Yazidis cheer Kurds on Iraqi mountain for breaking ISIS siege

Reuters reports: Iraqi Kurdish fighters flashed victory signs as they swept across the northern side of Sinjar mountain on Saturday, two days after breaking through to free hundreds of Yazidis trapped there for months by Islamic State fighters.

A Reuters correspondent, who arrived on the mountain late Saturday, witnessed Kurdish and Yazidi fighters celebrating their gains after launching their offensive on Wednesday with heavy U.S. air support.

The Iraqi Kurdish flag fluttered, with its yellow sun, and celebratory gunfire rang out. Little children cheered “Barzani’s party”, in reference to the Kurdish region’s president, Massoud Barzani.

“We have been surrounded the last three months. We were living off of raw wheat and barley,” said Yazidi fighter Haso Mishko Haso. [Continue reading…]

Facebooktwittermail

Spain jails four accused of recruiting women for ISIS

Vice News reports: Three women and a man, accused of recruiting young women for the Islamic State through social media and WhatsApp forums, were sent to prison by a Spanish judge on Thursday. They were allegedly part of a jihadist network that has managed to send 12 women to join the terrorist group in Syria and Iraq.

Spanish National Court Judge Santiago Pedraz “ordered unconditional detention for membership in a terrorist organisation,” according to a judicial source.

Police arrested seven suspects this week — four people in Melilla and Ceuta, Spanish territories in northern Africa, a Chilean woman in Barcelona, and two men in the Moroccan town of Castillejos. Two women arrested in Barcelona and Ceuta were apparently about to travel to the Middle East. [Continue reading…]

Facebooktwittermail

Syrian opposition leader: UN ‘freeze’ must be tied to broad peace process

The Wall Street Journal reports: Syria’s opposition chief, who was in Brussels this week to meet with European Union foreign ministers, is warning Western leaders against embracing a possible United Nations “freeze” on Syrian fighting unless it’s tied to a broader peace process.

Hadi al-Bahra, president of the Syrian National Coalition, said a plan being floated by UN special envoy Staffan de Mistura could be a breakthrough. But if it’s not part of a political resolution, Mr. Bahra said, it will simply give the regime of President Bashar al-Assad time to regroup.

“I’m seeing some fatigue with a few countries who feel a need just to support any proposal submitted, whether it’s part of a political solution or not, just for the sole reason that there is nothing available except this,” Mr. Bahra said in an interview.

Mr. de Mistura has been discussing a plan to freeze the fighting around the embattled city of Aleppo, meaning both sides would stay where they are and ratchet down the violence to zero. The goal would then be to spread the freeze to other areas.

European Union foreign ministers, meeting here Monday, largely embraced the idea as a rare glimmer of hope in a conflict that has killed some 200,000 people. “There is a good chance … that he can succeed in going step-by-step to impose a freeze in Aleppo,” Luxembourg’s Foreign Minister Jean Asselborn told reporters. “That would be perhaps the beginning of a more positive evolution… In any case, we don’t have a lot of options.”

But Mr. Bahra’s concerns were echoed privately by some countries, including Britain and France. Any plan must ensure that Mr. Assad doesn’t redeploy his troops and attack elsewhere, he said, and it must guarantee serious consequences if either side violates the deal. [Continue reading…]

Facebooktwittermail

Chinese general anticipates North Korea’s ‘collapse’

The New York Times reports: When a retired Chinese general with impeccable Communist Party credentials recently wrote a scathing account of North Korea as a recalcitrant ally headed for collapse and unworthy of support, he exposed a roiling debate in China about how to deal with the country’s young leader, Kim Jong-un.

For decades China has stood by North Korea, and though at times the relationship has soured, it has rarely reached such a low point, Chinese analysts say. The fact that the commentary by Lt. Gen. Wang Hongguang, a former deputy commander of an important military region, was published in a state-run newspaper this month and then posted on an official People’s Liberation Army website attested to how much the relationship had deteriorated, the analysts say.

“China has cleaned up the D.P.R.K.’s mess too many times,” General Wang wrote in The Global Times, using the initials of North Korea’s formal name, the Democratic People’s Republic of Korea. “But it doesn’t have to do that in the future.”

