Thursday, May 14, 2020

The funds for military operations Good 1 in the Beni region have reportedly been hijacked according to provincial MP Saidi Balikwisha



Military operations against the Ugandan Ugandan rebels who killed hundreds of civilians in the city and territory of Beni were launched in November 2019.

An elected provincial MP from the territory of Beni in North Kivu east of the DRC alert on a possible transfer of funds from the Congolese government to military operations against the Ugandan rebels.
Saidi Balikwisha claims that these diversion are not related to the massacres of civilians. As the army is not paid regularly, it would not be motivated to pursue the enemy. " When we were on vacation in the territory of Beni, we had found that the troops are determined to deal with the enemy's nuisance. Currently, we see that they are démotivation. There is no doubt that there is a link to the transfer of funds for military operations in the Beni area ", the provincial MP. According to him, military personnel sometimes don't even have fuel to use vehicles.
In the face of these possible diversion, the elected member of the territory of Beni wants justice to deal with the case. " There is a clear desire of the President of the Republic to end the ADF in Beni. But among his employees, there are some who turn away the funds for these operations. Reason why I ask justice to deal with this case ", he says.
In response to this, the military spokesperson of operations Good 1 against the ADF in Beni, Lieutenant Antony Mualushayi, talks about false accusations. " When we have nothing to say, we create controversy to attract attention (...) We must not politicize military operations because, with such words, the enemy seeks to split us, saying that there has been of, that the military collaborate with the enemy. All of this discourages the military who are on the front. Talking about this on social media is wrong. If there is evidence of diversion, let it be produced and Military Justice will follow its course ", crazy the spokesperson.
Meanwhile, the killing doesn't stop. 5 civilians were killed on Tuesday by the ADF in Eringeti in Beni territory and 6 pygmies removed according to local civil society.

DRC army orders for the hunting of more than 100 militias of CODECO in ituri

 The regular army is looking for fighters, their chiefs, féticheurs and priests.
It was since yesterday Wednesday, May 13th that FARDC issued a research opinion against 100 militiamen from the Congo Development Co-op (Codeco).
Since their Bunia Military Region headquarters in Bunia, regular forces have decided to track down these armed men, accused of participating in a insurrectional movement.
Lieutenant Jules Ngongo, FARDC spokesperson for the region, confirmed the information. He testifies to the truth of the photos that appear in those published by the army as the basis of the search opinion against 100 members of Justin Ngujolo who are insecure the territory of Djugu, Ituri.
Among the 100 people wanted by the FARDC, there are fighters, their line leaders, féticheurs and priests. Made up of a large number of féticheurs, the Codeco is a mystical-religious armed group, whose guru is Justin Ngujolo. As such, his faithful consider him a God and are willing to donate blood for him.
These fighters are also convinced that their leader, Justin Ngujolo, can't die of bullets. These can't go through his body. Which is fake and adam. Probably puts is wearing a bullet proof vest. Because, if the fetishes of their marabouts put them to the test of bullets, there would not have been so many Codeco fighters killed in confrontations with FARDC.
Last Tuesday, when the army attacked all the strong places of the Codeco, west of Djugu, killing 23, these militiamen fell on the battlefield. Yet they wore charms around their size, hoping they would make them invulnerable to the balls. Yet they fell. Him himself does not test FARDC balls, but he prefers to hide at the bottom of a hole. Very clever.
This is the very first time FARDC has launched such a research opinion in the eastern DRC where the United Nations has no fewer than 140 groups. An opinion that mainly addresses armed factions using magico-fetish practices, with a war leader considered a god. It is in Ituri that we have to go live it. We understand, therefore, the multiplicity of attacks against FARDC and more often in some kind of madness.
This is what we knew in the former Kasai West when the followers of Chief Kamwena nsapu launched their insurrection against the regular army. They had no weapons of war, but only white weapons and fetishes, with, in the front, their fetisher.
They were also convinced they had magic protection against bullets. We know the result.
This is why later they used weapons of war to continue their fight. In Ituri, however, Justin Ngujolo uses both the and advanced weapons and heavy weapons

Decisions on the the burial of general kahimbi creates a divide between family members,KIVU and FARDC

