Jump to content

The News Thread


akashkhannabond007

Recommended Posts

http://www.thehindu.com/todays-paper/tp-national/tp-newdelhi/nhrc-notice-to-hrd-ministry-on-discrimination-against-dalit-students/article4786110.ece

 

A case study reference on what usually is the fate of such cases -

http://www.indianexpress.com/news/gmch32-student-suicide-case-court-acquits-doctor/1076759/

 

 

In a more related new to the undercurrents of the current national discourse, the article is a must read, especially the quoted part.

 

Awesome read --> http://www.thehindu.com/opinion/lead/the-murthys-and-the-maoists/article4785205.ece

 

 

Pro-poor initiatives
The UPA’s approach has been to let the corporate marauders run amok while salving its democratic conscience with a slew of propoor, aam aadmi-centric initiatives. In the process, for the past nine years, the country has periodically been treated to a mock controversy over whether Sonia Gandhi’s National Advisory Council was usurping the government’s space and prerogatives, or, when this or that NAC member walks out in a huff, whether the government is not being sufficiently pro-poor. The UPA’s approach neither mollifies the corporate buccaneers nor satisfies the poor and the disadvantaged. The corporates, however, have sized up the divided political leadership across the spectrum. They have finessed their tactics. If a government is slow to give them the policy breaks that they demand, the democratic space and its anarchic habits will be creatively used to unleash civil unrest on this or that pretext. There is always the age old anger against “corruption” to be tapped. And, as it were, one can always rely on an auditor or a judge to step in to divert attention away from corporate misdemeanours of the most serious kind

 

Pincer movement
No wonder, then, that the Indian state is caught in a pincer movement. From one side, the ideologues and practitioners of “growth” are unrelenting in their insistence that the country’s natural resources and citizens’ savings be made available to them for exploitation; and, from the other direction, the state is confronted by a vast underclass that is unwilling to see any reason to sacrifice its land and forests so that some others can enjoy the benefit of “progress.” Just as the corporates have served sufficient notice that they have no qualms in taking the state on and causing misery to its political functionaries, the underclass, too, is willing to match the state’s capacity for violence, bullet for
bullet. Both the Murthys and the Maoists are forcing the Indian state to take a stand. For too long, the Indian political leadership has refused to confront the Grand Conundrum: for whom does the state exist, whom does the state seek to reward and whom does it strive to protect against whom. The UPA leadership has neither the appetite for a brutal repression of the angry tribal, nor is it likely to be able to lure the Naxalites into a democratic engagement without a demonstrable capacity to stand up to corporate greed. A kind of alternative arrangement is already on the drawing board: the Gujarat model of no dissent, no trade unions, no civil society, no Medha Patkar, no tribal resistance, no protests.

 

The great sociologist, Edward Shils, once observed that every society needs grandiose visions and austere standards; the political and intellectual leadership is obliged to prod society to its own historical ideals — “elements which must be recurrently realized without even being definitively realizable, once and for all.” Perhaps we should be thankful that both the Murthys and the Maoists are inviting us to find a vision for India that is morally defensible.

Link to comment
Share on other sites

 

Secret Intelligence Fuels U.S. Hacking Fight With China

 

When Barack Obama meets with Premier Xi Jinping at a California estate known as Sunnylands today, China’s hacking will be high on the agenda, pushed there by a drumbeat of bad news linking that country’s military to attacks on U.S. companies and defense contractors.

The seeds of the dispute, though, are at least three years old. That’s when a set of key intelligence breakthroughs and devastating attacks, including a breach of Google Inc. (GOOG)’s computers, reshaped the White House view of China’s cyber spying.

U.S. spy catchers were zeroing in on Chinese hackers a few years ago. Photographer: Stephen Morton/Bloomberg

U.S. President Barack Obama, right, meets with Xi Jinping, then vice president of China, in the Oval Office of the White House in Washington, D.C., on Feb. 14, 2012. The presidents will meet at a California estate known as Sunnylands today. Photographer: Martin H. Simon/Pool via Bloomberg

Although public information about the breach at Google and almost three dozen other companies was sketchy, that wasn’t the case for the U.S. government, according to a person familiar with the investigation.

