Security Weakness

Total Page:16

File Type:pdf, Size:1020Kb

Security Weakness Home SMEs are Achilles heel for ASEAN security The monthly magazine from Computer Weekly focusing on business IT in Southeast Asia NOVEMBER 2016 Mobile devices feed CWASEAN card fraud in ASEAN The problem of passwords and how to deal with it Security weakness Hackers are using small, unsecured companies for easy Lauri Love: the access to the secure networks of large organizations student accused of hacking the US computerweekly.com MACH/FOTOLIA VÁCLAV cw asean november 2016 1 DATA BREACHES Home SMEs are Achilles heel for ASEAN security SMEs are Achilles heel for ASEAN security Mobile devices feed card fraud in ASEAN Small to medium-sized enterprises in the ASEAN region could be serving as gateways for cyber criminals to gain access to large enterprises unless they improve their security, writes Ai Lei Tao The problem of passwords and how to deal with it mall and medium-sized enterprises (SMEs) have become personal details of 2,000 foreign nationals living in southern the preferred targets for cyber criminals. Not only are they Thailand during the testing stages. The data contained people’s Lauri Love: the often easy prey, but they offer a stepping stone to larger, names, addresses, professions and passport numbers. student accused S of hacking the US more lucrative corporate and government targets. While large enterprises have the resources and often place a According to Bill Chang, CEO group enterprise at Singapore priority on investing in shoring up their defenses, SMEs’ priori- Telecommunications giant Singtel, SMEs are “an entry point into ties can be very different. Most SMEs feel they are too small to the large organizations that are part of their supply chain”. attract the interest of a hacker or are unaware how best to protect The figures back this up. Smaller companies have been expe- themselves. They also lack the IT staff to ensure their systems riencing a steady increase in cyber attacks in the past five years, and networks are protected. according to Symantec’s 2016 Internet Security Report. The report found that 43% of all attacks in 2015 were targeted at small busi- Attacks are cheaper nesses with fewer than 250 employees. An SME owner’s assumption that the business is too insignifi- “Every partner that plugs into an enterprise environment brings cant to interest cyber criminals may have been true in the past, in a fresh set of vulnerabilities, which results in security lapses,” but that is no longer the case. The decreasing cost of compute said Nikhil Batra, research manager, telecommunications at IDC power and growth of automation allows cyber criminals to mass Asia-Pacific. “Hackers and malware developers are constantly on produce attacks at a fraction of what it used to cost. the lookout for such partner ecosystems, where they can creep “The cost of compute power has gone down and we can assume into a secure network through an unsecured partner.” this will continue,” said Mark McLaughlin, CEO at Palo Alto For example, in Thailand earlier this year, a third-party devel- Networks. “The advantage goes to the attacker as it means they oper commissioned by the immigration police briefly leaked the can launch bigger and more sophisticated attacks at less cost. cw asean november 2016 2 DATA BREACHES Home “When the cost of an attack goes down, the number of success- “In 2015, the median time it took the typical Asia-Pacific organi- SMEs are Achilles heel for ASEAN security ful attacks will go up at an alarming and exponential rate.” zation to know it had been compromised was 520 days – about Singtel’s Chang said: “This is a major issue as large enterprises 17 months,” he said. “The global figure is only 146 days and in have funding and resources to build or leverage security service Europe, the Middle East and Africa, it’s 469 days, according to the Mobile devices feed card fraud in ASEAN providers to increase their level of defenses, but SMEs either do 2016 Mandiant M-Trends Asia Pacific report.” not have the resources or do not bother.” The problem is compounded by the fact that Southeast Asia It is a popular myth that attackers have to force their way into is significantly more exposed to targeted attacks than the global The problem of passwords and how organizations. In fact, most breaches occur when attackers trick average. “In the second half of 2015, 27% of the organizations we to deal with it employees into letting them inside the organization, said Alex Lei, observed in Southeast Asia were exposed to at least one targeted regional director for Southeast Asia at FireEye. attack. This is almost double the global average of 15%,” said Lei. Lauri Love: the A particular challenge is the fact that most breaches in the Asia- student accused of hacking the US Pacific region never become public, as