General Major's funeral, Delphin Kahimbi Kasagwe divided the biological family, as well as friends and acquaintances. Indeed, on 7 May 2020, FARDC Deputy Chief of Staff had received limited biological family members to inform them of the decisions of the Deputy Chief of Staff in charge of the Administration and Logistics.
The General Staff of FARDC, for reasons of respect for his memory and tribute to this illustrious leader of war, finally seized the family in the following words: " In view of the coronavirus pandemic and instructions of his Excellency Mr. President of the Republic, the Chief of Staff General informs the family of the decision to bury the late General Kahimbi Kasagwe Delphin in Kinshasa, leaving her to organize later his funeral in Kiniezire, her native village, located in the territory of Kalehe in South Kivu province ".
This great and historic territory, it is remembered, includes several communities and tribes, namely the Bashi, Banande, Bahunde, Batembo, bahutu,batwa and Batutsi. As an eloquent proof of this socio-political reality, all of these communities are gathered in a Asbl called the "Agreement of the nationals of the of Territory" currently chaired by a local socio-political authority
Still according to reports of the press conference held yesterday Tuesday, May 2020, 12 in the municipality of Kintambo, the project to bury the late Delphin Kahimbi Kasagwe in Kinshasa according to the decisions of the General Staff of the FARDC, violating the rules of their ancient customs and traditions. For some, why not wait until the end of this pandemic and then hold a grand funeral in honor of this worthy son of the country? Doesn't this rush to carry out the funeral of General Major Delphin Kahimbi Kasagwe risk of causing and creating unspeakable hot tubs in the local communities of Kalehe territory and its surroundings in the form of a posthumous settlement of accounts?
So this is the dispute between the FARDC General Staff and the nationals of this large territory located geographically between the two provinces of South and North Kivu.
However, it is felt that, taking into account the concerns expressed by nationals of these two provinces over the current health situation, they still hope to hold their son's funeral when the time comes. Reason why the body is still kept since February 28th, the day of death, until today in Kinshasa at the level of the hospital of the Cinquantenaire hospital, waiting for its transfer to Kalehe and more precisely to the native village at level of the village of Kiniezire.
It is noted that while waiting for this funeral, in a correspondence dated May 8 from the biological family of the deceased, family and some friends claim to have already built a mausoleum in Kiniezire for the funeral of the late general-Major Delphin Kahimbi for organize a family funeral worthy of the name of the famous general-major and war lightning.

