GSSR-6.1-December-2017.Pdf
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Country of Origin Information Report Syria June 2021
Country of origin information report Syria June 2021 Page 1 of 102 Country of origin information report Syria | June 2021 Publication details City The Hague Assembled by Country of Origin Information Reports Section (DAF/AB) Disclaimer: The Dutch version of this report is leading. The Ministry of Foreign Affairs of the Netherlands cannot be held accountable for misinterpretations based on the English version of the report. Page 2 of 102 Country of origin information report Syria | June 2021 Table of contents Publication details ............................................................................................2 Table of contents ..........................................................................................3 Introduction ....................................................................................................5 1 Political and security situation .................................................................... 6 1.1 Political and administrative developments ...........................................................6 1.1.1 Government-held areas ....................................................................................6 1.1.2 Areas not under government control. ............................................................... 11 1.1.3 COVID-19 ..................................................................................................... 13 1.2 Armed groups ............................................................................................... 13 1.2.1 Government forces ....................................................................................... -
Officials Say Flynn Discussed Sanctions
Officials say Flynn discussed sanctions The Washington Post February 10, 2017 Friday, Met 2 Edition Copyright 2017 The Washington Post All Rights Reserved Distribution: Every Zone Section: A-SECTION; Pg. A08 Length: 1971 words Byline: Greg Miller;Adam Entous;Ellen Nakashima Body Talks with Russia envoy said to have occurred before Trump took office National security adviser Michael Flynn privately discussed U.S. sanctions against Russia with that country's ambassador to the United States during the month before President Trump took office, contrary to public assertions by Trump officials, current and former U.S. officials said. Flynn's communications with Russian Ambassador Sergey Kislyak were interpreted by some senior U.S. officials as an inappropriate and potentially illegal signal to the Kremlin that it could expect a reprieve from sanctions that were being imposed by the Obama administration in late December to punish Russia for its alleged interference in the 2016 election. Flynn on Wednesday denied that he had discussed sanctions with Kislyak. Asked in an interview whether he had ever done so, he twice said, "No." On Thursday, Flynn, through his spokesman, backed away from the denial. The spokesman said Flynn "indicated that while he had no recollection of discussing sanctions, he couldn't be certain that the topic never came up." Officials said this week that the FBI is continuing to examine Flynn's communications with Kislyak. Several officials emphasized that while sanctions were discussed, they did not see evidence that Flynn had an intent to convey an explicit promise to take action after the inauguration. Flynn's contacts with the ambassador attracted attention within the Obama administration because of the timing. -
People for Profit: North Korean Forced Labour on a Global Scale Edited by Remco E
PEOPLE FOR PROFIT People for Profit North Korean Forced Labour on a Global Scale Edited by Remco E. Breuker & Imke B.L.H. van Gardingen Contributors Jan Blinka Britt C.H. Blom Marte C.H. Boonen Klara Boonstra Rosa Brandse Remco E. Breuker Imke B.L.H. van Gardingen Larissa van den Herik Tycho A. van der Hoog Marieke P. Meurs Cedric Ryngaert Shannon R. Stewart Anoma P. van der Veere This is an open source publication by LeidenAsiaCentre. Copyright © 2018 (authors). People for Profit: North Korean Forced Labour on a Global Scale Edited by Remco E. Breuker and Imke B.L.H. van Gardingen ISBN 978-90-826167-1-2 (hardback) ISBN 978-90-826167-3-6 (e-book) LeidenAsiaCentre is an independent research centre affiliated with Leiden University and made possible by a grant from the Vaes Elias Fund. The centre focuses on academic research with direct application to society. All research projects are conducted in close cooperation with a wide variety of partners from Dutch society. More information can be found on our website: www.leidenasiacentre.nl For contact or orders: [email protected] M. de Vrieshof 3, 2311 BZ Leiden, The Netherlands Book design: A.P. van der Veere Contents Contributors IX Acknowledgements XII Introduction Remco E. Breuker and Imke B.L.H. van Gardingen 1 Chapter I Setting the Background: Labour Conditions in the DPRK Remco E. Breuker 6 Chapter II Accountability for DPRK Workers in the Value Chain: The Case of Partner Shipyard, a Polish Shipbuilder and its Dutch Partners Imke B.L.H. -
Reporting, and General Mentions Seem to Be in Decline
CYBER THREAT ANALYSIS Return to Normalcy: False Flags and the Decline of International Hacktivism By Insikt Group® CTA-2019-0821 CYBER THREAT ANALYSIS Groups with the trappings of hacktivism have recently dumped Russian and Iranian state security organization records online, although neither have proclaimed themselves to be hacktivists. In addition, hacktivism has taken a back seat in news reporting, and general mentions seem to be in decline. Insikt Group utilized the Recorded FutureⓇ Platform and reports of historical hacktivism events to analyze the shifting targets and players in the hacktivism space. The target audience of this research includes security practitioners whose enterprises may be targets for hacktivism. Executive Summary Hacktivism often brings to mind a loose collective of individuals globally that band together to achieve a common goal. However, Insikt Group research demonstrates that this is a misleading assumption; the hacktivist landscape has consistently included actors reacting to regional events, and has also involved states operating under the guise of hacktivism to achieve geopolitical goals. In the last 10 years, the number of large-scale, international hacking operations most commonly associated with hacktivism has risen astronomically, only to fall off just as dramatically after 2015 and 2016. This constitutes a return to normalcy, in which hacktivist groups are usually small sets of regional actors targeting specific organizations to protest regional events, or nation-state groups operating under the guise of hacktivism. Attack vectors used by hacktivist groups have remained largely consistent from 2010 to 2019, and tooling has assisted actors to conduct larger-scale attacks. However, company defenses have also become significantly better in the last decade, which has likely contributed to the decline in successful hacktivist operations. -
The Kremlin's Irregular Army: Ukrainian Separatist Order of Battle
THE KREMLIN’S IRREGULARY ARMY: UKRAINIAN SEPARATIST ORDER OF BATTLE | FRANKLIN HOLCOMB | AUGUST 2017 Franklin Holcomb September 2017 RUSSIA AND UKRAINE SECURITY REPORT 3 THE KREMLIN’S IRREGULAR ARMY: UKRAINIAN SEPARATIST ORDER OF BATTLE WWW.UNDERSTANDINGWAR.ORG 1 Cover: A Pro-Russian separatist sits at his position at Savur-Mohyla, a hill east of the city of Donetsk, August 28, 2014. REUTERS/Maxim Shemetov. Reproduced with permission. All rights reserved. Printed in the United States of America. No part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage or retrieval system, without permission in writing or from the publisher. ©2017 by the Institute for the Study of War. Published in 2017 in the United States of America by the Instittue for the Study of War. 1400 16th Street NW, Suite 515 | Washington, DC 20036 understandingwar.org 2 Franklin Holcomb The Kremlin’s Irregular Army: Ukrainian Separatist Order of Battle ABOUT THE AUTHOR Franklin Holcomb is a Russia and Ukraine Research Analyst at the Institute for the Study of War where he focuses on the war in Ukraine, Ukrainian politics, and Russian foreign policy in Eastern Europe. His current research focuses on studying the development of the Armed Forces of Ukraine and the Russian-backed separatist formations operating in Eastern Ukraine, as well as analyzing Russian political and military activity in Moldova, the Baltic, and the Balkans. Mr. Holcomb is the author of “The Order of Battle of the Ukrainian Armed Forces: A Key Component in European Security,” “Moldova Update: Kremlin Will Likely Seek to Realign Chisinau”, “Ukraine Update: Russia’s Aggressive Subversion of Ukraine,” as well as ISW’s other monthly updates on the political and military situation in Ukraine. -
