Thursday, May 7, 2020

Fake Zoom installers infect PCs with RevCode WebMonitor RAT and this is a reason why South African Parliament fell a prey

The corona virus lockdown has forced people to work from homes. Remote working involves using a variety of video-conferencing and communication mediums like Zoom. This compulsion has provided cybercriminals the perfect opportunity to carry out their malicious activities more passionately.
That’s why Zoom is being actively targeted by hackers in the past few weeks. These attacks involve zoomboming or spreading malware hidden fake zoom apps. And now, Trend Micro has identified yet another attack campaign targeting Zooming presentations and conferences.According to Trend Micro cybersecurity researchers, cybercriminals are using malicious Zoom installers to distribute RevCode WebMonitor RAT (remote access Trojan). However, researchers have confirmed that these installers, although authentic, doesn’t come from official sources such as Google Play, Apple App Store, or Zoom’s official download center.
The infected Zoom installers are available at third-party websites and victims are sent malicious links via phishing emails. This campaign is somewhat similar to another campaign that was discovered in April. In that campaign, legit Zoom installers were used to infect devices with a cryptocurrency miner.
In the new campaign, cybercriminals have repackaged authentic Zoom installers with WebMonitor RAT. When someone downloads ZoomInstaller[.]exe, which contains an uninfected Zoom installer version 4.6 and the malicious RevCode WebMonitor RAT, the device gets infected with the RAT.Upon infection, it allows the attacker to gain remote control of the device and the user via webcam streaming, keylogging, and screen capturing.
Bewre; fake Zoom installers infect PCs with RevCode WebMonitor RAT
RevCode WebMonitor RAT’s website where hackers sell the software
Amidst rising concerns over the use of Zoom for remote working, Zoom has updated its OS to version 5.0, which is touted to be far superior to the older versions in terms of privacy and security.
If you use Zoom, make sure it’s updated to the latest version only use legitimate distribution channels like Google Play to download Zoom. Moreover, install and scan your device withauthentic antivirus software.

what you have to know about the Wuhan laboratory that is behind all the conspiracy on COVID19

While scientists' attention is focused on a vaccine for the new coronavirus, politicians have begun raising questions as to where the virus came from. As the blame game goes international, a high-security lab at the epicentre of the pandemic in China has risen from obscurity.

As is often the case with the ever-changing viruses, SARS-CoV-19, the invisible newsmaker of the past four months, still remains a tough nut to crack.
With its genome fully sequenced, little is known about the origins of the virus, which has infected over 3,680,000 people worldwide and killed over 257,000. The World Health Organisation believes that it has natural origin and was not produced in a laboratory.
But US President Donald Trump, an outspoken fan of conspiracy theories,he claimed,he saw trustworthy evidence that the virus had been unleashed from a lab in the central Chinese city of Wuhan. He has not clarified whether he was referring to a deliberate or accidental release of SARS-CoV-19 and has yet to present evidence to back his claim.
The narrative clashes with the wide scientific consensus that the virus had originated in animals, possibly in bats, and then infected humans, whether directly or through a yet-unknown intermediate host (pangolins, for example).
China has pushed back on the lab leak accusations, but a growing chorus of voices in the West are calling for an independent probe into the origins of the new coronavirus. The US-China spat marked a big break for the Wuhan lab, yet for an unwanted reason. Here's what we know about it.
  • The lab was established in 2015 at the Wuhan Institute of Virology and cost 300 million yuan, or approximately $42 million.
  • The institute was founded in 1956, seven years after the Chinese Communist Revolution, by the national Academy of Sciences. It is home to the China Centre for Virus Culture Collection, the largest virus bank in Asia which stores more than 1,500 strains of viruses.
  • The lab became the first one in mainland China to achieve the fourth, highest level of biocontainment, which allows it to study the most dangerous pathogens in the world, such as the Ebola and Marburg viruses (work on SARS-CoV-2 requires the third level or higher).
  • It was built to withstand a magnitude-7 earthquake, despite the province of Hubei having no history of such strong tremors.
  • The lab's main building is reported to be equipped with sewage and life support systems on the ground floor. Core laboratories along with filter and pipeline systems are located on the second and third floors, while the top level houses an air conditioning system.
  • The safety protocol is so rigorous that people who contact with bats or their waste are considered to be at a higher risk of contracting the virus than staff at the lab.
  • Perhaps the most famous Wuhan virologist is the institute's deputy director Shi Zhengli, dubbed "bat woman" in Western media. In 2017, her team presented research that found a link between a single population of bats in southwest China and the 2003 SARS coronavirus pandemic. When global attention started turning to Wuhan, the city where the outbreak was first detected, Shi flatly rejected that the lab had anything to do with it.
  • Diplomatic cables recently obtained by The Washington Post showed that US officials had raised the alarm about possible safety breaches at the lab after a visit from a US diplomat in 2018.
  • Notably, they noted that the lab has a "serious shortage of appropriately trained technicians and investigators needed to safely operate this high-containment laboratory". They also warned that the lab's work on contagious viruses and potential transmission to humans could case a new SARS-like pandemic. The State Department declined to comment, and no screenshots of the cables have been provided.
  • American and French scientists helped train staff for the Wuhan lab as part of the PREDICT pandemic early warning programme, shut down by the Trump administration last year.
  • Jonna Mazet, a prominent epidemiologist who led the programme, has recounted that Wuhan workers had developed a "very stringent" safety protocol, which includes "extreme personal protective equipment", and work only with samples that have deactivated beforehand. Vials with the “active” virus are kept in a special area.