Tuesday, May 12, 2020

The dangers of simboxing and call masking in Uganda




Let's us firts understand fully how it goes:
SIM Boxing is a process of creating an artificial middle man with a device that alternates call rates. A SIM Box fraud is a practice whereby SIM boxes are installed with multiple prepaid SIM cards. This enables the fraudsters to bring calls through VolP (through internet) and terminate international calls through local phone numbers in the respective country, just to make it appear as a local call, by initiating the call through local SIM installed in the SIM box.
 SIM box fraudsters mainly use the prepaid SIM, the ownership and address of which is hard to know whereas post-paid SIM are easily traceable because of address verification at the time of connection. The affected stakeholders are the mobile operators, the legal international carriers, and the government.
There are two major players involved in this activity: (1) the fraudsters inside the terminating country; and (2) the illegitimate international carriers from across the border. The fraudster could be a SIM box operator, a local loop operator or a national carrier license holder. The SIM box fraudster basically sets up everything-the SIM boxes, the connectivity, the manpower, and fresh suppliers of SIMs. The local loop operators, bringing in illegal traffic, may use their switches in place of a SIM box. This makes it look like a local call using their own numbering series to terminate the traffic onto mobile operators. The national carrier may bring in illegal traffic, change the ‘A’ number to fake local loop number for each call and terminate the same onto mobile operators on their national trunks instead of international trunks.
Let me explain simplified first the basics of a GSM network and the billing process. I will cut some steps in the process, otherwise it will be too difficult to understand.
If a customer X of company like MTN Uganda calls a friend Y who has a subscription at MTN the flow goes like this.
Cellphone X transmits to the nearest antenna or BTS (Base Transmitter Station,omulingoti) of MTN. The BTS passes the call through the central computer or switch of MTN, where the receiving party is recognized as being a customer of MTN as well, and then the switch sends the call to the BTS where customer Y has made contact and then that BTS send the call to the cellphone of Y. So only the beginning and the end of the call are radio signals (mobile), the in between steps the signal is passed though fixed lines be it glassfiber or such. Customer X will get billed for the call. Since all the traffic is on the network of MTN, they don’t have to pay anyone. This is called an on-net call, where the calls are made between customers of the same network.
Next situation:
If a customer X of MTN calls a friend Y who has a subscription at AIRTEL the flow goes like this.
Cellphone X transmits to the nearest BTS of MTN. The BTS passes the call through the switch of MTN, where the receiving party is recognized as being a customer of AIRTEL. Switch of MTN connects the call to the Switch of AIRTEL, that forward the call to the BTS of AIRTEL where customer of AIRTEL made contact and then radio signals the call to the handset of the customer of AIRTEL. Customer of MTN still gets billed for the call. As you can see, now half of the call (the start) is on the network of MTN and the other half ( the termination) of the call makes use of AIRTEL’s network. So AIRTEL sends  MTN a bill for making use of their network, which they have to maintain. This bill is called termination fee, which every operator has to pay for off-net calls.
To bypass that termination fee, one fraudster can have a simbox to terminate off-net traffic on the radio network of a company. Only switch to switch traffic is charged for termination fee. With a simbox you can convert fixed line calls to mobile calls, using that box and activated simcards. The trick is that companies offer buy off bundles for on-net traffic, say for € 5 a month you can call as much as you want to customers of the same network. Or they have really low on-net tarrifs like 5 cent per minute. They can do that since there are no cost involved for that company since as we saw in the example there are no costs for that company, as long as the calls are started and ended by their own customers.
So the fraudster get some simcards with a tariff of 5 cent per on-net call each for MTN network. He puts them in the simbox and then starts to advertise. Normally when another company want to terminate a call to a customer of MTN they have to pay let’s say 15 cent per minute to MTN. (Not the actual price, but for making it easy to understand) But they only have to pay that when traffic is connected through the switches. The fraudster then can approach MTN and tells them that he is able to terminate all their traffic towards customers of MTN, but for only 10 cent per minute. AIRTEL agrees because that tariff is 5 cent per minute less than if they handover the traffic directly to the switch of MTN. They now send their traffic to the simbox of the fraudster that converts the traffic to mobile calls, just as if it was a giant handset with multiple simcards in it. Since the fraudster only has to pay the subscription fee and a tariff of 5 cents per minute while receiving 10 cent per minute he is making a profit of 5 cent per minute, per sim. He off course pays his bill right away because he wants his simcards open. Since the traffic is huge 5 cent per minute per sim means he earns  $72 each day per sim. So if he has 10 sims, he is earning $ 720 a day just by having that simbox active.
MTN then have a customer that has a monthly bill of let’s say $ 20.000. At first they are happy with such customer that pays his bills every month. But instead of gaining $ 20K, they lose $40K each month, because if all that traffic was presented at their switch they would have billed AIRTEL $60K for those calls.


 SIM box fraudsters mainly use the prepaid SIM, the ownership and address of which is hard to know whereas post-paid SIM are easily traceable because of address verification at the time of connection. The affected stakeholders are the mobile operators, the legal international carriers, and the government.
There are two major players involved in this activity: (1) the fraudsters inside the terminating country; and (2) the illegitimate international carriers from across the border. The fraudster could be a SIM box operator, a local loop operator or a national carrier license holder. The SIM box fraudster basically sets up everything-the SIM boxes, the connectivity, the manpower, and fresh suppliers of SIMs. The local loop operators, bringing in illegal traffic, may use their switches in place of a SIM box. This makes it look like a local call using their own numbering series to terminate the traffic onto mobile operators. The national carrier may bring in illegal traffic, change the ‘A’ number to fake local loop number for each call and terminate the same onto mobile operators on their national trunks instead of international trunks.
The perpetrators of these telecoms infractions have ulterior motives in tampering with international calls and disguising such calls as local calls because of the profit they hope to make from the price differential between international and local call termination rates.