Zerohack Zer0pwn Youranonnews Yevgeniy Anikin Yes Men
Zerohack Zer0Pwn YourAnonNews Yevgeniy Anikin Yes Men YamaTough Xtreme x-Leader xenu xen0nymous www.oem.com.mx www.nytimes.com/pages/world/asia/index.html www.informador.com.mx www.futuregov.asia www.cronica.com.mx www.asiapacificsecuritymagazine.com Worm Wolfy Withdrawal* WillyFoReal Wikileaks IRC 88.80.16.13/9999 IRC Channel WikiLeaks WiiSpellWhy whitekidney Wells Fargo weed WallRoad w0rmware Vulnerability Vladislav Khorokhorin Visa Inc. Virus Virgin Islands "Viewpointe Archive Services, LLC" Versability Verizon Venezuela Vegas Vatican City USB US Trust US Bankcorp Uruguay Uran0n unusedcrayon United Kingdom UnicormCr3w unfittoprint unelected.org UndisclosedAnon Ukraine UGNazi ua_musti_1905 U.S. Bankcorp TYLER Turkey trosec113 Trojan Horse Trojan Trivette TriCk Tribalzer0 Transnistria transaction Traitor traffic court Tradecraft Trade Secrets "Total System Services, Inc." Topiary Top Secret Tom Stracener TibitXimer Thumb Drive Thomson Reuters TheWikiBoat thepeoplescause the_infecti0n The Unknowns The UnderTaker The Syrian electronic army The Jokerhack Thailand ThaCosmo th3j35t3r testeux1 TEST Telecomix TehWongZ Teddy Bigglesworth TeaMp0isoN TeamHav0k Team Ghost Shell Team Digi7al tdl4 taxes TARP tango down Tampa Tammy Shapiro Taiwan Tabu T0x1c t0wN T.A.R.P. Syrian Electronic Army syndiv Symantec Corporation Switzerland Swingers Club SWIFT Sweden Swan SwaggSec Swagg Security "SunGard Data Systems, Inc." Stuxnet Stringer Streamroller Stole* Sterlok SteelAnne st0rm SQLi Spyware Spying Spydevilz Spy Camera Sposed Spook Spoofing Splendide -
List of Goods Produced by Child Labor Or Forced Labor a Download Ilab’S Sweat & Toil and Comply Chain Apps Today!
2018 LIST OF GOODS PRODUCED BY CHILD LABOR OR FORCED LABOR A DOWNLOAD ILAB’S SWEAT & TOIL AND COMPLY CHAIN APPS TODAY! Browse goods Check produced with countries' child labor or efforts to forced labor eliminate child labor Sweat & Toil See what governments 1,000+ pages can do to end of research in child labor the palm of Review laws and ratifications your hand! Find child labor data Explore the key Discover elements best practice of social guidance compliance systems Comply Chain 8 8 steps to reduce 7 3 4 child labor and 6 forced labor in 5 Learn from Assess risks global supply innovative and impacts company in supply chains chains. examples ¡Ahora disponible en español! Maintenant disponible en français! B BUREAU OF INTERNATIONAL LABOR AFFAIRS How to Access Our Reports We’ve got you covered! Access our reports in the way that works best for you. ON YOUR COMPUTER All three of the USDOL flagship reports on international child labor and forced labor are available on the USDOL website in HTML and PDF formats, at www.dol.gov/endchildlabor. These reports include the Findings on the Worst Forms of Child Labor, as required by the Trade and Development Act of 2000; the List of Products Produced by Forced or Indentured Child Labor, as required by Executive Order 13126; and the List of Goods Produced by Child Labor or Forced Labor, as required by the Trafficking Victims Protection Reauthorization Act of 2005. On our website, you can navigate to individual country pages, where you can find information on the prevalence and sectoral distribution of the worst forms of child labor in the country, specific goods produced by child labor or forced labor in the country, the legal framework on child labor, enforcement of laws related to child labor, coordination of government efforts on child labor, government policies related to child labor, social programs to address child labor, and specific suggestions for government action to address the issue. -
Shifting Patterns in Internet Use Reveal Adaptable and Innovative North Korean Ruling Elite
