attack November nycdevops meetup: DevSecOps and supply chain attack By feeds.everythingsysadmin.com Published On :: Mon, 28 Oct 2019 10:00:00 -0500 Irina Tishelman from Sonatype will present a talk "Automate or Die - DevSecOps in the Age of Software Supply Chain Attacks" at the November 14, 2019 nycdevops meetup. The meetup meets at the Stack Overflow office in NYC. https://www.meetup.com/nycdevops/events/265281451/ You don't want to miss this one! Full Article NYCDevOps Meetup Security
attack China's Military Is Tied to Debilitating New Cyberattack Tool By catless.ncl.ac.uk Published On :: Full Article
attack SEE IT: Video shows random attack on real estate agent in Los Angeles: ‘Seeing my legs in the air, it’s like a movie’ By www.nydailynews.com Published On :: Tue, 24 Sep 2019 18:31:16 +0000 A Los Angeles real estate agent was shoved backwards off a stairway and pinned to the ground by an unknown open house visitor who flashed a chilling smile at a security camera seconds earlier. Full Article
attack Woman attacked with hammer during Brooklyn mugging By www.nydailynews.com Published On :: Wed, 12 Feb 2020 13:39:26 +0000 Police said the crook crept up behind the 38-year-old victim on Wilson Ave. near Dekalb Ave. in Bushwick about 7 a.m. Tuesday and shoved her to the ground. Full Article
attack NYC man charged with murder for baseball-bat attack against street thief after victim dies 5 years later By www.nydailynews.com Published On :: Thu, 07 May 2020 22:03:54 +0000 Craig Nathaniel, 33, already served five years probation after pleading guilty to felony assault for the Dec. 23, 2012, attack. Full Article
attack Off-duty FDNY EMT busted for attacking ex-girlfriend in drunken rage, one of three city employees arrested for domestic incidents in eight-hour span By www.nydailynews.com Published On :: Fri, 08 May 2020 13:22:45 +0000 Robert Soto, 33, showed up drunk to his ex-lover’s Morrisania apartment some time before midnight Thursday and got into an argument with the woman. As she tried to escort him out, Soto bashed her head into a metal door, cops said. Full Article
attack Man Utd legend Wayne Rooney launches scathing attack on Health Secretary Matt Hancock By www.express.co.uk Published On :: Mon, 06 Apr 2020 00:01:00 +0100 Manchester United legend Wayne Rooney has hit back at Health Secretary Matt Hancock. Full Article
attack Fury as swan shot in head four times while protecting nest in ‘cruel and horrible’ attack By www.express.co.uk Published On :: Wed, 29 Apr 2020 22:20:00 +0100 A SWAN was shot in the head four times while trying to protect her nest in a shocking case of animal cruelty at a park in Merseyside. Full Article
attack Militants increasing attacks on Burkina Faso mines By www.ctvnews.ca Published On :: Sat, 9 May 2020 08:55:25 -0400 Jihadists linked to al-Qaida and the Islamic State organization have been overrunning gold mines, forcing the miners to sell them the gold exclusively, which is then smuggled and sold across the border in places like Benin, Ghana or Togo. Full Article
attack Butler 2010 rewind: Mack attack and 3s allowed Dawgs to overtake UTEP By rssfeeds.indystar.com Published On :: Wed, 18 Mar 2020 13:03:22 +0000 Shelvin Mack made six of his seven 3s in the second half and scored 25 points, leading the No. 5 seeded Bulldogs over No. 12 Texas-El Paso Full Article
attack Cognizant Expects To Lose Between $50 Million and $70 Million Following Ransomware Attack By rss.slashdot.org Published On :: 2020-05-09T01:10:00+00:00 IT services provider Cognizant said in an earnings call this week that a ransomware incident that took place last month in April 2020 will negatively impact its Q2 revenue. ZDNet reports: "While we anticipate that the revenue impact related to this issue will be largely resolved by the middle of the quarter, we do anticipate the revenue and corresponding margin impact to be in the range of $50 million to $70 million for the quarter," said Karen McLoughlin, Cognizant Chief Financial Officer in an earnings call yesterday. McLoughlin also expects the incident to incur additional and unforeseen legal, consulting, and other costs associated with the investigation, service restoration, and remediation of the breach. The Cognizant CFO says the company has now fully recovered from the ransomware infection and restored the majority of its services. Speaking on the ransomware attack, Cognizant CEO Brian Humphries said the incident only impacted its internal network, but not customer systems. More precisely, Humphries said the ransomware incident impacted (1) Cognizant's select system supporting employees' work from home setups and (2) the provisioning of laptops that Cognizant was using to support its work from home capabilities during the COVID-19 pandemic. Humphries said staff moved quickly to take down all impacted systems, which impacted Cognizant's billing system for a period of time. Some customer services were taken down as a precaution. Read more of this story at Slashdot. Full Article
attack Greenwood Christian AD Sue Tameling dies from apparent heart attack: 'She very much loved GCA.' By rssfeeds.indystar.com Published On :: Tue, 07 Apr 2020 17:06:57 +0000 Sue Tameling was in her role as Greenwood Christian AD for less than two years, but she left an impression as a mentor, teacher and a friend. Full Article
attack IS militants step up attacks on Iraqi security forces By www.bbc.co.uk Published On :: Tue, 05 May 2020 13:05:27 GMT Analysts say IS is exploiting the coronavirus pandemic, which is occupying authorities' attention. Full Article
attack CCTV released after 'frightening' Canning Town attack on doctor By www.bbc.co.uk Published On :: Fri, 08 May 2020 17:54:19 GMT The 37-year-old victim was followed and attacked in Canning Town, east London, on 17 April. Full Article
attack Laura Ingraham’s brother is attacking her after she compared Greta Thunberg to the ‘Children of the Corn’ By www.washingtonpost.com Published On :: Tue, 24 Sep 2019 15:08:52 +0000 “Clearly my sister’s paycheck is more important than the world her three adopted kids will inherit,” Curtis Ingraham wrote on Twitter. Full Article
attack Democracy is under attack. But how to protect it while Trump is in the White House? By www.washingtonpost.com Published On :: Thu, 01 Aug 2019 17:46:08 +0000 Review of 'Ill Winds" by Larry Diamond and 'The Democracy Fix' by Caroline Fredrickson. Full Article
attack News24.com | Covid-19 wrap | China slams US after Trump virus 'attack' claim, India repatriation to begin and Poland, Syria postpone elections due to pandemic By www.news24.com Published On :: Thu, 07 May 2020 14:57:56 +0200 Here are the latest developments in the coronavirus crisis. Full Article
attack After Paris Attacks, CIA Head Reignites Surveillance Debate By feedproxy.google.com Published On :: Mon, 16 Nov 2015 18:21:12 EST Just days after the attack in Paris, America’s top intelligence official suggested that recent leaks about classified surveillance programs were partially responsible. Full Article
