Thousands protest in Kashmir over rape of three-year-old | Kashmir News News | Al Jazeera

Thousands protest in Kashmir over rape of three-year-old | Kashmir News News | Al Jazeera

Police said the girl was hospitalised in critical condition on May 8 but her condition has stabilised.”> <meta http-equiv="X-UA-Compatible" content="chrome=1

Read More…

UAE claims four vessels targeted by ‘sabotage operations’ – BBC News

Four ships ‘sabotaged’ in the Gulf of Oman amid tensions 13 May 2019 These are external links and will open in a new window Close share panel Image copyright AFP Image caption Among those reportedly affected by the sabotage attack was an oil tanker, Amjad (pictured above) Four commercial ships were targets of a “sabotage attack” off the United Arab Emirates (UAE) on Sunday, the country’s foreign affairs ministry has said.
The incident reportedly took place near Fujairah port, just outside the Strait of Hormuz, but caused no casualties.
Saudi Arabia confirmed that two Saudi oil tankers sustained “significant damage”.
Another vessel was Norwegian-registered, whilst the fourth was reportedly UAE-flagged.
Iran, which borders the strait, has called for a full investigation.
Tensions are high in the region. About a fifth of oil that is consumed globally passes through the area.
Last month, Iran threatened to “close” the Strait of Hormuz if it was prevented from using the waterway.
This followed a US decision to end exemptions from sanctions for major importers of Iranian oil.
The US has deployed warships to the region in recent days to counter what it called “clear indications” of threats from Iran to its forces and maritime traffic. Iran dismissed that allegation as nonsense.
A US military official told the BBC that, at the UAE’s request, America had send “a team of experienced investigators” to help determine the cause of the damage.
US Secretary of State Mike Pompeo made an unplanned visit to Brussels on Monday to discuss Iran with European foreign ministers. What do we know about the incident?
Few details have been released about the incident, which is said to have taken place at about 06:00 (02:00 GMT) on Sunday within the UAE’s territorial waters in the Gulf of Oman, east of the emirate of Fujairah.
The UAE foreign ministry said on Sunday that it was investigating.
On Monday morning, the official Saudi Press Agency quoted the country’s energy minister, Khalid al-Falih as saying two Saudi oil tankers had been among the ships targeted .
“One of the two vessels was on its way to be loaded with Saudi crude oil from the port of Ras Tanura, to be delivered to Saudi Aramco’s customers in the United States,” he added.
Industry sources told the BBC that the Saudi tankers affected were the Amjad and Al Marzoqah.
Saudi TV has shown images of the damaged Saudi ships, and a picture released by the UAE shows a Norwegian-flagged vessel, Andrea Victory, with damage to its hull. Image copyright HANDOUT Image caption Norwegian firm Thome Ship Management said one of its vessels had been “struck by an unknown object” off Fujairah
Thome Ship Management, a Norwegian firm which manages the ship, said in a statement that it had been “struck by an unknown object on the waterline” while anchored off Fujairah. No crew members were harmed.
News agency Reuters reports that the fourth vessel is the UAE-flagged A. Michel, a fuel bunker barge.
Intertanko, an association of independent tanker owners and operators, said it had seen pictures showing that “at least two ships have holes in their sides due to the impact of a weapon”, Reuters news agency reported. Murky Gulf waters
Whoever was behind this offshore incident, it adds yet one more layer to the increasingly complex strategic picture in the Gulf.
The White House accuses Iran of threatening its interests in the Gulf – without saying how exactly – and has dispatched an aircraft carrier group and amphibious assault ship to the Gulf, hoping to intimidate Tehran. The US has also sent a squadron of B52 bombers to an airbase in Qatar, a country that actually enjoys friendly relations with Iran.
The Iranians, for their part, have hinted that “a third country” could be to blame – historically, that has tended to mean Israel – and have called for a full investigation.
Oil tankers have been attacked in the region before, by al-Qaeda off Yemen in 2002, by Somali maritime pirates in the Gulf of Oman, and more recently by Houthi rebels in the Red Sea.
Until verified facts emerge it will be hard to ascertain who is to blame in this case. Image copyright Reuters Image caption UAE Navy boats have been pictured next to Al Marzoqah, a Saudi Arabian tanker which was reportedly “sabotaged” Related Topics

