Wednesday, February 12, 2020

Pacific Light Cable Network (PLCN) cable and why it delayed

There's been a lot of press about delayed approval for the
Pacific Light Cable Network (PLCN) cable, which is due to connect Hong Kong, Taiwan, and the Philippines to the United States.
You can understand why this cable has gotten extra attention. Backers include Google, Facebook, and Pacific Light Data Communication (PLDC), which is owned by Chinese ISP Dr. Peng Telecom & Media Group.
While the whole system is awaiting approval from U.S. authorities, Google and Facebook have requested that the FCC allow activation of the Taiwan and Philippines portions of the cable.
There are many regulatory and political issues at play, but I felt a bit of background on the trans-Pacific cable market is warranted amid these headlines.
As you read more about the PLCN, keep these four facts in mind.
Several submarine cables already connect China and the United States
PLCN would not be the first cable to link Hong Kong, or even mainland China, to the U.S. Existing cables include:
Trans Pacific Express (TPE): this cable entered service in 2008
Asia-America Gateway (AAG) : activated in 2009, this cable links many southeast Asian countries to the U.S. with landings in Hong Kong, Guam, Hawaii, and American West Cost.
New Cross Pacific (NCP) : the most recent cable to enter service in the Pacific, this cable connects China, South Korea, Taiwan, and Japan to the U.S.
Direct cables are not the only way data can travel between China and the United States
While cables that offer a direct path between countries is preferable in many cases, data can traverse any number of cables en route to its final destination.
Even though there several cables that link China and the United States directly, there's certainly a substantial amount of traffic that travels on an intra-Asian cables, like the Southeast Asia-Japan Cable or Asia Pacific Gateway, from China to Japan.
In Japan, this traffic can transfer to a trans-Pacific cable, such as FASTER or Unity , to reach the U.S.
PLCN is not the only planned cable between Hong Kong and the United States
PLCN is just one of several planned submarine cables that intend to link Hong Kong to the United States (or U.S. territories). These include:
Hong Kong-Americas (HKA) : this consortium cable involves several parties including Facebook, China Telecom, and China Unicom.
Hong Kong-Guam: Google is an investor in this cable alongside RTI
Bay to Bay Express (BtoBE) : this system is backed by Facebook, Amazon, and China Mobile
Content providers are investing in many new cables
Google and Facebook’s involvement in PLCN is one of many investments made by these two companies. And other content providers are following suit.

Chinese advances in space technology worrying NATO as expressed by Norway's intelligence

As we all know,Norway plays an important role in space exploration for key military space facilities used by the US, including the Globus II radar in Finnmark County, sometimes referred to as the world's most advanced radar for tracking satellites.
In recent years, the Chinese intelligence service has succeeded in obtaining advanced Norwegian technology several times, the Scandinavian country's intelligence service has stressed, warning that China is en route to becoming “a military superpower in Norway's neighbourhood”.
“With growing interest in the Arctic, we believe that China will continue to influence the situation, even in our proximity”, the head of the intelligence service, Lieutenant General Morten Haga Lunde, said, as quoted by national broadcaster NRK.
According to Haga Lunde, advanced technology with military application is especially sought after.
For instance, the Andøya Space Centre at Andenes in Nordland County, which is vying to become the first in Europe to launch satellites, has admittedly noticed penetration attempts.
“We notice that the interest and awareness of our sector is only getting bigger, even when it comes to penetration attempts”, Odd Roger Enoksen, Managing Director of the Andøya Space Centre, told High North News.
Focus 2020, the new threat assessment by the Intelligence Service (E-Tjenesten), also lists Norwegian space research facilities among the main targets for the Chinese intelligence service, which, it claims, has shown a high interest in dual-use technology . According to Focus 2020, Chinese intelligence has on several occasions succeeded in obtaining this type of advanced technology.
A report by the US Congress raised suspicions about China hacking US satellites via the Svalsat ground station on the Svalbard archipelago as early as 2007 and 2008.
Norway's Intelligence Service stressed that only a few of China's satellites are referred to as military, whereas civilian polar satellites are used for both intelligence and military purposes. Last year, China surpassed the US in the number of satellites launched, Focus 2020 stressed.
The Andøya Space Centre, formerly named Andøya Rocket Range, is a rocket launch site and spaceport on the island of Andøya (the northernmost in the Vesterålen archipelago) in Nordland County, Norway. Since 1962, over 1,200 sounding and suborbital rockets of various configurations have been launched from the site. It has about 100 employees and is considered one of Norway's most technologically advanced facilities.
To place Norway's concerns into a broader picture, the Scandinavian nation plays a key role in space exploration owing to important military space facilities used by the US, including the radar Globus II in Finnmark County, which is often labelled the world's most advanced radar for tracking satellites and has become the bone of contention in Norway's relations with Russia, who sees it as a spying tool. The radar is now being upgraded.

