Monday, April 29, 2019

Somalia and the alshabab today!!!!


Security forces in Mogadishu have last night conducted a massive operation aimed to sweep suspected Al-Shabaab militants groups in the city.
The night operation which was conducted in Dharkenlay district of Banadir region led to the arrest hundreds of young people.
Police said the hundreds of the young people who were taken to custody will be questioned with a view to getting more information from them.
The governor of Benadir region and mayor of Mogadishu, Abdirahman Osman Yarisow has yesterday vowed to ensure the safety and security of the capital Mogadishu.
Security forces in Banadir region have been conducting security operations in Mogadishu over the past few months to ensure the security of the region.

 Again on this sunday ,Kenyan police  urged the public to provide any information that will lead to the arrest of three wanted terror suspects behind insecurity across the East African nation.
Anthony Munga, National Police Service’s deputy spokesman also circulated photos of the suspects whom he said could be armed and dangerous and may cause harm to the public and urged the three suspects to surrender themselves.
“We urge those who suspect that their relatives or acquaintances could have joined jihadi groups, are planning to travel to jihadi theatres, or have returned from countries known to harbour jihadists to immediately report to the nearest police station,” Munga said in a statement issued in Nairobi.
Munga who did not provide names of the wanted terror suspects said the police have already started taking legal action on individuals who have failed to report on their associates and relatives who have joined jihadi organizations.
Kenya is currently engaged in the fight against the militia group in southern Somalia where its soldiers under the African Union peacekeeping mission African Union Mission in Somalia (AMISOM) have intensified the fight against the insurgents.
The east African nation faces insecurity as bomb attacks using improvised explosive devices and grenades have targeted the coastal city of Mombasa and northeastern regions since the military entered Somalia in 2011 to secure the shared border Somalia. court in Mogadishu has today,Monday sentenced to death a police officer found guilty of killing a minibus driver and injury one of the passenger on 06-01-2019 at Siinka dheer a police checkpoint between Mogadishu and Afgoye
Colonel Hussein Mohamed Mohamud, one of the judges of the Supreme Court of the Armed Forces read the verdict to the media and declared that Abdullahi Hassan Mohamed Ali has committed the crime deliberately and killed Mohamed Ismail Qaboobe on 6th January this year at Siinka dheer.
“Abdullahi Hassan Mohamed has also injured unarmed civilians who were on board of the minibus driven by the deceased Mohamed Ismail,” added Colonel Hussein.
The judge noted the defendant can appeal the case.
The military court often carries out sentences and executions to Al-Shabaab militants and government soldiers who commit crimes despite condemnation from human rights groups including the European Union.
The African Union Mission in Somalia (AMISOM) on Saturday dismissed reports that extremist group of al-Shabab has recaptured the recently liberated town of Sabiid in the southern region.
The AU mission said the strategic town of Sabiid, which located about 40 km south of Mogadishu, is still controlled by the allied forces.
“Kindly disregard reports circulating that the terrorists have seized the recently liberated town of Sabiid. Sabiid is currently under the full control of Somali government forces with support from AMISOM,” said the AU mission in a statement.
AMISOM said the joint forces continue to work in coordination for peace across the Horn of Africa nation and dismissed the takeover reports as propaganda by the extremist group.
“Al-Shabab and their supporters are at pain with the loss of Sabiid and their inability to face the firm grip of the town by the Somali government forces. They are now resorting to propaganda and disinformation,” said the AU mission.
AMISOM troops in a joint operation with the Somali National Army (SNA) liberated the strategic bridge town of Sabiid from the control of the insurgents on April 1.
Sabiid town, situated in the Lower Shabelle region of Somalia, is one of the strategic objectives which are earmarked for liberation.

Saturday, April 27, 2019

Uganda redCross does not know this... Never fall prey to this fraud!!!


