Page 4,061«..1020..4,0604,0614,0624,063..4,0704,080..»

Technical Weekly – Bitcoin bulls on thin ice; Altcoins mixed – FXStreet

Cryptocurrency traders have been staying cautiously optimistic as we enter the final trading month of the year. The prices of bitcoin briefly touched 7800 levels over the weekend before sheltering in the 7500 area. We've also seen the same mixed sentiment in the altcoin space, as ETH and XRP gained about 1.5%, while LTC and ATOM gave up less than 2% of their values.

The mixed sentiment in the crypto market also illustrated in market data. Data from OKEx shows that futures contracts traders have been holding a split view on BTC, with the Long/Short Ratio hovered in the 1 area.

However, another set of data shows that investors have been reluctant to enter the market despite market sentiment has slightly rebounded. The latest reading of the Sentix Bitcoin Sentiment Index has rebounded from last week's -34 percentage points to -22percentage points.

Patrick Hussy, Managing Director at CEFA, believes that "fears remain in the market that the sell-off could continue." Although extreme fear usually indicates a price rebound, Hussy said he hadn't seen indications that show investors' willingness to buy. Bitcoin bulls may have to be patient before the next significant price increase can take place.

US investors are expected to return into the market as Thanksgiving weekend wrapped up, crypto watchers may want to refocus on the overall trade volume, and the potential changes in the momentum and market dynamic.

Facebook's Libra project may face additional regulatory hurdles as US laand ATOM gave up less than 2% of their values.wmakers have been pushing to classify stablecoins as securities. The obstacle came at the time when Libra has been in consideration of embracing fiat-pegged stablecoins model, rather than a single token supported by a basket of national currencies. Libra Association insisted that the project is a commodity.

Banks in Germany may soon be allowed to sell and store crypto assets. That's according to a local newspaper. Handelsblatt reports that the Bundestag has passed a new bill that implements the fourth EU Money Laundering Directive, which allows banks to have access to crypto-assets. The bill is expected to be signed off by the nation's 16 states.

Investors in Canada are one step closer to see public-traded bitcoin funds as soon as late December. Canadian investment fund 3iQ told Coindesk that the company is expected to list the fund on TSX or TSX Venture in late December or early January. The firm claims the IPO would be the "world's first regulated closed-end bitcoin exchange-traded product."

BTCUSD

As previously discussed in our publication , BTC could have needed to find another bottom support of the recent uptrend (red tunnel) before retesting the October resistance (yellow line).

BTC seems has found another 3-hour leg of support, which is higher than the previous lows. At this point, the 23.6% Fibonacci Retracement must be further tested before another attempt at the upper end of the uptrend.

We believe that momentum would be the key of BTC to hold up at current levels or further push up, as both UO and RSI suggest that momentum has been somewhat losing out.

If the lower end of the channel is compromised, the retest of the support near 6850 should not be ruled out.

Key levels: 7455, 6850

EOSBTC

EOSBTC has formed a 6-hour double bottom reversal in late November and started a rally from there. A similar pattern has occurred back in early November, which sent the price to nearly 0.0004 levels.

The thin confidence in the BTC should able to provide some rooms for altcoins speculations, and EOS could be one of them.

If the momentum is sustainable, the pair could test the 0.00039 area, which is the support- turned-resistance levels.

Besides, the 6-hour 10-SMA has surged above the 50-SMA recently, it has been getting closer to the 200-SMA, and a 6-hour "golden cross" could be in the making.

Key levels: 0.00039, 0.00037

ATOMUSDT

ATOM has been one of the recent gainers in the altcoin space, as ATOMUSDT has been rally since November 22.

However, we've seen a mixed signal from here. While the lower end of the 3-hour rally channel seems like decent support, the ultimate oscillator was unable to produce some higher lows. At the same time, the RSI has made a more obvious rebound.

The chance of retest the support of the uptrend should not be eliminated; however, the double top formation could limit the upside from here.

Key levels: 3.6, 4.1

LINKUSDT

LINKUSDT is set to test the support of a long-term trend line. The green line in the chart below is the support of the pair, which started in May 2019.

Momentum indicators and the price have shown divergence since mid-October, an expected price correction occurred in mid-November.

The correction also makes the case of a daily "death cross" more likely, which is the 10-day moving average is likely to break below the 200-day moving average. However, unlike the name suggests, a short-term price rebound usually occurs after a death cross happened shortly.