governments and industry- “LARGE ENTERPRISES HAVE FUNDING governing bodies may lack effective disclosure laws, according to the Mandiant M-Trends report. Also, SMEs are less likely to under- TO INCREASE THEIR DEFENSES, BUT stand attacks and report them to authorities. SMES EITHER DO NOT HAVE THE Breach losses not revealed RESOURCES OR DO NOT BOTHER” Symantec’s 2016 Internet Security Report found that in 2015, more companies chose not to reveal the full extent of the breaches BILL CHANG, SINGTEL they experienced, with an 85% increase in the number of firms that chose not to report the number of records lost. For instance, in January 2014, an employee of a contractor “In ASEAN, a lot of [cyber security] breaches are not shared,” engaged by KB Kookmin Card, Lotte Card and NH NongHyup said Chang. “But increasingly, countries will mandate that noti- Card used a portable hard drive device to steal credit card data, fication is mandatory when there is loss of customer, citizen and according to prosecutors in South Korea. Some 20 million cus- public data. Due diligence will take cyber security measures to a tomers were reportedly affected by the firms’ data breach. different level.” An added challenge, said Lei, is that Asia as a whole and Regulatory requirements can be a deterrent. For instance, Southeast Asia in particular are playing catch-up in cyber security. Singapore’s Computer Misuse and Cybersecurity Act (CMCA) cw asean november 2016 3 DATA BREACHES Home gives law enforcement agencies the power to investigate and and conduct surveillance work, monitor cyber threats and test the SMEs are Achilles heel for ASEAN security apprehend individuals or entities behind cyber crime. ability of supervised institutions to manage cyber security issues. Data protection laws can also encourage organizations to ensure Meanwhile, the Monetary Authority of Singapore took “appro- their IT infrastructure is secure enough to protect data. ASEAN priate supervisory actions” against Standard Chartered after the Mobile devices feed card fraud in ASEAN nations Malaysia, Singapore and the Philippines have introduced data of 647 of the bank’s wealthy clients was stolen in Singapore. comprehensive data protection regimes in the past five years. The data was taken from a server hired by Standard Chartered at Singapore has started to enforce this legislation, with the Personal a Fuji Xerox printing facility to print bank statements. The problem of passwords and how Data Protection Commission imposing a fine of S$50,000 on to deal with it karaoke chain K Box Entertainment Group for not having suffi- Mitigating the risk cient security measures to protect the personal data of 317,000 “The truth of the matter is that nobody can guarantee that an Lauri Love: the members, for inadequate data protection policies and not having SME or enterprise won’t be hacked or breached,” said IDC’s student accused of hacking the US a data protection officer. Its IT supplier, which was responsible for Batra. “It’s all about assessing the security landscape and miti- its content management system, was fined S$10,000. gating the risk. SMEs need to have plans in case of a breach. Regulators in industries such as finance are also playing their “Investing in security for enterprises and SMEs is like a country part. In the Philippines, the central bank has set up a separate investing in its nuclear arsenal – with the hope that they never cyber security surveillance division to craft cyber security policies have to use it.” n Editor: Karl Flinders Sub-editors: Bob Wells, Jaime Lee Daniels, Ryan Priest CW Production editor/design: Claire Cormack Vice-president APAC Jon Panker TechTarget/CW ASEAN © 2016 TechTarget Inc. No part of this publication may be transmitted or reproduced in any form or by any means without 55 B/C Tanjong Pagar Road written permission from the publisher. TechTarget reprints are available through The YGS Group. Singapore 088476 About TechTarget: TechTarget publishes media for information technology professionals. More than 100 focused websites enable quick access to a deep store of news, advice and analysis about the technologies, products and processes crucial to your job. Our live and virtual events give you direct access to independent expert commentary and advice. At IT Knowledge Exchange, our social community, you can get advice and share solutions with peers and experts. cw asean november 2016 4 CYBER CRIME Home SMEs are Achilles heel for ASEAN security Mobile devices feed card fraud in ASEAN Mobile devices feed Card fraud is rising in ASEAN countries, and high use of mobile devices is a contributing factor, reports Ai Lei Tao card fraud in ASEAN ard fraud is on the rise in ASEAN countries, mirroring a “The faster-maturing markets, such as Thailand, Indonesia The problem of passwords and how global trend, a study has found.