just in History:How USSR's 'Death to Spies' Spooks Paralyzed Third Reich Intelligence

Nazi intelligence and the Kriegsmarine mastered the art of spreading radio disinformation among the Allies after the occupation of France and the campaign for the Atlantic. However, by 1944, the NKVD and SMERSH (Red Army counterintelligence), set up similar operations, disrupting Wehrmacht intelligence-gathering until the very end of the war.The ‘funkspiel’ (German for ‘radio play’) carried out by Soviet intelligence officers during the Second World War helped cripple German intelligence-gathering operations on the Eastern Front, and made a major contribution to victory, saving tens or even hundreds of thousands of lives, Vladimir Makarov, a Russian intelligence services historian who has written extensively on the subject, says. Makarov explained that although the idea of radio play disinformation was not a novelty of the Second World War, it was an area that the Soviets quickly took an interest in after the start of the war on the Eastern Front in June 1941. “The first radio play to misinform the enemy was carried out by the Special Department of the North-Western Front in September 1941,” the historian recalled.
But it would not be until the spring of 1942, when German special forces began dropping parachutists armed with mobile radio stations behind Soviet lines in large numbers, that funkspiel would become a major tool for Soviet counterintelligence efforts.
On April 25, 1942, People’s Commissar of Internal Affairs Lavrenty Beria presented Joseph Stalin with a report on German agents detained with radio equipment. “The NKVD believes that the captured German radio equipment can be used in the interests of Red Army high command to misinform the enemy with regard to the deployment and regrouping of Red Army units,” the report indicated. Stalin approved the proposal, and from then on, German high command began receiving reports about strange goings-on on the Eastern Front.