UGANDA RED CROSS JOB APPLICATION FORM
URGENT MASS RECRUITMENT BY UGANDA RED CROSS SOCIETY IN EVERY DISTRICT. APPLY NOW!!!
RED CROSS is a global humanitarian organization that is dedicated to saving lives through provision of emergency responses, health & human development, sanitation, poverty alleviation and food security.
We are recruiting 50 people in every District based on first come first served basis, to fill up the following job positions.
• Supervisors & Administrators
• Cleaners & Messengers
• Fieldwork Assistants
• Guards
• Drivers
• Motorbike Riders
• Accountants
• First-Aid Facilitators
• Nurses
• Receptionists
• Technicians
• Cooks & Caresses
SALARY IS FROM UGX. 940,000 AND ABOVE
Qualifications
1) Must be 18 years and above
2) Understand and Speak English and One local language.
3) Disciplined and ready to work ANYWHERE in Uganda.
Applications must be received on or before 28th April 2019.
* Required
Application Procedure
Step 1: Complete the application form
Step 2: Enter Red Cross Membership number and Submit application.
NOTE: Those who do not have Red Cross membership card must register with 20,000 UGX to get Instant Membership Registration before proceeding with application. The Money is refundable if you do not qualify for the job applied for and do not wish to remain as a Red Cross member.
NOTE: ONLY APPLICANTS WHO HAVE MEMBERSHIP CARDS OR HAVE PAID MEMBERSHIP REGISTRATION FEE WILL BE CONSIDERED.
Step 3: First interview
Step 4: Attend One Week training
Step 5: Receive an offer
MEMBERSHIP FEE PAYMENT PROCEDURE
Note: We have opted for Mobile Money payment mode to make this application process as simple as possible.
1. Go to your Mobile Money menu,
2. Send Money
3.Enter Our MTN NUMBER; 0774 743 298 (ABUBAKALI NDILUGENDAWA, Chief Recruitment Officer)
4. Enter amount 20,000 UGX
5. Enter your PIN and confirm to send money.
POINTS TO NOTE
1. After payment of the Membership Registration fee, you will receive a transaction ID which you will use to complete the application form below. Your Red Cross Membership number will be given to you at a later date.
APPLY BELOW
Name *
First and last name
Your answer
Age *
Your answer
Email *
Your answer
Phone number *
Your answer
Your District *
Your answer
Which job(s) are you interested in? *
You may name a maximum of three
Your answer
Enter your Red Cross Membership Number or Transaction ID you received after sending Registration Fee. *
Your answer
Apply Today To Join The Red Cross Community Around The World

SUBMIT

Friday, April 26, 2019

What are finger print scanner and how does it work

 Malicious actors can harm us in so many ways that we cannot even fathom it. The most common tactic they use is by stealing someone’s identification and using it as their own. For this reason, many IT technicians are working on new technologies to get rid of these kinds of menaces. One of the most talked about technologies is Virtual Private Network (VPN). Many people are using free VPNs to attain security, keep their activities anonymous, and encrypt their traffic. However, there is another method of security that many people are unaware of. Technicians gave creation to the technology called Fingerprint Scanners.
What Is A Fingerprint Scanner?
A fingerprint scanner is a device used to identify a person by scanning their fingerprints. We have several ridges on our fingers. Additionally, every person has a unique pattern. Hence, a fingerprint scanner scans them to identify us.
There are also many types of fingerprint scanners. Some of these are as follows:
Optical reflexive
Capacitive
Mechanical
Thermal
Dynamic output
How Do Fingerprint Scanners Work
The sensor avails a light-penetrating microprocessor that can either be a charge-coupled device or a CCD, or a CMOS image sensor. In doing so, this creates a digital picture. Following this, the processor examines the image mechanically, choosing just the fingerprint, and then uses refined pattern-identical software to turn it into encryption.
This is merely how one type of scanner works. In the other kind, i.e., the capacitive type of scanners, the scanner scans the gaps between our ridges.
So when a person places his or her hand on any object, the ridges are the part that touches the surface. Therefore, these ridges are logged and the gaps distances are measured. In this way, the pattern is recorded. In other words, it means the distance between two ridges that never came in contact with the surface is noted down.
Uses Of Fingerprint Scanners
Fingerprint scanners greatly benefit humanity.
They:
are a secure form of identification.
reduce the work of the human brain.
increase the efficiency of work security.
help log people quickly.
Following are some pieces of equipment in which a fingerprint scanner is being used.
1. Laptops and Computers
Fingerprint Scanners are used prominently and most beneficially in our everyday laptops and computers. Thankfully, we have an option of creating a fingerprint configuration. This way, we can keep our laptops and PC’s secure from external attacks. Additionally, we can prevent someone from getting in without permission.
A fingerprint configuration will keep your information safe if you ever lose your laptop.
2. Smart Phone
Smart Phones hold a lot of our personal information. We keep friends/relatives numbers, personal photographs, and sometimes even our notes and private documents. Additionally, in the worst cases, we have banking apps with our credit card information or even social security numbers stored. Therefore, we can use fingerprint arrangement in our phones to keep such information safe and protected.
If your phone is ever stolen, a lock and a fingerprint confirmation will help prevent your information from being leaked or abused.
3. Online Banking
Just like phones and laptops, we also need fingerprint scanners in online banking. Malicious actors often target bank account details like code pins or account numbers. Therefore, using fingerprint scanners ensure that only you can access your bank information.
4. Automatic doors
Today, industrialization has increased so much that office and home security is moving towards automatic doors. However, these doors open only with the correct fingerprint scan. We call this a biometric lock. A person can add their fingerprints to it and then the door will open only when it scans those fingerprints.
Privacy And Security
Of course, we cannot say that fingerprint scanners are 100% reliable. There are ways to hack them. Hackers always find a way to invade into your personal and professional life. Here are some shortcomings regarding fingerprint scanners:
Hackers can use a 3D system of mildew that is created from a preserved fingerprint.
Mischievous and evil hackers can forge your fingerprint with the assistance of tools which are as plain as a luminous or transparent film and a circuit scribe.
Scanners can malfunction and prevent the user from full access if their skin is wet or if too much dust gathers on the devices.
Thus, you see fingerprint scanners does not guarantee privacy. Therefore cyber-crime departments should work more on the security of fingerprint scanners. However, these shortcomings in this relatively new technology does not negate the fact that fingerprint scanners are and will continue to be very helpful and eventually essential.
Tags: Banking, 

