Mass panic as Zimbabwean officials fake air crash
">

Mass panic as Zimbabwean officials fake air crash

Thursday, August 5, 2010

Today, Zimbabwean officials informed the media that an Air Zimbabwe Boeing 767 aircraft carrying 250 people had crashed at Harare International Airport, before they announced the reports were false and the incident had in fact been a drill to simulate the occurrence of such an event. Initial reports suggested that a flight from London had crashed upon landing at the airport. However, Medical Rescue International later stated in a post on Facebook that no airplane had crashed and it had “joined up with other services to attend to a mock accident at Harare International Airport … Good to keep the practising up.”

Those behind the staged accident had reportedly not told any other governmental departments, resulting in relatives inquiring with Air Zimbabwe as to what had happened. A senior figure for Air Zimbabwe stated that he was “concerned that this incident led to many, many calls to us. People were frightened. No actual plane was involved, but there was a scenario involving a Boeing 767 plane that had been hijacked and forced down at Harare airport.”

It was reported that Peter Chikumba, chief of Air Zimbabwe, had also not been informed that the exercise was to take place, and that the airline had set up an emergency helpdesk to liaise with the families of victims. Alan McGuinness, a correspondent for Sky News, stated, “journalists who arrived at the airport saw smoke rising from a runway and were then taken to a room where they were told to wait. David Chawota, the head of the Zimbabwe Civil Aviation Authority, said the media was duped to make the drill more realistic.” Chawota stated, “telling the media was part of the exercise. We wanted to see how the media would react,” he said.

Chawota himself told BNO News that an airliner had crashed. Michael van Poppel, head of BNO News said that “while I first thought Chawota was just misinformed by others, although that would be odd since he is the CEO of the aviation authority, I was stunned to hear that he actually knew it was a drill and wanted to see the media’s response … This basically means he was lying to me when I spoke to him, but also to other reporters he spoke to … I think it was absolutely irresponsible of this CEO and I can’t imagine what the families of passengers travelling to Harare around that time must have gone through when they heard news reports that there had been an ‘accident’ at the airport.”

McGuinness reported, “Stuart Sprake, general manager of FX Logistics, works at Harare airport and believed the secrecy surrounding the drill will help emergency crews learn valuable lessons.” Sprake told reporters “they (the crews) had to find their way through crowds and traffic … training exercises should be ad hoc — the less people know about it the better.”

Ontario Votes 2007: Interview with Progressive Conservative candidate Dan McCreary, Brant
">

Ontario Votes 2007: Interview with Progressive Conservative candidate Dan McCreary, Brant

Tuesday, October 2, 2007

Dan McCreary is running for the Progressive Conservative in the Ontario provincial election, in the Brant riding. Wikinews’ Nick Moreau interviewed him regarding his values, his experience, and his campaign.

Stay tuned for further interviews; every candidate from every party is eligible, and will be contacted. Expect interviews from Liberals, Progressive Conservatives, New Democratic Party members, Ontario Greens, as well as members from the Family Coalition, Freedom, Communist, Libertarian, and Confederation of Regions parties, as well as independents.

New Zealand Government announces record surplus
">

New Zealand Government announces record surplus

Wednesday, October 11, 2006

Today the New Zealand Government announced that they had a record surplus of NZ$11.5 billion for the 2005 and 2006 financial year. This amount was $2.5 billion more than the government expected to get, however $1.8 billion of the surplus was because of a change to the recording of the tax take.

However the surplus is now going to put more pressure on the government to put tax cuts on the cards. Both the Labour and United Future parties are reviewing cutting business tax. But the National party says that with the big surplus they can afford to cut both business tax and personal tax.

However finance minister, Doctor Michael Cullen, said the amount of cash available for tax cuts will be clearer in December.

John Key, finance spokesman for National, said: “The surplus makes a mockery of claims made by Michael Cullen before the last election that tax cuts were unaffordable and would put at risk core primary services. When surpluses are this enormous, any veiled hope the government had that it is not overtaxing people will rapidly evaporate.”

Cullen said: “The Government’s “robust” financial position was a firm base for the future, but it was not an indication of how much room he had for tax cuts or spending.”