Within 24 hours of Google’s January 12, 2010, announcement, U.S. investigators knew the attack had been state sponsored. Within three weeks, they had pinned it on a specific unit of the People’s Liberation Army, the person said. The attacks on Google and the other companies were especially worrisome because they targeted technology that makes up the underpinnings of the Internet.

The attack on Google, dubbed Operation Aurora by McAfee Inc. (MFE) researchers, came about the same time that U.S. investigators were making a separate breakthrough. After years of trying, they identified several key individuals in the attacks against U.S. companies, placing them at the heart of China’s intelligence apparatus.

The Justice Department’s national security division is now considering criminal indictments against some of those individuals, according to a second person familiar with the matter who asked not to be identified because it wasn’t public.

No Chance

Prosecutors have virtually no chance of getting China’s spies into a U.S. courtroom. Instead, a criminal indictment would lay out the detailed evidence of China’s involvement in trade secrets theft -- a far more significant step than any the U.S. has taken so far.

“The decision to hold China publicly accountable reflects a high degree of confidence in the intelligence community as to who is responsible for the attacks,” said Paul Tiao, a partner atHunton & Williams LLP (1130L) and until recently, senior counselor for cyber security to FBI Director Robert Mueller. “Certainty about attribution enables operational professionals and policy makers to explore different ways to deal with this threat.”

The conflict over China’s hacking puts the White House in a delicate position. The U.S. is trying to draw a bright line around economic espionage while still retaining the right to hack into foreign computer systems as part of more traditional spying efforts, which are focused on military secrets.

Managing Anger

American officials also must manage the anger of U.S. companies and voters, on one hand, and China, on the other, as they lay out the case that one of the country’s largest trading partners and a rising power has been caught red-handed rifling the jewels of the U.S. economy.

Over the last three months, that case has mostly consisted of a series of public remarks and visits to Asia by high-level officials, including the secretaries of Defense, Chuck Hagel, and Treasury, Jacob Lew.

In the days leading to this week’s summit, China and the U.S. agreed to hold regular meetings, beginning in July, to establish norms when it comes to hacking and economic espionage.

Less visible actions could be more significant in the long run. In February, the Department ofHomeland Security released a set of indicators that companies could use to detect China espionage teams in their computers, among them computer IP addresses used by hackers to extract data.

Tipping China

The move was controversial within intelligence circles because it could tip off China to how the much the U.S. knows about the hacking, according to one former intelligence official. The White House intervened and pushed for the release, signaling the administration wanted to make a dent in China’s activities, the former official said.

An indictment of some of China’s cyber spies would go several steps beyond a recent Pentagon report that accused China of stealing weapons technology from U.S. defense contractors.

A detailed criminal indictment typically provides a chain of evidence and an account of why the person is accused of a crime. In this case, prosecutors would probably establish the theft of commercial or military technology and show what information the government has on the hackers’ relationships to China’s military intelligence organizations.

“Anything that we can read ourselves, instead of having to take some official’s word for it, is really powerful,” Stewart Baker, former general counsel for the National Security Agency, said in a phone interview. “The more detail that comes out, the greater the pressure.”

Spy Catchers

While U.S. spy catchers were zeroing in on Chinese hackers a few years ago, Operation Aurora demonstrated how the line was becoming blurred between traditional espionage and the theft of trade secrets.

Google’s willingness to announce publicly that it had been hacked was unusual. Still, the company kept secret that the hackers had accessed a server containing court orders, which could reveal the identity of U.S. government surveillance targets, including China’ agents in the U.S. and elsewhere. That access was reported five weeks ago by a researcher at Microsoft Corp. and confirmed to Bloomberg News by a senior official involved in the investigation.

Raytheon, Intel

The wider list of victims was just as worrying. According to three people involved in the government and private investigations, the list included major defense contractors -- Raytheon Co. (RTN) and Northrop Grumman Corp. (NOC) -- as well as a handful of technology companies including Intel Corp. (INTC), Adobe Systems Inc (ADBE)., Yahoo! Inc. (YHOO),Juniper Networks Inc (JNPR)., Symantec Corp. (SYMC) and Microsoft.