When I wrote about this in early March this year,many of you thought I was joking!!! It's kabale and next is another district... DISOs,GISOs,..... stay warned!!!

Police in Kabale district have arrested Samson Twasiima, the Butanda Sub County National Identification Registration Authority (NIRA) Officer on allegation of bribery and extortion.
The arrest was ordered by Kabale Deputy Resident District Commissioner Gad Rugaju.
Twasiima was arrested on Thursday during a meeting between Mr Rugaju and residents of Butanda, held at Butanda Sub County headquarters.
Rugaju says he called the meeting after several residents reported to his office complaining against the NIRA boss and his colleagues for extorting money from locals who are trying to register for national IDs.
Some of the residents like Winston Tumuheimbise, Elcana Byamukanga and Jonathan Niwamanya told the RDC that the suspect forced them to pay up to Shs 100,000 to accept their applications for the IDs.
Twasiima is also said to have been charging Shs 8000 and 20000 for birth and death certificates respectively from the locals.
In response, Norman Nsenga the Kabale and Rukiga districts NIRA Officer described the situation as unfortunate and apologized for the mess.
He clarified that the registration process for the National IDs is free and all the money supposed to be paid, 5000 for a birth certificate and 50000 for National ID replacement must be paid in the bank.
On his part, Twasiima admitted to have extorted the money from the residents but could not account for it. This forced Rugaju to order for his arrest by police.

Mighty UPDF to get new weapons


A colossal sum of money has been set aside for the purchase of an unnamed item by the Uganda Peoples Defense Forces.
The classified asset is billed at Shs 1.9Trillion, about 6% of the 2019/2020 national budget of 34.3tn.
The Shs 1.94Trillions, is separate from the customary classified expenditure of Shs 225bn also planned for in the same financial year.
The new development is contained in the Ministerial Policy Statement (2019/2020 budget) of Defense and Veteran Affairs ministry.
The annual classified expenditure for the last four financial years since 2015/2016 has been maintained at around Shs 600bn. The 2018/2019 classified expenditure was Shs 640bn.
The planned 2019/2020 total classified expenditure will be Shs 2.2bn, higher than the whole 2018/2019 defense budget of Shs 1.97tn. The 2019/2020 total defense budget stands at Shs 3.4tn, an increment of 58 percent.
The top UPDF generals, Ministers of Defense and Veteran Affairs and Permanent Secretary Rosette Byengoma did not divulge to Members of Parliament any detail about the classified asset during meetings by the Committee on Defense and Internal Affairs sitting at Parliament.
It shall be remembered however, that in mid-2014, the Defense Ministry entered negotiations with a Russian bank through the Russian state owned arms export company, Rosboronexport to acquire a USD$ 170m loan to support the acquisition of some classified equipment.
In 2012 Uganda bought 6 fighter jets from the same Russian state arms export company at Shs 654bn. The government had taken a total of Shs 1.7tn from Bank of Uganda to also buy other military assets from Eastern European countries.
The current Shs 1.94tn (USD$ 524m) can buy 14 multirole Sukhoi Su-30 Russian fighter jets, which are among the most popular in Africa, at the current USD$ 37.5m each. Uganda already has Sukhoi fighter jets in her air force fleet.
The same amount can also buy 112 advanced T-90 third generation Russian made battle tanks. Uganda already own 44 T-90 tanks also known as Vildamirs and the Africa’s biggest defense spender, Algeria (USD$ 10bn) has 572 similar fighter tanks.
Uganda’s Defense spending has also immensely increased from USD$ 500m to USD$ 921m. The defense budget is however projected to reduce to Shs 2.4tn or USD$ 640m in the next financial year of 2020/2021.
When contacted on phone the Ministry of Defense and UPDF Spokesman, Brig. Richard Kaaremire confirmed and defended the budget.
“We need that amount (Shs 1.9tn) to deliver on our mandate as the UPDF,” Karemire briefly said.
The UPDF has four main mandates: to defend and protect the sovereignty and territorial integrity of Uganda, cooperate with civilian authorities in emergency situations and natural disasters, foster harmony and understanding between defense forces and civilians and engage in productive activities for national development.
The Shs 1.9tn for a single classified vote is 48 times bigger than the total 2019/2020 budget of Ministry of ICT and National Guidance’s Shs 40bn.

