Monday 17 May 2021

غزہ سے آنے والے راکٹوں نے اسرائیل کو پاگل کر دیاغزہ سے آنے والے راکٹوں نے اسرائیل کو پاگل کر دی

 

اسرائیل پر اب تک 1 ہزار راکٹس فائر ہو چکے، راکٹ حملوں کو روکنے کیلئے اسرائیل کا کروڑوں ڈالرز کا نقصان





   غزہ (اُردو پوائنٹ تازہ ترین اخبار۔ 17 مئی 2021ء) غزہ سے آنے والے راکٹوں نے اسرائیل کو پاگل کر دیا، اسرائیل پر اب تک 1 ہزار راکٹس فائر ہو چکے، راکٹ حملوں کو روکنے کیلئے اسرائیل کا کروڑوں ڈالرز کا نقصان۔ تفصیلات کے مطابق ایک ترک خبر رساں ویب سائٹ کے مطابق اسرائیل کا خودکار جدید دفاعی نظام آئرن ڈوم فلسطین سے آنے والے راکٹوں کو روکنے میں ناکام ہو رہا ہے۔


فلسطین کے علاقے غزہ سے اب تک 1000 راکٹ اسرائیل پر فائر کیے جا چکے، اتنی بڑی تعداد میں راکٹ حملوں کو روکنے کیلئے اسرائیل کو بڑی رقم خرچ کرنا پڑ رہی ہے۔ ایک راکٹ حملے کو روکنے کیلئے دفاعی نظام آئرن ڈوم کا 1 ہی راکٹ استعمال ہوتا ہے، جس کی قیمت کروڑوں روپے ہے۔





واضح رہے کہ غزہ کی پٹی پر اسرائیلی بربریت تاحال جاری ہے، اسرائیل کے متعدد فضائی حملوں کے نتیجے میں مزید 5 فلسطینیوں کو شہید کر دیا گیا۔


جس کے بعد شہادتوں کی تعداد 200 تک پہنچ گئی ہے، اسرائیلی بمباری سےمرنےوالوں میں 58 بچےاور34 عورتیں بھی شامل ہیں۔ عرب میڈیاکے مطابق اسرائیل کی جانب سے غزہ پر کم از کم 70 فضائی حملے کیے گئے اورشہری آبادیوں پربمباری کی ۔ یہ 2014ء میں ہونے والے بمباری کے بعد غزہ کا سب سے زیادہ شدید فضائی حملہ بتایا جاتا ہے۔ 

آج صبح کیے گئے حملوں کے اہداف میں فلسطینی سرزمین کے متعدد فوجی اورحفاظتی اڈے شامل تھے۔

غزہ کے وسط میں 4 منزلہ عمارت پربھی بمباری کی گئی۔ ملبے سے کئی بچوں کی لاشیں نکالنے کے لرزہ خیز مناظر سامنے آئے، ایک بچی 24 گھنٹوں بعد زندہ نکال لی گئی۔ گزشتہ روزبھی رہائشی عمارتوں پرحملے کیے گئے تھے جن کے نتیجے میں42 افرادشہید ہوئےتھے۔ واضح رہے کہ 10 مئی سے اسرائیل اور فلسطین کے درمیان کشیدگی شدت اختیار کر گئی ہے۔ ایک اندازے کے مطابق اب تک 487 افراد زخمی اور ہزاروں بےگھر ہو چکے ہیں۔ یاد رہے کہ بیت المقدس میں اسرائیلی پولیس اور فلسطینی شہریوں میں تازہ جھڑپوں کی ابتدا اس وقت ہوئی تھی جب مشرقی بیت المقدس میں یہودی آبادکاروں کی جانب سے وہاں بسنے والے چند فلسطینی خاندانوں کو بےدخل کرنے کی کوشش کی گئی۔



Sunday 25 April 2021

Indian hospitals plead for oxygen, country sets virus record

 



NEW DELHI (AP) — India put oxygen tankers on special express trains as major hospitals in New Delhi begged on social media on Friday for more supplies to save COVID-19 patients who are struggling to breathe. More than a dozen people died when an oxygen-fed fire ripped through a coronavirus ward in a populous western state.

India’s underfunded health system is tattering as the world’s worst coronavirus surge wears out the nation, which set a global record in daily infections for a second straight day with 332,730.