Effects of SIM Box Fraud
Subscriber Identification Modules (SIM) box fraud is a set up where fraudsters team up with international entities,and local operators (I highly anticipate that simcardboxing in Uganda is made possible as a result of teaming with local network operators especially a connivance with their dubious employee to route international calls through the internet, using voice over internet protocol (VOIP) and terminate those calls through a local phone number in Uganda to make it appear as if the call is local.
This allows the box operator to bypass international rates to fraudulently undercut the prices charged by Mobile Network Operators (MNO) and evade the surtax charged by the government. This act denies telecommunications and government from benefiting from international phone calls. Besides loss of revenue, SIM Box operators cause degradation of call quality which prevents them from meeting service level agreements for mobile hubbing traffic. Uganda, in recent years, made attempt to detect and track SIM Box fraudsters.
Another effect is on our social media accounts,that is Instagram, Facebook, WhatsApp, emails,...etc,whereby 2FA and other verification messages are carried to local phone numbers.
I believe the tracking and detection activities only deter fraudsters, but it does not eradicate the problem. Administrative and technical controls must be implemented in Uganda to thwart SIM Box operations.
Strategies must be implemented to include Geo-location solution which will expose the location of the equipment and their operators for confiscation and prosecution. The network operators must be  mandated to block all SIM card identified to be involved in SIM Box fraud activities, but these operators mostly do not block this fraud SIMs in real time or near time.
 I believe these mechanisms cannot prevent SIM Box operations in Uganda because they can only detect or track fraud activities. The solution must not be just tracking, blocking SIM cards and arresting the culprit. Both administrative and technical measures must be put in place to stop the act or make it less attractive.
The only plan that could probably stop or prevent SIM Box fraud in Uganda is to create an environment where the criminal will feel uncomfortable to operate. Since it is practically impossible and economically unwise to reduce the call rate for the international traffic penetration, government must implement measures to either reduce the crime rate or eradicate it entirely.
The sale of pre- paid SIM cards contributes to operation of SIM Box activities.I recommend that Uganda Communication Commission (UCC) put measures in place to reduce the sale of pre-paid SIM cards by Ugandan mobile telecommunication companies. UCC must sanction any network operator whose SIM is used for perpetrating crime without proper profiling.
UCC  must speed up the ironing out of SIM registration irregularities which are still in existence. Additionally, network operators need to implement an intelligent software or hardware system that can detect and report multiple name registration for onwards investigations.
UCC must task the communication policy implementers and other security organs  to provide enhanced bypassed traffic detection and location-aware system. This system has the capability to identify fraudulent VoIP calls (in real-time) and provides the GPS coordinates for the exact location of the SIM Box. The proposed intelligent solution could be software or hardware device programmed to intelligently detect cases in real-time and then enforce immediate blocking of the SIMs detected.
Real-time information of any suspicious or potentially fraudulent activity can be instantly identified and brought under control so that financial losses are avoided. Further, there must be automation of fraud detection process, implementation of organizational standards, customized policies, rules, and thresholds (with fraud management system) which is built around UCC’s specific needs and operational requirement.Government must ensure that the law enforcement agencies,UCC, Network operators and police collaborate to effect an arrest of the perpetrators in near real time. These measures, when implemented appropriately, have the ability of providing a lasting solution to the SIM Box fraud in Uganda and other persistent communication related crimes.
CALL MASKING
Call masking/refilling is a practice in which callers hide their true numbers when making calls, especially international calls, in order to evade international call rates. A masked call happens when an international call coming into a country is concealed and presented as a local call in order to avoid payment of the correct international termination rate (ITR). For instance, if a number is masked as a local call, the rogue network operator pays Local Termination Rate (LTR) instead of the approved  ITR.
 call masking has the following repercussions:
1. It is powered by Voice APIs, a coding platform where a developer can set up phone number proxies to keep parties from knowing each other’s phone numbers during a call.
2. It uses a short-lived phone number for each party.This allows the caller to communicate seamlessly during a specified time period, with no room for the recipient to speak.
3. It is one of the many platforms terrorists use to communicate in an anonymous manner.
4. It is used to disguise as a family, especially for fraudulent motives.
5. It is a method used to evade the international call rates.
6. Call masking amounts to revenue loss for licensed local telecom operators from international calls since they are being disguised as local calls.

General Muhima Dieudonné accused by three local communities of co-operation with the armed armed group.


