. Spokesmen for Delhi police and India's foreign ministry did not respond to requests for comment.

HOROSCOPES AND PORNOGRAPHY

Operating from a small room above a shuttered tea stall in a west-Delhi retail complex, BellTroX bombarded its targets with tens of thousands of malicious emails, according to the data reviewed by Reuters. Some messages would imitate colleagues or relatives; others posed as Facebook login requests or graphic notifications to unsubscribe from pornography websites.

Fahmi Quadir's New York-based short selling firm Safkhet Capital was among 17 investment companies targeted by BellTroX between 2017 and 2019. She said she noticed a surge in suspicious emails in early 2018, shortly after she launched her fund.

Initially "it didn't seem necessarily malicious," Quadir said. "It was just horoscopes; then it escalated to pornography."

Eventually the hackers upped their game, sending her credible-sounding messages that looked like they came from her coworkers, other short sellers or members of her family. "They were even trying to emulate my sister," Quadir said, adding that she believes the attacks were unsuccessful.

U.S. advocacy groups were also repeatedly targeted. Among them were digital rights organizations Free Press and Fight for the Future, both of whom have lobbied for net neutrality. The groups said a small number of employee accounts were compromised, but the wider organizations' networks were untouched. The spying on those groups was detailed in a report by the Electronic Frontier Foundation in 2017, but has not been publicly tied to BellTroX until now.

Timothy Karr, a director at Free Press, said his organization "sees an uptick in breach attempts whenever we're engaged in heated and high-profile public policy debates." Evan Greer, deputy director of Fight for the Future, said: "When corporations and politicians can hire digital mercenaries to target civil society advocates, it undermines our democratic process."

While Reuters was not able to establish who hired BellTroX to carry out the hacking, two former employees said the company and others like it were usually contracted by private investigators on behalf of business rivals or political opponents.

Bart Santos of San Diego-based Bulldog Investigations was one of a dozen private detectives in the United States and Europe who told Reuters they had received unsolicited advertisements for hacking services out of India - including one from a person who described himself as a former BellTroX employee. The pitch offered to carry out "data penetration" and "email penetration."

Santos said he ignored those overtures, but could understand why some people didn't. "The Indian guys have a reputation for customer service," he said.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
News Network
January 10,2020

Washington, Jan 10: It is “highly likely” that Iran shot down the civilian Ukrainian jetliner that crashed near Tehran late Tuesday, killing all 176 people on board, U.S., Canadian and British officials declared Thursday.

They said the fiery missile strike could well have been a mistake amid rocket launches and high tension throughout the region.

The crash came just a few hours after Iran launched a ballistic attack against Iraqi military bases housing U.S. troops in its violent confrontation with Washington over the U.S. drone strike that killed an Iranian Revolutionary Guard general. The airliner could have been mistaken for a threat, said four U.S. officials, speaking on condition of anonymity to discuss sensitive intelligence.

Canadian prime minister Justin Trudeau, whose country lost at least 63 citizens in the downing, said in Toronto: “We have intelligence from multiple sources including our allies and our own intelligence. The evidence indicates that the plane was shot down by an Iranian surface-to-air missile.”

Likewise, U.K. prime Minister Boris Johnson and Australian prime minister Scott Morrison offered similar statements. Morrison also said it appeared to be a mistake. “All of the intelligence as presented to us today does not suggest an intentional act,” he said.

The assessment that 176 people were killed as collateral damage in the Iranian-U.S. conflict cast a new pall over what had at first appeared to be a relatively calm aftermath following the U.S. military operation that killed Iranian Gen. Qassem Soleimani.

At the White House, U.S. president Donald Trump suggested he believed Iran was responsible for the shootdown and dismissed Iran's initial claim that it was a mechanical issue with the plane.

“Somebody could have made a mistake on the other side.” Trump said, noting the plane was flying in a “pretty rough neighborhood."

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
July 18,2020

Days after Twitter accounts of several billionaires were hacked to engineer a crypto scam, Twitter on Saturday said it is embarrassed, disappointed and, more than anything, sorry for what happened with some of its high-profile users as attackers successfully manipulated its employees and used their credentials to access internal systems, including getting through the two-factor protections.

In the first detailed summary of the "social engineering attack" via a crypto scam that hit at least 130 users this week, Twitter said for 45 of those accounts, the attackers were able to initiate a password reset, login to the account and send Tweets.

"We are continuing our forensic review of all of the accounts to confirm all actions that may have been taken. In addition, we believe they may have attempted to sell some of the usernames," the micro-blogging platform said in a statement.

For up to eight of the Twitter accounts involved, the attackers took the additional step of downloading the account's information via "Your Twitter Data" tool.

This is a tool that is meant to provide an account owner with a summary of their Twitter account details and activity.

"We are reaching out directly to any account owner where we know this to be true. None of the eight were verified accounts," said Twitter.

The company said the attackers were not able to view previous account passwords, as those are not stored in plain text or available through the tools used in the attack.

"Attackers were able to view personal information including email addresses and phone numbers, which are displayed to some users of our internal support tools," informed Twitter.

In cases where an account was taken over by the attacker, they may have been able to view additional information, Twitter added, saying its forensic investigation of these activities was still ongoing.

"We are actively working on communicating directly with the account-holders that were impacted".

The company said it will soon restore access for all account owners who may still be locked out as a result of the remediation efforts.

The New York Times reported on Friday that the Twitter crypto scam can be traced back to a group of hackers who congregate online at OGusers.com, a username-swapping community where people buy and sell coveted online handles.

The report said that the Twitter hack is not from Russian, Chinese or North Korean hackers but was done by a group of young people, "one of whom says he lives at home with his mother".

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.