India has confirmed 16 million cases so far, second only to the United States in a country of nearly 1.4 billion people. India has recorded 2,263 deaths in the past 24 hours for a total of 186,920.

The fire in a hospital intensive care unit killed 13 COVID-19 patients in the Virar area on the outskirts of Mumbai early Friday.

The situation is worsening by the day with hospitals taking to social media to plead with the government to replenish their oxygen supplies and threatening to stop admissions of new patients.

A major private hospital chain in the capital, Max Hospital, tweeted that one of its facilities had one hour’s oxygen supply in its system and had been waiting for replenishment since early morning. Two days earlier, they had filed a petition in the Delhi High Court saying they were running out of oxygen, endangering the lives of 400 patients, of which 262 were being treated for COVID-19.

The government started running Oxygen Express trains with tankers to meet the shortage at hospitals, Railroad Minister Piyush Goyal said. The air force also airlifted oxygen tanks and other equipment to areas where they were needed, and flew doctors and nurses to New Delhi, the government said.

“We have surplus oxygen at plants which are far off from places where it is needed right now. Trucking oxygen is a challenge from these plants,” said Saket Tiku, president of the All India Industrial Gases Manufacturers Association. “We have ramped up the production as oxygen consumption is rising through the roof. But we have limitations and the biggest challenge right now is transporting it to where its urgently needed. ”

The Supreme Court told Prime Minister Narendra Modi’s government on Thursday that it wanted a “national plan” for the supply of oxygen and essential drugs for the treatment of coronavirus patients.

The Press Trust of India news agency said the Defense Ministry will fly 23 mobile oxygen generating plants from Germany to help with the shortage. Each plant will be able to produce 2,400 liters of oxygen per hour, it said.

The New Delhi government issued a list of a dozen government and private hospitals facing an acute shortage of oxygen.

At another hospital in the capital, questions were raised about whether low oxygen supplies had caused deaths.

The Press Trust of India news agency reported that 25 COVID-19 patients had died at Sir Ganga Ram Hospital in the past 24 hours and the lives of another 60 were at risk amid a serious oxygen supply crisis. It quoted unidentified officials as saying “low-pressure oxygen” could be the cause of their deaths.

Enjoy Sehgal, a hospital spokesperson, would not comment on whether the 25 patients died from a lack of oxygen. He said an oxygen tanker had just entered the hospital complex and he hoped it would temporarily relieve the depleted supplies.

The New Delhi Television channel later cited the hospital chairman as saying the deaths cannot be ascribed to a lack of oxygen.

On the outskirts of Mumbai, the fire early Friday was the second deadly incident involving COVID-19 patients at a hospital this week.

The fire on the second-floor ICU was extinguished and some patients requiring oxygen were moved to nearby hospitals, said Dilip Shah, CEO of Vijay Vallabh hospital. Shah said there are 90 patients in the hospital, about 70 kilometers (43 miles) north of Mumbai, India’s financial capital.

The cause of the fire is being investigated, he said. An explosion in the ICU air conditioning unit preceded the fire, PTI quoted government official Vivekanand Kadam as saying.

On Wednesday, 24 COVID-19 patients on ventilators died due to an oxygen leak in a hospital in Nashik, another city in Maharashtra state.

In New Delhi, Akhil Gupta was waiting for a bed for his 62-year-old mother, Suman. On April 2, she tested positive and was asymptomatic for 10 days. Then she developed a fever and started experiencing difficulty breathing.

For the next two days, her other sons, Nikhil and Akhil, drove around the city, visiting every hospital in search of a bed. Sometimes they took their mother with them, sometimes they went on their own. They looked everywhere to no avail.

On Friday, they got their mother into the emergency room at the Max Hospital in Patparganj, where she was put on oxygen temporarily as she waited in line for a bed to open up inside.

“Now the doctors are asking us to take her away because they don’t have enough oxygen to keep her in the emergency room. But we’re not even getting any ambulance with oxygen to transport her to some other facility,” said Akhil Gupta.

The family decided to stay at Max and continue waiting for a bed.

“What else can we do?” said Akhil.

A year ago, India was able to avoid the shortages of medical oxygen that plagued Latin America and Africa after it converted industrial oxygen manufacturing systems into a medical-grade network.