Key levels: 2.36, 2.02, 2.01.

Link:
Technical Weekly - Bitcoin bulls on thin ice; Altcoins mixed - FXStreet

Read More..

What to Make of the Inaugural NetThing 2019 – CircleID

The last Australian Internet Governance Forum (auIGF) was held in October 2016 before the annual event was cancelled as part of an auDA review. Three years on and the auIGF replacement NetThing was held in Sydney on 28 October 2019, though I was surprised to see that this Australian Internet event no longer had an associated .au domain name, instead choosing to go with NetThing.info. According to the organisers, "NetThing is the renewal of an annual forum to strengthen Australia's Internet governance community, and consists of robust Australia-based Internet policy exploration and discussion". So with that in mind, my colleague and I went along to see what was going on.

Inclusive Presentation Environment

NetThing 2019 felt like an auIGF but different, in a good way. The way the sessions were prepared and presented provided a more inclusive environment, which is an improvement from the "sit behind a desk panel" style quite often previously seen at auIGF. Internet governance and policy discussion can only be enhanced by active stakeholder engagement, so this was definitely a step in the right direction.

Broader scope of topics

My previous experience of the auIGF was that it usually only covered very technical topics that affected the governance of the infrastructure that supports the operation of the Internet. This was probably because the audience was typically from a technical background.

It is clear though, NetThing took inspiration from Nethui, which is held by our friends from across the Tasman in New Zealand. Nethui has a reach of topics far beyond that of a traditional IGF and NetThing set about broadening the scope of topics covered as well by exploring these five areas:

The Internet has grown exponentially in the last twenty years and has become core to the way that everyone lives, from entertainment through to critical functions that support our very lives. To that end, broadening the topics covered at such an event is essential to remain relevant to the current and future users of the Internet.

I encourage you all to watch each session online as NetThing has made the recordings of each session publicly available on their website.

Multi-stakeholder model

NetThing 2019 promoted the idea of a multi-stakeholder model, which, by definition, allows for the voices of multiple groups within the Australian community to come together and make informed decisions based on the inputs of others. It brought together representation from the Australian Government, IT professionals from organisations of all sizes in the private sector, journalists and academics.

This helped provide a more dynamic discussion on a host of topics ranging from Australia's 2020 Cyber Security Strategy to socially sensitive events such as the events post the tragic and despicable Christchurch Mosque shootings and how the New Zealand government worked to take down web content.

Overall, I left NetThing, feeling very inspired by the passion of our Internet community. However, I also felt very much overwhelmed by the amount of work that we all have ahead of us to ensure that the governance of the Australian Internet fosters inclusiveness from all corners of Australia, as well as ensuring that our rights are protected online and that all the technical bits are sorted out as well.

It's clear to see how the Internet has impacted the lives of Australians and all global citizens alike, and as such, the security and online well-being of all internet stakeholders is a goal of paramount importance. I feel privileged and empowered to be able to directly impact the Australian and Global Internet environments in a professional capacity through Neustar, a world leader in Internet security.

However, there is still much to do so between now and NetThing 2020 (and beyond), everyone as an Internet community must continue to work and collaborate to ensure a safe and prosperous "online Australia" and I encourage all to join in the discussion and NetThing is a good place to start.

More:
What to Make of the Inaugural NetThing 2019 - CircleID

Read More..

cloudtamer.io Announces Availability of Compliance Jumpstarts for Cloud Governance Solution – PR Web

Our Compliance Jumpstarts now come out-of-the-box and can be quickly applied across all the cloud accounts in the enterprise.

FULTON, Md. (PRWEB) December 02, 2019

cloudtamer.io today announced the initial release of its Compliance Jumpstarts for Amazon Web Services (AWS) to expedite customer efforts in meeting various industry security and compliance standards. The initial release of the cloudtamer.io Compliance Jumpstarts includes both the National Institute of Standards and Technology (NIST) Special Publication 800-171 Rev. 1 as well as the Center for Internet Security (CIS) AWS Foundation Benchmark v1.2.0. The NIST 800-171 standard defines how non-federal systems and organizations should safeguard and distribute non-classified sensitive material. The CIS Benchmark for AWS provides best practices to secure cloud accounts.