Of the government in North Korea, he said: “If an administration isn’t supported by the people, ‘collapse’ is just a matter of time.” Moreover, North Korea had violated the spirit of the mutual defense treaty with China, he said, by failing to consult China on its nuclear weapons program, which has created instability in Northeast Asia. [Continue reading…]

Facebooktwittermail

Why there’s still reason to doubt North Korea was behind the Sony attack

Why would the FBI say it has “enough information to conclude that the North Korean government is responsible for these actions,” if that’s not really true?

Firstly, the FBI and the U.S. government as a whole is always reluctant to present itself as ignorant. Presenting itself as having privileged access to secret information is something every government does in order to bolster its image of power. The FBI can’t tell us exactly how it knows what it claims to know because “the need to protect sensitive sources and methods precludes us from sharing all of this information” — trust us; we know; we’re the FBI.

Secondly, the only way that North Korea can convincingly refute the accusation is to identify the real culprits — and they have no means of doing that.

Given the appalling reputation of the leaders of the hermit kingdom, there is a prevailing assumption of guilt even in the absence of compelling evidence, which makes the FBI’s accusation an easy sell.

Sean Gallagher recently wrote: “Based on the amount of data stolen, and the nature of the malware itself, it’s likely the attackers had physical access to the network and that the attack may have been ongoing for months…”

Are we to imagine that North Korea not only instigated the attack but was also able to recruit inside collaboration?

I can see this as central to the plot that numerous Hollywood screenwriters must currently be working on for a blockbuster thriller about how an evil dictator tries to destroy Hollywood, but I can’t really see it in real life.

Michael Hiltzik writes:

The North Korea/”Interview” narrative is comforting in several ways. It feeds into the tendency to attribute almost God-like capabilities to an adversary, especially a secretive one; that’s very much a scenario favored by Hollywood. (Think of the all-time definitive James Bond movie line, from “Dr. No”: “World domination–same old dream.”) And it helps Sony executives deflect blame — how could anyone expect them to defend against an attack by such a sinister, all-powerful enemy? You can expect to see more coverage, like this piece from CNN, about North Korea’s shadowy “Bureau 121,” purportedly its Cyberattack Central.

There are great dangers in mistaken attribution — it shifts attention from the real perpetrators, for one thing. A counterattack against North Korea could needlessly provoke the regime, wrecking the few diplomatic initiatives taking place.

Here’s a rundown of the counter-narrative.

–“Whitehat” hacker and security expert Marc W. Rogers argues that the pattern of the attack implies that the attackers “had extensive knowledge of Sony’s internal architecture and access to key passwords. While it’s plausible that an attacker could have built up this knowledge over time … Occam’s razor suggests the simpler explanation of an insider,” perhaps one out for workplace revenge. (N.B. “Occam’s razor” is the principle that the simplest explanation for something is often the best.)

–The assertion that the attack was uniquely sophisticated, which is an element of the accusation against North Korea, is both untrue and incompatible with the North Korea narrative. It presupposes that a nation-state without a native computer infrastructure could launch an unprecedented assault. More to the point, very similar hacking technology has been used in earlier hacks in Saudi Arabia and elsewhere. The consulting firm Risk Based Security has a discussion of these and other aspects of the Sony affair.

It’s worth noting that Risk Based Security’s team isn’t entirely convinced by the FBI statement. In an update to their commentary Friday, they observed that the agency has “not released any evidence to back these claims.” They add: “While the FBI certainly has many skilled investigators, they are not infallible. Remember, this agency represents the same government that firmly stated that Iraq had weapons of mass destruction, leading the U.S. into a more than ten year conflict, which was later disproven.

Finally, Caroline Baylon from Chatham House, in an interview with ITN, laid out the reasons why the North Korean government was probably not behind the hack:

Facebooktwittermail

Hollywood’s war against Google

Ars Technica reports: Tensions between Google and Mississippi Attorney General Jim Hood exploded into public view this week, as Google filed court papers seeking to halt a broad subpoena Hood sent to the company.

The Hood subpoena, delivered in late October, didn’t come out of nowhere. Hood’s investigation got revved up after at least a year of intense lobbying by the Motion Picture Association of America (MPAA). E-mails that hackers acquired from Sony Pictures executives and then dumped publicly now show the inner workings of how that lobbying advanced—and just how extensive it was. Attorneys at Sony were on a short list of top Hollywood lawyers frequently updated about the MPAA’s “Attorney General Project,” along with those at Disney, Warner Brothers, 21st Century Fox, NBC Universal, and Paramount.