Morgan Stanley (MS), the New York-based investment bank, was attacked, as was eBay Inc., the online auction site.

The investigation involved agents from the FBI, Defense Department and Department of Homeland Security, a response so broad that the agencies had to develop new rules to sort out their roles.

Once U.S. officials linked the attack to the PLA, the information was provided to senior executives of several companies, including Google co-founder Sergey Brin, who was granted a temporary classified clearance to sit in on the briefing, according to a person familiar with the investigation.

In several cases -- including those of Google, Adobe and Intel -- investigators discovered that the attackers had accessed source code repositories.

Zero-Day Exploits

It’s unlikely the hackers were trying to replicate Adobe or Google products, investigators believe. The real danger is that the hackers were mining for unknown flaws in the software’s programming -- known as zero-day exploits. Those exploits can be used to take over computers, essentially giving China’s cyber spies the keys to millions of computers worldwide as the software was shipped by major manufacturers. In the case of Intel, it would be hard-wired into the chip sets as firmware.

“I don’t think you can come to any other conclusion,” said Stuart McClure, former chief technology officer for McAfee, which aided the government’s investigation.

The seriousness of the attacks steeled the administration’s resolve, while the intelligence breakthroughs provided the necessary proof.

Over the next several months, the administration took several steps to help defend critical networks, including finalizing the Defense Industrial Base pilot project, which provided sensitive intelligence on China’s hackers to defense contractors.

By then, however, administration officials had decided that a purely defensive approach wouldn’t work. The only solution was pushing China to change its behavior. This weekend’s meeting between the leaders of the two countries will be the best indicator so far of whether the plan is working.

“The idea of being victimized over and over again without taking action is not one you can stomach for very long,” said Tiao, the former FBI agent. “After a while you reach this boiling point, and we’re finally seeing the response.”

 

http://www.bloomberg.com/news/2013-06-07/secret-intelligence-fuels-u-s-hacking-fight-with-china.html

 

they had actually stolen future weapons design ...according to report 25 years of advanced researched material is stolen...

Report: Designs of Weapons Systems Breached by Chinese Hackers

In a blow to the U.S. defense industry, Chinese hackers have reportedly stolen confidential details on highly-sensitive advanced weapons systems, including missile defenses, fighter jets and combat ships.

The disclosure highlights the serious threat posed in cyber space by China, which has been striving to narrow the gap between its military and that of America’s.

“The breadth and depth” of China’s efforts to target U.S. military secrets are “both astounding and troubling,” Frank Cilluffo, director of George Washington University’s Homeland Security Policy Institute, said in an email. “The implications go far beyond theft of intellectual property and economic security matters. They also have direct national-security implications."

Designs for more than two dozen major weapons systems were breached, The Washington Post reported, citing an undisclosed section of a confidential report prepared for the Pentagon by the Defense Science Board.

“In many cases, they don’t know they’ve been hacked until the FBI comes knocking on their door,” a senior military official told the Post. “This is billions of dollars of combat advantage for China. They’ve just saved themselves 25 years of research and development. It’s nuts.”

The report listed a slew of critical weapons systems that were breached, including the advanced Patriot missile system; THAAD, which is an Army system for shooting down ballistic missiles; the Navy’s Aegis ballistic-missile defense system; the $1.4 trillion F-35 Joint Strike Fighter; the F/A-18 fighter jets; the Navy’s new Littoral Combat ship; the V-22 Osprey and the Black Hawk helicopter.

 

Read more: http://www.foxbusiness.com/government/2013/05/28/report-designs-weapons-systems-breached-by-chinese-hackers/#ixzz2VUMuhiLn

 

 

 

There was report that India DRDO and all was also hacked i think i posted also before ...but our government is still investigating while USA has already warned and getting ready to reply.

 

India government needs to get offensive now...atleast in these things...hack the f**k out of chinese PLA security & defence sites....I dont want to insult capabilities of my country men to not able to hack into any system in the world...it is just that they are not given a chance or their potential is always wasted.