According to Makarov, there is an important distinction to be made between Soviet and Nazi German funkspiel efforts. “Unlike the radio play carried out by the Germans, ours were centralized, and featured the participation of the general staff. There, a separate group worked on the creation of misinformation materials. Furthermore, the best staffers were assigned to this work.” This, the historian noted, meant that each misinformation operation was carefully prepared for maximal effect.
What’s more, Makarov said, the bulk of German intelligence officers who were captured agreed to work for the Soviet side, with careful checks made to test how sincere these new double agents were. This included looking out for any secret signals these agents might be ordered to send in the event of capture. The NKVD issued strict, detailed instructions on the use of these double agents by late 1942, distributing them to territorial and army counterintelligence units.
“In the event that a successful radio play operation was carried out, agents were not only spared prosecution, but often even rewarded,” the historian explained.
The Soviet doctrine of maskirovka (lit. ‘disguise’), or military deception, i.e. the use of measures ranging from camouflage and concealment to decoy and dummy mockups and engaging in false maneuvers, would become a key Red Army tactic during the Second World War, and was used again during the Cold War and even in Russia’s post-Cold War military doctrine.
In funkspiel too, Makarov stressed, the famous concept came into play. “In order for our misinformation to be considered real, and to minimize the likelihood of a particular radio play operation from failing, maskirova measures were taken.” This meant, for example, that when a packet of misinformation was sent out, Red Army or supply units would engage in pretend activities which would allow any other possible German agents in Soviet rear areas to be able to observe and confirm the ‘validity’ of the misinformation.
For example, knowing that the Germans had a large number of agents concentrated in Moscow, the country’s main rail hub, Soviet high command would dispatch equipment and ammunition along the ring road, indicating preparations for (fake) offensives. Furthermore, fake depots were constructed to hold fake equipment. Similarly, knowing that Nazi intelligence was tracking the movement of senior Red Army commanders, funkspiel operations would include reports on generals being sent in one direction when in reality, they would be deployed somewhere else.
Funkspiel operations even assisted in the defence of Moscow in June 1942, with a planned Luftwaffe bomber raid called off due to false radio intelligence reports that several fighter regiments, anti-aircraft artillery, searchlights and blimps has been transferred to the capital to shore up defences.
Similarly, radio play was used to provide the German high command with false information on the state of Soviet military industry, with tank factories, for example, either overstating or downplaying their true production output.
Soviet funkspiel was even used to thwart Nazi efforts to rile up nationalist sentiments in various regions of the USSR, and to stop potential sabotage operations against railways. “For example, it was very important to protect the railway connection between the Murmansk and Arkhangelsk regions, where the equipment supplied by the Allies to the USSR under Lend-Lease came from,” Makarov said.
Another trick played by Soviet intelligence was to conduct special funkspiel missions deliberately designed to show a lack of professionalism by Soviet agents to give Nazi intelligence a false sense of superiority. In these operations, crude, clumsy work by Soviet security organs would be shown, with coded messages deliberately allowed to be cracked for maximal effect.
From Defence to Offense
By 1944, after the Red Army completed the liberation of the majority of Soviet territory and began moving into Eastern Europe toward Germany, funkspiel operations took on a new complexity and importance, covering for Soviet offensive operations.
“For example,” Makarov recalled, “during the Budapest offensive operation in Hungary in early 1945, troops from the 3rd Ukrainian Front were used in the attack. To smash a Wehrmacht group which was sent to break through to the city to help the Nazi forces surrounded in the capital, the 3rd Ukrainian Front’s SMERSH directorate staged a radio play operation dubbed ‘Signalers’. The Germans believed the disinformation which was transmitted, and removed significant forces from the main direction of the attack, allowing our troops to liquidate the Nazi breakthrough.”
According to the historian, toward the end of the war, Soviet funkspiel operations became so complex that they were able to mislead German high command not only about the deployment of individual battalions or regiments, but entire armies. This, he said, effectively deprived German intelligence from providing the Wehrmacht with reliable information about Red Army plans.
“The Germans also failed to disrupt the work of the Soviet rear areas. Our security agencies neutralized thousands of saboteurs, with tens of thousands of weapons, explosives and ammunition prevented from going off or exploding in the Soviet hinterland,” he added, noting that this included stopping assassination attempts against Soviet leaders.
“It can be said that the Soviet special services unconditionally defeated the enemy. In essence, the work of the massive German intelligence machine was for nothing. Therefore, the organizers and participants of these radio play actions made a huge contribution to victory,” he stressed.
Operation Berezino
Possibly the most famous Soviet funkspiel mission was Operation Berezino, a deception operation that kicked off in August 1944 and would see native German antifascist fighters take to the airwaves to spread disinformation about a major (non-existent) pocket of German resistance behind Soviet lines in the forests of Belarus. The operation made use of Lt. Col. Heinrich Scherhorn, a real, decorated World War I and World War II officer who was captured in battles outside Minsk, and who agreed to cooperate with Soviet intelligence to take part in the charade about this ghost German army unit.
Scherhorn’s ghost army of 2,000 troops was used to lure Nazi intelligence units and army forces into traps by attempting to make contact with his forces and provide them with supplies. The operation proved successful, so much so that the German high command continued to make contact with him and believed his force was real until the very end of the war, even awarding him the Knight's Cross and the Iron Cross in March 1945.
Heinrich Scherhorn
Specially-trained Soviet units impersonating Wehrmacht troops were formed to meet arriving Nazi paratroopers. These units, under the command of Otto Skorzeny, the legendary commando, saboteur and spy, were sent on an operation to verify the existence of the ‘Sherhorn units’, but got neutralized along the way.
“Soviet intelligence officers ‘crossed swords’ with Skorzeny and his men several times during the war, and always successfully,” Makarov noted. “Judging by his recollections, Skozeny himself remained blissfully unaware that the ‘campaign’ by Sherhorn and his units in the Soviet rear was actually a brilliantly executed operation by the Soviet special services.”
Ultimately, the NKVD and SMERSH managed to keep the German high command in the dark about the Sherhorn deception until the closing days of the war. On May 1, 1945, the German side informed Sherhorn about Adolf Hitler’s suicide, helping to confirm separate reports about the Fuhrer’s demise.
On May 5, German intelligence sent Sherhorn its final telegram, which read: “The superiority of the enemy’s forces have defeated Germany…With a heavy heart, we are forced to stop providing you with assistance.” Three days later, on the night of May 8, 1945, Germany unconditionally surrendered to the Allies.