The e-mails show a staggering level of access to, and influence over, elected officials. The MPAA’s single-minded obsession: altering search results and other products (such as “autocompleted” search queries) from Google, a company the movie studios began referring to as “Goliath” in around February 2014. The studios’ goal was to quickly get pirated content off the Web; unhappy about the state of Google’s voluntary compliance with their demands and frustrated in their efforts at passing new federal law such as SOPA and PIPA, the MPAA has turned instead to state law enforcement.

The most controversial elements of SOPA/PIPA would have let content owners effectively shut down websites they said were infringing their copyrights or trademarks. This already happens—think of various peer-to-peer sites that no longer exist—but it usually involves drawn-out litigation. SOPA promised a faster-moving process that would have essentially made rights holders a website’s judge, jury, and executioner.

To get the same results in a post-SOPA world, MPAA has hired some of the nation’s most well-connected lawyers. The project is spearheaded by Thomas Perrelli, a Jenner & Block partner and former Obama Administration lawyer. Perrelli has given attorneys general (AGs) across the country their talking points, suggesting realistic “asks” prior to key meetings with Google. Frustrated with a lack of results, Perrelli and top MPAA lawyers then authorized an “expanded Goliath strategy” in which they would push the AGs to move beyond mere letter writing. Instead, they would seek full-bore investigations against Google.

If the AGs felt short on resources—well, Hollywood studios could help with that. Money from Sony and other Big Six studios was available to draft the actual subpoenas, to research legal theories to prosecute Google, to spread negative press about the search giant, and to reach out to other state AGs that might join with Hood.

This is how the project unfolded over the past year. [Continue reading…]

Facebooktwittermail

Feds release new details about malware targeting Sony

Ars Technica reports: The highly destructive malware believed to have hit the networks of Sony Pictures Entertainment contained a cocktail of malicious components designed to wreak havoc on infected networks, according to new technical details released by federal officials who work with private sector security professionals.

An advisory published Friday by the US Computer Emergency Readiness Team said the central malware component was a worm that propagated through the Server Message Block protocol running on Microsoft Windows networks. The worm contained brute-force cracking capabilities designed to infect password-protected storage systems. It acted as a “dropper” that then unleashed five components. The advisory, which also provided “indicators of compromise” that can help other companies detect similar attacks, didn’t mention Sony by name. Instead, it said only that the potent malware cocktail had targeted a “major entertainment company.” The FBI and White House have pinned the attack directly on North Korea, but so far have provided little proof. [Continue reading…]

Facebooktwittermail

Peshawar massacre: Pakistan’s enemy within

Pervez Hoodbhoy writes: The gut-wrenching massacre in Peshawar’s Army Public School has left Pakistan aghast and sickened. All political leaders have called for unity against terrorism. But this is no watershed event that can bridge the deep divides within. In another few days this episode of 134 dead children will become one like any other.

All tragedies provoke emotional exhortations. But nothing changed after Lakki Marwat when 105 spectators of a volleyball match were killed by a suicide bomber in a pickup truck. Or, when 96 Hazaras in a snooker club died in a double suicide attack. The 127 dead in the All Saints Church bombing in Peshawar, or the 90 Ahmadis killed while in prayer, are now dry statistics. In 2012, men in military uniforms stopped four buses bound from Rawalpindi to Gilgit, demanding that all 117 persons alight and show their national identification cards. Those with typical Shia names, like Abbas and Jafri, were separated. Minutes later corpses lay on the ground.

If Pakistan had a collective conscience, just one single fact could have woken it up: the murder of nearly 60 polio workers — women and men who work to save children from a crippling disease — at the hands of the fanatics.

Hence the horrible inevitability: from time to time, Pakistan shall continue to witness more such catastrophes. No security measures can ever prevent attacks on soft targets. The only possible solution is to change mindsets. For this we must grapple with three hard facts.

First, let’s openly admit that the killers are not outsiders or infidels. Instead, they are fighting a war for the reason Boko Haram fights in Nigeria, IS in Iraq and Syria, Al Shabab in Kenya, etc. The men who slaughtered our children are fighting for a dream — to destroy Pakistan as a Muslim state and recreate it as an Islamic state. This is why they also attack airports and shoot at PIA planes. They see these as necessary steps towards their utopia. [Continue reading…]

Make of it what you will, but a statement attributed to the newly formed al-Qaeda in the Indian Subcontinent (AQIS), strongly condemns the massacre.

