Share This

Showing posts with label CIA. Show all posts
Showing posts with label CIA. Show all posts

Sunday 17 March 2024

The more thoroughly exposed the CIA's true face, the better

Mother of all disorder Illustration: Liu Rui/GT

Reuters exclusively reported on Thursday that, according to a former US official with direct knowledge of highly confidential operations, then-US president Donald Trump authorized the Central Intelligence Agency (CIA) to launch secret operations on Chinese social media aimed at "turning public opinion in China against its government." Many people don't find this information surprising or even consider it "news." The US is a habitual offender, using various covert means to foment "peaceful evolution" and "color revolutions" in other countries, with the CIA being the main force employed to this end. For other countries, the US' pervasive influence is everywhere, visible and tangible, so there is no need for exposés.

We are still unclear  what the specific purpose of the "former US official" was in leaking the information to Reuters. A CIA spokesperson declined to comment on the existence of the program, its goals or impact. A spokesperson for the Biden administration's National Security Council also declined to comment, which means it was neither confirmed nor denied. The US intelligence community often uses a mixture of false and true information to create confusion, a tactic that was used on Edward Snowden. The Reuters report is valuable, but needs to be further processed to filter out the true and useful parts.

Firstly, this report carries a strong defense of US penetration into China. It portrays the proactive offensive of the US' cognitive warfare against China as a passive counterattack against "cyber attacks" on the US from China and Russia. In reality, portraying themselves as the weak or victimized party and labeling their hegemonic actions as "justice" is a part of the US' cognitive warfare against foreign countries.

One US official interviewed by Reuters even said it felt like China was attacking the US with "steel baseball bats," while the US could only fight back with "wooden ones," showing his exaggerated and clumsy acting skills. The US has never used a "wooden stick." Over the past few decades, the CIA has overthrown or attempted to overthrow at least 50 legitimate international governments. There are also statistics showing that from 1946 to 2000, the US attempted to influence elections in 45 countries 81 times to achieve regime change. As a habitual offender of manipulating public opinions, the US has long established a series of tactics in its targeted propaganda, information dissemination, event creation, rumor fabrication, incitement of public opinion, and media manipulation. It constantly creates new tactics and uses new technologies according to changing circumstances. This is an open secret. The US dressing itself up as a "little lamb" only has a comedic effect, not a propaganda effect.

Next, as the US' intervention and infiltration in other countries are covert operations, this disclosure provides an opportunity for the outside world to glimpse into the specific methods used by the US. For example, the whistleblower admitted that the CIA had formed a small team of operatives, using bogus online identities to spread damaging stories about the Chinese government while simultaneously disseminating defamatory content to overseas news agencies. This corroborates with previous statements by CIA Director William Burns, indicating increased resources being allocated for intelligence activities against China, once again confirming the existence of the US "1450" (internet water army) team targeting China.

The whistleblower admitted that the CIA has targeted public opinion in Southeast Asia, Africa, and the South Pacific region, spreading negative narratives about the Belt and Road Initiative. This indicates that in the US-instigated propaganda war against China, the global public opinion arena, especially in "Global South" countries, is their main strategic target. Various "China threat" theories circulating in third-party countries, as consistently pointed out by China, are all being operated by the US intelligence agencies behind the scenes.

The US has never concealed its hegemonic aims, nor does it regard encroachment on other countries' sovereignty as something to be ashamed of, which is even more infuriating than the hegemonic behavior itself. American economist Jeffrey Sachs criticized the CIA's blatant violation of international law in his commentary last month, stating that it is "devastating to global stability and the US rule of law," leading to "an escalating regional war, hundreds of thousands of deaths, and millions of displaced people." He also criticized the mainstream American media for failing to question or investigate the CIA. In fact, far from acting as watchdogs, mainstream American media has served as an accomplice. How many rumors manufactured by the CIA have been spread through the mouths of mainstream American media? When did they reflect and correct themselves?

We also see that the intentions of the US intelligence agencies are even more sinister. As admitted in the revelations, they aim to force China to spend valuable resources in defending against "cognitive warfare," keeping us busy with "chasing ghosts," and disrupting our development pace. First of all, we appreciate their reminder. At the same time, we will not allow external factors to interfere with our strategic determination to manage our own affairs well. For China and the world, the more fully, clearly, and thoroughly the CIA exposes itself, the deeper people will understand its true nature, and the stronger their ability to discern the truth will become. Keeping the CIA busy to no end or failing in their attempts is the best preventive effect.

Source linkl

How the CIA Destabilizes the World


 

Tuesday 13 September 2022

Under banner of 'counter-terrorism' 9/11: US exports instability and plunders foreign resources for 21 years, US and the west must brace for great reset as new voices rise up

 

Under banner of 'counter-terrorism,' US exports instability and plunders foreign resources for 21 years

  https://www.globaltimes.cn/page/202209/1275032.shtml

Sunday marks the 21st anniversary of the 9/11 attacks. Amid the mourning for the victims, it's apparent that much of the world in the past two decades has been impacted by the US government' vengeance wars against terrorism, though the global situation has only got more complicated and chaotic.