Facebook under fire from UK's government


Facebook and some other social media companies have recently come under fire for failing to remove allegedly misleading and harmful content from their platforms. Now, British regulatory authority Ofcom is reportedly set to be given a role in policing social media companies.
Britain’s media watchdog Ofcom will have more power in regulating social media companies in the UK, such as Facebook, Twitter, YouTube or Snapchat, and will make them accountable for harmful content, the BBC reported citing Digital Secretary Baroness Nicky Morgan.
Social media companies have long defended their rights to control unacceptable content on their platforms related to violence, terrorism or child abuse, but according to reports, this is now going to change in the UK.
"There are many platforms who ideally would not have wanted regulation, but I think that's changing”, Nicky Morgan, Baroness Morgan of Cotes, was quoted as saying. “I think they understand now that actually regulation is coming”.
The information has not been confirmed by the UK’s Department for Digital, Culture, Media and Sport but it was reported that on Wednesday the government will present a draft of the new legislation related to online harm and will announce Ofcom’s new powers. So far, the authority has only been entitled to regulate British media, not social media platforms or internet safety. The news could cause some concerns among the public about potential censorship over online content.
Facebook has long been criticised for failing to take responsibility for content on its platform, including its refusal to remove political ads that may contain misinformation, citing its monitoring, rather than regulatory role.
Mark Zuckerberg , Facebook’s CEO, has maintained that the company was still accountable for removing harmful content related to child exploitation, terrorism, or violence from the its platform. However, in relation to political ads, he cited the policy of free speech and insisted that social media users were still able to make up their own minds about the political agenda.

This is why Trump has been too unfriendly to Huawei company

The Trump administration has long maintained that Chinese tech giant Huawei poses a threat to the national security of its allies and thus should not be granted access to their 5G networks. These warnings, however, have not stopped Great Britain from allowing Huawei to participate in building its next-generation infrastructure across the country.
US officials claim that Huawei has a secret capability to extract data from mobile networks globally through “back door” mechanisms that have been used for more than ten years, The Wall Street Journal first revealed. According to their report, this information remained highly classified until Washington decided to share the intelligence with its Western allies, including the UK and Germany, last year.
Some officials, including US National Security Adviser Robert C. O’Brien, maintain the US has evidence and can prove to its allies that Huawei can secretly retrieve “sensitive and personal” information in wireless 5G networks if granted access to the building of the necessary infrastructure.
“This is alarming because Chinese companies, by law, must comply with directives of the Chinese Communist Party”, O’Brien said on Tuesday, as quoted by The New York Times. “Strategically, we see a company that can use its position in the market to advance the aims of the Chinese Communist Party”.
According to US officials, the Chinese company has long had access to the “back doors” initially designed for use by law enforcement officials, but has been able to use them even without the knowledge or permission of national operators in countries where it has built its systems. Huawei officials have denied all these allegations.
The news comes after several American officials, including US Secretary of State Mike Pompeo, Treasury Secretary Steve Mnuchin, and a number of other high-ranking representatives of the Trump administration travelled to London throughout January to warn its transatlantic partner about the dangers Huawei could pose to UK national security if allowed to take part in the building of its 5G infrastructure.
Despite the warnings, Boris Johnson’s government still
allowed the Chinese company into Britain’s 5G networks, although in a limited capacity. Germany is also currently deciding on whether to work with the world’s leading 5G provider and according to reports, Berlin is inclined to grant Huawei access to its next-generation networks, despite Washington’s concerns.
So far, the Trump administration has maintained that it did not need to present any evidence about Huawei posing a threat to its allies and has just repeatedly argued that Huawei was required by Chinese law to provide Beijing with access to all of its data and information upon request. In May 2019, Washington blacklisted Huawei and 68 of its subsidiaries from working with American companies and called upon its allies to follow suit.
Both Beijing and Huawei officials have denied the accusations that the company has ever spied or intends to spy on foreign corporations and countries on behalf of the Chinese government.