Recommended publications
  • Lauri Love -V- the Government of the United States of America & Liberty
    Neutral Citation Number: [2018] EWHC 172 (Admin) Case No: CO/5994/2016 IN THE HIGH COURT OF JUSTICE QUEEN'S BENCH DIVISION ADMINISTRATIVE COURT Royal Courts of Justice Strand, London, WC2A 2LL Date: 05/02/2018 Before: THE RIGHT HONOURABLE THE LORD BURNETT OF MALDON THE LORD CHIEF JUSTICE and THE HONOURABLE MR JUSTICE OUSELEY - - - - - - - - - - - - - - - - - - - - - Between: LAURI LOVE Appellant - and - THE GOVERNMENT OF THE UNITED STATES Respondent OF AMERICA - and - LIBERTY Interested Party - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - MR EDWARD FITZGERALD QC AND MR BEN COOPER (instructed by KAIM TODNER SOLICITORS LTD) for the Appellant MR PETER CALDWELL (instructed by CPS EXTRADITION UNIT) for the Respondent MR ALEX BAILIN QC AND MR AARON WATKINS (instructed by LIBERTY) for the Interested Party Hearing dates: 29 and 30 November 2017 - - - - - - - - - - - - - - - - - - - - - Approved Judgment Judgment Approved by the court for handing down. Love v USA THE LORD CHIEF JUSTICE AND MR JUSTICE OUSELEY : 1. This is the judgment of the Court. 2. Lauri Love appeals against the decision of District Judge Tempia, sitting at Westminster Magistrates’ Court on 16 September 2016, to send his case to the Secretary of State for the Home Department for her decision whether to order his extradition to the United States of America, under Part 2 of the Extradition Act 2003 [“the 2003 Act”]. The USA is a category 2 territory under that Act. On 14 November 2016, the Home Secretary ordered his extradition. 3. The principal
    [Show full text]
  • USA -V- Julian Assange Judgment
    JUDICIARY OF ENGLAND AND WALES District Judge (Magistrates’ Court) Vanessa Baraitser In the Westminster Magistrates’ Court Between: THE GOVERNMENT OF THE UNITED STATES OF AMERICA Requesting State -v- JULIAN PAUL ASSANGE Requested Person INDEX Page A. Introduction 2 a. The Request 2 b. Procedural History (US) 3 c. Procedural History (UK) 4 B. The Conduct 5 a. Second Superseding Indictment 5 b. Alleged Conduct 9 c. The Evidence 15 C. Issues Raised 15 D. The US-UK Treaty 16 E. Initial Stages of the Extradition Hearing 25 a. Section 78(2) 25 b. Section 78(4) 26 I. Section 78(4)(a) 26 II. Section 78(4)(b) 26 i. Section 137(3)(a): The Conduct 27 ii. Section 137(3)(b): Dual Criminality 27 1 The first strand (count 2) 33 The second strand (counts 3-14,1,18) and Article 10 34 The third strand (counts 15-17, 1) and Article 10 43 The right to truth/ Necessity 50 iii. Section 137(3)(c): maximum sentence requirement 53 F. Bars to Extradition 53 a. Section 81 (Extraneous Considerations) 53 I. Section 81(a) 55 II. Section 81(b) 69 b. Section 82 (Passage of Time) 71 G. Human Rights 76 a. Article 6 84 b. Article 7 82 c. Article 10 88 H. Health – Section 91 92 a. Prison Conditions 93 I. Pre-Trial 93 II. Post-Trial 98 b. Psychiatric Evidence 101 I. The defence medical evidence 101 II. The US medical evidence 105 III. Findings on the medical evidence 108 c. The Turner Criteria 111 I.