The West needs to brace for the Great Reset as new voices rise up ...

The West needs to brace for the Great Reset as new voices challenge the established world order

Illustration: Craig Stephens

  • China’s rise and America’s failings have shifted world opinion and set the scene for Asia and the rest to clash with the US and Europe over ideologies and values

  • As geopolitical tensions rise, a Hong Kong used to Western voices will benefit by more deeply understanding Asian perspectives 


We have entered the Age of the Great Reset. We are likely to come out at the other end with a world quite different from the one we have become used to. Let’s hope it will be a better one.

The perspectives of non-Western experiences are increasingly being articulated and heard, and new voices are challenging the dominant narratives.

History can explain the collision of ideologies and values between the East and West, and between the North and South.

The second world war was followed by a period of decolonisation in the Asia-Pacific and Africa between 1945 and the 1970s. Many new nations struggled to establish stability after long periods of imperial rule when their land, resources and labour were exploited.

Civil war broke out in China after Japan was defeated. Just as in much of Asia, Chinese people were dirt poor when the People’s Republic was created in 1949 and they remained among the poorest in the world until relatively recently. 

https://multimedia.scmp.com/news/china/article/2176472/china-reforms/index.html?src=article-launcher

The era of decolonisation coincided with the Cold War, a period of intense rivalry between the United States and Soviet Union. America was wary of Soviet communism and its expansion, and the USSR resented the US for its policy of containment to check its power.

The Cold War may be said to have ended with the dissolution of the Soviet Union in 1991. The dominant narrative then was that the superiority of the American democratic-capitalist system enabled the US to “win” because it could outdo the Soviets in amassing weaponry and generating material wealth.

Asia has become a fast-growing economic region. It’s advancement has been a result of improving education of the people, integrating Asian economies into the global system through export production, and strengthening the capacity of public institutions.

African countries have been making strides too, especially since 2000, in their socio-economic advancement and governance performance. 


Top Chinese diplomat tours East Africa to promote peace, ensure stability for belt and road allies

As a result of the progress being made in these parts of the world, diverse perspectives about ideologies and values, as well as how countries are conducting their international affairs, have come to the fore. 

Every Saturday A weekly curated round-up of social, political and economic stories from China and how they impact the world.

The US has been forcing the pace of the Age of the Great Reset. Its seemingly orderly governing system and successful market-capitalist economic and financial systems used to be seen as the model to emulate. That has changed.

The US invasion of Iraq in 2003 and the financial crisis of 2008 may be seen as watershed moments that started to shift world opinion. 

More than 100 lavish palaces and villas of Iraq’s former dictator Saddam Hussein lie in ruins 


More than 100 lavish palaces and villas of Iraq’s former dictator Saddam Hussein lie in ruins

The claimed intent of the Americans was to free Iraqis from their authoritarian leader, and Iraq supposedly had weapons of mass destruction that endangered the world. However, Iraq did not possess such weapons – the claim was later exposed as a lie – and the US actions destabilised not only Iraq but the Middle East as a whole.

The 2008 financial crisis gave rise to doubts and a distrust of Western financial practices, and exposed the weaknesses, especially of the American regulatory and supervisory systems.

Hank Paulson, former head of the US Treasury, wrote in his book that Wang Qishan – now China’s vice-president – said to him in June 2008 that perhaps the Chinese didn’t have much to learn about finance from America any more.

Fast forward to today, and how the world sees Russia and the Ukraine war provides a good example of the difference in perspectives between the East and West, the North and South. 


Putin tells pupils why Russian troops are in Ukraine in a speech to open school year Putin tells pupils why Russian troops are in Ukraine in a speech to open school year Putin tells pupils why Russian troops are in Ukraine in a speech to open school year

Last June, when asked why Europe should stick up for India if China were to present a challenge, if New Delhi didn’t take a tough stance on Russia now, India’s external affairs minister S. Jaishankar provided a harsh retort: “That’s not how the world works.”

He stressed that India’s problems with China had nothing to do with Russia and Ukraine. And he told Europe to grow out of the mindset that its problems were the world’s problems, but the world’s problems were not Europe’s problems.

The West is unused to hearing such forceful, disagreeing non-Western voices. China is much criticised for what the Western media calls “Wolf Warrior” diplomacy. It is a convenient label for China’s more assertive and combative style in recent years. 


How can China and US stop stumbling towards war? David Shambaugh on Talking Post with Yonden Lhatoo

The pace of the reset is being framed today in simplistic terms – that democracies must fight autocracies, with the US leading the charge together with its Group of 7 allies, and that the “rule-based international order” must be maintained.

That narrative may resonate in the West and North – but not necessarily in the East and South. This can be seen with the G20 meeting scheduled for mid-November – host country Indonesia has insisted that Russia and its leader, Vladimir Putin, should not be excluded from the gathering.

Hong Kong used to be a spot of the West in the East before 1997 when it was a British colony. The city is used to taking note of the mainly Western voices. Hearing different and opposing voices can be uncomfortable because it forces reflection. Hong Kong will benefit by more deeply understanding Asian perspectives.