attack Risk of serious cyber attacks on nuclear facilities underestimated, says new report By feedproxy.google.com Published On :: Fri, 09 Oct 2015 15:22:30 +0000 2 October 2015 20150930CyberSecurity.jpg Workers at the Wolsong nuclear power plant participate in an anti-cyber attack exercise, Gyeongju, South Korea. Photo: Getty Images. The risk of a serious cyber attack on civil nuclear infrastructure is growing, as facilities become ever more reliant on digital systems and make increasing use of commercial ‘off-the-shelf’ software, according to a major new report from Chatham House.Cyber Security at Civil Nuclear Facilities: Understanding the Risks is the result of an 18-month study that draws on in-depth interviews with 30 leading industry practitioners based in more than eight countries. It found that the trend to digitization, when combined with a lack of executive-level awareness of the risks involved, means that nuclear plant personnel may not realize the full extent of their cyber vulnerability and are thus inadequately prepared to deal with potential attacks. Specific findings include: The conventional belief that all nuclear facilities are ‘air gapped’ (isolated from the public internet) is a myth. The commercial benefits of internet connectivity mean that a number of nuclear facilities now have VPN connections installed, which facility operators are sometimes unaware of.Search engines can readily identify critical infrastructure components with such connections.Even where facilities are air gapped, this safeguard can be breached with nothing more than a flash drive.Supply chain vulnerabilities mean that equipment used at a nuclear facility risks compromise at any stage.A lack of training, combined with communication breakdowns between engineers and security personnel, means that nuclear plant personnel often lack an understanding of key cyber security procedures.Reactive rather than proactive approaches to cyber security contribute to the possibility that a nuclear facility might not know of a cyber attack until it is already substantially under way.In the light of these risks, the report outlines a blend of policy and technical measures that will be required to counter the threats and meet the challenges. Recommendations include:Developing guidelines to measure cyber security risk in the nuclear industry, including an integrated risk assessment that takes both security and safety measures into account.Engaging in robust dialogue with engineers and contractors to raise awareness of the cyber security risk, including the dangers of setting up unauthorized internet connections.Implementing rules, where not already in place, to promote good IT hygiene in nuclear facilities (for example to forbid the use of personal devices) and enforcing rules where they do exist.Improving disclosure by encouraging anonymous information sharing and the establishment of industrial CERTs (Computer Emergency Response Team).Encouraging universal adoption of regulatory standards. Editor's notes Cyber Security at Civil Nuclear Facilities: Understanding the Risks, written by Caroline Baylon with Roger Brunt and David Livingstone, is embargoed until Monday 5 October 2015.Caroline Baylon is the research associate in science, technology and cyber security at Chatham House. Roger Brunt was appointed the UK government's regulator for security in the civil nuclear industry as the director of the Office for Civil Nuclear Security after retiring from the British Army in 2004. David Livingstone is an associate fellow at Chatham House, where he has participated in a broad range of projects on national-level risk management, cyber security, counterterrorism, serious organized crime, nuclear security and space security.Fore more information, or to request an interview with the authors, contact the press office Contacts Press Office +44 (0)20 7957 5739 Email Full Article
attack Undercurrents: Episode 33 - Chinese Millennials, and Attacks on Infrastructure in Gaza By feedproxy.google.com Published On :: Thu, 16 May 2019 00:00:00 +0100 Full Article
attack It’s unlikely Latin America is at risk of an Iranian proxy attack. However . . . By feedproxy.google.com Published On :: Wed, 15 Jan 2020 12:32:39 +0000 Source The Miami Herald URL https://www.miamiherald.com/opinion/op-ed/article239105468.html Release date 10 January 2020 Expert Dr Christopher Sabatini In the news type Op-ed Hide date on homepage Full Article
attack Iran attack: Who are the winners and losers in the crisis? By feedproxy.google.com Published On :: Tue, 21 Jan 2020 14:30:37 +0000 Source BBC URL https://www.bbc.co.uk/news/world-middle-east-51012268 Release date 09 January 2020 Expert Dr Sanam Vakil In the news type Op-ed Hide date on homepage Full Article
attack These Iraqi militias are attacking protesters and getting away with it. Here’s why. By feedproxy.google.com Published On :: Tue, 21 Jan 2020 14:31:50 +0000 Source The Washington Post URL https://www.washingtonpost.com/politics/2019/11/18/these-iraqi-militias-are-atta... Release date 18 November 2019 Expert Dr Renad Mansour In the news type Op-ed Hide date on homepage Full Article
attack Fly ash geopolymer concrete: Significantly enhanced resistance to extreme alkali attack By www.eurekalert.org Published On :: Wed, 06 May 2020 00:00:00 EDT (University of Johannesburg) Fly ash generated by coal-fired power stations is a global environmental headache, creating groundwater and air pollution from vast landfills and ash dams. The waste product can be repurposed into geopolymer concrete, such as precast heat-cured structural elements for buildings. However, a critical durability problem has been low resistance to extreme alkali attack. UJ researchers found that high temperature heat-treatment at 200 degrees Celsius can halve this harmful mechanism in fly ash geopolymer concretes. Full Article
attack Fossil reveals evidence of 200-million-year-old 'squid' attack By www.eurekalert.org Published On :: Wed, 06 May 2020 00:00:00 EDT (University of Plymouth) Researchers say a fossil found on the Jurassic coast of southern England in the 19th century demonstrates the world's oldest known example of a squid-like creature attacking its prey. Full Article
attack Bolton’s Attack on the International Criminal Court May Backfire By feedproxy.google.com Published On :: Thu, 20 Sep 2018 11:48:10 +0000 20 September 2018 Dr Max du Plessis SC Associate Fellow, International Law Programme The US national security advisor’s recent threats look damaging but they may in fact strengthen support for the ICC from other states. 