    [Show full text]
  • 1 in the Westminster Magistrates' Court Between
    IN THE WESTMINSTER MAGISTRATES’ COURT B E T W E E N: GOVERNMENT OF THE UNITED STATES OF AMERICA Requesting State v JULIAN ASSANGE Defendant _________________________________ DEFENCE SUBMISSIONS: PART ONE _________________________________ ** All references are to the Defence Core Bundle unless otherwise stated 1. Introduction 1.1. These Defence Submissions are in two parts. In Part 1, we provide an overall summary of the case and briefly set out Mr Assange’s position on each of the grounds of abuse, including the Treaty point, and each of the statutory bars. This updates and refines the defence opening; responds to issues raised at the February hearing about the Treaty point and develops the Article 3 and Section 91 argument in more detail. In Part 2 (a separate document) we set out in full the interlinked arguments on Zakrzewski abuse, Article 7 and Article 10, and the related dual criminality point that no extradition crime is made out. That is because these points require amplification from the earlier submissions. 1.2. In these submissions we first summarise the history of this case to demonstrate that the prosecution is not motivated by genuine concerns for criminal justice but by politics. 1 1.3. We next address the three ways in which these proceedings constitute an abuse of process, in the following three separate but overlapping categories: (i) First, the request seeks extradition for what is a classic “political offence”. Extradition for a political offence is expressly prohibited by Article 4(1) of the Anglo-US Extradition Treaty. Therefore, it constitutes an abuse of this Court’s process to require this Court to extradite on the basis of the Anglo-US Treaty in breach of the Treaty’s express provisions.
    [Show full text]
  • USA V Lauri Love Judgment
    JUDICIARY OF ENGLAND AND WALES The Government of the United States of America Requesting Judicial Authority v Lauri Love Requested Person Judge N Tempia In the Westminster Magistrates’ Court Advocates: Mr P Caldwell – Judicial Authority Mr B Cooper – Requested Person APPLICATION AND BACKGROUND 1. This is an application by the Government of the United States of America for the extradition of the requested person, Lauri Love, (dob: 14.12.1984) a United Kingdom citizen, who is accused of unlawfully accessing computers used by United States Federal Agencies and private companies and misusing the data he unlawfully obtained. 2. The United States of America is a Category 2 territory. Part 2 of the Extradition Act 2003 (the Act) applies. 1 3. The criminal proceedings in the US have been commenced in three judicial districts, the Southern District of New York, the District of New Jersey and the Eastern District of Virginia. These proceedings are referred to within a Diplomatic Note from the United States dated 6th July 2015. The material relating to each of the judicial districts was separately certified by the Secretary of State on 7th July 2015 and these proceedings are treated as a single request. The bundle contains the warrants for Mr Love’s arrest in the three districts and were issued by the Southern District of New York on 21st February 2015, District of New Jersey on 23rd March 2015 and Eastern District of Virginia on 21st May 2015. 4. Following certification a warrant was issued for Mr Love’s arrest. Mr Love was arrested on 15th July 2015 and appeared at Westminster Magistrates’ Court on the same day.
    [Show full text]
  • Julian Assange Judgment
    JUDICIARY OF ENGLAND AND WALES District Judge (Magistrates’ Court) Vanessa Baraitser In the Westminster Magistrates’ Court Between: THE GOVERNMENT OF THE UNITED STATES OF AMERICA Requesting State -v- JULIAN PAUL ASSANGE Requested Person INDEX Page A. Introduction 2 a. The Request 2 b. Procedural History (US) 3 c. Procedural History (UK) 4 B. The Conduct 5 a. Second Superseding Indictment 5 b. Alleged Conduct 9 c. The Evidence 15 C. Issues Raised 15 D. The US-UK Treaty 16 E. Initial Stages of the Extradition Hearing 25 a. Section 78(2) 25 b. Section 78(4) 26 I. Section 78(4)(a) 26 II. Section 78(4)(b) 26 i. Section 137(3)(a): The Conduct 27 ii. Section 137(3)(b): Dual Criminality 27 1 The first strand (count 2) 33 The second strand (counts 3-14,1,18) and Article 10 34 The third strand (counts 15-17, 1) and Article 10 43 The right to truth/ Necessity 50 iii. Section 137(3)(c): maximum sentence requirement 53 F. Bars to Extradition 53 a. Section 81 (Extraneous Considerations) 53 I. Section 81(a) 55 II. Section 81(b) 69 b. Section 82 (Passage of Time) 71 G. Human Rights 76 a. Article 6 84 b. Article 7 82 c. Article 10 88 H. Health – Section 91 92 a. Prison Conditions 93 I. Pre-Trial 93 II. Post-Trial 98 b. Psychiatric Evidence 101 I. The defence medical evidence 101 II. The US medical evidence 105 III. Findings on the medical evidence 108 c. The Turner Criteria 111 I.