US defence contractor Lockheed Martin in a statement announced that a joint venture team completed the first production run of a new Javelin anti-tank missile.


"The Javelin Joint Venture team, a partnership of Raytheon Missiles & Defense, a business of Raytheon Technologies, and Lockheed Martin completed the first production Javelin F-Model (FGM-148F) missile," the release said on Wednesday.
The F-Model, the statement added, has an advanced, multipurpose warhead that can defeat current and future armor, and adds a fragmenting steel case to take out soft targets and light armored vehicles.
The production of the F-Model represents the latest in a series of upgrades to the weapon since it was first deployed in 1996, the release said.
Javelin has been used extensively in combat operations in Afghanistan and Iraq. U.S. and coalition forces have used the Javelin in more than 5,000 engagements since its deployment in 1996, the release said.

The world is slowly being eaten up by covid19 as cases get close to a total of 4 million

In the whole world now....
Confirmed cases: 3766680
Recoveries: 1249049
Deaths: 263956


,........
Here is Africa now...
Confirmed coronavirus cases in Africa: 51,697
Recovered: 17,660; Confirmed coronavirus deaths: 2,009



Cases that were reported last night from:
Africa: 51 677 cases; the five countries reporting most cases are South Africa (7 808), Egypt (7 588), Morocco (5 408), Algeria (4 997) and Nigeria (3 145).
Asia: 597 979 cases; the five countries reporting most cases are Turkey (131 744), Iran (101 650), China (83 970), India (52 952) and Saudi Arabia (31 938).
America : 1 595 437 cases; the five countries reporting most cases are United States (1 228 603), Brazil (125 218), Canada (63 496), Peru (54 817) and Ecuador (29 420).
Europe : 1 459 723 cases; the five countries reporting most cases are Spain (220 325), Italy (214 457), United Kingdom (201 201), Germany (166 091) and Russia (165 929).
Oceania: 8 284 cases; the five countries reporting most cases are Australia (6 875), New Zealand (1 139), Guam (151), French Polynesia (60) and Fiji (18).
Other: 696 cases have been reported from an international conveyance in Japan.
Deaths have been reported from:
Africa: 2 011 deaths; the five countries reporting most deaths are Algeria (476), Egypt (469), Morocco (183), South Africa (153) and Cameroon (108).
Asia: 20 730 deaths; the five countries reporting most deaths are Iran (6 418), China (4 637), Turkey (3 584), India (1 783) and Indonesia (895).
America : 94 122 deaths; the five countries reporting most deaths are United States (73 431), Brazil (8 536), Canada (4 232), Mexico (2 704) and Ecuador (1 618).
Europe : 146 293 deaths; the five countries reporting most deaths are United Kingdom (30 076), Italy (29 684), Spain (25 857), France (25 809) and Belgium (8 339).
Oceania: 125 deaths; the 4 countries reporting deaths are Australia (97), New Zealand (21), Guam (5) and Northern Mariana Islands (2).
Other: 7 deaths have been reported from an international conveyance in Japan.