What with the much thought of UK cabinet reshaffle


The structural reshuffle has been on everyone’s lips since Johnson’s overwhelming win in December, but the scale of it has been played down following speculation of a much wider Cabinet transformation after the general election.
Boris Johnson is expected to add the finishing touches to his updated Cabinet on Thursday, with sources cited by The Telegraph insisting it will be no “revolution” in terms of scale. The reshuffle will reportedly see a number of Remainers promoted at Leavers’ expense, like Geoffrey Cox, Andrea Leadsom, and Theresa Villiers.
For instance, Remain-supporting Chloe Smith has reportedly been tipped for a wider role as Minister for the Union at the Cabinet Office, while Oliver Dowden is expected to run the Digital, Culture, Media and Sport department.
Michael Gove, the Chancellor to the Duchy of Lancaster, is believed, per the British edition, to be in general control of post-Brexit trade talks with the EU at a reshuffled Cabinet Office.
Meanwhile, Environment Secretary Theresa Villiers, is also expected to be sacked, with Home Secretary Priti Patel purportedly remaining the only member of the Cabinet who consistently voted against Theresa May's Brexit deal.
Devoted Brexiteers including Boris Johnson, Foreign Secretary Dominic Raab, and Commons’ Leader Jacob Rees-Mogg, all backed her deal at the so-called third Meaningful Vote stage last March."The labels of 'Leave' and 'Remain' were binned as soon as we got Brexit done - no one mentions them now", one source was cited by The Telegraph as saying.
Defence Secretary Ben Wallace and Ms Leadsom, the Business Secretary, are both tipped to quit their roles, Liz Truss, the International Trade Secretary, has strengthened her position after she was repeatedly mentioned and quoted by Johnson in his trade speech last week.
The Cabinet reshuffle has been rumoured ever since Johnson won by a landslide in the 12 December general vote.
As the UK braces for stiff trade talks during its 11-month transition period, Michael Gove instructed businesses to prepare for “inevitable” border checks.
He insisted there is no way they can be avoided, as the UK is facing a “significant change", and stressed the country has enough time to handle it.

The new capability of Emotet trojan highlights the fact that one should always secure their device with a strong password.

The new capability of Emotet trojan highlights the fact that one should always secure their device with a strong password.
Initially identified in 2014, Emotet is a banking trojan that has been used in various malicious campaigns in the past for gaining financial data. An example is of 2017 when it infected Mcafee’s ClickProtect service to trick users by making them download a legitimate-looking Word document which in actuality contained the malware.
Now, it is back albeit with a new way to spread its infection. Featuring a new WiFi module; the trojan now focuses on compromising machines on the same WiFi network. Simply put: Emotet trojan can now spread through nearby wireless networks if the networks use insecure passwords.
To carry the entire operation out, it firstly uses wlanAPI.dll
calls to find wireless networks surrounding it excluding the current computer system it has infected.
Commenting on the reason wlanAPI.dll calls are used, researchers at BinaryDefence state that,
Once it finds such a network, it would connect to it automatically and by using brute-force techniques if it is password protected. Therefore, it searches for Windows-based devices and tries to find its way into user accounts through brute-forcing once again. If successful, it proceeds by adding malicious files for different purposes.
The first one is named “service.exe” which installs an additional service by the name of “Windows Defender System Service.” This helps the attacker maintain access to the system and in a very unsuspicious way indeed in the eyes of a layman.
An interesting thing here is that “although the connection to the server uses port 443, which is normally used for Transport Layer Security (TLS) encrypted communications, the connection is unencrypted HTTP.”

The new capability of Emotet trojan highlights the fact that one should always secure their device with a strong password.
Initially identified in 2014, Emotet is a banking trojan that has been used in various malicious campaigns in the past for gaining financial data. An example is of 2017 when it infected Mcafee’s ClickProtect service to trick users by making them download a legitimate-looking Word document which in actuality contained the malware.
Now, it is back albeit with a new way to spread its infection. Featuring a new WiFi module; the trojan now focuses on compromising machines on the same WiFi network. Simply put: Emotet trojan can now spread through nearby wireless networks if the networks use insecure passwords.
To carry the entire operation out, it firstly uses wlanAPI.dll
calls to find wireless networks surrounding it excluding the current computer system it has infected.
See: Hackers using Coronavirus emergency to spread Emotet malware
Commenting on the reason wlanAPI.dll calls are used, researchers at BinaryDefence state that,
Once it finds such a network, it would connect to it automatically and by using brute-force techniques if it is password protected. Therefore, it searches for Windows-based devices and tries to find its way into user accounts through brute-forcing once again. If successful, it proceeds by adding malicious files for different purposes.
The first one is named “service.exe” which installs an additional service by the name of “Windows Defender System Service.” This helps the attacker maintain access to the system and in a very unsuspicious way indeed in the eyes of a layman.
An interesting thing here is that “although the connection to the server uses port 443, which is normally used for Transport Layer Security (TLS) encrypted communications, the connection is unencrypted HTTP.”
Second is “worm.exe” with a timestamp of ” 04/16/2018 ” and containing a hard-coded IP address to its C2 server. Explaining this, BinaryDefence states how “this hints that this Wi-Fi spreading behavior has been running unnoticed for close to two years. This may be in part due to how infrequently the binary is dropped.”
A reason that could be attributed to it not being discovered despite the more-than-1-year-old timestamp is that when analyzed on a virtual machine, it does not show any spreading behavior without a WiFi card.
To sum up, both of these help the malware gain access to computers in such a way, particularly those that use weak passwords as brute-forcing them would become much easier this way too. These can then be used for hurting the victim through various ways such as data theft and even ransomware. Hence, we would recommend a range of precautions to guard against such attacks:
1. Add passwords to your user accounts even if you do not share your computer system with someone else. This at least gives you a shot to fight anyone trying to get in through such methods.
2. Use strong passwords, one that particularly could withstand a large number of attempts per second, a trillion if you’re an Edward Snowden fan and live near the NSA.
3. Try to monitor the processes running on your computer to see for suspicious ones. This could be easily done using Window’s in-built task manager.
4. Install a good anti-malware software that could also help in network monitoring and recognize “patterns that identify the malware message content.”
5. Last but not least avoid using public Wi-Fi spots.
Second is “worm.exe” with a timestamp of ” 04/16/2018 ” and containing a hard-coded IP address to its C2 server. Explaining this, BinaryDefence states how “this hints that this Wi-Fi spreading behavior has been running unnoticed for close to two years. This may be in part due to how infrequently the binary is dropped.”