Phil O’Reilly, Chief Executive of Business New Zealand said: “The business tax reduction from 33 to 30 cents planned for April 2008 could be brought forward to April 2007. The last time the business rate was cut, in 1989, business tax revenue actually went up. In the decade before 1989, revenue averaged around $1 billion a year, while in the decade after, it averaged nearly $3 billion a year – in other words, revenue nearly tripled.

“It [tax] should be put to use in a way that truly benefits New Zealand,” O’Reilly added.

Four more found guilty in 1993 Mumbai blasts case
">

Four more found guilty in 1993 Mumbai blasts case

Monday, October 16, 2006

The TADA court in Mumbai held four accused guilty of assisting Tiger Memon in smuggling arms and RDX that were used in the serial blasts. Four others were acquitted for want of evidence. Muzamil Umar Kadri, Khalil Ahmed Sayyed Nazir and Gulam Hafeez Shaikh were convicted of helping land RDX on the Shekhadi coast in February 1993, and also for tranporting weapons and possessing illegal arms.

Tulsiram Dhondu Surve, watchman of high security Wangani microwave tower in Raigad district, was found guilty of allowing Tiger’s men to use government property for the purpose of loading arms into vehicles which then transported them to Mumbai. CBI investigations also revealed that Surve had concealed 59 bags of explosives in his field, before handing them over to the bombers. The watchman was convicted under Section 202 of the Indian Penal Code for “not informing authorities of the smuggling of arms and explosives despite having knowledge of the activities.”

Judge Kode, however, acquitted Anant Bhoir, who had allowed his dumper to be used for disposing of RDX in the Nagla Bunder Creek. The court said that Bhoir had not been aware that the sacks contained explosive material. The court also ruled that Bhoir and his co-accused’s confessions were inadmissible since they “appear to have been taken under duress.”

ACLU, EFF challenging US ‘secret’ court orders seeking Twitter data
">

ACLU, EFF challenging US ‘secret’ court orders seeking Twitter data

Thursday, April 7, 2011

Late last month, the American Civil Liberties Union (ACLU) and Electronic Frontier Foundation (EFF) filed objections to the United States Government’s ‘secret’ attempts to obtain Twitter account information relating to WikiLeaks. The ACLU and EFF cite First and Fourth amendment issues as overriding reasons to overturn government attempts to keep their investigation secret; and, that with Birgitta Jonsdottir being an Icelandic Parliamentarian, the issue has serious international implications.

The case, titled “In the Matter of the 2703(d) Order Relating to Twitter Accounts: Wikileaks, Rop_G, IOERROR; and BirgittaJ“, has been in the EFF’s sights since late last year when they became aware of the US government’s attempts to investigate WikiLeaks-related communications using the popular microblogging service.

The key objective of this US government investigation is to obtain data for the prosecution of Bradley Manning, alleged to have supplied classified data to WikiLeaks. In addition to Manning’s Twitter account, and that of WikiLeaks (@wikileaks), the following three accounts are subject to the order: @ioerror, @birgittaj, and @rop_g. These, respectively, belong to Jacob Apelbaum, Birgitta Jonsdottir, and Rop Gonggrijp.

Birgitta is not the only non-US citizen with their Twitter account targeted by the US Government; Gonggrijp, a Dutch ‘ex-hacker’-turned-security-expert, was one of the founders of XS4ALL – the first Internet Service Provider in the Netherlands available to the public. He has worked on a mobile phone that can encrypt conversations, and proven that electronic voting systems can readily be hacked.

In early March, a Virginia magistrate judge ruled that the government could have the sought records, and neither the targeted users, or the public, could see documents submitted to justify data being passed to the government. The data sought is as follows:

  1. Personal contact information, including addresses
  2. Financial data, including credit card or bank account numbers
  3. Twitter account activity information, including the “date, time, length, and method of connections” plus the “source and destination Internet Protocol address(es)”
  4. Direct Message (DM) information, including the email addresses and IP addresses of everyone with whom the Parties have exchanged DMs

The order demands disclosure of absolutely all such data from November 1, 2009 for the targeted accounts.

The ACLU and EFF are not only challenging this, but demanding that all submissions made by the US government to justify the Twitter disclosure are made public, plus details of any other such cases which have been processed in secret.