Hope for peace in North Kivu as two rebel group leaders announced dropping down weapons


Two rebel group leaders have announced that they want to follow a call for peace by President Félix Tshisekedi. But the victims are worried about seeing them eventually join the Congolese army.
The two rebel groups have been operating so far in northern North Kivu province, in the and Lubero territories. Kakule Sikuli and Kakule Masibi, from the group " Union of Congolese Patriots for Peace " (UPCP) and the " Mai-Mai Charles " group, dropped the weapons on Monday (04.05.2020).
Two leaders of a well-known militia active in North Kivu province in the Democratic Republic of the Congo went to the security forces, said the authorities on Tuesday.
Lafontaine Sikuli, Commander of the Armed Group Union of Congolese Patriots for Peace (UPCP), and Iloveyou Kakule, another leader, visited on Monday, said North Kivu governor Carly Nzanzu Kasivita to journalists after a meeting with the committee security of the province in the capital Goma.
" We welcome the decision of these leaders of an armed group to put an end to the violence. We hope they will help us convince other compatriots who are still committed to armed activities in North Kivu province to drop the weapons. The government's policy for North Kivu is to put an end to decades of insecurity ", said Mr. Kasivita.
surrender comes after the militia has been weak by the government forces (FARDC) following an offensive launched last October, according to analysts.
" Lafontaine Sikuli is one of the veterans of the Mai-Mai Chiefs of the region. But he doesn't have much influence after losing many of his fighters. He is under pressure and had to take an olive branch offered by the current Kinshasa government to surrender ", said to the agency Eugene Eugene Kabange, a security analyst based in Goma.
Sikuli, whose militia was active in the city of Lubero in North Kivu, also said he was ready to join in the process of peace restoration in the region.
"I listened to President Felix Tshisekedi's call [ to peace ] after seeing that he had committed to bring peace to the Democratic Republic of the Congo, especially in the east", Mr. said. Sikuli to the journalists.
The Union of Congolese Patriots for Peace was based in Bunyatenge, south of Lubero.
More than five years ago, the group formed an alliance with a Rwandan rebel group, the Democratic Forces for the Liberation of Rwanda (FDLR), according to a North Kivu human rights group called GADHOP.
But the FDLR-UPCP coalition split after the emergence of divisions in the management in 2015.They were presented to the press and members of the region's Security Committee. Some of these repented rebels have decided to join the Congolese army while others have chosen to reintegrate into social life.
Call launched by President Félix Tshisekedi
Kakule Sikuli Lafontaine, one of the rebel leaders says
that this surrender is supported by an appeal made by the head of state who wants the pacification of the eastern Democratic Republic of the Congo (DRC). " Since 1999, we've been in the bush. We did not drop weapons following operations against armed groups, but we decided to drop the weapons so that together, together with the Congolese government, we can find solutions to the security challenges in our region ", explains the ex - rebel leader.
Convinced of his decision, he invites "all those who remain in the bush, that the time has come for the peace promoted by number one of the Republic and the governor of North Kivu to materialize".
People between hope and trust
The inhabitants of one of the of territories in which these rebels were committing abuse greet their decision to drop weapons and invite other armed groups to drop weapons.
On the other hand, they are opposed to the possible integration of these ex-rebels into the Congolese army. They think they have committed too many crimes and have no legitimacy to defend the population they once massacred.
Thus, for James Havugimana, capita, these rebels " are people who raped and killed our mothers. They scared us for a long time, we think they are not worthy to serve in the army ".
Forgive and reconcile
In the face of this distrust of the people, the authorities are disseminating messages of appeasement.
For Carly Nzanzu Kasivita, governor of North Kivu province, these former rebels " have agreed to drop the weapons and we ask all patriots to support efforts in the search for peace in our province. We continue to raise awareness of the culture of peace and we thank these armed groups who have accepted this call by wanting to give our province a chance ".
North Kivu province continues to face serious security challenges with the presence of several armed groups preventing the economic development of this eastern DRC, border with Rwanda.
For Martin Fayulu, he had this to say as he mainly indicated the active rolevof one of DRC's neighbour in accelerating rebel groups;an "open and honest dialogue must be engaged with our neighbours on their destabilizing role"
Martin Fayulu Madidi, president of the political party commitment to Citizenship and Development, (ECIDé), spoke on May 1, 2020 on the security situation in the eastern Democratic Republic of the Congo during an interview given to the Council on Foreign Relations, (CFR), an American non-supporter think to analyse US foreign policy and the global political situation.