2018-09-20-Bolton.jpg John Bolton speaks to the Federalist Society on 10 September. Photo: Getty Images. On 10 September, US National Security Advisor John Bolton used his first major speech since joining the White House to attack the International Criminal Court’s (ICC) potential investigation of American personnel in Afghanistan. The ‘American patriots’, as Bolton describes them, are being investigated for potential torture and ill-treatment of detainees, mostly in 2003 and 2004, during the United States-led invasion of the country.Bolton has a long history of opposition to the ICC. Although the US signed the ICC Statute under president Bill Clinton, it was ‘unsigned’ by Bolton, then an under-secretary of state in the George W Bush administration.And when the court first opened its doors in 2002, Bolton helped secure, in what he described on 10 September as one of his ‘proudest achievements’, around 100 bilateral agreements with other countries to prevent them from delivering US personnel to the ICC. Those agreements were often extracted under pressure, with the US threatening to cut off military and other aid to countries that refused to sign.In recent years under the Obama administration, relations between the US and the ICC improved, and the US offered help and support to the court. Bolton’s attack is aimed at reversing those gains – with measures aimed directly at the court and its staff.These include: (i) negotiating ‘even more binding, bilateral agreements to prohibit nations from surrendering US persons to the ICC’; (ii) banning ICC judges and prosecutors from entering the US, sanctioning their funds in the US financial system and prosecuting them in the US criminal courts (and doing the ‘same for any company or state that assists an ICC investigation of Americans’); and (iii) ‘taking note if any countries cooperate with ICC investigations of the United States and its allies, and remember[ing] that cooperation when setting US foreign assistance, military assistance and intelligence sharing levels’.These are serious threats – they would potentially undermine the work of a court that is designed to prosecute the world’s worst crimes. The ICC prosecutor and its judges would be barred entry from the US to attend to vital work of the court.Some of that work, ironically, is at the behest of the US. For instance, two of the UN Security Council’s referrals to the ICC, one in relation to atrocities committed in Sudan, the other in respect of the crimes committed by Muammar Gaddafi in Libya, were referred with US support. Also, the meetings of the ICC Assembly of States Parties are held each year at UN headquarters in New York. Those meetings may have to be held elsewhere if the ICC judges and staff are under threat of arrest.In the case of the potential torture linked to operations in Afghanistan, the ICC has not been acting on its own initiative in investigating. For example, the Center for Constitutional Rights submitted ‘victim’s representations’ to the ICC on behalf of two of their clients, Sharqawi Al Hajj and Guled Hassan Duran, emphasizing the importance of an ICC investigation of US officials for serious crimes arising out of post-9/11 detention and interrogations.According to the center, both Al Hajj and Duran were detained by the CIA in black sites or 'proxy-detention' by other countries, tormented and tortured.Although the US is not a party to the ICC Statute, Afghanistan is, and therefore the court has jurisdiction over US nationals who allegedly committed atrocities in Afghanistan. And it should be noted that the investigation includes pursuing any atrocities committed by the Taliban and Afghan security forces during the same period.So the basis for attacking the work of the ICC based on this is shaky, and Bolton’s threats raise a number of important international law questions going forward. For one, they may be unlawful retaliatory steps, given that the US has obligations to accord at least some privileges and immunities to judges and other personnel of the ICC under the 1947 UN Headquarters Agreement between the UN and US. Counter-measures might be considered by member states of the ICC, either alone, or collectively. In this regard, Bolton’s comments about the EU will not go unnoticed: he suggests Europe is a region where ‘the global governance dogma is strong’. The US may yet come to learn just how strong that ‘dogma’ is.With US abstention from the ICC, the opening remains for Europe and other regions to position themselves at the heart of the international criminal justice regime, thereby – as in response to the US attitude towards climate change – building a network of partnerships with other like-minded nations to compensate for US disengagement.Further, while the ICC has many critics, and could be improved as an institution, Bolton’s speech may have the effect of galvanizing support for the world’s first permanent international criminal court. That could be a good thing for the court, which is sorely in need of support for its work.Whatever concerns states may have about the ICC, they may be outweighed by a mutual desire to stand up to perceived bullying by the Trump administration, in favour of the international rule of law. Full Article
attack Sovereignty and Non-Intervention: The Application of International Law to State Cyberattacks By feedproxy.google.com Published On :: Fri, 01 Nov 2019 10:55:01 +0000 Research Event 4 December 2019 - 5:30pm to 7:00pm Chatham House | 10 St James's Square | London | SW1Y 4LE Event participants Douglas, Legal Director, GCHQZhixiong Huang, Luojia Chair of International Law, Wuhan UniversityNemanja Malisevic, Director of Digital Diplomacy, MicrosoftHarriet Moynihan, Associate Fellow, International Law Programme, Chatham HouseChair: Elizabeth Wilmshurst, Distinguished Fellow, International Law Programme, Chatham House International law applies to cyber operations – but views differ on exactly how. Does state-sponsored interference in another state's affairs using cyber means – for example, disinformation campaigns in elections, disabling government websites, or disrupting transport systems – breach international law? If so, on what basis and how are the principles of sovereignty and non-intervention relevant? States are increasingly attributing cyber operations to other states and engaging in the debate on how international law applies, including circumstances that would justify countermeasures.As states meet to debate these issues at the UN, the panel will explore how international law regulates cyberoperations by states, consider the prospects of progress at the UN, and assess the value of other initiatives.This event coincides with the launch of a Chatham House research paper which analyses how the principles of sovereignty and intervention apply in the context of cyberoperations, and considers a way forward for agreeing a common understanding of cyber norms.This event will bring together a broad group of actors, including policymakers, the private sector, legal experts and civil society, and will be followed by a drinks reception. Department/project International Law Programme, Cyber, Sovereignty and Human Rights Jacqueline Rowe Programme Assistant, International Law Programme 020 7389 3287 Email Full Article
attack The Application of International Law to State Cyberattacks: Sovereignty and Non-Intervention By feedproxy.google.com Published On :: Fri, 29 Nov 2019 16:56:12 +0000 2 December 2019 Hostile cyber operations by one state against another state are increasingly common. This paper analyzes the application of the sovereignty and non-intervention principles in relation to states’ cyber operations in another state below the threshold of the use of force. Read online Download PDF Harriet Moynihan Senior Research Fellow, International Law Programme @HarrietMoyniha9 2019-11-29-Intl-Law-Cyberattacks.jpg A computer hacked by a virus known as Petya. The Petya ransomware cyberattack hit computers of Russian and Ukrainian companies on 27 June 2017. Photo: Getty Images. SummaryThe vast majority of state-to-state cyberattacks consist of persistent, low-level intrusions that take place below the threshold of use of force. International law, including the principle of non-intervention in another state’s internal affairs and the principle of sovereignty, applies to these cyber operations.It is not clear whether any unauthorized cyber intrusion