The reset also has much to do with the US seeing China as the biggest “threat” to “democracy and the international order”. It is corralling allies to fight together, and Taiwan has become a stalking horse to goad Beijing.

The reset will continue and it can be unsettling, especially for Hong Kong, if fighting should break out in the neighbourhood. The world needs better angels to cool geopolitical tensions.

Christine Loh, a former undersecretary for the environment, is an adjunct professor at Hong Kong University of Science and Technology 

 

Thursday 16 June 2022

Exclusive: Report reveals how US spy agencies stole 97b global internet data, 124b phone records in just 30 days

 

Photo: headquarter of NSA in Maryland

 

The US military and government cyber agencies have remotely stolen more than 97 billion pieces of global internet data and 124 billion phone records in the last 30 days, which are becoming a major source of intelligence for the US and other "Five Eyes" countries, a latest cybersecurity report showed.

The report the Global Times obtained from Anzer, a cybersecurity information platform, on Monday, once again revealed the "black hand" operations of Tailored Access Operations (TAO), the cyber warfare intelligence agency under the US National Security Agency (NSA), which has been using advanced cyberattack weapons to indiscriminately "grab" data from internet users around the world.

An exclusive report published by the Global Times in May  disclosed that China captured a spy tool deployed by the NSA, which is capable of lurking in a victim's computer to access sensitive information and was found to have controlled global internet equipment and stole large amounts of user information. The Trojan horse, "NOPEN," is a remote control tool for Unix/Linux computer systems. It is mainly used for stealing files, accessing systems, redirecting network communication, and viewing a target device's information.

According to internal NSA documents leaked by hacking group Shadow Brokers, "NOPEN" is one of the powerful weapons used by the TAO to attack and steal secrets.

Anzer's report revealed another weapon platform, "boundless informant," which is the NSA's exclusive big data summary analysis and data visualization tool system capable of colleting, managing and analyzing data around the world illegally obtained by NSA's remote control system.

According to terminal screenshots from the platform, the NSA has remotely stolen more than 97 billion pieces of global internet data and 124 billion phone records in the last 30 days.

A cybersecurity analyst told the Global Times on condition of anonymity on Monday that TAO is the largest and most important part of the intelligence division of the NSA.

Founded in 1998, the main responsibility of the TAO is to use the internet to secretly access insider information of its competitors, including secretly invading target countries' key information infrastructure to steal account codes, break or destroy computer security systems, monitor network traffic, steal privacy and sensitive data, and access to phone calls, emails, network communications and messages.

TAO also assumes an important role. When US president issues an order to disable or destroy communications networks or information systems in other countries, TAO will provide relevant cyberattack weapons, and the attacks will be carried out by the US Cyber Warfare Command, the report revealed.

According to the report, the various departments of TAO are composed of more than 1,000 active military personnel, network hackers, intelligence analysts, academics, computer hardware and software designers, and electronics engineers. The entire organizational structure consists of one "center" and four "divisions."

The "center" employs more than 600 people and is responsible for receiving, sorting and summarizing account passwords and important sensitive information stolen from around the world by network information systems controlled remotely by TAO.

"The NSA's global indiscriminate intrusion has long been supported by a vast and sophisticated network of weapons platforms, of which TAO is an important weapon maker. Some of these weapons are dedicated to the products of US internet giants such as Apple, Cisco and Dell, and have been developed with the support and full participation of these internet giants," the expert said.

Media reports showed some US internet giants have set up a special government affairs department to cooperate with the NSA in developing cyber attack weapons and provide the NSA with special backdoors and vulnerabilities. Internal information leaked by Edward Snowden showed these weapons could be used to conduct mass traffic monitoring and hacking on any internet user around the world.

According to publicly available information, most of the cyber attack weapons have already been handed over to the US and other "Five Eyes" countries.

The report also showed more than 500 code names for cyber attacks and data theft operations conducted by TAO have been disclosed, which proves that the US is a developed internet country in the world, as well as a major country in cyber intelligence collection and data theft.

In 2013, the US spent $52.6 billion on global intelligence gathering programs, of which two-thirds went to cyber security operations to carry out cyber attacks on foreign countries and domestic targets in the US.

A large number of TAO's cyber attack weapons have also been shared with some allied countries. Media reports showed that GCHQ, the UK's security and intelligence agency, has used NSA's cyberattack weapons to conduct long-term attack control and communications monitoring in the European Union.

"The US is taking highly engineered cyber weapons as the winning advantage in future cyber warfare, and is investing resources and increasing chips regardless of cost, bringing endless hidden dangers to global cyber security," the expert said. 