But many facilities went back to supplying oxygen to industries and now several Indian states face such shortages that the Health Ministry has urged hospitals to implement rationing.

The government in October began building new plants to produce medical oxygen, but now, some six months later, it remains unclear whether any have come on line, with the Health Ministry saying they were being “closely reviewed for early completion.”

Tanks of oxygen are being shuttled across the country to hotspots to keep up with the demand, and several state governments have alleged that many have been intercepted by other states to be used for their needs.

Ashok Kumar Sharma, 62, was finally put on oxygen on Monday in his home in West Delhi. It only happened after days of frantically searching for an oxygen cylinder from various hospitals, clinics and private distributors.

“I called at least 60 people looking for oxygen, but everyone’s numbers were switched off,” said Kunal, Sharma’s son.

Kunal’s father was diagnosed with pneumonia on April 14, and a few days later, tested positive for COVID-19. The doctors recommended he be put on oxygen immediately. When Kunal could not find any, he put out an SOS on social media.

“But there is so much black marketeering going on. People contacted me selling cylinders for 3 times, 4 times the original price,” said Kunal. He finally acquired one from personal contact.

“It’s horrible how people are taking advantage of our helplessness,” he said.

___

Associated Press writers Aijaz Hussain in Srinagar, India, and Patrick Quinn in Bangkok contributed to this report.



Thursday 8 August 2019

Dumbo

Dumbo,dumbo,dumbo 2019,dumbo trailer,dumbo disney,dumbo live action,dumbo trailer 2019,dumbo 1941,dumbo song,dumbo (film),dumbo movie,dumbo review,disney dumbo,tim burton,dumbo trailer 2,dumbo original,dumbo baby mine,dumbo tim burton,dumbo la pelicula,dumbo live-action,dumbo filmkritik,dumbo trailer german,dumbo trailer deutsch,jumbo,dumbo 2,movie,dumbo trailer español latino,dumbo cake,dumbo clip,dumbo kino,michael keaton


Dumbo


Today, August 3rd 2017 WikiLeaks publishes documents from the Dumbo project of the CIA. Dumbo is a capability to suspend processes utilizing webcams and corrupt any video recordings that could compromise a PAG deployment. The PAG (Physical Access Group) is a special branch within the CCI (Center for Cyber Intelligence); its task is to gain and exploit physical access to target computers in CIA field operations.
Dumbo can identify, control and manipulate monitoring and detection systems on a target computer running the Microsoft Windows operating sytem. It identifies installed devices like webcams and microphones, either locally or connected by wireless (Bluetooth, WiFi) or wired networks. All processes related to the detected devices (usually recording, monitoring or detection of video/audio/network streams) are also identified and can be stopped by the operator. By deleting or manipulating recordings the operator is aided in creating fake or destroying actual evidence of the intrusion operation.
Dumbo is run by the field agent directly from an USB stick; it requires administrator privileges to perform its task. It supports 32bit Windows XP, Windows Vista, and newer versions of Windows operating system. 64bit Windows XP, or Windows versions prior to XP are not supported.

Leaked Documents

Imperial



Today, July 27th 2017, WikiLeaks publishes documents from the Imperial project of the CIA.
Achilles is a capability that provides an operator the ability to trojan an OS X disk image (.dmg) installer with one or more desired operator specified executables for a one-time execution.
Aeris is an automated implant written in C that supports a number of POSIX-based systems (Debian, RHEL, Solaris, FreeBSD, CentOS). It supports automated file exfiltration, configurable beacon interval and jitter, standalone and Collide-based HTTPS LP support and SMTP protocol support - all with TLS encrypted communications with mutual authentication. It is compatible with the NOD Cryptographic Specification and provides structured command and control that is similar to that used by several Windows implants.
SeaPea is an OS X Rootkit that provides stealth and tool launching capabilities. It hides files/directories, socket connections and/or processes. It runs on Mac OSX 10.6 and 10.7.