cloudtamer.io's Compliance Jumpstarts deliver two key capabilities to customers:

"The initial release of cloudtamer.io's Compliance Jumpstarts represents our commitment to simplify security and compliance in the cloud for our customers. We have seen organizations struggle with understanding, implementing, and documenting the necessary controls within AWS to better secure their cloud account configuration. Our Compliance Jumpstarts now come out-of-the-box and can be quickly applied across all the cloud accounts in the enterprise," said Brian Price, cloudtamer.io CEO. "Along with our constantly evolving library of Cloud Rules to proactively enforce compliance and security standards, our Compliance Jumpstarts help everyone hit the ground running to better implement and align best practices to their governance, risk management, and compliance (GRC) controls."

The cloudtamer.io Compliance Jumpstarts for NIST SP 800-171 Rev. 1 and CIS AWS Benchmark v1.2.0 are available now to all cloudtamer.io customers.

To learn more about how to accelerate compliance in the cloud, visit the cloudtamer.io website or schedule a demonstration.

About cloudtamer.ioAt cloudtamer.io, headquartered in Fulton, Maryland, we build software products to help government and commercial customers achieve success and realize full value from their cloud operations. Our mission is to make peoples lives easier in the cloud through innovative products built by passionate employees. Our solution, cloudtamer.io, does this by delivering comprehensive cloud governance to provide visibility, enforce budgets, and ensure compliance across public cloud workloads. For more information, visit the cloudtamer.io website or follow us on Twitter and LinkedIn.

Share article on social media or email:

Continued here:
cloudtamer.io Announces Availability of Compliance Jumpstarts for Cloud Governance Solution - PR Web

Read More..

5G hackers: These eight groups will try to break into the networks of tomorrow – ZDNet

European computer security agency Enisa has listed the groups it thinks are most likely to attempt to hack into 5G networks, warning that security threats to telecoms infrastructure and beyond will expand with the arrival of next-generation mobile connectivity.

5G will introduce new risks because it will play a role in connecting up everything from smart cities, connected cars, automated factories and the internet of things.

"This will attract the attention of existing and new threat agent groups with a large variety of motives," Enisa said in a report into the security threats facing the next generation of mobile networks. It warned that 5G will introduce a set of new vulnerabilities that will expand the ways networks and connected devices could be attacked.

"These facts may cause an unprecedented shift of capabilities and objectives of existing threat agent groups in ways that have not been seen in the past," Enisa said.

SEE: IT pro's guide to the evolution and impact of 5G technology (free PDF)

The list of potential 5G threats includes:

Cyber criminals Given the advanced capabilities of organised cybercrime, 5G is a likely target for them, either through attempts to steal data or via frauds. "Though not yet representing a significant monetizing vector, such attacks (or preparations hereto), will be part of their activities," Enisa predicted.

Insiders These could be a key threat, mainly because they are in constant proximity with the core of 5G technology. The increased complexity of 5G might increase the amount of unintentional damage caused by clumsy insiders anyway, and dishonest insiders "may misuse their access to vital network function to cause high impact/large scale availability issues in the network itself," Enisa said. Disgruntled and dissatisfied insiders are also a target for other malicious groups, and could be recruited to abuse their insider knowledge for money.

Nation states This is an important group due to their ability to compromise 5G networks and their potential motivation to do so, Enisa said: "Given the importance of 5G to the sovereignty of nation states, they will most probably be a target of state-sponsored attack." It is also "indisputable" that vendors of 5G components are in a better position to cause devastating attacks to the operation of self-developed components, Enisa said, especially when governments influence them, a possible nod to the ongoing debate about which companies from which nations should be allowed to build 5G infrastructure.

Military 5G infrastructure will be one of the most vital components to protect in the technology landscape, Enisa said, and is also likely to be a technology of use to the military. "Such a development will amplify the protection requirements and the attractiveness of 5G as a target of cyberwar," Enisa said. "5G mobile networks are going to comprise a significant target for military operations, but also as a platform used for military purposes."

SEE: AI, quantum computing and 5G could make criminals more dangerous than ever, warn police

Enisa also put 'hacktivists' on its list, but admitted that it's unclear how this group is going to be engaged in malicious activities surrounding 5G: "While the most probable is to see this group engaging in regional campaigns, it cannot be excluded that it could achieve high impact activities in national and even global 5G infrastructures". Enisa also warned that corporations may themselves be a threat to 5G networks as they will be interested in tracking the development of patents and intellectual property related to 5G infrastructure.