 Source link

RELATED ARTICLES

It's a threat to national security | The Star

 https://www.thestar.com.my/opinion/letters/2022/06/14/its-a-threat-to-national-security


Related posts:

China captures powerful US NSA cyberspy tool

 

 

 

 

SOURCE: Data protection dept not doing its job

Act swiftly to prevent data breaches

 

 

 

 

Remain vigilant against financial fraud

 


Friday 3 September 2021

Pakatan’s dependency on dubious NED funding, Suaram

Suaram adviser questions Pakatan Harapan's funding from the National Endowment for Democracy

https://www.thestar.com.my/news/nation/2021/08/30/suaram-adviser-questions-pakatan-harapan039s-funding-from-the-national-endowment-for-democracy


MALAYSIAN CIVIL SOCIETY MUST SEVER NED FUNDING TO BE CREDIBLE ( by Kua Kia Soong, SUARAM Adviser, 30.8.2021)

It is painful to watch Malaysian NGOs squirming their way out of justifying NED funding for their activities. The NGO I belong to, SUARAM used to receive funding from the National Endowment for Democracy (NED) until the organisation was exposed as a CIA “soft power” front for the US government several years ago. Knowing the blood-drenched “regime changing” record of th...

Lihat Lagi  https://www.facebook.com/kiasoong.kua/posts/3761531817280035

  

https://youtu.be/DPt-zXn05ac 

'We lied, we cheated, we stole', ‘the Glory of American experiment’ by US former Secretary of State/Ex-CIA director Mike Pompeo 

 


PETALING JAYA: Pakatan Harapan should explain its dependence on funding from the National Endowment for Democracy (NED), says Suara Rakyat Malaysia (Suaram) adviser Kua Kia Soong.Inside America's Meddling Machine: NED, the US-Funded Org Interfering in Elections Across the Globe “It is up to Pakatan Harapan to explain their dependence on NED funding if they can,” he said in a statement on Facebook yesterday.

Daniel Twining, the president of the International Republican Institute (IRI) revealed three years ago that they – through NED – had been funding the Opposition in Malaysia since 2002.

NED is a non-governmental organisation in the United States that was founded in 1983 for promoting democracy in other countries by developing political groups, trade unions, deregulated markets and business associations.

Twining allegedly told a forum in 2018 that the IRI, with funds from the NED, had worked to strengthen Malaysian opposition parties and its efforts paid off when Pakatan Harapan won the 14th General Election.

Kua also urged all NGOs in the country to stop accepting funds from NED to remain credible.

Kua said Suaram used to receive funding from the NED until the organisation was exposed as a CIA “soft power” front for the US government several years ago.

“Knowing the blood-drenched ‘regime changing’ record of the CIA in so many third world countries since 1947, we could not continue receiving funds from such a dubious source for our own credibility.

Source link

 

Related:

 

Suaram adviser questions Pakatan Harapan's funding from ...

 

Suaram adviser questions Pakatan Harapan's funding from ...

 

Related posts:

 

  Botched Afghan retreat reveals an America struggling to contain China ` Unable to better China in positive 
 
‘Use science, not politics’   China is concerned that the so-called US intelligence report on the origins of the coronavirus will contain p...
 

Tuesday 28 July 2015

American FBI's China accusation spurred by finance, not a good idea to spy on friends!


On Thursday last week, the FBI released a film entitled The Company Man: Protecting America's Secrets, which targets economic espionage. The 35-minute film features two Chinese economic spies who try to bribe a US employee with money, attempting to acquire insulation technology from the latter's company. The two were later prosecuted and caught in the net of justice. According to media reports, the video has already been shown nearly 1,300 times at US enterprises.

An FBI official publicly voiced that "China is the most dominant threat we face from economic espionage … The Chinese government plays a significant role."

The official also declared that economic espionage has caused losses of hundreds billions of dollars annually to the US economy.

How much is "hundreds of billions of dollars?" Say $300 billion, about 2 percent of US annual GDP.

Since the FBI believes that there has been a 53 percent surge in economic espionage in the US, and 95 percent of US companies suspect that China is the main culprit, does it infer that China has stolen 2 percent of US GDP?

Some people may ponder that given the Cold War is over, Osama bin Laden and Saddam Hussein were eradicated and the war on terror is seemingly not that urgent for the moment, and in light of US federal budget constraints, the FBI needs to find new strategic reasons for more funds. Therefore, the "position" of "Chinese economic spies" has been greatly elevated.

What the FBI has done is bound to injure Sino-US relations. But it is US society that will suffer the most. Many Americans will hence think that their economy is fine, their companies have no problems at all and the only issue is the threat from Chinese economic espionage.

It looks to them like Chinese intelligence services and civilian business spies are much more powerful than the FBI, CIA and other non-governmental intelligence forces combined. China is not capable in every category except for spy technology. This is the logic of the FBI.

If we take a good look at China's overall development in this changing world, you will see that one-third of global new technical patents are now created by Chinese companies every year. Innovation has also become China's national slogan. China will eventually be able to challenge the West's dominance in high technology.

China is well aware that it should learn from the West, especially the US, in terms of technology. But this is not stealing.

US universities are also attracting students from all over the world, yet this brings more benefits than losses to the nation due to the dissemination of knowledge.

Someone who always claims that his house was robbed and feels free to suspect his friend or neighbor is the thief is very annoying, and that is what the US is doing right now. The whole world knows that US intelligent agencies are the most notorious regarding this issue.