General Muhima Dieudonné of Congolese Loyalists based in Minembwe is accused by the Vira, Nyindu and Fuliro communities of being in complicity with the Gumino armed group of the Banyamulenge community to carry out joint operations against them, on the grounds of attacking the Mai Group - Mai Yakutumba neutralized two years ago, reports a joint statement from these three communities dated April 25
These charges came after the death of three Banyamulenge in the exchange of shots between them and the Bafuleru on April 20th in Lulenge. These clashes were due to the introduction of the Banyamulenge into the fields of Bafuliro in Lulenge, who accused them of wanting to steal their yams.
To dispel, the Banyamulenge Community accused the Mai-Mai Yakutumba of being at the base of their three dead with a view to having the intervention of the Loyalists, led by General Muhima Dieudonné.
On Wednesday, April 22, the population of Musika Lulenge woke up in a rain of bullets, having killed 10 dead, all children, and 18 houses burned on the grounds that he was chasing the Mai-Mai Yakutumba, yet neutralized two years ago by the Democratic Republic of the DRC.
" The presence of General Muhima Dieudonné of the Loyalists here in the Fizi remains a source of insecurity and the worsening of conflicts. He does not participate in the pacification of the territory of Fizu, he always lights fire for the benefit of those who will kill him. Sometimes the Banyamulenge accuse him, sometimes the other local communities. There's still a two-edged knife left. He is worthless. He sometimes abuse his authority in some cases. Its elements under control also bother people in some lands. Finally, those who should bring together and protect the people, are those who split them to enrich themselves in the blood of others said a resident under anonymity.
The three communities have signed this grunts to the Congolese government, call for its intervention to avoid another wave of violence during this period of the of-19. pandemic.
It should be noted that the territory of Fizi has been the epicenter of inter-differences conflicts for years between Banyamulenge, Vira, Fuliro, and the, despite several attempts at reconciliation by local civil society organizations.

Conversation between the judge and vital Kamerhe during the opening of the trial at the prison on this ended Monday in Makala.

This letter above shows there is still more Vital kamerhe must answer.

Judge: how did you intervene in the implementation of this program? Director of Cabinet or any other quality? What role did you play in delivering this program?
Kamerhe: I am cabinet director of the head of state. We have to run the program of the head of state, which is already a new situation and usually the program is the prime minister. By what we had a prime minister from an assembly that had just been swept away by a new assembly and we didn't have a prime minister and the president of the republic should cross arms for 7 months and do nothing? So I intervened on behalf of the President of the Republic to get this work done and that we can meet the urgent needs of the Congolese people in the education, health, roads and even free education at home then many know that free is part of the 100 day program. We choose what seems to create confusion and move on.
Judge: Thank you and the court asked the question, how did you intervene?
Kamerhe: Director of Cabinet of the Head of State.
Judge: and that's it?
Kamerhe: yes that's all
Judge: another question, do you know Mr. Samih Jammal who is on your right?
Kamerhe: I'm going to know him in what title? all economic operators, all providers have gone to the commission, they got validated there.
Judge: have you never met him?
Kamerhe: I've met a lot of people in my life. How do you want me to remember thousands of people we met during the election campaign.
Judge: as far as you're concerned, you have no idea?
Kamerhe: I say no
Judge: and the accused Muhima, do you know him?
Kamerhe: you know that Muhima I know him by name, it was today that I discovered the face and was amazed by what I asked everyone, is Jeannot already there. Because our administration of ours, the one I led to the president of the republic, it is no longer the administration to receive the agents in the offices it is the notes on the documents. The customs clearance documents I wrote to the accountant in transfer quickly at Mr. Muhima in charge of logistics to speed up the process. This annotation is here, I don't need to see it. I don't touch the money, I don't transfer for Jeannot, everyone does their job. And me this is the notebook I look at, is it the containers of Mbuji-Mayi have arrived, yes, part. The containers of Kinshasa? Yes, all the containers have arrived, from Kananga? No because we didn't pay, is it in Lobito, South Kivu? No by what we didn't pay, is it in Dar Es Salaam of Matadi? No by what the government hasn't paid yet, it's in Istanbul. What do you want us to say again?
Attorney: Mr. President asked you the question, he answered twice but not the same. He replied that he intervened as a cabinet manager and supervisor and I did not alone, we were with others and coordination. But in the end, he intervened to stress that he intervened as a cabinet manager. I would like the Clerk, if he can repeat, so that the Clerk would note not only that he intervened as a cabinet director but a supervisor as well.
Judge: can you specify.
Kamerhe: it's tendentious, it's tendentious, that's how I didn't want lawyers to come say I'm not going to answer. Then all these little traps left and right...
Judge: can you specify in relation to this?
Kamerhe: is one inconsistent with the other? I'm not saying I'm a supervisor, we were a monitoring team, 9 in total. The document, it's here, read it. There was Mr. vital Kamerhe, director of cabinet, he had Mr. Kolongele, deputy director of cabinet, there was Mr. Yav Minister of Finance, there was the governor of the central bank, the minister of budget of the time, there was had the of representative... all of that.
Judge: you were 9 in total?
Kamerhe: 9 in total, in addition to this 9, there was coordination. What's amazing here.
Judge: who was coordinating?
Kamerhe: it's Monsi vouseur Nicolas Kazadi, traveling ambassador of the head of state.
Judge: thank you, please sit down.