would violate the target state’s sovereignty, or whether there is a threshold in operation. While some would like to set limits by reference to effects of the cyber activity, at this time such limits are not reflected in customary international law. The assessment of whether sovereignty has been violated therefore has to be made on a case by case basis, if no other more specific rules of international law apply.In due course, further state practice and opinio iuris may give rise to an emerging cyber-specific understanding of sovereignty, just as specific rules deriving from the sovereignty principle have crystallized in other areas of international law.Before a principle of due diligence can be invoked in the cyber context, further work is needed by states to agree upon rules as to what might be expected of a state in this context.The principle of non-intervention applies to a state’s cyber operations as it does to other state activities. It consists of coercive behaviour by one state that deprives the target state of its free will in relation to the exercise of its sovereign functions in order to compel an outcome in, or conduct with respect to, a matter reserved to the target state.In practice, activities that contravene the non-intervention principle and activities that violates sovereignty will often overlap.In order to reach agreement on how international law applies to states’ cyber operations below the level of use of force, states should put their views on record, where possible giving examples of when they consider that an obligation may be breached, as states such as the UK, Australia, France and the Netherlands have done.Further discussion between states should focus on how the rules apply to practical examples of state-sponsored cyber operations. There is likely to be more commonality about specific applications of the law than there is about abstract principles.The prospects of a general treaty in this area are still far off. In due course, there may be benefit in considering limited rules, for example on due diligence and a prohibition on attacking critical infrastructure, before tackling broad principles. Department/project International Law Programme, Cyber, Sovereignty and Human Rights Full Article
attack The Destabilizing Danger of Cyberattacks on Missile Systems By feedproxy.google.com Published On :: Tue, 02 Jul 2019 08:40:06 +0000 2 July 2019 Dr Patricia Lewis Research Director, Conflict, Science & Transformation; Director, International Security Programme @PatriciaMary Dr Beyza Unal Senior Research Fellow, International Security Programme @beyzaunal Google Scholar ‘Left-of-launch’ attacks that aim to disable enemy missile systems may increase the chance of them being used, not least because the systems are so vulnerable. 2019-07-02-NKMissile.jpg This undated photo released by North Korea's news agency in March 2017 shows the launch of four ballistic missiles during a military drill at an undisclosed location in North Korea. Photo: STR/AFP/Getty Images. After President Trump decided to halt a missile attack on Iran in response to the downing of a US drone, it was revealed that the US had conducted cyberattacks on Iranian weapons systems to prevent Iran launching missiles against US assets in the region.This ‘left-of-launch’ strategy – the pre-emptive action to prevent an adversary launch missiles – has been part of the US missile defence strategy for some time now. President George W Bush asked the US military and intelligence community to infiltrate the supply chain of North Korean missiles. It was claimed that the US hacked the North Korean ballistic missile programme, causing a failed ballistic missile test, in 2012.It was not clear then – or now – whether these ‘left-of-launch’ cyberattacks aimed at North Korea were successful as described or whether they were primarily a bluff. But that is somewhat irrelevant; the belief in the possibility and the understanding of the potential impact of such cyber capabilities undermines North Korean or Iranian confidence in their abilities to launch their missiles. In times of conflict, loss of confidence in weapons systems may lead to escalation.In other words, the adversary may be left with no option but to take the chance to use these missiles or to lose them in a conflict setting. ‘Left of launch’ is a dangerous game. If it is based on a bluff, it could be called upon and lead to deterrence failure. If it is based on real action, then it could create an asymmetrical power struggle. If the attacker establishes false confidence in the power of a cyber weapon, then it might lead to false signalling and messaging.This is the new normal. The cat-and-mouse game has to be taken seriously, not least because missile systems are so vulnerable.There are several ways an offensive cyber operation against missile systems might work. These include exploiting missile designs, altering software or hardware, or creating clandestine pathways to the missile command and control systems.They can also be attacked in space, targeting space assets and their link to strategic systems.Most missile systems rely, at least in part, on digital information that comes from or via space-based or space-dependent assets such as: communication satellites; satellites that provide position, navigation and timing (PNT) information (for example GPS or Galileo); weather satellites to help predict flight paths, accurate targeting and launch conditions; and remote imagery satellites to assist with information and intelligence for the planning and targeting.Missile launches themselves depend on 1) the command and control systems of the missiles, 2) the way in which information is transmitted to the missile launch facilities and 3) the way in which information is transmitted to the missiles themselves in flight. All these aspects rely on space technology.In addition, the ground stations that transmit and receive data to and from satellites are also vulnerable to cyberattack – either through their known and unknown internet connectivity or through malicious use of flash drives that contain a deliberate cyber infection.Non-space-based communications systems that use cable and ground-to-air-to-ground masts are likewise under threat from cyberattacks that find their way in via internet connectivity, proximity interference or memory sticks. Human error in introducing connectivity via phones, laptops and external drives, and in clicking on malicious links in sophisticated phishing lures, is common in facilitating inadvertent connectivity and malware infection.All of these can create a military capacity able to interfere with missile launches. Malware might have been sitting on the missile command and control system for months or even years, remaining inactivated until a chosen time or by a trigger that sets in motion a disruption either to the launch or to the flight path of the missile. The country that launches the missile that either fails to launch or fails to reach the target may never know if this was the result of a design flaw, a common malfunction or a deliberate cyberattack.States with these capabilities must exercise caution: cyber offence manoeuvres may prevent the launch of missile attacks against US assets in the Middle East or in the Pacific regions, but they may also interfere with US missile launches in the future. Even, as has recently been revealed, US cyber weapons targeting an adversary may blow back and inadvertently infect US systems. Nobody is invulnerable. Full Article