 

 

 

One thing about china ...they have zeal to become superpower....and they are moving at fast rate to become one.

Link to comment
Share on other sites

Yeh bhi sala shaadi kar lega phir se sarkozy ke tera...carla bruni..

 

ladkhi log ko asa bhi powerful high influenced man acha lagta hai......

 

when pervez musharaf aya power mein ..lot of pakistani girls were going crazy for him....arey bc...budha sala..tuhmara baap ka umar phir bhi going crazy but in reality it is power than these people hold that attract girls...

Link to comment
Share on other sites

I don't even know what to say :O

 

 

Texas Says It's OK to Shoot an Escort If She Won't Have Sex With You

 

 

A jury in Bexar County, Texas just acquitted Ezekiel Gilbert of charges that he murdered a 23-year-old Craigslist escort—agreeing that because he was attempting to retrieve the $150 he'd paid to Lenora Ivie Frago, who wouldn't have sex with him, his actions were justified.

Gilbert had admitted to shooting Frago in the neck on Christmas Eve 2009, when she accepted $150 from Gilbert and left his home without having sex with him. Frago, who was paralyzed by the shooting, died several months later.

Gilbert's defense argued that the shooting wasn't meant to kill, and that Gilbert's actions were justified, because he believed that sex was included as part of the fee. Texas law allows people"to use deadly force to recover property during a nighttime theft."

The 30-year-old hugged his defense attorneys after the "not guilty" verdict was read by the judge. If convicted, he could have faced life in prison. He thanked God, his lawyers, and the jury for being able to "see what wasn't the truth."

 

Link to comment
Share on other sites

Came across this video on India-China.....The Betrayal by chinese and nehru & company being taken for a ride....

 

 

When Chou [ Zhou Enlai ] premier of the People's Republic of China, told then Indian Vice President Radhakrishnan that he could not convince "the Chinese people that Ladakh and the Aksai Plain in particular did not belong to them because of the legends going back to the 12th century which supported Chinese claims," Radhakrishnan retorted that "on such a basis India could claim Kandahar, Kabul, and many other areas including parts of China." - Answer For people who try to historically connect Tibet With Arunachal pradesh....

 

 

The 13 Kumaon Regiment Charlie Company and Major Shaitan Singh....if i have tears in my eyes right now...it is tears of how proud I am of you guys....

 

 

 

 

The area assigned to 13 Kumaon was defended by three platoon positions, but the surrounding terrain isolated 13 Kumaon from the rest of the Regiment. The Indian artillery was located behind a hill feature, and could not train its guns on the target. Therefore, the Indian infantry had to fight the battle without the protective comfort of the artillery. The Chinese suffered no such disadvantage and brought on heavy artillery fire on the 13 Kumaon’s Charlie Company.

The Chinese attack, which was expected, came through a dry river bed. It was repulsed with heavy machine gun fire by the Indian soldiers. The Chinese regrouped and attacked persistently with more reinforcements. Major Shaitan Singh, the Company Commander, went from post to post raising the morale of his men and continued to fight even after being seriously wounded. The Chinese ultimately defeated the Indian side. 114 Indian soldiers out of a total of 123 were killed. A memorial in Rewari, where many of the Ahir soldiers came from, claims that 1300 Chinese soldiers were killed in the battle

 

 

Link to comment
Share on other sites

 

Pak PM talks peace, its army kills Indian jawan

 

Tension has again gripped the Line of Control (LoC) after Pakistani army violated the border ceasefire and fired indiscriminately on the Indian forward positions leaving one Junior Commissioned Officer (JCO) dead in Saujiyan-Mandi sector of Poonch district in Jammu division.

 

The fresh ceasefire violation comes a day after the new Pakistan prime minister Nawaz Sharif offered olive branch to India and vowed to “progressively pursue” normalcy to settle all outstanding issues including Kashmir.