UCL / Raytheon



Today, July 19th 2017, WikiLeaks publishes documents from the CIA contractor Raytheon Blackbird Technologies for the "UMBRAGE Component Library" (UCL) project. The documents were submitted to the CIA between November 21st, 2014 (just two weeks after Raytheon acquired Blackbird Technologies to build a Cyber Powerhouse) and September 11th, 2015. They mostly contain Proof-of-Concept ideas and assessments for malware attack vectors - partly based on public documents from security researchers and private enterprises in the computer security field.
Raytheon Blackbird Technologies acted as a kind of "technology scout" for the Remote Development Branch (RDB) of the CIA by analysing malware attacks in the wild and giving recommendations to the CIA development teams for further investigation and PoC development for their own malware projects.

Spy Files Russia

Spy Files Russia



This publication continues WikiLeaks' Spy Files series with releases about surveillance contractors in Russia.

While the surveillance of communication traffic is a global phenomena, the legal and technological framework of its operation is different for each country. Russia's laws - especially the new Yarovaya Law - make literally no distinction between Lawful Interception and mass surveillance by state intelligence authorities (SIAs) without court orders. Russian communication providers are required by Russian law to install the so-called SORM ( Система Оперативно-Розыскных Мероприятий) components for surveillance provided by the FSB at their own expense. The SORM infrastructure is developed and deployed in Russia with close cooperation between the FSB, the Interior Ministry of Russia and Russian surveillance contractors.

Spy-Files-Russia,russia,spy,russian spy,spy files russia,russian spies,files,russian,spy files,russia today,wikileaks,russia (country),snowden files,russian spy case,spies,russian spy agency,putin russia,russian spy profile,cia,trump russia,flynn russia,cold war russia,decoded russia,michael flynn russia,spy stories,putin files,russia news,decoded by russia,russia trump,russia putin,trump russia probe,espionage,russian kgb

PETER-SERVICE


Today, September 19th 2017, WikiLeaks starts publishing the series "Spy Files Russia" with documents from the Russian company Петер-Сервис (PETER-SERVICE). This release includes 209 documents (34 base documents in different versions) dated between 2007 and 2015.
PETER-SERVICE was founded 1992 in St. Petersburg as a provider for billing solutions and soon became the major supplier of software for the mobile telecommunications industry in Russia. Today it has more than 1000 employees in different locations in Russia, and offices in major cities in Russia and Ukraine. The technologies developed and deployed by PETER-SERVICE today go far beyond the classical billing process and extend into the realms of surveillance and control. Although compliance to the strict surveillance laws is mandatory in Russia, rather than being forced to comply PETER-SERVICE appears to be quite actively pursuing partnership and commercial opportunities with the state intelligence apparatus.
As a matter of fact PETER-SERVICE is uniquely placed as a surveillance partner due to the remarkable visibility their products provide into the data of Russian subscribers of mobile operators, which expose to PETER-SERVICE valuable metadata, including phone and message records, device identifiers (IMEI, MAC addresses), network identifiers (IP addresses), cell tower information and much more. This enriched and aggregated metadata is of course of interest to Russian authorities, whose access became a core component of the system architecture.

Selected components of PETER-SERVICE software

The base architecture of the software from PETER-SERVICE (SVC_BASE) includes components for data retention (DRS [en], [ru]), long-term storage in SORM (SSP, Service СП-ПУ), IP traffic analysis (Traffic Data Mart, TDM) and interfaces (adapters) for state agencies to access the archives.

Traffic Data Mart (TDM)

The Traffic Data Mart is a system that records and monitors IP traffic for all mobile devices registered with the operator. It maintains a list of categorized domain names which cover all areas of interest for the state. These categories include blacklisted sites, criminal sites, blogs, webmail, weapons, botnet, narcotics, betting, aggression, racism, terrorism and many more. Based on the collected information the system allows the creation of reports for subscriber devices (identified by IMEI/TAC, brand, model) for a specified time range: Top categories by volume, top sites by volume, top sites by time spent, protocol usage (browsing, mail, telephony, bittorrent) and traffic/time distribution.

Data Retention System (DRS)

The data retention system is a mandatory component for operators by law; it stores all communication (meta-)data locally for three years. State intelligence authorities use the Protocol 538 adapter built into the DRS to access stored information. According to PETER-SERVICE, their DRS solution can handle 500,000,000 connections per day in one cluster. The claimed average search time for subscriber related-records from a single day is ten seconds.