CYBER THREAT ANALYSIS Shifting Patterns in Internet Use Reveal Adaptable and Innovative North Korean Ruling Elite By Insikt Group Recorded Future CTA-2018-1025 CYBER THREAT ANALYSIS Scope Note: Insikt Group examined North Korean senior leadership’s internet activity by analyzing third-party data, IP geolocation, Border Gateway Protocol (BGP) routing tables, and open source intelligence (OSINT) using a number of tools. The data analyzed for this report spans from March 16, 2018 through August 30, 2018. This report will be of greatest interest to government departments and organizations within the technology, finance, defense, cryptocurrency, and logistics sectors, as well as those investigating North Korean sanctions circumvention, illicit financing, and state- sponsored cyberespionage. Executive Summary Over the course of the past year and a half, Recorded Future has published a series of research pieces revealing unique insight into the behavior of North Korea’s most senior leadership. We discovered that North Korea’s ruling elite are technologically savvy, use a full range of older and cutting-edge computers, phones, and devices, use the internet as a tool for sanctions circumvention, and recently shifted to embrace Chinese social networking services over Western ones. In this final piece in our series, we explore the persistence of trends in internet security, social media use, and cryptocurrency, and reveal greater insight into the way North Korea uses the internet to generate revenue for the Kim regime. In particular, shifting patterns in the ruling elite’s internet usage reveal just how adaptable and innovative North Korea’s most senior leadership are. The Kim regime has developed a model for using and exploiting the internet that is unique, and leadership are quick to embrace new services or technologies when useful and cast them aside when not. -
Make Technology Great Again
Make Technology Great Again Michał „rysiek” Woźniak [email protected] Everything is Broken – Quinn Norton https://medium.com/message/everything-is-broken-81e5f33a24e1 "Malicious Word Doc Uses ActiveX To Infect" https://www.vmray.com/blog/malicious-word-doc-uses-activex-infect/ "Word Malware: OLE Exploited in Zero-Day Attack" https://www.vadesecure.com/en/word-doc-malware/ "Dynamic Data Exchange was frst introduced in 1987 with the release of Windows 2.0” https://en.wikipedia.org/wiki/Dynamic_Data_Exchange "As part of the December 2017 Patch Tuesday, Microsoft has shipped an Ofce update that disables the DDE feature in Word applications, after several malware campaigns have abused this feature to install malware.” https://www.bleepingcomputer.com/news/microsoft/microsoft-disables-dde-feature-in-word- to-prevent-further-malware-attacks/ "Dynamic Data Exchange was frst introduced in 1987 with the release of Windows 2.0” https://en.wikipedia.org/wiki/Dynamic_Data_Exchange "As part of the December 2017 Patch Tuesday, Microsoft has shipped an Ofce update that disables the DDE feature in Word applications, after several malware campaigns have abused this feature to install malware.” https://www.bleepingcomputer.com/news/microsoft/microsoft-disables-dde-feature-in-word- to-prevent-further-malware-attacks/ "Microsoft Ofce macro malware targets Macs" https://blog.malwarebytes.com/cybercrime/2017/02/microsoft-ofce-macro- malware-targets-macs/ "Beware PowerSniff Malware uses Word macros and PowerShell scripts" https://www.grahamcluley.com/beware-powersnif-malware/ -
Cyber Activities in the Syrian Conflict CSS CY
CSS CYBER DEFENSE PROJECT Hotspot Analysis The use of cybertools in an internationalized civil war context: Cyber activities in the Syrian conflict Zürich, October 2017 Version 1 Risk and Resilience Team Center for Security Studies (CSS), ETH Zürich The use of cybertools in an internationalized civil war context: Cyber activities in the Syrian conflict Authors: Marie Baezner, Patrice Robin © 2017 Center for Security Studies (CSS), ETH Zürich Contact: Center for Security Studies Haldeneggsteig 4 ETH Zürich CH-8092 Zürich Switzerland Tel.: +41-44-632 40 25 [email protected] www.css.ethz.ch Analysis prepared by: Center for Security Studies (CSS), ETH Zürich ETH-CSS project management: Tim Prior, Head of the Risk and Resilience Research Group; Myriam Dunn Cavelty, Deputy Head for Research and Teaching; Andreas Wenger, Director of the CSS Disclaimer: The opinions presented in this study exclusively reflect the authors’ views. Please cite as: Baezner, Marie; Robin, Patrice (2017): Hotspot Analysis: The use of cybertools in an internationalized civil war context: Cyber activities in the Syrian conflict, October 2017, Center for Security Studies (CSS), ETH Zürich. 