Bradley Manning, at the time a specialist from Maryland enlisted with the United States Army’s 2nd Brigade, 10th Mountain Division, was arrested in June last year in connection with the leaking of classified combat video to WikiLeaks.

The leaked video footage, taken from a US helicopter gunship, showed the deaths of Reuters staff Saeed Chmagh and Namir Noor-Eldeen during a U.S. assault in Baghdad, Iraq. The wire agency unsuccessfully attempted to get the footage released via a Freedom of Information Act request in 2007.

When WikiLeaks released the video footage it directly contradicted the official line taken by the U.S. Army asserting that the deaths of the two Reuters staff were “collateral damage” in an attack on Iraqi insurgents. The radio chatter associated with the AH-64 Apache video indicated the helicopter crews had mistakenly identified the journalists’ equipment as weaponry.

The US government also claims Manning is linked to CableGate; the passing of around a quarter of a million classified diplomatic cables to WikiLeaks. Manning has been in detention since July last year; in December allegations of torture were made to the United Nations High Commissioner for Human Rights regarding the conditions under which he was and is being detained.

Reports last month that he must now sleep naked and attend role call at the U.S. Marine facility in Quantico in the same state, raised further concern over his detention conditions. Philip J. Crowley, at-the-time a State Department spokesman, remarked on this whilst speaking at Massachusetts Institute of Technology; describing the current treatment of Manning as “ridiculous and counterproductive and stupid”, Crowley was, as a consequence, put in the position of having to tender his resignation to Secretary of State Hillary Clinton.

Despite his native Australia finding, in December last year, that Assange’s WikiLeaks had not committed any criminal offences in their jurisdiction, the U.S. government has continued to make ongoing operations very difficult for the whistleblower website.

The result of the Australian Federal Police investigation left the country’s Prime Minister, Julia Gillard, having to retract a statement that WikiLeaks had acted “illegally”; instead, she characterised the site’s actions as “grossly irresponsible”.

Even with Australia finding no illegal activity on the part of WikiLeaks, and with founder Julian Assange facing extradition to Sweden, U.S. pressure sought to hobble WikiLeaks financially.

Based on a State Department letter, online payments site PayPal suspended WikiLeaks account in December. Their action was swiftly followed by Visa Europe and Mastercard ceasing to handle payments for WikiLeaks.

The online processing company, Datacell, threatened the two credit card giants with legal action over this. However, avenues of funding for the site were further curtailed when both Amazon.com and Swiss bank PostFinance joined the financial boycott of WikiLeaks.

Assange continues, to this day, to argue that his extradition to Sweden for questioning on alleged sexual offences is being orchestrated by the U.S. in an effort to discredit him, and thus WikiLeaks.

Wikinews consulted an IT and cryptography expert from the Belgian university which developed the current Advanced Encryption Standard; explaining modern communications, he stated: “Cryptography has developed to such a level that intercepting communications is no longer cost effective. That is, if any user uses the correct default settings, and makes sure that he/she is really connecting to Twitter it is highly unlikely that even the NSA can break the cryptography for a protocol such as SSL/TLS (used for https).”

Qualifying this, he commented that “the vulnerable parts of the communication are the end points.” To make his point, he cited the following quote from Gene Spafford: “Using encryption on the Internet is the equivalent of arranging an armored car to deliver credit card information from someone living in a cardboard box to someone living on a park bench.

Continuing, the Katholieke Universiteit Leuven (KUL) expert explained:

In the first place, the weak point is Twitter itself; the US government can go and ask for the data; companies such as Twitter and Google will typically store quite some information on their users, including IP addresses (it is known that Google deletes the last byte of the IP address after a few weeks, but it is not too hard for a motivated opponent to find out what this byte was).
In the second place, this is the computer of the user: by exploiting system weaknesses (with viruses, Trojan horses or backdoors in the operating system) a highly motivated opponent can enter your machine and record your keystrokes plus everything that is happening (e.g. the FBI is known to do this with the so-called Magic Lantern software). Such software is also commercially available, e.g. for a company to monitor its employees.
It would also be possible for a higly motivated opponent to play “man-in-the-middle”; that means that instead of having a secure connection to Twitter.com, you have a secure connection to the attacker’s server, who impersonates Twitter’s and then relays your information to Twitter. This requires tricks such as spoofing DNS (this is getting harder with DNSsec), or misleading the user (e.g. the user clicks on a link and connects to tw!tter.com or Twitter.c0m, which look very similar in a URL window as Twitter.com). It is clear that the US government is capable of using these kind of tricks; e.g., a company has been linked to the US government that was recognized as legitimate signer in the major browsers, so it would not be too large for them to sign a legitimate certificate for such a spoofing webserver; this means that the probability that a user would detect a problem would be very low.
As for traffic analysis (finding out who you are talking to rather than finding out what you are telling to whom), NSA and GCHQ are known to have access to lots of traffic (part of this is obtained via the UK-USA agreement). Even if one uses strong encryption, it is feasible for them to log the IP addresses and email addresses of all the parties you are connecting to. If necessary, they can even make routers re-route your traffic to their servers. In addition, the European Data Retention directive forces all operators to store such traffic data.
Whether other companies would have complied with such requests: this is very hard to tell. I believe however that it is very plausible that companies such as Google, Skype or Facebook would comply with such requests if they came from a government.
In summary: unless you go through great lengths to log through to several computers in multiple countries, you work in a clean virtual machine, you use private browser settings (don’t accept cookies, no plugins for Firefox, etc.) and use tools such as Tor, it is rather easy for any service provider to identify you.
Finally: I prefer not to be quoted on any sentences in which I make statements on the capabilities or actions of any particular government.

Wikinews also consulted French IT security researcher Stevens Le Blond on the issues surrounding the case, and the state-of-the-art in monitoring, and analysing, communications online. Le Blond, currently presenting a research paper on attacks on Tor to USENIX audiences in North America, responded via email:

Were the US Government to obtain the sought data, it would seem reasonable the NSA would handle further investigation. How would you expect them to exploit the data and expand on what they receive from Twitter?

By requesting 1) and 2) for Birgitta and other people involved with WikiLeaks (WL) since 2009, one could derive 2 main [pieces of] information.
First, he could tell the mobility of these people. Recent research in networking shows that you can map an IP address into a geographic location with a median error of 600 meters. So by looking at changes of IP addresses in time for a Twitter user, one could tell (or at least speculate about) where that person has been.
Second, by correlating locations of different people involved with WL in time, one could possibly derive their interactions and maybe even their level of involvement with WL. Whether it is possible to derive this information from 1) and 2) depends on how this people use Twitter. For example, do they log on Twitter often enough, long enough, and from enough places?
My research indicates that this is the case for other Internet services but I cannot tell whether it is the case for Twitter.
Note that even though IP logging, as done by Twitter, is similar to the logging done by GSM [mobile phone] operators, the major difference seems to be that Twitter is subject to US regulation, no matter the citizenship of its users. I find this rather disturbing.
Using 3), one could search for Birgitta on other Internet services, such as social networks, to find more information on her (e.g., hidden accounts). Recent research on privacy shows that people tend to use the same e-mail address to register an account on different social networks (even when they don’t want these accounts to be linked together). Obviously, one could then issue subpoenas for these accounts as well.
I do not have the expertise to comment on what could be done with 4).
((WN)) As I believe Jonsdottir to be involved in the Icelandic Modern Media Initiative (IMMI), what are the wider implications beyond the “WikiLeaks witchhunt”?

Having been alerted to the ongoing case through a joint press release by the ACLU and EFF, Wikinews sought clarification on the primary issues which the two non-profits saw as particularly important in challenging the U.S. Government over the ‘secret’ court orders. Rebecca Jeschke, Media Relations Director for the EFF, explained in more detail the points crucial to them, responding to a few questions from Wikinews on the case:

((WN)) As a worse-case, what precedents would be considered if this went to the Supreme Court?
((WN)) Since this is clearly a politicised attack on free speech with most chilling potential repercussions for the press, whistleblowers, and by-and-large anyone the relevant U.S. Government departments objects to the actions of, what action do you believe should be taken to protect free speech rights?
((WN)) Twitter via the web, in my experience, tends to use https:// connections. Are you aware of any possibility of the government cracking such connections? (I’m not up to date on the crypto arms race).
Iranian hackers obtain fraudulent httpsEFF website.
((WN)) And, do you believe that far, far more websites should – by default – employ https:// connections to protect people’s privacy?