Monday, May 11, 2020

Main ways to block mobile phone attacks


With mobile attacks on the rise this year, we wanted to push the importance of ensuring you are doing everything possible to keep yourself from becoming another victim of mobile attacks; be just as careful on your mobile as you would on your desktop!
So, here are the TOP 20 ways to block mobile attacks...
WIFI:
- Don't allow your device to auto-join unfamiliar networks.
- Always turn off WiFi when you aren't using it or don't need it.
- Never send sensitive information over WiFi unless you're absolutely sure it's a secure network.
APPS:
- Only us apps available in your device's official store - NEVER download from a browser.
- Be wary of apps from unkown developers or those with limited/bad reviews.
- Keep them updated to ensure they have the latest security.
- If they're no longer supported by your store, just delete!
- Don't grant administrator, or excessive privileges to apps unless you truly trust them.
BROWSER:
- Watch out for ads, giveaways and contests that seem too good to be true. Often these lead to phishing sites that appear to be legit.
- Pay close attention to URLs. These are harder to verify on mobile screens but its worth the effort.
- Never save your login information when you're using a web browser.
BLUETOOTH:
- Disable automatic Bluetooth pairing.
- Always turn it off when you don't need it.
SMISHING (PHISHING VIA SMS):
- Don't trust messages that attempt to get you to reveal any personal information.I know alot of you have always received fake messages on mobile money or local phone numbers that send you 2FA codes for your emails,social media accounts.
- Beware of similar tactics in platforms like WhatsApp, Facebook Messenger, Instagram, etc.
- Treat messages the same way you would treat email, always think before you click!
VISHING (VOICE PHISHING):
- Do not respond to telephone or email requests for personal financial information especially mobile money. If you are concerned, call the financial institution directly using the phone number that appears on the back of your credit card or on your monthly statement.
- Never click on a link in an unsolicited commercial email.
- Speak only with live people when providing account information, and only when you initiate the call.
- Install software that can tell you whether you are on a secure or fake website.
SOCIAL MEDIA
On your social media accounts,always let your phone number and emails associated be only viewed by you!!!

