SAARC has not lived up to its potential: White House

October 13, 2016

Washington, Oct 13: SAARC has not lived up to its potential, a top White House official said and "regretted" that the regional summit has to be postponed this year after most of the member countries pulled out of it.SAARC2

"It is regrettable that the SAARC meeting could not be held this year," Peter Lavoy, Senior Director for South Asia at the National Security Council (NSC), White House told a Washington audience in response to a question at the Center for Strategic and International Studies (CSIS).

"In fact SAARC has not lived up to the potential of other regional groupings like ASEAN. That grouping has countries with similar frictions, similar boarder disputes, ethnic concerns and other problems at the time ASEAN was created," he said.

But SAARC has not been able to provide that platform, which has negative effect on the relationships, Lavoy said when asked about America's relationship between India and Pakistan.

"I think, the bottom line is we do not try to balance this relationship," he said, adding that the Obama Administration has been focused on deepening and broadening its relationship with India.

"We wish that were to be the case with Pakistan. We work very hard with Pakistan to turn that into a productive mutually beneficial relationship. I am sure the next administration would continue with these tendencies," Lavoy said.

The US he said already has a very vibrant trilateral co-operation with India and Japan.

"There is no reason why other countries can't join in on this partnership," he said.Following the attack in Uri in which 19 soldiers were killed, India decided not to participate in the SAARC Summit that was scheduled to be held in Islamabad in November.

Following India, several other South Asian countries – Bangladesh, Bhutan, Afghanistan and Sri Lanka – pulled out of the summit. This forced Pakistan to postpone the SAARC Summit for an indefinite period.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
News Network
May 13,2020

Islamabad, May 13 : The number of confirmed COVID-19 cases in Pakistan rose to 34,370 on Wednesday after new infections were confirmed in the country.

As per province-wise breakup of the total tally cited by Radio Pakistan, so far 13,225 cases have been registered in Punjab, 12,610 in Sindh, 5,021 in Khyber Pakhtunkhwa, 2,158 in Balochistan, 759 in Islamabad, 475 in Gilgit Baltistan and 88 in Pakistan-occupied Kashmir.

As many as 2,255 cases positive were confirmed, while 31 deaths reported during the last 24 hours.

At least 737 patients have died so far while 8,812 stand recovered, the media reported further.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
July 18,2020

Days after Twitter accounts of several billionaires were hacked to engineer a crypto scam, Twitter on Saturday said it is embarrassed, disappointed and, more than anything, sorry for what happened with some of its high-profile users as attackers successfully manipulated its employees and used their credentials to access internal systems, including getting through the two-factor protections.

In the first detailed summary of the "social engineering attack" via a crypto scam that hit at least 130 users this week, Twitter said for 45 of those accounts, the attackers were able to initiate a password reset, login to the account and send Tweets.

"We are continuing our forensic review of all of the accounts to confirm all actions that may have been taken. In addition, we believe they may have attempted to sell some of the usernames," the micro-blogging platform said in a statement.

For up to eight of the Twitter accounts involved, the attackers took the additional step of downloading the account's information via "Your Twitter Data" tool.

This is a tool that is meant to provide an account owner with a summary of their Twitter account details and activity.

"We are reaching out directly to any account owner where we know this to be true. None of the eight were verified accounts," said Twitter.

The company said the attackers were not able to view previous account passwords, as those are not stored in plain text or available through the tools used in the attack.

"Attackers were able to view personal information including email addresses and phone numbers, which are displayed to some users of our internal support tools," informed Twitter.

In cases where an account was taken over by the attacker, they may have been able to view additional information, Twitter added, saying its forensic investigation of these activities was still ongoing.

"We are actively working on communicating directly with the account-holders that were impacted".

The company said it will soon restore access for all account owners who may still be locked out as a result of the remediation efforts.

The New York Times reported on Friday that the Twitter crypto scam can be traced back to a group of hackers who congregate online at OGusers.com, a username-swapping community where people buy and sell coveted online handles.

The report said that the Twitter hack is not from Russian, Chinese or North Korean hackers but was done by a group of young people, "one of whom says he lives at home with his mother".

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
March 1,2020

Washington, Mar 1: The US Federal Communications Commission (FCC) has proposed a fine of over $200 million for all major US mobile carriers for selling the location data of customers to some agencies.

The Federal Communications Commission today proposed fines against the nation's four largest wireless carriers for apparently selling access to their customers' location information without taking reasonable measures to protect against unauthorised access to that information. As a result, T-Mobile faces a proposed fine of more than $91 million, AT&T faces a proposed fine of more than $57 million, Verizon faces a proposed fine of more than $48 million, and Sprint faces a proposed fine of more than $12 million, the FCC said in a statement on Friday.

The Enforcement Bureau of FCC opened this investigation after reports surfaced that a Missouri Sheriff, Cory Hutcheson, used a "location-finding service" operated by Securus, a provider of communications services to correctional facilities, to access the location information of the wireless carriers' customers without their consent between 2014 and 2017.

"American consumers take their wireless phones with them wherever they go. And information about a wireless customer's location is highly personal and sensitive. The FCC has long had clear rules on the books requiring all phone companies to protect their customers' personal information. And since 2007, these companies have been on notice that they must take reasonable precautions to safeguard this data and that the FCC will take strong enforcement action if they don't. Today, we do just that," said FCC Chairman Ajit Pai.

"This FCC will not tolerate phone companies putting Americans' privacy at risk."

The FCC also admonished these carriers for apparently disclosing their customers' location information, without their authorisation, to a third party

The four major US carriers mentioned sold access to their customers' location information to "aggregators," who then resold access to such information to third-party location-based service providers (like Securus).

Although their exact practices varied, each carrier relied heavily on contract-based assurances that the location-based services providers (acting on the carriers' behalf) would obtain consent from the wireless carrier's customer before accessing that customer's location information.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.