    [Show full text]
  • Ethical Hacking
    Ethical Hacking Alana Maurushat University of Ottawa Press ETHICAL HACKING ETHICAL HACKING Alana Maurushat University of Ottawa Press 2019 The University of Ottawa Press (UOP) is proud to be the oldest of the francophone university presses in Canada and the only bilingual university publisher in North America. Since 1936, UOP has been “enriching intellectual and cultural discourse” by producing peer-reviewed and award-winning books in the humanities and social sciences, in French or in English. Library and Archives Canada Cataloguing in Publication Title: Ethical hacking / Alana Maurushat. Names: Maurushat, Alana, author. Description: Includes bibliographical references. Identifiers: Canadiana (print) 20190087447 | Canadiana (ebook) 2019008748X | ISBN 9780776627915 (softcover) | ISBN 9780776627922 (PDF) | ISBN 9780776627939 (EPUB) | ISBN 9780776627946 (Kindle) Subjects: LCSH: Hacking—Moral and ethical aspects—Case studies. | LCGFT: Case studies. Classification: LCC HV6773 .M38 2019 | DDC 364.16/8—dc23 Legal Deposit: First Quarter 2019 Library and Archives Canada © Alana Maurushat, 2019, under Creative Commons License Attribution— NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0) https://creativecommons.org/licenses/by-nc-sa/4.0/ Printed and bound in Canada by Gauvin Press Copy editing Robbie McCaw Proofreading Robert Ferguson Typesetting CS Cover design Édiscript enr. and Elizabeth Schwaiger Cover image Fragmented Memory by Phillip David Stearns, n.d., Personal Data, Software, Jacquard Woven Cotton. Image © Phillip David Stearns, reproduced with kind permission from the artist. The University of Ottawa Press gratefully acknowledges the support extended to its publishing list by Canadian Heritage through the Canada Book Fund, by the Canada Council for the Arts, by the Ontario Arts Council, by the Federation for the Humanities and Social Sciences through the Awards to Scholarly Publications Program, and by the University of Ottawa.
    [Show full text]
  • Extradition and Mental Health in Uk Law I
    Criminal Law Forum (2019) 30:339–372 Ó The Author(s) 2019 https://doi.org/10.1007/s10609-019-09369-7 PAUL ARNELL* EXTRADITION AND MENTAL HEALTH IN UK LAW ABSTRACT. The response of UK extradition law and practice to requested persons presenting with mental health disorders is multi-faceted and unnecessarily complex. There are a number of reasons for this. They centre upon the law failing to ade- quately recognise that mental health cases can give rise to concerns not present in physical health cases. The deficiencies of the law are found in the three applicable bars to extradition; oppression, human rights and forum. They also can be seen in the applicable rules of evidence and the practice of diplomatic assurances. The time has come for UK law to specifically and systematically respond to mental health disorders in the context of extradition. I INTRODUCTION The response of UK extradition law and practice to requested per- sons presenting with mental health disorders is multi-faceted and unnecessarily complex. The issues raised are not consistently ad- dressed. The reasons for this are manifold and inter-related. They are firstly that extradition law fails to adequately recognise that mental health cases can engender distinct concerns. This is seen in the sim- ilarity in approach taken to deportation and physical illness on the one hand and mental health disorders on the other. It is also manifest in the operation of the three different, intricate and at times over- lapping bars which may prevent an extradition in mental health cases. The response to the evidential challenges arising in the area further illustrates the deficiency of the law.