We hope that the often-silent Chinese intelligence services could expose some hard evidence of espionage by US spies, and make a spy movie featuring US espionage, providing it with a mirror to look at itself.- Global Times

Not a good idea to spy on friends

THERE's been so much dramatic news these days – from Greece's miseries to Iran, China from blowhard Donald Trump – that the shocking story of how America's National Security Agency has been spying on German and French leadership has gone almost unnoticed.

Last year, it was revealed that the NSA had intercepted Chancellor Angela Merkel's cell phone. She is supposed to be one of Washington's most important allies and the key power in Europe. There was quiet outrage in always subservient Germany, but no serious punitive action.

Brazil's president, Dilma Rousseff, was also bugged by American intelligence. Her predecessor, Luiz Lula da Silva, was also apparently bugged.

This year, came revelations that NSA and perhaps CIA had tapped the phones of France's president, Francois Hollande, and his two predecessors, Nicholas Sarkozy and Jacques Chirac. Hollande ate humble pie and could only summon some faint peeps of protest to Washington. Luckily for the US, Charles de Gaulle was not around. After the US tried to strong-arm France, "le Grand Charles" kicked the US and Nato out of France.

Last week, WikiLeaks revealed that the NSA had bugged the phone of Germany's foreign minister, Frank-Walter Steinmeier, for over a decade. Imagine the uproar and cries "the Gestapo is back" if it were revealed that German intelligence had bugged the phones of President Barack Obama or Secretary of State John Kerry.

A lot of Germans were really angry that their nation was being treated by the Americans as a northern banana republic. Many recalled that in the bad old days of East Germany its intelligence agency, Stasi, monitored everyone's communications under the direct supervision of KGB big brother at Moscow Centre.

The National Security Agency and CIA claim their electronic spying is only aimed at thwarting attacks by anti-American groups (aka "terrorism"). This claim, as shown by recent events, is untrue. One supposes the rational must be a twist on the old adage "keep your enemies close, but your friends even closer".

Ironically, the political leaders listed above – save perhaps Brazil's da Silva – are all notably pro-American and responsive to Washington's demands.

Why would the US risk alienating and humiliating some of its closet allies?

One suspects the reason is sheer arrogance … and because US intelligence could do it. But must US intelligence really know what Mr Merkel is making Mrs Merkel for dinner?

Until WikiLeaks blew the whistle, some European leaders may have known they were being spied upon but chose to close their eyes and avoid making an issue. Raising a fuss would have forced them to take action against the mighty US.

Besides, British, Italian and French intelligence are widely believed to have bugged most communications since the 1950's. But not, of course, the White House or Pentagon. The only nation believed to have gotten away with bugging the White House was Israel during the Clinton years. The Pentagon was bugged by a number of foreign nations, including Israel, China and Russia.

Humiliating Europe's leaders in this fashion is a gift to the growing numbers of Europeans who believe their nations are being treated by the US as vassal states.

There is widespread belief in Western Europe that US strategic policy aims at preventing deeper integration of the EU and thwarting a common foreign policy or a powerful European military. Britain serves as a Trojan horse for America's strategic interests in Europe.

Way back in the 1960's, then German defence minister Franz Josef Strauss, an ardent proponent of a truly united Europe, thundered that Europeans would not play spearmen to America's atomic knights. But, of course, that's just what happened.

The US still runs and finances Nato in the same way the Soviet Union commanded the Warsaw Pact. Washington calls on Europe for troop contingents in its Middle East and south Asian colonial wars in the same way that the Persian Empire summoned its vassals to war.

Many Germans and French, both right and left, would like their leaders to react more forcefully to NSA's ham-handed spying. However, Merkel and Hollande are both political jellyfish eager to evade any confrontation with Big Brother in Washington. Maybe he has too much dirt on them.

But a confrontation is inevitable one day if Europe is to regain its true independence that was lost after World War II.

By Eric S. Margolis who is an award-winning, internationally syndicated columnist. Comments: letters@thesundaily.com

Related articles

Sunday 14 July 2013

Play safe on the mobile, secure your devices!


All a sinister person needs to do to spy on you is to simply penetrate your smartphone or tablet.

OF late, spying has been a household word after revelations of Prism, a clandestine mass electronic surveillance programme operated by the United States National Security Agency (NSA), by former NSA contractor Edward Snowden. 

But one does not need an entire state programme to spy on someone.

All that a sinister person needs to do is to penetrate their intended victim’s smartphone or tablet. Which is quite an easy thing to do, actually. One of the common methods used is spyware.

Such spyware can easily be found by searching on Google although they are usually not free.

There is a possibility that consumers might download spyware from an identified party or an unknown source accidentally. - Goh Chee Hoh

This is what happened when a husband in Singapore suspected his wife of having an affair. On the pretence that his phone was not working, he borrowed his wife’s phone to make a call but instead installed a spyware app.

The husband was then able to see the calls made (but not hear the actual conversation), messages sent and her location at that point, from a computer using a Web-based application that communicated with the app.

When the information confirmed that she was having an affair, he continued to monitor her phone for some time before posting the information online, including the messages she sent to her “lover”. He did not reveal any personal details about themselves but this is how the news became public.