attack Identity fraudsters attack Tax Office at least 11,000 times in one year By www.smh.com.au Published On :: Tue, 03 Nov 2015 13:55:23 GMT The ATO has been targeted more than 11,000 times by identity fraudsters attempting to steal tax refunds in 2014-15. Full Article
attack Australia vulnerable to a cyber-attack disaster By www.smh.com.au Published On :: Fri, 13 Nov 2015 06:06:57 GMT Australian government agencies and organisations are increasingly vulnerable to a major cyber attack yet security has not evolved in more than 20 years, according to an international cybercrime expert. Full Article
attack Call for a cyber security reserve corps to help fight major attacks By www.smh.com.au Published On :: Mon, 15 Aug 2016 14:15:00 GMT Experienced volunteers would help fight major online threats to governments, private industry and civil institutions. Full Article
attack ATO fumes after cyber criminals attack myGov portal during last days of Tax Time 2016 By www.smh.com.au Published On :: Thu, 03 Nov 2016 13:15:00 GMT Tensions emerge between Tax Office and Human Services after hackers take down myGov Full Article
attack Calculations for an Air Attack on Iran: Bombs Away? By feedproxy.google.com Published On :: Mon, 27 Apr 2020 12:36:20 +0000 1 March 2007 , Number 1 The Iranian nuclear site at Natanz is already one of the most protected places on earth, and the apparently never-ending diplomatic minuet over Iran’s nuclear activities may be no more than Tehran stringing out negotiations until its nuclear protection programme is complete. Andrew Brookes Former Royal Air Force bomber pilot GettyImages-1179034669.jpg An Iranian man carries a placard in support of nuclear technology during a rally to mark the 28th anniversary of the Islamic revolution Full Article
attack Crimea’s Occupation Exemplifies the Threat of Attacks on Cultural Heritage By feedproxy.google.com Published On :: Tue, 04 Feb 2020 14:24:47 +0000 4 February 2020 Kateryna Busol Robert Bosch Stiftung Academy Fellow, Russia and Eurasia Programme @KaterynaBusol LinkedIn Societies, courts and policymakers should have a clearer awareness that assaults against cultural heritage constitute a creeping encroachment on a people’s identity, endangering its very survival. 2020-02-04-Bakhchysarai.jpg 'The destructive reconstruction of the 16th-century Bakhchysarai Palace is being conducted by a team with no experience of cultural sites, in a manner that erodes its authenticity and historical value.' Photo: Getty Images. Violations against cultural property – such as archaeological treasures, artworks, museums or historical sites – can be no less detrimental to the survival of a nation than the physical persecution of its people. These assaults on heritage ensure the hegemony of some nations and distort the imprint of other nations in world history, sometimes to the point of eradication.As contemporary armed conflicts in Syria, Ukraine and Yemen demonstrate, cultural property violations are not only a matter of the colonial past; they continue to be perpetrated, often in new, intricate ways.Understandably, from a moral perspective, it is more often the suffering of persons, rather than any kind of ‘cultural’ destruction, that receives the most attention from humanitarian aid providers, the media or the courts. Indeed, the extent of the damage caused by an assault on cultural property is not always immediately evident, but the result can be a threat to the survival of a people. This is strikingly exemplified by what is currently happening in Crimea.Ukraine’s Crimean peninsula has been occupied by Russia since February 2014, meaning that, under international law, the two states have been involved in an international armed conflict for the last six years.While much attention has been paid to the alleged war crimes perpetrated by the occupying power, reports by international organizations and the International Criminal Court (ICC) have been less vocal on the issue of cultural property in Crimea. Where they do raise it, they tend to confine their findings to the issue of misappropriation.However, as part of its larger policy of the annexation and Russification of the peninsula and its history, Russia has gone far beyond misappropriation.Crimean artefacts have been transferred to Russia – without security justification or Ukrainian authorization as required by the international law of occupation – to be showcased at exhibitions celebrating Russia’s own cultural heritage. In 2016, the Tretyakov Gallery in Moscow staged its record-breaking Aivazovsky exhibition, which included 38 artworks from the Aivazovsky Museum in the Crimean town of Feodosia.Other ‘cultural’ violations in the region include numerous unsanctioned archaeological excavations, whose findings are often unlawfully exported to Russia or end up on the black market.There is also the example of Russia’s plan to establish a museum of Christianity in Ukraine’s UNESCO World Heritage site, the Ancient City of Tauric Chersonese. This is an indication of Russia’s policy of asserting itself as a bastion of Orthodox Christianity and culture in the Slavic world, with Crimea as one of the centres.The harmful effects of Russia’s destructive cultural property policy can be seen in the situation of the Crimean Tatars, Ukraine’s indigenous Muslim people. Already depleted by a Stalin-ordered deportation in 1944 and previously repressed by the Russian Empire, the Crimean Tatars are now facing the destruction of much of the remainder of their heritage.For example, Muslim burial grounds have been demolished to build the Tavrida Highway, which leads to the newly built Kerch Bridge connecting the peninsula to Russia.The destructive reconstruction of the 16th-century Bakhchysarai Palace – the only remaining complete architectural ensemble of the indigenous people, included in the UNESCO World Heritage Tentative List – is another example of how the very identity of the Crimean Tatars is being threatened. This reconstruction is being conducted by a team with no experience of cultural sites, in a manner that erodes its authenticity and historical value – which is precisely as Russia intends.There is a solid body of international and domestic law covering Russia’s treatment of Crimea’s cultural property.Under the 1954 Hague Convention for the Protection of Cultural Property in the Event of Armed Conflict – ratified by both Ukraine and Russia – the occupying power must facilitate the safeguarding efforts of the national authorities in occupied territories. States parties must prevent any vandalism or misappropriation of cultural property, and, according to the first protocol of the convention, the occupying power is required to prevent any export of artefacts from the occupied territory.The 1907 Hague Regulations and the 1949 Fourth Geneva Convention confirm that the authentic domestic legislation continues to apply in occupied territories. This leaves Russia with no excuse for non-compliance with Ukraine’s cultural property laws and imposing its own rules unless absolutely necessary.Besides, both Ukrainian and Russian criminal codes penalise pillage in occupied territory, as