Read More…

WhatsApp discovers surveillance attack – BBC News

Image copyright Getty Images Image caption WhatsApp has 1.5bn users, but it believed the attacks were highly-targeted Hackers were able to remotely install surveillance software on phones and other devices using a major vulnerability in messaging app WhatsApp, it has been confirmed.
WhatsApp, which is owned by Facebook, said the attack targeted a “select number” of users and was orchestrated by “an advanced cyber-actor”.
A fix was rolled out on Friday.
On Monday, WhatsApp urged all of its 1.5 billion users to update their apps as an added precaution.
The surveillance software involved was developed by Israeli firm NSO Group , according to a report in the Financial Times .
Why the WhatsApp spies may have eyes on Iran Facebook first discovered the flaw in WhatsApp earlier in May.
WhatsApp promotes itself as a “secure” communications app because messages are end-to-end encrypted , meaning they should only be displayed in a legible form on the sender or recipient’s device.
However, the surveillance software would have let an attacker read the messages on the target’s device.
Some users of the app have questioned why the app store notes associated with the latest update are not explicit about the fix.
Image copyright Twitter “Journalists, lawyers, activists and human rights defenders” are most likely to have been targeted, said Ahmed Zidan from the non-profit Committee to Protect Journalists.
How do I update WhatsApp? Android
Open the Google Play store Tap the menu at the top left of the screen Tap My Apps & Games If WhatsApp has recently been updated, it will appear in the list of apps with a button that says Open If WhatsApp has not been automatically updated, the button will say Update. Tap Update to install the new version The latest version of WhatsApp on Android is 2.19.134 iOS
Open the App Store At the bottom of the screen, tap Updates If WhatsApp has recently been updated, it will appear in the list of apps with a button that says Open If WhatsApp has not been automatically updated, the button will say Update. Tap Update to install the new version The latest version of WhatsApp on iOS is 2.19.51 How was the security flaw used? It involved attackers using WhatsApp’s voice calling function to ring a target’s device.
Even if the call was not picked up, the surveillance software could be installed. According to the FT report, the call would often disappear from the device’s call log.
WhatsApp told the BBC its security team was the first to identify the flaw. It shared that information with human rights groups, selected security vendors and the US Department of Justice earlier this month.
“The attack has all the hallmarks of a private company reportedly that works with governments to deliver spyware that takes over the functions of mobile phone operating systems,” the company said on Monday in a briefing document note for journalists.
What is encryption? What we know about the secretive NSO Group The firm also published an advisory to security specialists , in which it described the flaw as: “A buffer overflow vulnerability in WhatsApp VOIP [voice over internet protocol] stack allowed remote code execution via specially crafted series of SRTCP [secure real-time transport protocol] packets sent to a target phone number.”
Prof Alan Woodward from the University of Surrey said it was a “pretty old-fashioned” method of attack.
“A buffer overflow is where a program runs into memory it should not have access to. It overflows the memory it should have and hence has access to memory in which malicious code can potentially be run,” he explained.
“If you are able to pass some code through the app, you can run your own code in that area.
“In VOIP there is an initial process that dials up and establishes the call, and the flaw was in that bit. Consequently you did not need to answer the call for the attack to work.”
Who is behind the software? The NSO Group is an Israeli company that has been referred to in the past as a “cyber-arms dealer”.
While some cyber-security companies report the flaws they find so that they can be fixed, others keep problems to themselves so they can be exploited or sold to law enforcement.
The NSO Group is part-owned by the London-based private equity firm Novalpina Capital , which acquired a stake in February.
NSO’s flagship software, Pegasus, has the ability to collect intimate data from a target device, including capturing data through the microphone and camera, and gathering location data.
In a statement, the group said: “NSO’s technology is licensed to authorised government agencies for the sole purpose of fighting crime and terror.
On the frontline of India’s WhatsApp fake news war WhatsApp sets new rules after mob killings “The company does not operate the system, and after a rigorous licensing and vetting process, intelligence and law enforcement determine how to use the technology to support their public safety missions. We investigate any credible allegations of misuse and if necessary, we take action, including shutting down the system.
“Under no circumstances would NSO be involved in the operating or identifying of targets of its technology, which is solely operated by intelligence and law enforcement agencies. NSO would not or could not use its technology in its own right to target any person or organisation.”
Who has been targeted? WhatsApp said it was too early to know how many users had been affected by the vulnerability, although it added that suspected attacks were highly-targeted.
According to the New York Times , one of the people targeted was a London-based lawyer involved in a lawsuit against the NSO Group.
Amnesty International, which said it had been targeted by tools created by the NSO Group in the past, said this attack was one human rights groups had long feared was possible.
“They’re able to infect your phone without you actually taking an action,” said Danna Ingleton, deputy programme director for Amnesty Tech. She said there was mounting evidence that the tools were being used by regimes to keep prominent activists and journalists under surveillance.
“There needs to be some accountability for this, it can’t just continue to be a wild west, secretive industry.”
On Tuesday, a Tel Aviv court will hear a petition led by Amnesty International that calls for Israel’s Ministry of Defence to revoke the NSO Group’s licence to export its products.
What are the unanswered questions? How many people were targeted? WhatsApp says it is too early in its investigation to say how many people were targeted, or how long the flaw was present in the app Does updating WhatsApp remove the spyware? While the update fixes the flaw that let this attack take place, WhatsApp has not said whether the update removes any spyware that has already infected a compromised device What could the spyware do? WhatsApp has not said whether the attack could extend beyond the confines of WhatsApp, reaching further into a device and accessing emails, photos and more “Using an app as an attack route is limited on iOS as they run apps in very tightly controlled sandboxes,” said Prof Woodward. “We’re all assuming that the attack was just a corruption of WhatsApp but analysis is still ongoing.
“The nightmare scenario would be if you could get something much more capable onto the device without the user having to do anything,” he said.
The BBC has asked WhatsApp for clarification.
__