For this member of the Presidium of lamuka, the Armed Forces of the Democratic Republic of the Congo (FARDC) must be reorganized as they are at the highest levels of command.
" When we talk about security in the DRC, it's important to look at the origins of recent instability in the country: the invasion of our country in 1996 by external forces, sponsored directly or indirectly by some of our eastern neighbours. The series of events that took place has left us an army that is a mosaic of various rebel groups and is, by essence, infiltrated at its highest levels of command by forces against a free and democratic Congo ", a - he let it be known.
According to the former presidential candidate of December 2018, until this situation is discussed in order to remedy it, progress on the security front is utopian.
Martin Fayulu also mentioned the need for an "honest dialogue" between the Democratic Republic of the Congo and its neighbours as one of the pre-entry of peace to the east of the country.
" In addition, an open and honest dialogue needs to be engaged with our neighbours about their destabilizing role. There can be no peace without truth and justice. To this extent, I have repeatedly supported the efforts of the Nobel Peace Prize, Dr. Denis Mukwege, to extract from graves the findings of the United Nations mapping report that clearly identifies the root causes of our security problems ", he added.
With regard to peace-keeping efforts, Martin Fayulu believes that the UN's mandate needs to be reviewed to adapt it to the realities on the ground and make it more effective.
"The combination of a truly sovereign army and a more adequate UN mandate will greatly contribute to reducing conflicts in the East", said the President.
According to the latest report of the Security Barometer of Kivu, December 2019 has been the most deadly for civilians ever recorded by this structure since its creation in June 2017. 117 people have been killed in attacks mainly to the Islamist rebels of the Democratic Forces Forces (ADF).

Wednesday, May 6, 2020

PPSh-41,The legendary Russian machine gun that eased the winning of WW II




A Soviet submachine gun designed by Georgy Shpagin, the PPSh-41, became one of the main infantry weapons of the Soviet Armed Forces during World War II.
The PPSh-41 was often called "Papasha" ("Daddy") by Russian soldiers as its three-letter acronym sounds similar.
The gun fires the standard Soviet pistol and submachine gun cartridge, the 7.62×25mm (Tokarev). While weighing approximately 12 pounds (5.45 kg) with a loaded 71-round drum and 9.5 pounds (4.32 kg) with a loaded 35-round box magazine, the PPSh-41 can shoot about 1,000 rounds per minute, a very high rate of fire compared to most other military submachine guns during World War II . It is a durable, low-maintenance weapon made from low-cost, easily obtained components, primarily stamped sheet metal and wood.
With this gun, Soviet soldiers defended Moscow and Odessa as well as fought in the Battles of Kursk and Stalingrad. With the PPSh-41, Soviet soldiers crossed half the world and celebrated their victory by firing up into the sky above Berlin in May 1945.

Cyber-intelligence firms are using the coronavirus pandemic as an excuse to surveil citizens and threaten civil liberties as Explained by web developer and technologist Chris Garaffa and software engineer and technology and security analyst Patricia Gorky


“We are seeing the coronavirus crisis being used as a way to further attack privacy and civil liberties, not just in the US … but around the world,” said Garaffa .

