Tuesday 24 June 2014

Boko Haram ready to Swap 219 Chibok Girls With 70 Detainees


 Haram has demanded the release of 70 of its members in detention as a condition to free the Chibok girls, it emerged yesterday.
The sect is also asking the government to give amnesty to its members.
A lawyer close to the armed group, Hajiya Aisha Wakil,  told AlJazeera English that the sect said only when these conditions are met would it release the abducted girls.
No fewer  than 276 girls were abducted from the Government Girls Secondary School in Chibok, Borno State on April 15.
The Boko Haram leaders deceived the girls that they were soldiers who came to protect them from attack.
There are 219 girls in their custody following the escape of 57 from their enclave.
In spite of the support from an international coalition, including the United States, Britain, France and Australia military personnel and the use of a negotiator, the girls remain in the sect’s custody.

'Radicalisation of Young Muslims on the Rise in Cardiff, United Kingdom'


Cardiff has an ongoing problem with the radicalisation of young Muslims, said an academic who has studied the issue.
Two men from the city have been identified taking part in what appears to be a Jihadist recruiting video, which was posted online last week.
It is thought Reyaad Khan travelled to Syria with friend Nasser Muthana who also appears in the footage.
Khan lived close to the Cardiff men jailed over the London Stock Exchange bombing plot in 2012.
It is believed the two men, both 20, travelled to Syria in November, while Nasser Muthana's younger brother Aseel, 17, travelled to the country in February.

Monday 23 June 2014

Bomb Explosion Rocks Kano School Of Hygiene, Scores Feared Dead


A blast suspected to be from an explosive device has occurred at the School of Hygiene in Kano, the Kano state capital in northern Nigeria.
The ‎spokesperson of the Kano Police, Magaji Majiya, who confirmed the blast, told reporters that other officers were on their way to the scene of the blast.
He said the area had been cordoned off and that the commissioner would address the media at the scene.
The number of casualties in the Monday attack is not yet known.





Saturday 21 June 2014

Wanted Boko Haram Terror Gang Leader Killed In Shootout


 The Defence headquarters Friday disclosed that a wanted notorious gang leader of the Boko Haram who has led many attacks against the military and the police including the killing of two soldiers along Lokoja Kaduna road in 2013 has been killed.
In its blog of Friday, June 20th, DHQ said, “A notorious terrorist who has led serial attacks on security personnel, Mallam Husaini has died in an encounter between his group and a military convoy along Jos – Bauchi highway”.
“Husaini who leads a cell of the terrorists billed to operate in the Plateau is known to have led an attack on Headquarters, Police Special Anti-Robbery Squad in Abuja, in November 2012”.

Stephanie L. Kwolek, Inventor of Kevlar (Bullet Proof Fibre), Dies at 90


Stephanie L. Kwolek, a DuPont chemist who invented the technology behind Kevlar, a virtually bulletproof fiber that has saved thousands of lives, died on Wednesday in Wilmington, Del. She was 90.
The chief executive of DuPont, Ellen Kullman, announced the death, calling Ms. Kwolek, who spent 15 years in the laboratory without a promotion before her breakthrough, “a true pioneer for women in science.”
Kevlar is probably best known for use in body armor, particularly bulletproof vests. A DuPont spokeswoman estimated that since the 1970s, 3,000 police officers have been saved from bullet wounds through the use of equipment reinforced with Kevlar, which is far stronger and lighter than steel.

Friday 20 June 2014

Tracking Syria Fighters Now Main Task for MI5


MI5 are devoting the greatest amount of their casework to tracking jihadists leaving the UK for Syria - and returning, as Frank Gardner reports
Tracking British jihadists fighting in Syria is now the top priority for MI5, the BBC has learned.
It comes after a video appeared to show UK jihadis in Syria trying to recruit people to join them there and in Iraq.
The Home Office said counter-terror police were working to get the video - posted by internet accounts linked to Islamic State of Iraq and the Levant (Isis) militants - taken off line.

United States House of Representatives Backs Limits on NSA Spying


WASHINGTON –  House libertarians and liberals banded together for a surprise win in their fight against the secretive National Security Agency, securing support for new curbs on government spying a year after leaker Edward Snowden's disclosures about the bulk collection of millions of Americans' phone records.
The Republican-led House voted 293-123 late Thursday to add the limits to a $570 billion defense spending bill. The provision, which faces an uncertain fate in the Senate, would bar warrantless collection of personal online information and prohibit access for the NSA and CIA into commercial tech products.