well as unsanctioned archaeological excavations. As an occupying power, Russia must not just abstain from such wrongdoings in Crimea, but also duly investigate and prosecute the alleged misconduct.The clarity of the international legal situation demonstrates that no exhibitions in continental Russia and no archaeological excavations which are not sanctioned by Ukraine can be justified. Likewise, any renovation or use of cultural sites, especially those on permanent or tentative UNESCO lists, must only be conducted pursuant to consultancy with and approval of the Ukrainian authorities.But the resonance of the Crimean case goes beyond law and touches on issues of the very survival of a people. The Soviet deportation of the Crimean Tatars in 1944 did not only result in the deaths of individuals. Their footprints in Crimea have been gradually erased by baseless treason charges, the long exile of the indigenous community from their native lands and ongoing persecution.First the Soviet Union and now Russia have targeted the Crimean Tatars’ cultural heritage to undermine their significance in the general historical narrative, making attempts to preserve or celebrate this culture seem futile. Russia is thus imposing its own historical and political hegemony at the expense of the Crimean Tatar and Ukrainian layers of Crimean history.As exemplified by occupied Crimea, the manipulation and exploitation of cultural heritage can serve an occupying power’s wider policies of appropriating history and asserting its own dominance. Domestic cultural property proceedings are challenging due to the lack of access to the occupied territory, but they should still be pursued.More effort is needed in the following areas: case prioritization; informing the documenters of alleged violations about the spectrum of cultural property crimes; developing domestic investigative and prosecutorial capacity, including by involving foreign expert consultancy; more proactively seeking bilateral and multilateral cooperation in art crime cases; liaising with auction houses (to track down objects originating from war-affected areas) and museums (to prevent the exhibition of the artefacts from occupied territories).When possible, cultural property crimes should also be reported to the ICC.Additionally, more international – public, policy, media and jurisprudential – attention to such violations is needed. Societies, courts and policymakers should have a clearer awareness that assaults against cultural heritage constitute a creeping encroachment on a people’s identity, endangering its very survival. Full Article
attack Sovereignty and Non-Intervention: The Application of International Law to State Cyberattacks By feedproxy.google.com Published On :: Fri, 01 Nov 2019 10:55:01 +0000 Research Event 4 December 2019 - 5:30pm to 7:00pm Chatham House | 10 St James's Square | London | SW1Y 4LE Event participants Douglas, Legal Director, GCHQZhixiong Huang, Luojia Chair of International Law, Wuhan UniversityNemanja Malisevic, Director of Digital Diplomacy, MicrosoftHarriet Moynihan, Associate Fellow, International Law Programme, Chatham HouseChair: Elizabeth Wilmshurst, Distinguished Fellow, International Law Programme, Chatham House International law applies to cyber operations – but views differ on exactly how. Does state-sponsored interference in another state's affairs using cyber means – for example, disinformation campaigns in elections, disabling government websites, or disrupting transport systems – breach international law? If so, on what basis and how are the principles of sovereignty and non-intervention relevant? States are increasingly attributing cyber operations to other states and engaging in the debate on how international law applies, including circumstances that would justify countermeasures.As states meet to debate these issues at the UN, the panel will explore how international law regulates cyberoperations by states, consider the prospects of progress at the UN, and assess the value of other initiatives.This event coincides with the launch of a Chatham House research paper which analyses how the principles of sovereignty and intervention apply in the context of cyberoperations, and considers a way forward for agreeing a common understanding of cyber norms.This event will bring together a broad group of actors, including policymakers, the private sector, legal experts and civil society, and will be followed by a drinks reception. Department/project International Law Programme, Cyber, Sovereignty and Human Rights Jacqueline Rowe Programme Assistant, International Law Programme 020 7389 3287 Email Full Article
attack The Application of International Law to State Cyberattacks: Sovereignty and Non-Intervention By feedproxy.google.com Published On :: Fri, 29 Nov 2019 16:56:12 +0000 2 December 2019 Hostile cyber operations by one state against another state are increasingly common. This paper analyzes the application of the sovereignty and non-intervention principles in relation to states’ cyber operations in another state below the threshold of the use of force. Read online Download PDF Harriet Moynihan Senior Research Fellow, International Law Programme @HarrietMoyniha9 2019-11-29-Intl-Law-Cyberattacks.jpg A computer hacked by a virus known as Petya. The Petya ransomware cyberattack hit computers of Russian and Ukrainian companies on 27 June 2017. Photo: Getty Images. SummaryThe vast majority of state-to-state cyberattacks consist of persistent, low-level intrusions that take place below the threshold of use of force. International law, including the principle of non-intervention in another state’s internal affairs and the principle of sovereignty, applies to these cyber operations.It is not clear whether any unauthorized cyber intrusion would violate the target state’s sovereignty, or whether there is a threshold in operation. While some would like to set limits by reference to effects of the cyber activity, at this time such limits are not reflected in customary international law. The assessment of whether sovereignty has been violated therefore has to be made on a case by case basis, if no other more specific rules of international law apply.In due course, further state practice and opinio iuris may give rise to an emerging cyber-specific understanding of sovereignty, just as specific rules deriving from the sovereignty principle have crystallized in other areas of international law.Before a principle of due diligence can be invoked in the cyber context, further work is needed by states to agree upon rules as to what might be expected of a state in this context.The principle of non-intervention applies to a state’s cyber operations as it does to other state activities. It consists of coercive behaviour by one state that deprives the target state of its free will in relation to the exercise of its sovereign functions in order to compel an outcome in, or conduct with respect to, a matter reserved to the target state.In practice, activities that contravene the non-intervention principle and activities that violates sovereignty will often overlap.In order to reach agreement on how international law applies to states’ cyber operations below the level of use of force, states should put their views on record, where possible giving examples of when they consider that an obligation may be breached, as states such as the UK, Australia, France and the Netherlands have done.Further discussion between states should focus on how the rules apply to practical examples of state-sponsored cyber operations. There is likely to be more commonality about specific applications of the law than there is about abstract principles.The prospects of a general treaty in this area are still far off. In due course, there may be benefit in considering limited rules, for example on due diligence and a prohibition on attacking critical infrastructure, before tackling broad principles. Department/project International Law Programme, Cyber, Sovereignty and Human Rights Full Article