Read More…

WhatsApp discovers ‘targeted’ surveillance attack – BBC News

WhatsApp sets new rules after mob killings Who is behind the software?
The NSO Group is an Israeli company that has been referred to in the past as a “cyber arms dealer”.
Its flagship software, Pegasus, has the ability to collect intimate data from a target device, including capturing data through the microphone and camera, and gathering location data.
In a statement, the group said: “NSO’s technology is licensed to authorised government agencies for the sole purpose of fighting crime and terror.
“The company does not operate the system, and after a rigorous licensing and vetting process, intelligence and law enforcement determine how to use the technology to support their public safety missions. We investigate any credible allegations of misuse and if necessary, we take action, including shutting down the system.
“Under no circumstances would NSO be involved in the operating or identifying of targets of its technology, which is solely operated by intelligence and law enforcement agencies. NSO would not or could not use its technology in its own right to target any person or organisation.” Who has been targeted?
WhatsApp said it was too early to know how many users had been affected by the vulnerability, although it added that suspected attacks were highly-targeted.
According to Facebook’s latest figures, WhatsApp has around 1.5bn users worldwide.
Amnesty International, which said it had been targeted by tools created by the NSO Group in the past, said this attack was one human rights groups had long feared was possible.
“They’re able to infect your phone without you actually taking an action,” said Danna Ingleton, deputy programme director for Amnesty Tech. She said there was mounting evidence that the tools were being used by regimes to keep prominent activists and journalists under surveillance.
“There needs to be some accountability for this, it can’t just continue to be a wild west, secretive industry.”
On Tuesday, a Tel Aviv court will hear a petition led by Amnesty International that calls for Israel’s Ministry of Defence to revoke the NSO Group’s licence to export its products.
Follow Dave Lee on Twitter @DaveLeeBBC
Do you have more information about this or any other technology story? You can reach Dave directly and securely through encrypted messaging app Signal on: +1 (628) 400-7370 Related Topics

Read More…

Thousands protest in Kashmir over rape of three-year-old | Kashmir News News | Al Jazeera

Kashmiri protesters call for justice in the case of the alleged rape of a three-year-old girl [Tauseef Mustafa/AFP] Thousands of people have taken to the streets in Indian-administered Kashmir , angered by the alleged rape of a three-year-old girl by a neighbour who lured her to a school bathroom, which escalated into intense clashes between protesters and government forces.
Top local administrator Baseer Khan said on Monday that police arrested the suspect in a village in Sumbal town and a fast-track inquiry is under way.
Police said the girl was hospitalised in critical condition on May 8 but her condition has stabilised.
Protests erupted on Sunday and spread to new areas on Monday after the suspect’s family produced a school-issued birth certificate giving his age as 13.
190509075611550 The protesters claimed it was a fake birth certificate produced by the family to show him as a juvenile and save him from a maximum sentence of life imprisonment.
On Monday, allegations emerged that the principal of another school issued a certificate for the accused that he was a minor.
At least a dozen people, including government forces personnel, were injured when tear gas and pellet shotguns were fired to quell the protests in many towns, top police officer Swayam Prakash Pani told the AFP news agency.
“One of the injured protesters is critically wounded,” Pani said. “We have registered a separate case against the school principal and detained him for questioning.”
Thousands also protested in Srinagar and clashed with government forces.
Across the Kashmir Valley, thousands of security forces wearing riot gear were deployed to contain the spreading protests, officials said.
A police statement later Monday said that protests had spread to northern Baramulla district where 47 security personnel and seven protesters were injured in the clashes.
The protesters threw stones at the security forces, who fired tear gas at the demonstrators. Schools across the valley shut spontaneously as did shops and businesses.
Hundreds of students at three university campuses also protested, demanding capital punishment for the alleged perpetrator and action against the school principal.
Leaders from across the political spectrum appealed for calm, with a top separatist leader, Mirwaiz Umar Farooq saying on Monday the incident was “a crime against humanity”.
Another separatist leader with a wide following in Kashmir, Syed Ali Geelani, said the alleged crime was “a black stain on the social fabric” of Kashmir.
In January 2018, an eight-year-old girl was abducted, starved for a week and murdered after she was raped by several people in the southern Kathua area.
That incident caused widespread outrage and protests in Kashmir and many Indian cities and towns.
UpFront
Arundhati Roy: Modi ‘reckless’ in Kashmir
SOURCE: News agencies

Read More…