Finally, Wikinews approached the Icelandic politician, and WikiLeaks supporter, who has made this specific case a landmark in how the U.S. Government handles dealings with – supposedly – friendly governments and their elected representatives. A number of questions were posed, seeking the Icelandic Parliamentarian’s views:

((WN)) How did you feel when you were notified the US Government wanted your Twitter account, and message, details? Were you shocked?
((WN)) What do you believe is their reasoning in selecting you as a ‘target’?
((WN)) Are you concerned that, as a Member of Parliament involved in the Icelandic Modern Media Initiative (IMMI), the US attempt to obtain your Twitter data is interfering with planned Icelandic government policy?
((WN)) In an earlier New York Times (NYT) article, you’re indicating there is nothing they can obtain about you that bothers you; but, how do you react to them wanting to know everyone you talk to?
HAVE YOUR SAY
Do you believe the U.S. government should have the right to access data on foreign nationals using services such as Twitter?
Add or view comments
((WN)) The same NYT article describes you as a WikiLeaks supporter; is this still the case? What attracts you to their ‘radical transparency’?
((WN)) How do you think the Icelandic government would have reacted if it were tens of thousands of their diplomatic communications being leaked?
((WN)) Your ambassador in the US has spoken to the Obama administration. Can you discuss any feedback from that? Do you have your party’s, and government’s, backing in challenging the ordered Twitter data release?
((WN)) Wikinews consulted a Belgian IT security expert who said it was most likely companies such as Facebook, Microsoft, and Google, would have complied with similar court orders *without advising the ‘targets*’. Does that disturb you?
This exclusive interview features first-hand journalism by a Wikinews reporter. See the collaboration page for more details.
((WN)) Has there been any backlash within Iceland against US-based internet services in light of this? Do you expect such, or any increase in anti-American sentiments?
((WN)) Does this make you more, or less, determined to see the IMMI succeed?

The U.S. Government continues to have issues internationally as a result of material passed to WikiLeaks, and subsequently published.

Within the past week, Ecuador has effectively declared the U.S. ambassador Heather Hodges persona-non-grata over corruption allegations brought to light in leaked cables. Asking the veteran diplomat to leave “as soon as possible”, the country may become the third in South America with no ambassadorial presence. Both Venezuela and Bolivia have no resident U.S. ambassador due to the two left-wing administrations believing the ejected diplomats were working with the opposition.

The U.S. State Department has cautioned Ecuador that a failure to speedily normalise diplomatic relations may jeapordise ongoing trade talks.

The United Kingdom is expected to press the Obama administration over the continuing detention of 23-year-old Manning, who also holds UK citizenship. British lawmakers are to discuss his ongoing detention conditions before again approaching the U.S. with their concerns that his solitary confinement, and treatment therein, is not acceptable.

The 22 charges brought against Manning are currently on hold whilst his fitness to stand trial is assessed.

Wedding next year for Sweden’s crown princess
">

Wedding next year for Sweden’s crown princess

Friday, February 27, 2009

On February 24th the Swedish Royal Court announced that the Crown Princess Victoria is to be married in 2010 to her boyfriend and former fitness trainer Daniel Westling. KP Victoria, 31, and Daniel, 35, have been in a relationship for seven years. As the wedding is to be held in the summer of 2010, it gives the court 18 months to prepare, contemplate the wedding dress of the Crown Princess, and complete the guest-list – which will include prominent guests from Europe and the world.

According to the Swedish constitution, KP Victoria must ask for the King’s approval for the marriage, who then has to call a cabinet council so that the government can give its approval. This was done on Tuesday morning, just before the court announced the engagement.

After the wedding, Daniel will be given the title of Prince Daniel, Duke of Västergötland. Their children will be next in line to the throne after Crown Princess Victoria.