2 The use of cybertools in an internationalized civil war context: Cyber activities in the Syrian conflict Table of Contents 1 Introduction 5 2 Background and chronology 6 3 Description 9 3.1 Attribution and actors 9 Pro-government groups 9 Anti-government groups 11 Islamist groups 11 State actors 12 Non-aligned groups 13 3.2 Targets 13 3.3 Tools and techniques 14 Data breaches 14 -
Situation in Ukraine
COMMUNICATION SUBMITTED UNDER ARTICLE 15 OF THE ROME STATUTE OF THE INTERNATIONAL CRIMINAL COURT SITUATION IN UKRAINE: WAR CRIMES AND CRIMES AGAINST HUMANITY COMMITTED IN PRISONS SEIZED AND CONTROLLED BY ANTI-GOVERNMENT FORCES September 2020 TABLE OF ABBREVIATIONS ATO Anti-Terrorist Operation CF Correctional Facility DPR Donetsk Peoples’ Republic ECHR European Convention on Human Rights ECtHR European Court of Human Rights FIDH International Federation for Human Rights IAC International Armed Conflict ICC International Criminal Court ICTY International Criminal Tribunal for the Former Yugoslavia KHPG Kharkiv Human Rights Protection Group LPR Luhansk Peoples’ Republic NIAC Non-International Armed Conflict PTDC Pre Trial Detention Centre SBU Ukrainian State Security UAF Ukrainian Armed Forces The preparation and elaboration of this FIDH-KHPG Communication were made possible thanks to the support of the United Nations Development Programme in Ukraine, International Renaissance Foundation, the European Commission, Open Society Foundations, National Endowment for Democracy (United States), the Democracy Commission of the United States Embassy in Ukraine, and the Ministry of Foreign Affairs of the Netherlands. The contents of this publication are the sole responsibility of FIDH and KHPG and can in no way be taken to reflect the views of the aforementioned supporting institutions. 2 TABLE OF CONTENTS Table of abbreviations 2 I. Introduction 4 II. Executive Summary 6 III. Filing Parties 9 IV. Methodology 12 V. Factual Background 17 A. Outbreak of Armed Conflict in Eastern Ukraine 17 B. Ukrainian Prisons in Donetsk and Luhansk Provinces Prior 24 to the Outbreak of Armed Conflict C. Impact of the Outbreak of Armed Conflict on Prisoners in 24 Eastern Ukraine D. -
Memorial on Admissibility on Behalf of the Government of Ukraine
Ukraine v. Russia (re Eastern Ukraine) APPLICATION NO. 8019/16 Kyiv, 8 November 2019 MEMORIAL ON ADMISSIBILITY ON BEHALF OF THE GOVERNMENT OF UKRAINE CHAPTER 1: INTRODUCTION 1. The Russian Federation has consistently denied its involvement in the conflict in eastern Ukraine, and has sought to evade international legal responsibility by adopting a series of measures to disguise and “outsource” its military aggression in eastern Ukraine. The Kremlin’s denials of direct involvement were implausible from the outset, and were roundly rejected by the international community. All of the relevant international institutions rightly hold Moscow responsible for a pattern of conduct that has been designed to destabilise Ukraine by sponsoring separatist entities in the use of armed force against the legitimate Government and members of the civilian population. Almost from the outset, the United Nations, the Council of Europe, the European Union, and the G7 all re-affirmed Ukraine’s sovereignty and territorial integrity within its internationally recognised borders, and condemned the Russian Federation’s continuing proxy war in eastern Ukraine. As the conflict has continued, the evidence of Russia’s direct and indirect involvement in the violent rebellion in Donbass has become more and more apparent. Despite Russia’s crude attempts to conceal its involvement, the proof of Russian State responsibility has steadily mounted. In the face of the obvious truth, Russia’s policy of implausible deniability has fallen apart completely. 2. Ukraine submits that the human rights violations committed by Russian forces and their proxies, as particularised in this application, fall directly within Russia’s extra-territorial jurisdiction for the purposes of article 1 of the Convention.