Service СП-ПУ

In SORM call monitoring functions are concentrated in control points (пунктах управления, ПУ) which are connected to network operators. The Service СП-ПУ is a data exchange interface based on HTTPS between components in SVC_BASE/DRS and SORM. The interface receives search requests from state intelligence authorities and delivers results back to the initiator. Search requests for lawful interceptions (based on a court order) are processed by the operator on the same system.

Deep Packet Inspection products

As a related document, this first release contains a publically available slide show presentationgiven by Валерий Сысик (Valery Syssik, Director of Development) from PETER-SERVICE at the Broadband Russia Forum in 2013. Titled "National stacks of DPI / BigData / DataMining technologies and solutions for collection and analysis of information, as well as means of predicting social and business trends - the key to digital and financial sovereignty of the state and business in the XXI century", the presentation - which appears to already be publicly available on PETER-SERVICE's website - is not targeted at the usual telecom provider, but at a closed group of people from the ФСБ (FSB, Russian Federal Security Service), МВД (Interior ministry of Russia) and the три ветви власти ("three pillars of Power" - legislature, executive and judiciary).
The presentation was written just a few months after Edward Snowden disclosed the NSA mass surveillance program and its cooperation with private U.S. IT-corporations such as Google and Facebook. Drawing specifically on the NSA Prism program, the presentation offers law enforcement, intelligence and other interested parties, to join an alliance in order to establish equivalent data-mining operations in Russia. PETER-SERVICE claims to already have access to a majority of all phone call records as well as Internet traffic in Russia, and in the description of the current experiences, it claims to have deployed technology for Deep Packet Inspection "with not just the headings of IP packets, but the contents of whole series". PETER-SERVICE is presented as a natural ally for intelligence agencies in "the most lucrative business [of] manipulating minds".
However, the core of the presentation is about a new product (2013) called DPI*GRID - a hardware solution for "Deep Packet Inspection" that comes literally as "black boxes" that are able to handle 10Gb/s traffic per unit. The national providers are aggregating Internet traffic in their infrastructure and are redirecting/duplicating the full stream to DPI*GRID units. The units inspect and analyse traffic (the presentation does not describe that process in much detail); the resulting metadata and extracted information are collected in a database for further investigation. A similar, yet smaller solution called MDH/DRS is available for regional providers who send aggregated IP traffic via a 10Gb/s connection to MDH for processing.
PETER-SERVICE advertises its experience in SORM technologies - especially DPI - and its ability to collect, manage and analyse "Big Data" for commercial and intelligence purposes. "From DPI solutions for SORM to contextual advertising, we have the experience and the solution. We are offering to coordinate a scalable national solution for control of the digital network. We strive for effective cooperation within a symbolic network alliance: operator - vendor - search engine - business - state organs."
The above graphics shows the Internet backbone infrastructure in Russia and the nodes at various providers that run components of the proposed DPI*GRID system in different locations. The node TopGun most likely refers to a multi terabit DPI system developed by PETER-SERVICE.

About SORM

SORM is the technical infrastructure for surveillance in Russia. It dates back to 1995 and has evolved from SORM-1 (capturing telephone and mobile phone communications) and SORM-2 (interception of Internet traffic, 1999) to the current SORM-3. SORM now collects information from all forms of communication, providing long-term storage of all information and data on subscribers, including actual recordings and locations. In 2014, the system was expanded to include social media platforms, and the Ministry of Communications ordered companies to install new equipment with Deep Packet Inspection (DPI) capability. In 2016, SORM-3 added additional classified regulations that apply to all Internet Service providers in Russia. The European Court for Human Rights deemed Russia's SORM legislation in breach of the European Convention on Human Rights in 2015 (Zakharov v. Russia).