Last week, Reuters published a special report titled “Cyber-intel firms pitch governments on spy tools to trace coronavirus.”
The report outlines how at least eight surveillance and cyber-intelligence companies around the world are “attempting to sell repurposed spy and law enforcement tools” to supposedly help governments contain the spread of COVID-19. Two of the companies specifically named in the report are Israeli firms Cellebrite and NSO Group.
Garaffa noted “there are at least six other companies involved with various countries around the world,” telling a  RUSSIAN news paper that Cellebrite sells a so-called GrayKey device which is used to extract information from cellphones by bypassing any password protection on them. The device is made by GrayShift, an American mobile device forensics company.
“Ultimately what Cellebrite’s GrayKey does is get a copy of everything on your device. Now, think about what’s on your phone. Not just the photos or emails … So, now Cellebrite is offering these tools to more governments under the guise of tracking the spread of COVID-19. They’re suggesting to governments that they purchase these GrayKey and other devices, and when someone is diagnosed with coronavirus or dies from it, the government actually takes their phone so they can see all of their locations,” Garaffa explained.
According to the Reuters report, a Cellebrite “email pitch” to the New Delhi, India, police force this month stated that its technology can be used to “quarantine the right people.” To accomplish this it would “siphon up” an infected person’s location information and contacts, Reuters explains.
Cellebrite told the Indian government that this process would usually only be done with the phone owner’s consent. However, if an infected person violates the law by not following public gathering guidelines, for instance, the police could use the Cellebrite’s tools to hack into a confiscated phone.
“We do not need the phone passcode to collect the data,” a Cellebrite spokesperson wrote to an officer in an April 22 email obtained by Reuters.
“And then there’s the NSO Group,” Garaffa noted.
“NSO Group sells software called Pegasus to governments. It’s rumored that they sell them to large corporations,” Garaffa explained, adding there isn’t “any hard confirmation of that yet.”
“But what Pegasus is, is a collection of attacks, and these are sometimes called zero-days, because they are not seen in the wild,” Garaffa said. “No one knows about them until you see them. So, the NSO Group, instead of sharing these issues with the manufacturer, they hold them close and keep them secret so Pegasus can use them to compromise and take over people’s phones.”
“The NSO situation is actually, to me, worse. It’s been involved in building a huge tracking platform for the Israeli government. NSO Group claims, and this is kind of controversial, that they can figure out your coordinates to within 3 feet of where you’re standing, and if that's true, that’s some very advanced technology,” Garaffa noted.
The Reuters report notes that NSO Group is marketing COVID-19 tracking platforms to countries across Asia, Latin America and Europe. The technology would allow governments to track those with whom an infected person has been in contact in the previous few weeks.
“There’s absolutely no transparency on the methods used by the NSO or Cellbrite or any of the eight companies mentioned in this article,” Garaffa pointed out, to which Gorky agreed, adding that such companies are using COVID-19 as an excuse to “deepen the surveillance apparatus.”
“These surveillance companies, these Israeli surveillance companies in particular, the way that they test out their software and they test out these surveillance platforms is directly on the Palestinian people … Israel uses these surveillance companies to track what these Palestinians are saying on social media, to track their location, to surveil them … and the fact that these companies are even being floated as possibilities to fight the coronavirus shows the fact that this is not about fighting COVID at all. This is about really deepening the surveillance apparatus and adding to it,” Gorky noted.
While the Reuters article frames the conflict as one of privacy rights versus health concerns, Garaffa believes there’s a larger issue at play.
“Further investment and use of these tools only sets the stage for larger and larger violations of privacy by both governments and corporations, with the assistance of all of these companies that are involved,” Garaffa noted.

Tuesday, May 5, 2020

I People’s Liberation Army (PLA), China’s new H-20 stealth bomber will likely make its first public appearance at the Zhuhai Air Show in November, assuming the event isn’t cancelled by the COVID-19 pandemic.


The world could get its first peek at China’s most advanced aircraft ever at the Zhuhai Air Show, a November venue where Beijing shows off its military might.
The South China Morning Post, a Hong Kong-based publication, reported on Monday that the H-20 stealth bomber is expected to be completed this year and might be shown off as soon as November 2020. However, a number of factors could influence that decision, including the ongoing pandemic as well as the state of regional political relations.
“The Beijing leadership is still carefully considering whether its commission will affect regional balance, especially as regional tensions have been escalating over the COVID-19 pandemic,” an unnamed military source told the Post. “Like intercontinental ballistic missiles, all strategic bombers can be used for delivering nuclear weapons … if China claimed it had pursued a national defense policy which is purely defensive in nature, why would it need such an offensive weapon?”
The bomber is purported to have a maximum takeoff weight of at least 200 tons (400,000 pounds), a payload of up to 45 tons (90,000 pounds), a range of 5,000 miles (8,050 kilometers) and utilizes a “flying wing” design similar to that used by the United States’ B-2 Spirit and B-21 Raider stealth bombers , the latter of which could also make a 2020 debut.