However, many have questioned the authenticity of the story, with some brushing it off as a publicity stunt to sell the spyware app.

Nevertheless, it pays to be safe, as there are apps that can do such things and they are easily obtainable from the Web.


“Mobile phones are an integral part of consumers’ lives, with two thirds of adults worldwide reporting that they use a mobile device to access the Internet,” says David Hall, senior manager of regional product marketing for Norton at Symantec Corporation.

“As we use our mobile phones in new and innovative ways, we’re also putting sensitive information at risk.”

“Spyware is a type of malware (malicious software) that logs information and then forwards that information from your device,” explains Rob Forsyth, director for Asia Pacific at Sophos Ltd.

Usually, such spyware is capable of operating quietly in the background so it can easily go unnoticed by an unsuspecting device owner.

“For a regular user, it is very difficult to figure out that they’ve been infected,” says Goh Su Gim, security advisor for Asia Pacific at F-Secure (M) Sdn Bhd. “There’s no obvious signs.”

In fact, it may surprise you to know that such threats could actually come from a source that’s known to you.

“There is a possibility that consumers might download spyware from an identified party such as their spouse, friends, colleagues, business associates or from an unknown source accidentally,” says Goh Chee Hoh, managing director for South-East Asia at Trend Micro Inc.

As an example, he describes a mobile phone monitoring service which uses Nickispy, a family of viruses that attacks Android devi­ces). It is said to be capable of monitoring a mobile user’s activities and whereabouts. The Chinese website which offers this service charges subscribers fees costing US$300 to US$540 (RM900 to RM1,620).

“This spyware sends MMS to the victim’s mobile device. Once the MMS is downloaded, the cybercriminal is granted access to your line of communications,” Chee Hoh says.

This security issue is further compounded in cases where a consumer uses the same device for both work and personal purposes.

“From a personal user’s standpoint, one can experience loss of privacy whereas from a business perspective, an organisation may lose sensitive data which can lead to loss of revenue,” he explains.

Had such an act been committed in Malaysia, it would go against Section 231 of the Communications and Multimedia Act 1998. Using an app to obtain information from another person’s phone can land the offender a RM50,000 fine or a prison term not exceeding two years if convicted.

The Malaysian Communications and Multimedia commission (MCMC), our multimedia industry nurturer and regulator, also said that it does not act alone when pursuing offenders.

“We look at each case individually and help other agencies like the police, for example, when upholding the law,” said Sheikh Raffie Abd Rahman, MCMC head of strategic communications.



Simple safeguards to keep your devices secure

While the mobile security and privacy threats remain very real and imminent, the steps to prevent such problems are really quite straightforward and easy to do.

Following are some practical tips, courtesy of security specialists Symantec Corporation, Sophos Ltd, Trend Micro Inc and F-Secure (M) Sdn Bhd, that you should take note of:

1. Use your device’s built-in security features 

Configure your security settings so that functions such as location sharing are disabled and passwords are not saved but need to be manually keyed in each time.

You can also make your device more secure by activating its lock function and requiring an identification action such as a fingerprint scan, keystroke pattern, numeric PIN or alphanumeric password in order to access the device.

2. Use strong passwords and secure Internet connections

Unique and strong passwords will help prevent valuable information from being stolen from your device. Using a different password for each and every app would be best but you would need to ensure that you have a good way of remembering those passwords if you choose to go this route.

Avoiding open and unsecured Internet connections such as free public WiFi will also reduce risk of online threats on your mobile device.

3. Never jailbreak or root your device 

Use your device as recommended by the manufacturer instead of modifying the version of the iOS or Android operating system that has been installed. This is usually done to install pirated games and apps for free but this makes it easier for spyware to operate on your device.

4. Be cautious when choosing and installing apps

It’s a vast universe out there in the World Wide Web and, at times, it’s hard to tell the good guys from the bad ones. It therefore pays to be extra careful when downloading apps from the Internet. If something is too good to be true, it probably is. Do background checks on developers if you need to be sure, and scrutinise an app’s ratings and reviews as well.

It’s also a better idea to download apps directly from the Google Play Store for Android devices rather than from third party websites since downloads from some of these sources may contain malware.

Do have a close look at the Terms and Conditions as well as permissions requested by an app prior to installing it, as you don’t want to unknowingly allow developers to track and collect personal data which is unnecessary for running the app.

5. Scrutinise notifications and services running on your device 

Stay alert whenever you receive any notification on your device. Some may contain malicious links or cleverly trick you into submitting personal information to cybercriminals.

Also, pay special attention to services running in the background on your device that seem unfamiliar or strange. You will have to refer to online guides on how to check, as it differs among devices.

The principle of “when in doubt, throw it out” could help save you a great deal of trouble later on.

6. Log out immediately

This is especially crucial for social media apps where the chances of your data being misused are higher. Make it a habit to log out of such apps and re-enter login information each time you use them.

7. Stay up-to-date

Take time to pick out a preferred mobile security software and install it on your device. Make sure to constantly update it, and don’t forget to check for updates for all your apps and to install any available patches for your device’s operating system as well. Set up routine scans for your device, and review the logs each time a scan is concluded.