Australia Formally Lists Boko Haram As Terror Group

 Australia has formally listed Nigerian militant group Boko Haram as a terrorist organisation.
The move makes it illegal to fund, train with, recruit for or become a member of the group that became notorious when it kidnapped 250 schoolgirls in April.
Australia has joined with the US, UK, Canada and Nigeria in their decision to list the group.
Australian Prime Minister Tony Abbott announced plans to list Boko Haram last month, saying the world was transfixed and horrified by the group's hostage taking.

#BringBackOurGirls: Presidential Panel Confirms 219 Chibok Schoolgirls Still Missing

 A total of 219 students of the Government Secondary School, Chibok, Borno State, are still missing after the mass abduction carried out by members of the Boko Haram sect in the school on April 14.The 219 students were among the 276 girls said to have been snatched from the school during the midnight raid. The Chairman of the Presidential Fact-finding Committee on the Abduction of Chibok Schoolgirls, Brig.-Gen. Ibrahim Sabo (retd.), disclosed this on Friday while presenting the committee’s report to President Goodluck Jonathan at the Presidential Villa, Abuja.

Mali Unrest: UN Surveillance Drones To Be Deployed


Security in the north, where armed groups still operated, has deteriorated
Surveillance drones are to be used by the United Nations in Mali's volatile and vast northern desert region.
UN peacekeeping head Herve Ladsous told the UN Security Council they would help protect civilians and troops.
A 8,000-strong UN force is deployed to help stabilise the region after French and African troops ousted Islamist militants from the main towns in 2013.

Foreign Troops Only Gives Nigerian Soldiers ‘Coordinates’ Against Boko Haram


As it is 66 days today since the Boko Haram sect in Chibok abducted over 200 female students in Borno state. SaharaReporters today learned from credible sources that foreign countries are only giving Nigerian military official ‘coordinates’ in the battle to rescue the girls.
The ‘coordinates,’ according to the source, says a military officer is basically supplying pictorial intelligence to the Nigerian Air Force of images of areas in Borno where the Boko Haram are sighted, and the whereabouts of their movements in all their locations in Adamawa, Borno and Yobe states.

Android and Windows Smartphones to Get 'Kill Switch'


Authorities claim that a kill switch feature would help reduce phone theft
Google and Microsoft will add a "kill-switch" feature to their Android and Windows phone operating systems.
The feature is a method of making a handset completely useless if it is stolen, rendering a theft pointless.

Thursday 19 June 2014

Africa's Sahel Region 'Threatened By Islamist Violence'


The growth of Islamist violence in the Sahel is threatening the stability of the entire region that runs south of Africa's Sahara Desert, a UN envoy has told the Security Council.
Hiroute Guebre Sellassie, the new UN envoy for the Sahel, said Nigeria, Libya and Mali were worst affected.
But overall "terrorist acts" in the Sahel and the Maghreb had increased by 60% in 2013, he said.

Intelligence Reveal Plans By Boko Haram To Bomb Abuja Using Petrol Tankers

 The federal government has revealed a plot by members of the Boko Haram sect to carry out a massive attack in different locations in the Federal Capital Territory (FCT).
Coordinator of the National Information Centre, and Director-General of the National Orientation Agency (NOA), Mike Omeri, made the revelation on Wednesday during the update media briefing on the fight against insurgency and rescue of the abducted Chibok schoolgirls.

Wednesday 18 June 2014

How to Anonymize Everything You Do Online

Written By Andy Greenberg  (Wired)

One year after the first revelations of Edward Snowden, cryptography has shifted from an obscure branch of computer science to an almost mainstream notion: It’s possible, user privacy groups and a growing industry of crypto-focused companies tell us, to encrypt everything from emails to IMs to a gif of a motorcycle jumping over a plane.

But it’s also possible to go a step closer toward true privacy online. Mere encryption hides the content of messages, but not who’s communicating. Use cryptographic anonymity tools to hide your identity, on the other hand, and network eavesdroppers may not even know where to find your communications, let alone snoop on them. “Hide in the network,” security guru Bruce Schneier made his first tip for evading the NSA. “The less obvious you are, the safer you are.”

Though it’s hardly the sole means of achieving online anonymity, the software known as Tor has become the most vouchsafed and developer-friendly method for using the Internet incognito. The free and open source program triple-encrypts your traffic and bounces it through computers around the globe, making tracing it vastly more difficult. Most Tor users know the program as a way to anonymously browse the Web. But it’s much more. In fact, Tor’s software runs in the background of your operating system and creates a proxy connection that links with the Tor network. A growing number of apps and even operating systems provide the option to route data over that connection, allowing you to obscure your identity for practically any kind of online service.

Some users are even experimenting with using Tor in almost all their communications. “It’s like being a vegetarian or a vegan,” says Runa Sandvik, a privacy activist and former developer for Tor. “You don’t eat certain types of food, and for me I choose to use Tor only. I like the idea that when I log onto a website, it doesn’t know where I’m located, and it can’t track me.”