In Peshawar army school attack, more than 130 children have died. “And to him we belong and to him we return”. On this tragic incident, our hearts are deeply saddened. There is no doubt about the oppression of pakistan army and that its crimes have exceeded all limits. Truth is that, Pakistan army has exceeded all limits in its subservience to Americans and the massacre of Muslims. Its also true that, America is totally dependent on Pakistan’s army to silence any voice for Shariah.

But these crimes of Pakistan army and its horrific oppression CANNOT justify that its revenge be taken from innocent Muslims.

Facebooktwittermail

ISIS targets Afghanistan just as the U.S. quits

The Daily Beast reports: Few sayings of the Prophet Mohammed have a stronger hold on the imagination of the world’s jihadists than his prophecy about the flags: “If you see the black banners coming from Khorasan, join that army, even if you have to crawl over ice,” he is supposed to have admonished the faithful. “No power will be able to stop them and they will finally reach Baitul Maqdisi”—Jerusalem— “where they will erect flags.”

And where was this magical land of Khorasan, whence the conquerors would come? Think Afghanistan and pieces of all the countries that surround it, including and especially Iran.

For the great ideologues of modern jihadist terror, Ayman al Zawahiri of al Qaeda and Abu Bakr al Baghdadi of the so-called Islamic State, the strategic and symbolic importance of Khorasan is huge, and there are already signs that they are competing for control there. Some factions of both the Afghan and Pakistani Taliban and some members of al Qaeda in the area have pledged allegiance to Baghdadi’s self-proclaimed caliphate in Syria and Iraq. Zawahiri’s most elite group of operatives, meanwhile, has become known as the Khorasan Group.

As terrorists compete for prestige and authority, they are under attack by the governments of the region. To make their mark on the minds of potential followers, they carry out ever more desperate and horrifying acts, like the slaughter of children at a school in Peshawar, Pakistan, earlier this week.

A central figure in these dangerous wider developments is a soft-spoken scholar, journalist and poet, Sheikh Abdul Rahim Muslim Dost, who spent more than three years as a prisoner of the Americans at Guantanamo, then found himself imprisoned again by the Pakistanis. News reports in the region recently named his as the Islamic State-appointed governor or wali of Khorasan. [Continue reading…]

Facebooktwittermail

ISIS now regulates rape and slavery

Zvi Bar’el reports: The rape and trafficking of women now has rules, according to a short explanatory pamphlet released recently by the Islamic State (also known as ISIS or ISIL).

According to this publication, which appears in Q&A format, a man may take a woman as a slave and have sexual intercourse with her if she has reached puberty. However, if a man is only part-owner of a woman, he must purchase her fully from his co-owners before he can have intercourse with her. If the slave becomes pregnant, she may not be sold. However, if her owner dies, she goes free.

A man may not have intercourse with his wife’s slave, because the latter is another’s property. One may sexually enjoy a slave without having full intercourse with her if she has not reached puberty. A slave should be treated as property, as long as that property is not damaged. A woman must not be separated from her child when she is bought or sold, except if her children have reached adulthood.

These rules are presented together with quotes from the words of the prophet Mohammed and verses of wisdom from Islamic luminaries. Not only is the abduction of women and selling them as sex slaves an inseparable part of the strategy of terror imposed by ISIS in areas under its control in Iraq and Syria, the butchering of women is also an accepted act. [Continue reading…]

Facebooktwittermail

Several ISIS leaders have been killed in Iraq, U.S. says

The Wall Street Journal reports: U.S. airstrikes have killed three military leaders of the extremist group Islamic State in Iraq in recent weeks, the Pentagon’s top uniformed officer said Thursday.

The action came as U.S. and Iraqi forces step up operations in Iraq, officials said, part of an expanding coalition effort ahead of an expected offensive next year to try to retake key cities seized by the militant group.

Gen. Martin Dempsey, chairman of the Joint Chiefs of Staff, told The Wall Street Journal in an interview that the strikes that killed the military leaders were designed to hamper Islamic State’s ability to conduct attacks, supply fighters and finance operations. [Continue reading…]

Facebooktwittermail

Boko Haram now appears intent on governing

The Wall Street Journal reports: After seizing another village in Nigeria’s northeast last month, Boko Haram militants took a step in their transition from terror group to governing authority. They rounded up the men and ordered them to wear pants as the prophet Mohammed did, several inches above the ankle.