attack Crimea’s Occupation Exemplifies the Threat of Attacks on Cultural Heritage By feedproxy.google.com Published On :: Tue, 04 Feb 2020 14:24:47 +0000 4 February 2020 Kateryna Busol Robert Bosch Stiftung Academy Fellow, Russia and Eurasia Programme @KaterynaBusol LinkedIn Societies, courts and policymakers should have a clearer awareness that assaults against cultural heritage constitute a creeping encroachment on a people’s identity, endangering its very survival. 2020-02-04-Bakhchysarai.jpg 'The destructive reconstruction of the 16th-century Bakhchysarai Palace is being conducted by a team with no experience of cultural sites, in a manner that erodes its authenticity and historical value.' Photo: Getty Images. Violations against cultural property – such as archaeological treasures, artworks, museums or historical sites – can be no less detrimental to the survival of a nation than the physical persecution of its people. These assaults on heritage ensure the hegemony of some nations and distort the imprint of other nations in world history, sometimes to the point of eradication.As contemporary armed conflicts in Syria, Ukraine and Yemen demonstrate, cultural property violations are not only a matter of the colonial past; they continue to be perpetrated, often in new, intricate ways.Understandably, from a moral perspective, it is more often the suffering of persons, rather than any kind of ‘cultural’ destruction, that receives the most attention from humanitarian aid providers, the media or the courts. Indeed, the extent of the damage caused by an assault on cultural property is not always immediately evident, but the result can be a threat to the survival of a people. This is strikingly exemplified by what is currently happening in Crimea.Ukraine’s Crimean peninsula has been occupied by Russia since February 2014, meaning that, under international law, the two states have been involved in an international armed conflict for the last six years.While much attention has been paid to the alleged war crimes perpetrated by the occupying power, reports by international organizations and the International Criminal Court (ICC) have been less vocal on the issue of cultural property in Crimea. Where they do raise it, they tend to confine their findings to the issue of misappropriation.However, as part of its larger policy of the annexation and Russification of the peninsula and its history, Russia has gone far beyond misappropriation.Crimean artefacts have been transferred to Russia – without security justification or Ukrainian authorization as required by the international law of occupation – to be showcased at exhibitions celebrating Russia’s own cultural heritage. In 2016, the Tretyakov Gallery in Moscow staged its record-breaking Aivazovsky exhibition, which included 38 artworks from the Aivazovsky Museum in the Crimean town of Feodosia.Other ‘cultural’ violations in the region include numerous unsanctioned archaeological excavations, whose findings are often unlawfully exported to Russia or end up on the black market.There is also the example of Russia’s plan to establish a museum of Christianity in Ukraine’s UNESCO World Heritage site, the Ancient City of Tauric Chersonese. This is an indication of Russia’s policy of asserting itself as a bastion of Orthodox Christianity and culture in the Slavic world, with Crimea as one of the centres.The harmful effects of Russia’s destructive cultural property policy can be seen in the situation of the Crimean Tatars, Ukraine’s indigenous Muslim people. Already depleted by a Stalin-ordered deportation in 1944 and previously repressed by the Russian Empire, the Crimean Tatars are now facing the destruction of much of the remainder of their heritage.For example, Muslim burial grounds have been demolished to build the Tavrida Highway, which leads to the newly built Kerch Bridge connecting the peninsula to Russia.The destructive reconstruction of the 16th-century Bakhchysarai Palace – the only remaining complete architectural ensemble of the indigenous people, included in the UNESCO World Heritage Tentative List – is another example of how the very identity of the Crimean Tatars is being threatened. This reconstruction is being conducted by a team with no experience of cultural sites, in a manner that erodes its authenticity and historical value – which is precisely as Russia intends.There is a solid body of international and domestic law covering Russia’s treatment of Crimea’s cultural property.Under the 1954 Hague Convention for the Protection of Cultural Property in the Event of Armed Conflict – ratified by both Ukraine and Russia – the occupying power must facilitate the safeguarding efforts of the national authorities in occupied territories. States parties must prevent any vandalism or misappropriation of cultural property, and, according to the first protocol of the convention, the occupying power is required to prevent any export of artefacts from the occupied territory.The 1907 Hague Regulations and the 1949 Fourth Geneva Convention confirm that the authentic domestic legislation continues to apply in occupied territories. This leaves Russia with no excuse for non-compliance with Ukraine’s cultural property laws and imposing its own rules unless absolutely necessary.Besides, both Ukrainian and Russian criminal codes penalise pillage in occupied territory, as well as unsanctioned archaeological excavations. As an occupying power, Russia must not just abstain from such wrongdoings in Crimea, but also duly investigate and prosecute the alleged misconduct.The clarity of the international legal situation demonstrates that no exhibitions in continental Russia and no archaeological excavations which are not sanctioned by Ukraine can be justified. Likewise, any renovation or use of cultural sites, especially those on permanent or tentative UNESCO lists, must only be conducted pursuant to consultancy with and approval of the Ukrainian authorities.But the resonance of the Crimean case goes beyond law and touches on issues of the very survival of a people. The Soviet deportation of the Crimean Tatars in 1944 did not only result in the deaths of individuals. Their footprints in Crimea have been gradually erased by baseless treason charges, the long exile of the indigenous community from their native lands and ongoing persecution.First the Soviet Union and now Russia have targeted the Crimean Tatars’ cultural heritage to undermine their significance in the general historical narrative, making attempts to preserve or celebrate this culture seem futile. Russia is thus imposing its own historical and political hegemony at the