Wednesday, March 27, 2019


NOKIA 7 PLUS PHONES SENT PERSONAL INFORMATION TO China.Nokia 7 plus phones have been hidden sending personal information to China. Finland has started an investigation after
NRK’s ​​disclosure.
As per NRK’s reports, The end user’s phone number, GPS location, mobile phone IMEI number has sent to the Chinese server. Every time when Nokia 7 plus devices were powered on or Unlocked the information sent to the server. Moreover, the data packages were in an unencrypted format that is more horrify.
NRK investigated and found the server domain vnet.cn. Vnet.cn domain is own by China Internet Network Information Center( China Telecom).
Likely, that this is an application intended for the Chinese market but which has been accidentally distributed to Nokia 7 Plus phones outside China’s borders. HMD Global refused to make comment to NRK on the matter.
Further more, uncovered code on Github by non-other than Qualcomm.
The only other clue comes courtesy of security researcher Dirk Wetter, who claims the offending APK package sending this data to China is named “com.qualcomm.qti.autoregistration.apk.” He had also investigated the network traffic to his Nokia 7 Plus, and saw the same remarkable packages.

Tuesday, March 26, 2019

All people in East Africa who use mobile phones are at a risk of falling prey to cyber criminals

C

Throughout my writings and research reports  i have presented to various blogs, websites,and as an experienced cyber security and threat intelligence analyst.I have for long time been warning all of you in East Africa of being subjective and prone to attacks from cyber criminals.I remember telling you of the behavior that show a phone or an technology equipment has been taken over by a malicious spy ware or any exterior intrusion. Some of the characters include fast draining of the battery,unfamiliar sounds in background when calling,slowness and unexpected shutdowns of internet browser and search engines.... etc.
Recently you had that president Uhuru Kenyatta's social media accounts were being intruded by unknown and anauthorised people!!!! How did it happen for a whole president with all availed technocrats. Its ridiculous however we as technologists know that it is possible. I have talked of many issues which President Uhuru Kenyatta's technocrats can put in mind,i know some of these presidents talk to fellow presidents even over the phones and social media and remember that some of your fellows are naturally "un ethical spies"... Try to read through articles on acidicsecurity.blogspot.com .
They are some features that can show that your phone haa been taken over by intrusions, these are:
You will see some unfamiliar apps installed on your phone without your knowledge. These apps include:
Load control:if this is installed on your phone,it means the one who haa remotedly installed it has a load control reciever and is able to recieve and record control data from activities taking place within and on your phone including date,time and gps coordinates.
Settings app:This is meant to provide an opening in the systems of your phone and set alternative settings on your phone that remotely replaces the activities of the original " settings " app on your phone.This rogue settings app has ability to monitor the victims phone,able to stealthily and quickly make glances over whats taki g place on the phone since it also enables PEEKING. it has permission to access to phonebook,camera,..etc as you Will see in the picture
Meter mark:This is a very dangerous app,basically and specifically is meant to take over the gps services on the phone. And because its able to have permission of access to phone storage,it downloads gps data of the phone when it is online and stores it so that it can use it when the phone is offline.it has the ability to import key hole markup language files to enable it display geographical data in all earth browsers like google earth.
Please,if you are a diplomat or a national figure who like making calls to  phone numbers in a highly suspicious country, always reset your phone before you use it for other national duties
You will alao see your phone assigned queer accounts you didn't request  e.gDongnao,others am not going yo reveal because am still making research on them
Some of these rogue apps can not be easily seen for many are remotely installed in the phones chip partitions.
For God And My Country
As you can see from the picture, 70% of these apps activities take place in the background and since such an app has permission to the storage, camera,phone,sms,......etc.. Then i think president Uhuru Kenyatta must not get shock as yo why,how and who infiltrate in his social media accounts.For example,if it has accessibly to cameras it can remotely take screen shots of taps one makes on the keyboard thus enabling him yo take or know our passwords.2.if it can take over the messaging syatem the A2F authentication is rendered a useless..........,since it also read contacts,it thus knows who we talk to most often!!!! I know you all are reading this and most of you as you always brand me  a Museveni spy,but lets put that aside ...and make sure you take a keen interest in the security of your data over uour phone