CIA espionage orders for the 2012 French presidential election

CIA espionage orders for the 2012 French presidential election


Press Release (English)





CIA-espionage-orders-for-the-2012-French-presidential-election,cia,french presidential election 2012,french election,infiltration of french presidential election,wikileaks exposes cia interference in french presidential election,cia espionage orders,wikileaks reveals cia involvement in french presidential election,presidential election,election,wikileakscia involvement in frenc election 2012,france election,espionage,france,france elections,wikileaks,france news,american election


CIA spying orders for the list French presidential election


All major French political parties were targeted for infiltration by the CIA's human ("HUMINT") and electronic ("SIGINT") spies in the seven months leading up to France's 2012 presidential election. CIA Vault 7 series. CIA tasking orders published today by WikiLeaks as context for its forthcoming CIA Vault 7 series. Named specifically as targets of the French Socialist Party (PS), the National Front (FN) and the Union for a Popular Movement (UMP) together with current President Francois Hollande, then President Nicolas Sarkozy, current round one presidential front runner Marine Le Pen, and train presidential candidates Martine Aubry and Dominique Strauss-Khan.
The CIA assessed that President Sarkozy's party was not assured of re-election. Specific tasking pertaining to the "Strategic Election Plans" of the Union for a Popular Movement (UMP); schisms or alliances developing in the UMP elite; private UMP reactions to Sarkozy's campaign stratagies; discussions within the UMP on any "perceived vulnerabilities to maintaining power" after the election; efforts to change the party's ideological mission; and discussions about Sarkozy's support for the UMP and "the value of the place of the party's dominance". Specific instructions tasked CIA officers to discover Sarkozy's private deliberations "on the other candidates" he interacted with his advisors. Sarkozy 'did not protect him from US espionage in the 2012 election or during his presidency

The espionage order for "Non Ruling Political Parties" and "Candidates Strategic Election Plans", which targets Francois Holland, Marine Le Pen and other opposition. information on internal party dynamics and rising leaders; efforts to influence and implement political decisions; support from local government officials, government elites or business elites; views of the United States; efforts to reach out to other countries, including Germany, UK, Libya, Israel, Palestine, Syria & Ivory Coast; more about party and candidate funding.
Significantly, two CIA opposition espionage tasks, "What policies do they promote to help boost France's economic growth prospects?" and "What are their opinions on the German model of export-led growth?" resonate with a US economic espionage order from the same year . That order requires the details of every prospective French export contract or deal valued at $ 200m or more.
The opposition to the situation of women in the United States of America the role of France and Germany in the management of the Greek debt crisis; the vulnerability of French government and French banks to a Greek default; and "specific proposals and recommendations" to deal with "the euro-zone crisis".
The CIA espionage orders published today are classified and restricted to US eyes only ("NOFORN") due to "Friends-on-Friends sensitivities". The CIA, the Defense Intelligence Agency (DIA) 's EU Section, and the US State Department' s Intelligence and Research Branch.
The CIA Operation ran for the month of November 21, 2011 to Sep. 29, 2012, crossing the April-May 2012 English presidential election and new months in the formation of the new government.

 .

What Is WikilLeaks

What-Is-WikilLeaks,wikileaks,what is wikileaks,what is wikileaks?,what is wikileaks means,what is wikileaks in urdu,what is wikileaks in hindi,what is the meaning of wikileaks,what is wikileaks and how it work,what does wikileaks do,what does wikileaks mean,what does wikileaks stand for,who is julian assange? what is wikileaks in telugu ?,julian assange,wikileaks explained,how powerful is wikileaks?,whatAnonymous is a decentralized international hacktivist group that is widely known for its various DDoS cyber attacks against several governments, government institutions and government agencies, corporations, and the Church of Scientology




Motto: We Are Anonymous


Region served: Global









Anonymous

Anonymous is a decentralized international hacktivist group that is widely known for its various DDoS cyber attacks against several governments, government institutions and government agencies, corporations, and the Church of Scientology.



Anonymous is the name of a hacktivist group that was established on 4 chan in 2004. The group is often represented with the logo shown to the right of a person in a suite with a question mark for a head. When in a gathering, Anons (Anonymous members) often wear Guy Fawkes masks to keep their anonymity.
The group is associated with DDoS and other attacks that have targeted corporate, government, and religious websites that it feels contributes to Internet censorship and injustice. Such targets include the Church of Scientology, the Motion Picture and Recording Associations, MasterCard, PayPal, Sony, Visa, and the Westboro Baptist Church.
The Anonymous group has been called everything from "freedom fighters" to "cyber terrorists," and was even named one of the "100 most influential people" in the world by Time Magazine in 2012. Since the group is anonymous, it has no leader and membership is open to anyone who is willing to state they are a member of the collective. The few rules that the group does have include not disclosing one's identity, not talking about the group, and never attacking the media.