Former White House press secretary Robert Gibbs may work for Facebook
">

Former White House press secretary Robert Gibbs may work for Facebook

Tuesday, March 29, 2011

Robert Gibbs, the former press secretary for the U.S. White House, has been said to be in talks with Facebook about possible future employment as a manager for the communications aspect of the company.

According to an anonymous source close to the company, Gibbs is being pressed to quickly accept the job, in which Mr. Gibbs may receive millions of dollars in both salary and initial stock options for a planned public offering of Facebook Inc. in 2012.

Both Facebook and Gibbs have declined to comment.

Mr. Gibbs, who has worked for the Obama administration for two years, left in February 2011, and was reportedly “relaxing” and had denied rumors that he was planning to campaign for chairman of the Democratic National Committee if Tim Kaine were to leave the committee to run for a position in the senate.

In recent months, Facebook has stepped up lobbying the US capital to communicate its public image to policy makers, and may use Gibbs for their public relations stratagem in the future.

Find An Assault Lawyer In Reading To Represent You

byAlma Abell

The Law Offices of Sodomsky and Nigrini are the ones that you need to contact if you have been arrested for assault charges. After all, you don’t want to have to walk into the courtroom by yourself. This is most likely going to be one of the hardest things that you have had to deal with in quite some time. You are going to feel intimidated by the other lawyers. They are going to work hard to make your life miserable. This is why you need someone to help you through the process. Set up an appointment with an Assault Lawyer in Reading who will help you to get through this as quickly as possible.Always remember that the most important thing that you need to know when it comes to being in trouble with the law is that you need to tell the truth. Don’t be ashamed by the things that you have done. There is a good chance that your lawyer has seen a lot worse than what you have done. Don’t try to lie about your mistakes. Instead, make sure that you tell the truth so that your lawyer can work hard to put together the best possible case.We all lose our temper at one time or another. If you have lost your temper and assaulted someone, you need to stand up and do the right thing. You need to admit the things that you have done and make things right. You may have to take care of medical bills for the injuries that you have caused. You also may have to take care of any personal property damages. There is no way that you can get around these things. Thankfully, if you have a lawyer on your side, he may be able to get you a reduced fine. You never know how an Assault Lawyer in Reading can benefit you until you have hired one. Set up an appointment today and find out what you need to do to keep yourself out of trouble and get your life back on track. You will be happy with the end results.

[youtube]http://www.youtube.com/watch?v=6Tb88lHxRAk[/youtube]

Avalanche buries cars in Colorado
">

Avalanche buries cars in Colorado

Saturday, January 6, 2007

An avalanche on U.S. Route 40, which was 100 feet wide and 15 feet deep, has buried many cars, caused other cars to be pushed over the edge of an expressway, and injured eight people, just outside of Denver, Colorado. The avalanche started at 10:30 AM, starting about 12 miles off Interstate 70, and taking three different paths down the mountain before coming to a stop.

“Our crews said it was the largest they have ever seen. It took three paths,” said a spokeswoman for the Colorado Department of Transportation, Stacey Stegman.

All eight (7 adults, 1 minor) have been taken to the St. Anthony Central Hospital in Denver. According to a hospital spokeswoman, all of the victims suffered minor injuries. Seven patients were released on Saturday. There were no casualties.

U.S. route 40 is currently closed to traffic. According to Winter Park spokesman Matt Sugar, there are no plans to close the ski hills. “We’ve gotten calls from all over the country asking if the resort is closed,” he said, “and the answer is no.”

This is the third snow storm to hit the Denver area in three weeks.

Brazil’s Minas state stops sales of Toyota Corolla
">

Brazil’s Minas state stops sales of Toyota Corolla

Friday, April 23, 2010

Minas, one of the largest states of Brazil, has stopped the sale of the Toyota Corolla over safety concerns.

The move was made after nine Corolla customers reported that their cars automatically accelerated. The state public prosecutor’s office said in an online statement on Tuesday that the problem is blamed on accelerator pedals sticking underneath floor mats. Local government said the issue was “putting in danger the lives of occupants”.

According to the prosecutor’s office, sales of Corollas may resume when Toyota alters the floormats in its current models. Toyota has recalled over eight million vehicles worldwide due to acceleration problems.

« Previous Entries Next Entries »