Sunday 10 March 2013

CIA Assasinating South American Head of States with Cancer Virus , Chavez the latest Victim a US Plot?

  
JNN 8 Mar 2013 Caracas : The Venezuelan president himself, before he died Wednesday, wondered aloud whether the US government – or the banksters who own it – gave him, and its other leading Latin American enemies, cancer.





“How did it happen that six leaders of Latin American countries which had criticized US policies and tried to create an influential alliance in order to be independent and sovereign states, fell ill simultaneously with the same disease?”

A little over a year ago, Chavez went on Venezuelan national radio and said: “I don’t know but… it is very odd that we have seen Lugo affected by cancer, Dilma when she was a candidate, me, going into an election year, not long ago Lula and now Cristina… It is very hard to explain, even with the law of probabilities, what has been happening to some leaders in Latin America. It’s at the very least strange, very strange.”

Strange indeed… so strange that if you think Venezuela’s Hugo Chavez, Brazilian President Dilma Rousseff, Paraguayan Fernando Lugo, and former Brazilian leader Luiz Inácio Lula da Silva – Latin America’s top anti-US empire leaders – all just happened to contract cancer around the same time by sheer chance, you must be some kind of crazy coincidence theorist.

Am I 100% certain that the CIA killed Hugo Chavez? Absolutely not.

It could have been non-governmental assassins working for the bankers.

But any way you slice it, the masters of the US empire are undoubtedly responsible for giving Chavez and other Latin American leaders cancer. How do we know that? Just examine the Empire’s track record.
Fidel Castro’s bodyguard, Fabian Escalante, estimates that the CIA attempted to kill the Cuban president an astonishing 638 times. The CIA’s methods included exploding cigars, biological warfare agents painted on Castro’s diving suit, deadly pills, toxic bacteria in coffee, an exploding speaker’s podium, snipers, poison-wielding female friends, and explosive underwater sea shells.

The CIA’s assassination attempts against Castro were like a Tom and Jerry cartoon, with the CIA as the murderously inept cat, and the Cuban president as a clever and very lucky mouse. Some might even argue that Castro’s survival, in the face of 638 assassination attempts by the world’s greatest power, is evidence that El Presidente’s communist atheism was incorrect, and that God, or at least a guardian angel, must have been watching over “Infidel Castro” all along.

Theology aside, the CIA’s endless attempts on Castro’s life provide ample evidence that US authorities will stop at nothing in their efforts to murder their Latin American enemies.

John Perkins, in his bestselling book Confessions of an Economic Hit Man, supplies more evidence that the bankers that own the US government routinely murder heads of state, using private assassins as well as CIA killers.

Perkins, during his career as an “economic hit man,” gained first-hand knowledge about how the big international bankers maintain their empire in Latin America and elsewhere. Perkins’ job was to visit leaders of foreign countries and convince them to accept loans that could never be paid back. Why? The bankers want to force these nations into debt slavery. When the country goes bankrupt, the bankers seize the nation’s natural resources and establish complete control over its government and economy.

Perkins would meet with a targeted nation’s leader and say: “I have a fist-full of hundred dollar bills in one hand, and a bullet in the other. Which do you want?” If the leader accepted the loans, thereby enslaving his country, he got the payoff. If he angrily chased Perkins out of his office, the bankers would call in the “asteroids” to assassinate the uncooperative head of state.

The “asteroids” are the world’s most expensive and accomplished professional killers. They work on contract – sometimes to the CIA, sometimes to the bankers, and sometimes to wealthy private individuals. And though their specialty is causing plane crashes, they are capable of killing people, including heads of state, in any number of ways.

This isn’t just speculation. John Perkins actually knows some of these CIA-linked professional killers personally. And he has testified about their murders of Latin American leaders.Confessions of an Economic Hit Man is dedicated to Perkins’ murdered friends Gen. Torrijos of Panama and President Jaime Roldos of Ecuador. Both were killed by CIA-linked “asteroids” in engineered plane crashes.

Do CIA-linked killers sometimes induce cancer in their victims? Apparently they do. One notable victim: Jack Ruby (née Jack Rubenstein), a mobster who was himself a professional killer, and whose last hit was the choreographed murder of JFK-assassination patsy Lee Harvey Oswald in the basement of the Dallas Police Department. Ruby begged to be taken to Washington to tell the real story of the JFK murder, but instead died in prison, of a sudden and mysterious cancer, before he could reveal what he knew.

Have the CIA-bankster “asteroids” ever tried to kill Latin American leaders with cancer? The answer is an unequivocal “yes.”

Edward Haslam’s book Dr. Mary’s Monkey proves what JFK assassination prosecutor Jim Garrison had earlier alleged: Child-molesting CIA agent David Ferrie, one of President Kennedy’s killers, had experimented extensively with cancer-causing viruses for the CIA in his huge home laboratory. The purpose: To give Fidel Castro and other Latin American leaders cancer. (Ferrie himself was killed by the CIA shortly before he was scheduled to testify in court about his role in the JFK assassination.)