Is this really Why Virunga National Park guards were killed






In the middle of the forest, the large chalets at the Mikeno lodge are the most luxurious accommodation in Virunga National Park in eastern Democratic Republic of the Congo. In the evening, you can sip champagne at the corner of the fireplace. In the day, You meet orphaned primates, raised by park guards, and meet mountain gorillas in their natural environment. Virunga Park is one of the few on earth to house this iconic species in critical danger of extinction.
On the morning of April 24th, the lodge was empty of any visitor. Pandemic again coronavirus forces, tourism has been at a stop for several weeks. But it was another plague that was going to hit.
Around 11 p. m weapons of war suddenly rent the calm of the forest. A few hundred meters from the chalets, three vehicles, including two of the park guards, had fallen into an ambush in Mahura. The 30 minutes of exchange of shots leave a terrible record: twelve park guards, their driver, and four civilians are killed. The Congolese Nature Conservation Institute (ICCN) had never suffered such a heavy attack in Virunga Park.
Yet his guards are used to adversity. From Mount Rwenzori, which frequently serves as a refuge for the Allied Democratic Forces (ADF, an Islamist Rebellion of Ugandan origin), to the Nyiragongo volcano, which overlooks the city of Goma, the 7 km2 of Virunga National Park serve regularly from battlefield to armed groups, road to their smuggling routes or resources for their looting.
This adversity justifies an arms race in the 2010 s, including the creation of a "Quick Reaction Force" (QRF, or Rapid Reaction Force) of the ICCN, a paramilitary and sometimes offensive unit composed of 270 park elite guards. In doing so, and as noble as their mission to preserve nature, park guards have become, in fact, an actor caught in the conflicts of Kivu. The Kivu Security Barometer (KST) has thus identified 28 clashes involving of guards since the beginning of its survey in 2017. This is probably only part of the total.
The guards can co-operate with the Congolese army in attacks that can cause security civilians, as against the May-Mai mazembe, on May 23, 2019. " The park is quite correct that the guards are not not legitimate targets under international humanitarian law, but the specific status of QRF and the character of their operations places them in a grey area ", says Christoph Vogel, a researcher at the University of Ghent (Belgium) and former member of the Group United Nations experts on the DRC.
On the other hand, a long and complex conflict is against some local communities as to the boundaries of the park. The latter occupied a quarter of the territories of Beni, Lubero, Masisi, Nyiragongo and Rutshuru and deprived some farmers from access to land they used to grow. This conflict is particularly intense in the of area, although the recently authorized harvest from April 27 to July 26 to better deal with the shortage caused by the pandemic.
So the of guards have no enemies. Especially the QRF, the most feared of its units, who was decimated during the attack. However, park authorities were able to publish several very detailed news releases on the circumstances of the attack.
The first one claims that it was actually the civil vehicle that was the target of this ambush. According to our reports, it was a white Toyota Prado TX that was attacked with a weapon of war (RPG rocket launcher and heavy heavy machine gun). According to the statement, the attackers are no other than the Rwandan Hutu rebels of the Democratic Liberation Forces of Rwanda - abacunguzi fighting forces (FDLR-Foca). More specifically, it would be about sixty fighters from the Maccabé group, formerly known as the Deep Research and Action Commandos (Crap), an elite FDLR unit.
The of guards, who were passing through to their headquarters in Rumangabo, would have been nothing but security victims of the ambush and in turn were targeted only because they were trying to rescue civilians. This first version was slightly modified in the second statement, which only states that a "civil vehicle was near that had already been targeted by the attackers before the arrival of the guards".
So why would FDLR attack a civil vehicle with a weapon of war? Several sources, diplomatic, university and ICCN, have told the KST the scenario. According to the latter, FDLR reportedly received information that Colonel FARDC Claude Rusimbi, the deputy commander in charge of operations and intelligence of 3409 erégiment, was to take this route between Goma and Rutshuru that morning. It is possible that FDLR took park guards for his escort.
FDLR had reason to personally blame Rusimbi. On 13 April, one of their main strongholds located in Kazahoro, a few kilometers from the place of the attack, had indeed become the target of a massive Congolese army offensive. According to several sources, both military and diplomatic, members of the Special Forces of the Rwandan army (RDF) were secretly participating in this assault. Colonel Claude Rusimbi is just one of the Congolese officers responsible for coordination with their Rwandan colleagues, according to several military and university sources. According to a member of his entourage, this Colonel knew he was targeted by FDLR.
Whether or not targeted reprisals against Rusimbi, FDLR's responsibility seems highly likely. It is compatible with the known weapons and organization of this armed group, as well as the area where this group is carrying out its attacks.
The attack on Virunga Park guards (red star) is in an area where FDLR-Foca strikes regularly (other colors: incidents in which they have been involved, since June 2017)
In addition to the ICCN, which holds FDLR responsible for the ambush, Rwandan President Paul Kagame also accused this armed group at a press conference on 27 April (37th minute).
FDLR also had specific reasons to address the. These rebels regularly suspect park guards to collaborate with the Rwandan army to track them down. In addition, according to several reports by UN experts for the DRC, one of their main sources of financing is trade and taxation of "makala", charcoal obtained in particular by illegally burning trees inside the park. This puts them, in fact, in conflict with the ICCN, and especially its QRF.
FDLR, however, put forward another theory: they believe the Rwandan army would be responsible for the attack. But this scenario seems convoluted: the ICCN reportedly lied, mistakenly accused FDLR, in order to demonize them to justify the presence of RDF on Congolese soil. Such conspiracy, involving several different actors, seems difficult to implement.
" The FDLR statement was completely out of the reality of the facts, also says a good expert of the group. It has only been published to respond to the Rwandan authorities in the media war they are fighting ".
" FDLR members privately recognize being responsible for this attack says Christoph Vogel. According to them, this was a "mistake" and they claim that their target was Rusimbi"