    [Show full text]
  • United Kingdom
    FREEDOM ON THE NET 2014 United Kingdom 2013 2014 Population: 64.1 million Internet Freedom Status Free Free Internet Penetration 2013: 90 percent Social Media/ICT Apps Blocked: No Obstacles to Access (0-25) 2 2 Political/Social Content Blocked: No Limits on Content (0-35) 6 6 Bloggers/ICT Users Arrested: No Violations of User Rights (0-40) 15 16 TOTAL* (0-100) 23 24 Press Freedom 2014 Status: Free * 0=most free, 100=least free Key Developments: May 2013 – May 2014 • Filtering mechanisms, particularly child-protection filters enabled on all household and mobile connections by default, inadvertently blocked legitimate online content (see Limits on Content). • The Defamation Act, which came into effect on 1 January 2014, introduced greater legal protections for intermediaries and reduced the scope for “libel tourism,” while proposed amendments to the Contempt of Court Act may introduce similar protections for intermediaries in relation to contempt of court (see Limits on Content and Violations of User Rights). • New guidelines published by the Director of Public Prosecutions in June 2013 sought to limit offenses for which social media users may face criminal charges. Users faced civil penalties for libel cases, while at least two individuals were imprisoned for violent threats made on Facebook and Twitter (see Violations of User Rights). • In April 2014, the European Court of Justice determined that EU rules on the mass retention of user data by ISPs violated fundamental privacy and data protection rights. UK privacy groups criticized parliament for rushing through “emergency” legislation to maintain the practice in July, while failing to hold a public debate on the wider issue of surveillance (see Violations of User Rights).
    [Show full text]
  • Bibliography
    Bibliography Table of Cases European Court of Human Rights Appleby v United Kingdom (2003) 37 EHRR 38 Gorzelik and others v Poland (2005) 40 EHRR KU v Finland (2008) ECtHR 2872/02 Germany OberlandesGericht Frankfurt am Main v Thomas Vogel (No. 1 Ss 319/05) United Kingdom City of London v Samede & Ors [2012] EWHC 34 QB DPP v Lennon [2006] All ER (D) 147 R v Jones (Margaret) [2005] QB 259 © The Author(s) 2018 227 V. Karagiannopoulos, Living With Hacktivism, Palgrave Studies in Cybercrime and Cybersecurity, https://doi.org/10.1007/978-3-319-71758-6 228 Bibliography R v Bow Street Magistrates Court and Allison (A.P.) Ex Parte Government of the United States of America [1999] All ER (D) 972 R v Weatherhead, Rhodes, Gibson and Burchall, Southwark Crown Court, 24 January 2013 R v G and Another [2003] UKHL 50 R v Howe [1987] 1 AC 417 R v Ponting [1985] Crim LR 318 R v Saibene and others [2010] Lewes Crown Court United States Amalgamated Food Employees Union Local 590 v Logan Valley Plaza, Inc., 391 U.S. 308 (1968) America Online, Inc. v IMS et al. 24 F.Supp.2d 548 (E.D.Va. 1998) America Online v National Health Care Discount, Inc., 121 F. Supp. 2d 1255 (N.D. Iowa 2000) Chicago v Streeter, No. 85-108644 (Cir. Court, Cook County, Ill. 1985) Citizens United v Federal Election Commission 558 U.S. 310 (2010) Cyber Promotions, Inc. v America Online, Inc., 948 F. Supp. 436 (E.D. Pa. 1996) EF Cultural Travel BV v Explorica, Inc., 274 F.3d 577 (1st Cir.