To summarize: We know that the bankers who own the US government routinely try to kill any Latin American leader who refuses to be their puppet. We know that they have mounted thousands of assassination attempts against Latin American leaders, including more than 600 against Castro alone. We know that they have been experimenting with cancer viruses, and killing people with cancer, since the 1960s.

So if you think Hugo Chavez died a natural death, I am afraid that you are terminally naïve.

Venezuelan Vice President Nicolas Maduro has announced the expulsion of two US embassy officials for allegedly spying on the country’s military, accusing Washington of having infected late President Hugo Chavez with the cancer virus.

Maduro charged the US administration in a televised speech on Tuesday, after holding an emergency meeting with high military command and civilian leaders and hours before the announcement of President Chavez’s death.

Caracas accused the US embassy’s Air Force attache, Colonel David Delmonaco, and assistant air attache, Major Devlin Kostal, of trying to stir up a military plot against the Venezuelan government.

Washington confirmed that the two officials were employed at the embassy, saying Delmonaco was en route back to the US, and Kostal was in America at the time.

Maduro also said that, “We have no doubt” that the President’s cancer, first diagnosed in 2011, was induced by “the historical enemies of our homeland,” a thinly-veiled reference to the US.

He compared the situation to the death of the late leader of the Palestinian Liberation Organization, Yasser Arafat, who Maduro claimed was “inoculated with an illness.”

US State Department spokesman Patrick Ventrell said in a statement that Washington “definitely rejects” the assertion that the US was involved in Chavez’s illness.

On Tuesday, the 58-year-old Venezuelan leader died after a two-year battle with cancer.

Back in 2011, Chavez had accused the US of developing a technology for infecting Latin American leaders with cancer.

Argentinean President Cristina Kirchner Fernandez, Brazilian President Dilma Rousseff and former Paraguayan President Fernando Lugo have all received treatment for cancer disease.

“Wouldn’t it be weird if they [the US] had developed a technology for inducing cancer and nobody knows up until now?” Chavez had said at the time.

Russian Communist Party head Gennady Zyuganov today demanded an international investigation into the death of Venezuela’s Hugo Chavez, claiming it was “far from a coincidence” that six leaders of Latin-American countries who had criticized the U.S. simultaneously fell ill with cancer.

“How did it happen that six leaders of Latin American countries which had criticized US policies and tried to create an influential alliance in order to be independent and sovereign states, fell ill simultaneously with the same disease?” Zyuganov told Russian state television, urging an investigation under “international control” into Chavez’s death.

Zyuganov is accurate so far as his claim that six Latin-American leaders were diagnosed with cancer within a relatively close period of time, most notably Argentina’s President Cristina Fernández de Kirchner, who was diagnosed with thyroid cancer in December 2012, although later analysis proved that she had never actually suffered from the illness.

Current Brazilian President Dilma Rousseff, Paraguay’s Fernando Lugo, and the former Brazilian leader Luiz Inácio Lula da Silva, have all been hit with cancer in the last few years. In 2006 it was also reported that retired Cuban leader Fidel Castro was also diagnosed with cancer.

- Jafria Community's Voice

 “Chavez Death Could Be A US Plot”

Hugo-Chavez

The death of Venezuelan leader Hugo Chavez from cancer may have been part of a plot by the United States to infect its enemies in Latin America with the disease, the leader of Russia’s Communist party, Gennady Zyuganov, speculated on Wednesday.

“How did it happen that six leaders of Latin American countries which had criticized US policies and tried to create an influential alliance in order to be independent and sovereign states, fell ill simultaneously with the same disease?” Zyuganov said in comments carried by Russian state television.

“In my view, this was far from a coincidence,” said Zyuganov, the head of Russia’s second-largest political party. He urged an investigation under “international control” into Chavez’s death.

Zyuganov’s claim echoed accusations by Venezuelan Vice President Nicolas Maduro, who alleged last week that Chavez had fallen victim to an “imperialist” plot.

“The old enemies of our fatherland looked for a way to harm his health,” Maduro said,

Venezuelan leader Hugo Chavez

Chavez, who died on Tuesday at the age of 58 after an almost two-year battle with cancer, had himself speculated that the United States may have developed methods to infect its enemies with the disease.

“Would it be so strange that they’ve invented the technology to spread cancer and we won’t know about it for 50 years?” Chavez – who once famously called former US President George W. Bush “the devil” – said in late 2011, after he had been diagnosed with the disease.

He was speaking a day after Argentina’s President Cristina Fernández de Kirchner was diagnosed with thyroid cancer.

“Fidel [Castro] always told me, ‘Chávez take care. These people have developed technology. You are very careless. Take care what you eat, what they give you to eat … a little needle and they inject you with I don’t know what,’ he said in late 2011 after he had been diagnosed with cancer,” Chavez added.

Castro was himself the target of numerous US assassination plots, according to declassified documents published by the CIA in 2007.

Among the other leftwing Latin America leaders diagnosed with cancer are Brazil’s current president, Dilma Rousseff, Paraguay’s Fernando Lugo, and the former Brazilian leader Luiz Inácio Lula da Silva.

Global Research