expense of the Crimean Tatar and Ukrainian layers of Crimean history.As exemplified by occupied Crimea, the manipulation and exploitation of cultural heritage can serve an occupying power’s wider policies of appropriating history and asserting its own dominance. Domestic cultural property proceedings are challenging due to the lack of access to the occupied territory, but they should still be pursued.More effort is needed in the following areas: case prioritization; informing the documenters of alleged violations about the spectrum of cultural property crimes; developing domestic investigative and prosecutorial capacity, including by involving foreign expert consultancy; more proactively seeking bilateral and multilateral cooperation in art crime cases; liaising with auction houses (to track down objects originating from war-affected areas) and museums (to prevent the exhibition of the artefacts from occupied territories).When possible, cultural property crimes should also be reported to the ICC.Additionally, more international – public, policy, media and jurisprudential – attention to such violations is needed. Societies, courts and policymakers should have a clearer awareness that assaults against cultural heritage constitute a creeping encroachment on a people’s identity, endangering its very survival. Full Article
attack Defending evidence informed policy making from ideological attack By feeds.bmj.com Published On :: Mon, 17 Sep 2018 16:00:21 +0000 If you’re of a scientific persuasion, watching policy debates around Brexit, or climate change, or drug prohibition are likely to cause feelings of intense frustration about the dearth of evidence in those discussions. In this podcast we're joined by Chris Bonell, professor of public health sociology - in this podcast he airs those frustrations,... Full Article
attack Arkansas Provides K-12 Districts With Volunteer IT Team to Fight Cyber Attacks By feedproxy.google.com Published On :: Fri, 01 Nov 2019 00:00:00 +0000 The Arkansas Department of Education will now provide on-site help for schools and districts in the state that are experiencing cybersecurity incidents. Full Article Arkansas
attack An episode in The merry wives of Windsor: Sir John Falstaff is invited to a tryst in Windsor Forest at night, dressed in bizarre clothing: he is attacked by children dressed as fairies and by the merry wives. Stipple engraving by I. Taylor, 1795, after R. By feedproxy.google.com Published On :: [London], [1795] Full Article
attack The flight of Francesco Novello di Carrara, Lord of Padua, with his wife Taddea D'Este, from Padua under attack by Milan. Engraving by F. Bacon, 1839, after C.L. Eastlake. By feedproxy.google.com Published On :: London (No. 18 & 19 Southampton Place, Euston Square, New Road) : Published ... by the proprietors [E. & W. Finden], May 1, 1839. Full Article
attack The flight of Francesco Novello di Carrara, Lord of Padua, with his wife Taddea D'Este, from Padua under attack by Milan. Engraving by F. Bacon after C.L. Eastlake. By feedproxy.google.com Published On :: [London?] : Cassell & Company Limited, [between 1800 and 1899] Full Article
attack Evil eye : to protect use red thread : images of eyes being attacked. By search.wellcomelibrary.org Published On :: [London] : [publisher not identified], [2019] Full Article
attack Greedy Attack and Gumbel Attack: Generating Adversarial Examples for Discrete Data By Published On :: 2020 We present a probabilistic framework for studying adversarial attacks on discrete data. Based on this framework, we derive a perturbation-based method, Greedy Attack, and a scalable learning-based method, Gumbel Attack, that illustrate various tradeoffs in the design of attacks. We demonstrate the effectiveness of these methods using both quantitative metrics and human evaluation on various state-of-the-art models for text classification, including a word-based CNN, a character-based CNN and an LSTM. As an example of our results, we show that the accuracy of character-based convolutional networks drops to the level of random selection by modifying only five characters through Greedy Attack. Full Article
attack MAZE: Data-Free Model Stealing Attack Using Zeroth-Order Gradient Estimation. (arXiv:2005.03161v1 [stat.ML]) By arxiv.org Published On :: Model Stealing (MS) attacks allow an adversary with black-box access to a Machine Learning model to replicate its functionality, compromising the confidentiality of the model. Such attacks train a clone model by using the predictions of the target model for different inputs. The effectiveness of such attacks relies heavily on the availability of data necessary to query the target model. Existing attacks either assume partial access to the dataset of the target model or availability of an alternate dataset with semantic similarities. This paper proposes MAZE -- a data-free model stealing attack using zeroth-order gradient estimation. In contrast to prior works, MAZE does not require any data and instead creates synthetic data using a generative model. Inspired by recent works in data-free Knowledge Distillation (KD), we train the generative model using a disagreement objective to produce inputs that maximize disagreement between the clone and the target model. However, unlike the white-box setting of KD, where the gradient information is available, training a generator for model stealing requires performing black-box optimization, as it involves accessing the target model under attack. MAZE relies on zeroth-order gradient estimation to perform this optimization and enables a highly accurate MS attack. Our evaluation with four datasets shows that MAZE provides a normalized clone accuracy in the range of 0.91x to 0.99x, and outperforms even the recent attacks that rely on partial data (JBDA, clone accuracy 0.13x to 0.69x) and surrogate data (KnockoffNets, clone accuracy 0.52x to 0.97x). We also study an extension of MAZE in the partial-data setting and develop MAZE-PD, which generates synthetic data closer to the target distribution. MAZE-PD further improves the clone accuracy (0.97x to 1.0x) and reduces the query required for the attack by 2x-24x. Full Article
attack How Napalm Bombs Intensified U.S. Attacks During WWII By www.smithsonianmag.com Published On :: Thu, 30 Aug 2018 12:00:00 +0000 Bombing ground targets from the air is tricky and not always accurate. But a new type of bomb creates an unimaginable level of destruction Full Article
attack This U.S. Sub Launched an Attack on a Japanese Train By www.smithsonianmag.com Published On :: Tue, 04 Sep 2018 12:00:00 +0000 The USS Barb had an unusual target in its sights in 1945 - one that wasn't even in the water. It was a Japanese supply train on the island of Karafuto Full Article
attack Rumor: 'watchOS 7' could help Apple Watch detect panic attacks By appleinsider.com Published On :: Fri, 08 May 2020 20:35:17 -0400 Apple is supposedly developing new mental health features for the Apple Watch line that allow the wearable to detect panic attacks, with the capability potentially slated for launch with a next-generation "watchOS 7" this fall. Full Article Apple Watch
attack Counterattack drill By www.uefa.com Published On :: Tue, 03 Apr 2012 09:10:00 GMT Catch your opponents cold by improving your team's counterattack with this training exercise. Full Article