    [Show full text]
  • Extradition and Mental Health: the Need for Multidisciplinary Review and Research
    ARNELL, P. and FORRESTER, A. 2021. Extradition and mental health: the need for multidisciplinary review and research. Medicine, science and the law [online], 61(2), pages 83-85. Available from: https://doi.org/10.1177/0025802421993370 Extradition and mental health: the need for multidisciplinary review and research. ARNELL, P. and FORRESTER, A. 2021 Copyright © 2021 The Author(s). DOI: https://doi.org/10.1177/0025802421993370. Users who receive access to an article through a repository are reminded that the article is protected by copyright and reuse is restricted to non-commercial and no derivative uses. Users may also download and save a local copy of an article accessed in an institutional repository for the user's personal reference. For permission to reuse an article, please follow our Process for Requesting Permission. This document was downloaded from https://openair.rgu.ac.uk Title: Extradition and mental health: the need for multi-disciplinary review and research Authors: Dr Paul Arnell, Robert Gordon University Email: [email protected] Professor Andrew Forrester, Cardiff University [email protected] Word count: 1,390 Over one thousand people are forcibly removed from the United Kingdom each year, through the process of extradition, so that they might stand trial or be imprisoned abroad. Over the last ten years, 115,915 extradition requests were made using one such mechanism, the European Arrest Warrant, resulting in 15,243 arrests and 10,689 surrenders.1 A somewhat similar system has now been agreed post-Brexit. In an increasing number of these cases mental health disorders are put forward in opposition to the process.2 This is allowed under the law however a number of questions necessarily arise in the area.
    [Show full text]
  • King's Eye on the World
    Issue 9 Volume Four KING’S EYE ON THE WORLD 00 28th February 2014 Editors: Owen Parsonage Jack Mills Journalists: Adam Bartlett Alistair Smellie Francesca Angel Robert Batson Jordan Willis Jonny Nixon Chloe Morgan CURRENT AFFAIRS ENRICHMENT………………READ ALL ABOUT IT! Becky Perkins This week we have an Oscar-winning variety of stories. We Tasmin Feakes have federal hacking, unrest in Ukraine, and are giving the Will Ashton Cardiff owner a sporting chance. Also, F1 officials are racing away with plans for a London Grand Prix circuit, and the Scot Hodgson world’s largest aircraft, a giant airship, is flying high. We are Harry Jaquiss also looking at Moyes, the Manchester United manager, and Kal O’Connor his fumbles. ‘Paws’ for thought with our article on the links between dog and human brains, and, hopefully, think on the Tom Ramsbottom Winter Olympics’ success – did they really gain anything, or Will Cotgrove are they skating on thin ice? In other news, an old British spy has been seen and recognized for infiltrating a Gestapo camp. George Bell All in all, a very eclectic mix! Jamie Berry Cardiff City owner insists he is not a 'villain' Harry Jaquiss 3HL “Cardiff City's controversial owner Vincent Tan has insisted he is not the "villain" he is sometimes portrayed as.” Tan, who has upset many Cardiff fans, said the "vocal minority" who oppose him should "apologise". Tan has upset fans by changing the colour of the Cardiff kit from blue to red, his daughter’s favourite colour. He also sacked old manager Malky Mackay, saying Mackay “got lucky” when he was given the job, and replaced him with Ole Gunnar Solskjaer.
    [Show full text]
  • Hacker Lauri Love Sold out To
    http://supremelaw.org/authors/sachs/amicus.curiae.lauri.love.htm http://pastebin.com/AdwKwPYC Hacker Lauri Love sold out to USA by lawyers Assange Snowden Extradtion sell-out of vulnerable young UK hacker Mr Lauri Love by his own lawyers And by criminal fakers Julian Assange & Edward Snowden & Glenn Greenwald, who cynically used Lauri Love's plight to promote themselves, whilst colluding with the US government, & Lauri Love's own barristers & lawyers, to hide the facts that would save Lauri Love's life & freedom Text of key documents all below What may have been the means to bribe & buy off Lauri Love's barristers & solicitors, are payments from an alleged non-profit, the 'Courage Foundation', which has been engaged in supporting frauds run by the USA intelligence agencies & security services A scheme: Intel agencies - fake 'legal support charity' - buying corrupt lawyers & barristers who betray the victim Selling the victim to extradition to the USA, to jail & prison horrors, & maybe death by fake 'suicide' in US custody ... remembering Aaron Swartz who inspired Lauri Love --- Background that should be understood - what major governments know, but most of the public does not - is that both Julian Assange & Edward Snowden - plus their media pumpers such as Glenn Greenwald - are all liars, hoaxers, frauds & fakers working for the USA intelligence agencies This has all been well-proven long ago, going back to Israel's Netanyahu & Zbigniew Brzezinski admitting that Wikileaks & Assange are under US-Israeli government control For the many
    [Show full text]