 

SN Acharya, officiating defence spokesman at Jammu, said the firing came from thick forests across the LoC at around 1pm in Saujiyan-Mandi sector. “They used pika guns, rocket propelled grenades (RPG) and under barrel grenade launchers (to attack the Indian positions),” he said. A naib-subedar of the Indian army received grievous shrapnel injuries in the firing. He was rushed to the hospital where he succumbed to wounds.

 

The slain soldier has been identified as Bachan Singh. Indian army retaliated in a calibrated manner to the Pakistani firing to silence the guns from across the LoC. “There was a calibrated retaliation from our side. We have cordoned off the area. Search operation is on in the area (to find out any infiltration bid if any),” said the defence spokesman Following the firing, Indian army has put its troops on alert in all sectors along the line of control (LoC).

The ceasefire violation comes five months after Pakistan troops crossed the LoC and beheaded Lance Naik Hemraj and severed head of Lance Naik Sudhakar Singh of 13 Rajputana Rifles at Mendhar sector. There have been 154 ceasefire violations along the LoC from 2009 to August 2012. Of which 28 were reported in 2009, 44 during 2010, 51 in 2011 and 31 between January and August 2012.

 

http://www.dnaindia.com/india/1845206/report-pak-pm-talks-peace-its-army-kills-indian-jawan

 

 

 

 

We need to start viloating these ceasefire also at times and behead them pakistani soldiers and kill some of their troops at times. Enough with trying to be peaceful and all. Peace at a price like this where neighbours can just walk in to our land..behead our soldier....kill them ....i dont want.

Link to comment
Share on other sites

 

CBI closes disproportionate assets case against Sonia Gandhi's aide

 

CBI had also sought details of "business transactions" by two firms which were allegedly run by George's wife as they were suspected to be another route for converting alleged illicit wealth into white money.

1845022.jpg
Sonia Gandhi - DNA

CBI has closed the case of disproportionate assets against Congress President Sonia Gandhi's aide and former personal secretary Vincent George as it could not get enough evidence.

The sources said the agency's judicial requests seeking evidence from the United States remained unanswered for nearly 10 years, prompting the agency to close the case citing lack of sufficient evidence to pursue the case.

The CBI case was that George had allegedly amassed huge wealth after 1990 which included commercial and residential properties in posh South Delhi area, properties in Bangalore, Chennai, Kerala and agriculture land bordering Delhi besides cash over Rs 1.5 crore in bank accounts.

George had allegedly purchased assets using cash received from abroad which he claimed to be gifts from his family members.

The sources said these transactions were suspected to be hawala in nature as the alleged illegal gratifications were first taken abroad and returned as gifts which was white money for George.

The sources said the agency could not get response from US authorities about these transactions which left it with insufficient evidence to proceed with the

 

 

filing of chargesheet against George.

 

 

 

 

 

 

 

 

 

http://www.dnaindia.com/india/1845018/report-cbi-closes-disproportionate-assets-case-against-sonia-gandhi-s-aide

 

 

 

 

 

 

 

 

 

 

Good Job Sonia CBI. Rajiv bc ko kya dikha iss haramzadi mein.. :wallbash:

 

Link to comment
Share on other sites

 

 

Srinagar, June 08 (KMS): In occupied Kashmir, an Indian trooper and a policeman have committed suicide in Srinagar and Poonch areas.

The trooper, Santosh Kumar Yadav, committed suicide by hanging himself in the staff quarters at the cantonment area in Srinagar. He was attached with the Army Supply Corps and was living at the staff quarters with his wife.Meanwhile, a police constable ended his life by shooting himself with his service rifle while on duty at the police post in Poonch District Hospital.

These incidents raised the number of such deaths amongst Indian troops and police personnel in the occupied territory to 272 since January 2007.

 

http://www.kmsnews.org/news/2013/06/08/indian-trooper-policeman-commit-suicide-in-ihk.html

 

 

 

 

..:( to hear all this. I guess its pressure of the duty ...

Link to comment
Share on other sites

Archived

This topic is now archived and is closed to further replies.

Guest
This topic is now closed to further replies.
  • Recently Browsing   0 members

    No registered users viewing this page.

×
×
  • Create New...