The PLA has often used the Zhuhai Air Show to show off its new technology. The J-20 “Weilong” stealth fighter was also seen for the first time at the 2011 air show, and the FC-31 experimental stealth aircraft debuted at the 2014 air show, which may or may not become the PLA Navy’s new carrier-based fighter .
The H-20 will round out the PLA’s sweeping new series of modern aircraft intended to replace the aging Cold War-era air fleet, some of which still uses Soviet designs built under license or reverse-engineered. Alongside the H-20 stealth bomber are the Y-20 transport aircraft, the Z-20 helicopter and the J-20 stealth fighter - together dubbed the “20 series” by observers.
According to a report by a news paper in Russia in early 2019 that Beijing was developing two stealth bombers : one, the Hong-20 or H-20, was confirmed by the PLA, but a second aircraft, dubbed the J/H-XX by observers, remains largely in the world of speculation.
The International Institute for Strategic Studies (IISS), a British military think tank, wrote in its annual report “The Military Balance” in February 2020 that the J/H-XX is likely a fighter-bomber somewhat analogous to the Lockheed Martin F-35 Lightning II. It is purported to be supersonic, with a combat radius of up to 1,250 miles (2,000 kilometers).
Some unofficial art depicting the aircraft appeared on the cover of the May 2018 edition of Aerospace Knowledge, a Chinese publication, and the IISS description of the jet similarly assumes it to have a sleek silhouette with four tail surfaces similar to the failed Northrop/McDonnell Douglas YF-23 Black Widow.

One unnamed military source told SCMP on Monday the H-20 could make use of the Russian-made NK-321, built by Kuznetsov Design Bureau for Moscow’s Tu-160 “White Swan” supersonic bomber. However, another said the bomber could get an upgraded Shenyang WS-10 engine, used by several fighters built by the Chinese design firm.
“The WS-10 is still a transitional engine for the H-20 because it is not powerful enough. The eligible replacement may take two to three years for development,” one of the sources said. “That’s why the American air force doesn’t care about the H-20, because it is not strong and powerful enough to cause any challenge to their B-2 and B-21 bombers.”
Of course, neither the B-2 nor B-21 is supersonic, either. But, like both aircraft, the H-20 will carry nuclear weapons, which could help give Beijing a true nuclear triad. If so, China would join the ranks of Russia, India and the US as the only nations able to deliver a nuclear strike by submarine-launched ballistic missiles, intercontinental ballistic missiles and air-deployed nuclear weapons.
China has also been developing an air-launched ballistic missile to be fired from a specially modified H-6 bomber, which would also gi

The Boeing aircraft manufacturer has presented the first three prototypes of an unmanned attack drone that is powered by artificial intelligence for the Royal Australian Air Force

The Boeing aircraft manufacturer has presented the first three prototypes of an unmanned attack drone that is powered by artificial intelligence for the Royal Australian Air Force, the company’s Australian branch announced in a press release on Tuesday.
According to Boeing, the drone, dubbed Loyal Wingman, is the first aircraft to be designed, engineered, and produced in Australia for more than half a century with mass production starting by the middle of the decade.
“This is a truly historic moment for our country and for Australian defence innovation,” Australian Prime Minister Scott Morrison said in the press release.
According to Boeing, the Loyal Wingman drones will now be subject to rigorous ground and flight testing. Chief of the Royal Australian Air Force Air Marshal Mel Hupfeld praised the cooperation between the armed forces and the aircraft manufacturer.
picture © REUTERS

Boeing's unmanned Loyal Wingman aircraft is seen in this handout picture obtained on May 5, 2020 in an undisclosed location in Australia
“This demonstrates the importance of the relationship Air Force has with Boeing Australia and defence industry more broadly. I look forward to exploring the capabilities this aircraft may bring to our existing fleet in the future,” Air Marshal Hupfeld said in the press release.
In February 2019, the Australian government announced an investment of $25.8 million in the project to produce the unmanned combat drone.
The Loyal Wingman unmanned aircraft can reportedly conduct intelligence missions on its own or provide support to manned aircraft.