Otherwise, a Boko Haram commander told a crowd of men, they would be killed. “So we folded our trousers,” said Birgamus Kadams, a 26-year-old who was among the group of several hundred residents of Garkidi village the militant addressed.

Like 1.5 million other Nigerians, Mr. Kadams fled his home, in his case to the government-held town of Yola. But the world he left behind is changing.

After years of sowing chaos—bombing mosques, gunning up markets, kidnapping children, and leaving thousands dead, Boko Haram now appears intent on establishing order in towns it holds.

Fighters are imposing rigorous Islamic law in a bid to carve out a corner of a strategic, oil-rich country—just as its fellow jihadists in the Islamic State in Iraq and Syria are doing. [Continue reading…]

Facebooktwittermail

How the internet undermines the value of talking

Nick Bilton writes: According to a producer in Hollywood, people have been staying clear of email and opting for cellphones over the past two weeks as studios have been bolstering firewalls and email systems. “Everyone has been doing business on their cellphone since this happened,” the person said, asking not to be named. “The reality is, every studio has emails in their system that would cause the [same] chaos if they came out.”

Or as Jenni Konner, a writer and executive producer for HBO’s “Girls,” said on Twitter Tuesday night: “The worst thing about the Sony hacks is people using the phone again.”

It’s not only people in Hollywood who are picking up the phone again in case of an email hack.

For the rest of us, the Sony hacking is just another example of how our emails are highly insecure. “Don’t put anything in an email that you wouldn’t want to see on the front page of The New York Times the next day,” said Brian Krebs, who specializes in cybercrime and operates the website Krebs on Security. “It’s like putting a postcard in the mail.”

“And you can’t unsay anything you’ve said on the Internet,” Mr. Krebs added.

What’s so terrible about having to use the phone?

I know — it requires that massively inconvenient social accommodation which requires people to share time.

Nowadays everyone thinks they should be able to control their own time without engaging in submissive forms of behavior like answering phone calls.

Text allows people to connect without sharing space or time.

The sacrifice however, is that text lacks the fluidity of speech. What is said can instantly be modified, modulated and shaped within the flow of conversation.

Instead of bemoaning the inconvenience of talking, maybe its time for everyone to reacquaint themselves with its value.

Facebooktwittermail

FBI offers circumstantial evidence that North Korea is responsible for Sony hack

FBI statement: As a result of our investigation, and in close collaboration with other U.S. government departments and agencies, the FBI now has enough information to conclude that the North Korean government is responsible for these actions. While the need to protect sensitive sources and methods precludes us from sharing all of this information, our conclusion is based, in part, on the following:

  • Technical analysis of the data deletion malware used in this attack revealed links to other malware that the FBI knows North Korean actors previously developed. For example, there were similarities in specific lines of code, encryption algorithms, data deletion methods, and compromised networks.
  • The FBI also observed significant overlap between the infrastructure used in this attack and other malicious cyber activity the U.S. government has previously linked directly to North Korea. For example, the FBI discovered that several Internet protocol (IP) addresses associated with known North Korean infrastructure communicated with IP addresses that were hardcoded into the data deletion malware used in this attack.
  • Separately, the tools used in the SPE attack have similarities to a cyber attack in March of last year against South Korean banks and media outlets, which was carried out by North Korea.

The emphasis above is mine.

It’s reasonable to assume that the hackers don’t want to get caught and thrown in jail. It’s also reasonable to assume that they would want to evade detection by disguising themselves as North Korean. An abundance of clues that this attack emanated from North Korean sources may just as likely indicate that it came from somewhere else.

Moreover, given that the U.S. government takes a firm position on refusing to pay ransoms for the release of hostages, why would they not have strongly advised Sony to refuse to capitulate in the face of implausible threats?

President Obama now says that Sony “made a mistake” by pulling the release of the film.

Hmmm… Maybe Sony will now reconsider its decision — they can pitch the release of The Interview as an appropriate form of retaliation and also take advantage of the most massive run of free publicity a movie has ever had.

Sony executives may honestly believe that this film is “desperately unfunny,” but at the end of the day, this isn’t about free speech — it’s about making money.

Facebooktwittermail