Here’s how you can use the growing array of anonymity tools to protect more of your life online.

Web Browsing
The core application distributed for free by the non-profit Tor Project is the Tor Browser, a hardened, security-focused version of Firefox that pushes all of your Web traffic through Tor’s anonymizing network. Given the three encrypted jumps that traffic takes between computers around the world, it may be the closest thing to true anonymity on the Web. It’s also rather slow. But the Tor browser is getting faster, says Micah Lee, a privacy-focused technologist who has worked with the Electronic Frontier Foundation—one of the organizations that funds the Tor Project—and First Look Media. For the past month or so, he’s tried to use it as his main browser and only switch back to traditional browsers occasionally, mostly for flash sites and others that require plugins.

After about a week, he says, the switch was hardly noticeable. “It may not be entirely necessary, but I haven’t found it that inconvenient either,” Lee says. “And it does have real privacy benefits. Everyone gets tracked everywhere they go on the Web. You can opt of out of that.”

Email
The simplest way to anonymously send email is to use a webmail service in the Tor Browser. Of course, that requires signing up for a new webmail account without revealing any personal information, a difficult task given that Gmail, Outlook, and Yahoo! Mail all require a phone number.

Runa Sandvik suggests Guerrilla Mail, a temporary, disposable email service. Guerrilla Mail lets you set up a new, random email address with only a click. Using it in the Tor Browser ensures that no one, not even Guerrilla Mail, can connect your IP address with that ephemeral email address.

Encrypting messages with webmail can be tough, however. It often requires the user to copy and paste messages into text windows and then use PGP to scramble and unscramble them. To avoid that problem, Lee instead suggests a different email setup, using a privacy-focused email host like Riseup.net, the Mozilla email app Thunderbird, the encryption plugin Enigmail, and another plugin called TorBirdy that routes its messages through Tor.

Instant Messaging
Adium and Pidgin, the most popular Mac and Windows instant messaging clients that support the encryption protocol OTR, also support Tor. (See how to enable Tor in Adium here and in Pidgin here.) But the Tor Project  is working to create an IM program specifically designed to be more secure and anonymous. That Tor IM client, based on a program called Instant Bird, was slated for release in March but is behind schedule. Expect an early version in mid-July.

Large File Transfers
Google Drive and Dropbox don’t promise much in the way of privacy. So Lee created Onionshare, open-source software that lets anyone directly send big files via Tor. When you use it to share a file, the program creates what’s known as a Tor Hidden Service—a temporary, anonymous website—hosted on your computer. Give the recipient of the file the .onion address for that site, and they can securely and anonymously download it through their Tor Browser.

Mobile Devices
Anonymity tools for phones and tablets are far behind the desktop but catching up fast. The Guardian Project created an app called Orbot that runs Tor on Android. Web browsing, email and IM on the phone can all be set to use Orbot’s implementation of Tor as a proxy.

Apple users don’t yet have anything that compares. But a 99-cent app called Onion Browser in the iOS app store offers anonymous web access from iPhones and iPads. An audit by Tor developers in April revealed and helped fix some of the program’s vulnerabilities. But Sandvik suggests that prudent users should still wait for more testing. In fact, she argues that the most sensitive users should stick with better-tested desktop Tor implementations. “If I were in a situation where I needed anonymity, mobile is not a platform I’d rely on,” she says.

Everything Else
Even if you run Tor to anonymize every individual Internet application you use, your computer might still be leaking identifying info online. The NSA has even used unencrypted Windows error messages sent to Microsoft to finger users and track their identities. And an attacker can compromise a web page you visit and use it to deliver an exploit that breaks out of your browser and sends an unprotected message revealing your location.

So for the truly paranoid, Lee and Sandvik recommend using entire operating systems designed to send every scrap of information they communicate over Tor. The most popular Tor OS is Tails, or The Amnesiac Incognito Live System. Tails can boot from a USB stick or DVD so no trace of the session remains on the machine, and anonymizes all information. Snowden associates have said the NSA whistleblower is himself a fan of the software.

For the even more paranoid, there is a lesser-known Tor-enabled OS called Whonix. Whonix creates multiple “virtual machines” on the user’s computer—software versions of full computer operating systems that are designed to be indistinguishable from a full computer. Any attacker trying to compromise the user’s computer will be confined to that virtual machine.

That virtualization trick underlines an important point for would-be anonymous Internet users, Lee says: If your computer gets hacked, the game is over. Creating a virtual sandbox around your online communications is one way to keep the rest of your system protected.

“Tor is awesome and can make you anonymous. But if your endpoint gets compromised, your anonymity is compromised too,” he says. “If you really need to be anonymous, you also need to be really secure."