At least 20 people presented as alleged authors of insecurity in the city of Beni in North Kivu, have fallen into the net of the Congolese national police, announced on Sunday, May 10.


At least 20 people presented as alleged authors of insecurity in the city of Beni in North Kivu, have fallen into the net of the Congolese national police, announced on Sunday, May 10,, Murara, responsible for the cell of police communication in the vile of Beni.
These people, among whom we have been identified uncontrolled military, are accused of being responsible for the recent insecurity in some areas of the city of Beni.
According to the communication officer of the police station in the city of Beni, this operation launched since last Thursday, is the result of the alert but also the good collaboration between police and the population. During this closure that was carried out in the municipality of I, precisely in the Vingazi cell, 23 people fell into the police net. Two weapons have also been recovered.
In addition to these men, there are other people arrested Saturday, May 9 in the evening. They are suspected of being responsible for the assassination of a 20-year-old girl last Friday in the Muloku cell in the municipality of Bungulu. Police are asking the people to continue with this frank collaboration to ensure security is a reality in the city of Beni.
" This is a very strong signal. And we still continue to call on the people to remain very vigilant and denounce. Because the city of Beni seems to be like a prey of insecurity. The population must always continue to collaborate and denounce in a timely fashion. May the marriage between civilians and law enforcement continue until the elimination of insecurity in the city of Beni ", recommend Nasson Murara.
He adds that these persons will be transferred to the competent court.

Researchers have released the latest statistics on worldwide malware infection

Cybercriminals are taking full advantage of lockdown amid Corona virus period. At least this is what the new figures have revealed. Researchers have released the latest statistics on worldwide malware infection
trends during the last 30 days, and the results are quite alarming especially for educational institutions and the business sector.
According to Atlas VPN, the firm behind compiling these trends, in the past 30 days, about 404 million malware worldwide infections have been identified. This suggests cybercriminals carried out at least 10 million infections per day. Surprisingly, over 64% of the attacks were targeted against educational institutions. 
It is noted that the rate of daily infections in April kept fluctuating between 10 to 16 million cases per day, such as, on 1stApril 2020, there were roughly 12 million infections registered globally while the rate dropped significantly on April 5 with 10 million daily infections, the company’s blog post said. The rate peaked again reaching the highest number of infections on 16 April with 16 million infections registered in a day.

According to Kaspersky’S Cyberthreat map, Central Asia remained the prime target of local cyberattacks with 32% infected devices identified in Tajikistan and 31% in Uzbekistan while 27% of devices used Kaspersky antivirus solutions were exposed to malware in China.
Researchers detected 400 million malware infection in April 2020
On the other hand, Microsoft claims to have identified 6.5 million malware infections targeting different industries. After the education sector, business and professional services were targeted the most with 623,000 incidents of cyberattacks or 9% infection rate. The retail and consumer goods sector came in third claiming 8% of total incidents or 540,000 cases. 
The financial and insurance services sector received 5% of the global malware infections and Microsoft identified around 330,000 cases in this domain of service. Healthcare was the fifth most targeted sector receiving 4% of worldwide malware attacks or 270,000 infections.
The aerospace and automobile industry received 3% or 200,000 malicious attacks; chemicals, oils, gas, and mining sectors receive nearly 3% of worldwide cyberattacks with 194,000 cases. Transportation and hospitality services sector was exposed to 162,000 malware attacks, which means about 2.5% of devices receiving malware attacks globally.
Researchers detected 400 million malware infection in April 2020
The number of malware attacks is expected to rise during the exam period. Hence, if schools are planning on holding exams remotely, they should prepare and get experienced IT specialists to check the systems to prevent sensitive information from being stolen, warned Atlas VPN’s Anton P.