Monday, February 10, 2020

Uganda people defense forces airforce airlifts pesticides to fight the locusts

UPDF airforce has airlifted pesticides to fight the locusts



US soldiers have already started withdrawing from 15 Iraqi military bases and leaving the country,

US soldiers have already started withdrawing from 15 Iraqi military bases and leaving the country, member of the parliamentary Security and Defence Commission, Ali al-Qameni, was quoted as saying by the daily Baghdad Today.
The lawmaker reportedly added that Washington is still insisting on building up forces in the Ayn al-Asad and Erbil military bases, but noted that the Iraqi Parliament opposes this notion.
U.S. Soldiers and journalists stand near a crater caused by Iranian bombing at Ain al-Asad air base, in Anbar, Iraq, Monday, Jan. 13, 2020
© AP PHOTO / ALI ABDUL HASSAN
U.S. Soldiers and journalists stand near a crater caused by Iranian bombing at Ain al-Asad air base, in Anbar, Iraq, Monday, Jan. 13, 2020
Iraqi lawmakers voted for a non-binding motion to end all foreign military deployments in the country, including the American contingent, on 5 January following a US airstrike that killed major Iranian General, Qasem Soleimani, without discussing or clearing the operation with the country's authorities. The general was visiting the country to pass on the suggestion for normalising relations to Saudi Arabia, with which Tehran currently has no diplomatic ties.  
Washington's reaction to the news was mixed: while the US State Department said it was not intending to negotiate the withdrawal of forces, US Secretary of State Mike Pompeo stated three days later that the two countries would discuss the reduction of American troops in Iraq. Additionally, US Defence Secretary Mark Esper revealed that American troops will not be stationed in in Iraq "interminably", but failed to clarify when they will leave.
The US also defended the actions that led to Soleimani's killing on 3 January and resulted in an escalation of tensions with Iran and the latter's retaliatory missile strikes on bases hosting American forces in Iraq. Washington believes that the airstrike was legitimate, while Iraqi lawmakers disagreed.

Twenty-seven foreigners in China have been infected with the coronavirus, two of them have diede


Since a new strain of coronavirus was first detected in the Chinese city of Wuhan in December of 2019, it has spread to over 25 countries across the globe.
As of 10 February, twenty-seven foreigners in China have been infected with the coronavirus, two of them have died, the country's foreign ministry said. 
An American died on 6 February and a Japanese individual died on 8 February, ministry spokesman Geng Shuang said during a daily news briefing in Beijing.
He added that three people have been discharged from the hospital.
An outbreak of pneumonia caused by a new strain of coronavirus started in the Chinese city of Wuhan last December and has since spread to more than 25 countries around the world.
A member of staff outside the Shanghai Disney Resort in Shanghai, China
© REUTERS / ALY SONG
A member of staff outside the Shanghai Disney Resort in Shanghai, China
The death toll from the new coronavirus in China currently stands at 908 people with more than 40,000 other confirmed cases.  
In late January, the World Health Organisation (WHO) declared the coronavirus outbreak a global health emergency.

Trump approved the sale of a multi billion anti ship missile to Australia


The Trump administration has approved the sale of 200 anti-ship missiles to Australia for $990 million, the Defence Security Cooperation Agency (DSCA) said in a press release.
"The State Department has made a determination approving a possible Foreign Military Sale to Australia of up to 200 AGM-158C, Long Range Anti-Ship Missiles (LRASM) and related equipment for an estimated cost of $990 million", the release said on Friday.
The sale will also include up to eleven ATM-158C LRASM Telemetry systems, DATM-158C LRASM, Captive Air Training Missiles (CATM-158C LRASM) and other equipment, with Lockheed Martin being the prime contractor, the DSCA said.
The Trump administration has been expanding its military cooperation with Australia and Japan in the Indo-Pacific region.