"Through the integration of multiple verticals, 5G will provide a single attack surface that once targeted, may result in damages in the physical space (e.g. hybrid threats)," Enisa said. And while acknowledging that there is little evidence for significant activity of cyber terrorists, Enisa noted that: "5G stakeholders will need to take the protection of this infrastructure very seriously to avoid high impact events that would cause severe harm to society".

Script kiddies Individual junior hackers might still pose a threat to 5G because it has so many components, such as IoT devices, phones, and cloud storage spaces that are within the control of individuals, for example. "In the past, we have seen high impact attacks (e.g. DDoS) spreading from home devices and gadgets," Enisa said, adding that: "With the availability of high-speed 5G networks and interconnected devices, activities of this threat agent group may cause significant impact though cascaded events affecting upstream components of 5G operators."

Continued here:
5G hackers: These eight groups will try to break into the networks of tomorrow - ZDNet

Read More..

Opinion | What Iran Did Not Want You to See – The New York Times

Video by Alexander Stockton and Adam Westbrook

Parts of Iran are back online, and videos suppressed by the nations internet shutdown are starting to trickle onto social media. In the Video Op-Ed above, Raha Bahreini sheds light on the eye-opening stories that Irans government did not want you to see.

While internet service has been partly restored, many Iranians still do not have internet access on mobile phones, and government officials there have warned that connectivity may be blocked indefinitely. In a call for evidence of government repression during the blackout, the United States State Department says it has received almost 20,000 messages, videos and photographs.

A hike in fuel prices sparked protests across Iran. Ms. Bahreini exposes and analyzes footage of human rights abuses by Iranian security forces, including shootings into crowds of unarmed protesters. And she warns of what may come next incarceration, torture and forced confessions that will further oppress the Iranian people. If the world does not take a stand, Ms. Bahreini fears, Irans internet blackout may foreshadow the nations darkest days.

Raha Bahreini (@RahaBahreini) is a human rights lawyer and a researcher on Iran for Amnesty International.

Original post:
Opinion | What Iran Did Not Want You to See - The New York Times

Read More..

Multi-domain operations: Like bringing Waze to the battlefield – FedScoop

Written by Billy Mitchell Dec 2, 2019 | FEDSCOOP

In about a months time, the U.S. Air Force will host the first demonstration of its Advanced Battle Management System the networking concept that will serve as the technological backbone of the militarys shift to an advanced way of seeing the battlefield.

Through multi-domain operations, the military servicesaim to link togetherair, sea, land, space, cyber and information assets to better identify and eliminate threats. And while the idea could leave to revolutionary jump forward in awareness and information sharing for warfighters, the technology necessary to achieve it isnt at all revolutionary, said Will Roper, Air Forces assistant secretary for acquisition, technology and logistics.

Well connect F-22s, F-35s, SpaceX Starlink satellites, Navy ships, Army soldiers, Roper said at a recentCenter for a New American Security discussion. Were going to connect them in an internet-like style. What were really doing to enable multi-domain is finally building the internet in the Air Force. Its all the stuff that you know. There are no show-stoppers here.

Rather, its taking the best of what already exists in the commercial world things military personnel have access to and expect in their personal lives and cloning that for command and control.

The great news is this exists, he said. We just simply have to be able to clone it and probably put a little more security in it. But its not unachievable. But it is going to be different to become a digital service, a digital department.

Roper pointed to navigation app Waze as an example. Every time he drives home from the Pentagon and uses Waze, he thinks about how would this work on the battlefield?

Below such an app, he said, are strong software development capabilities with cloud infrastructure and platforms to build on. Hereferred to theAdvanced Battle Management System as a whole internet company in the Air Force, built on the services Cloud One, Platform One and Data One programs.

The way that this will work well have kind of a big cloud, a big [Department of Defense] cloud, and if youre a system and youre connected to big cloud, and very similar to the app Waze, or pick your favorite, we have a user profile for you based on your mission, Roper said. And the data that hits our cloud, we can recognize, Oh this is something [you] should see, because youre driving a ship and you dont know that threat is over there and we just collected on it. And we can push it to you in a way thats very similar to Waze, easy to engage with, and as you respond to it, we get better at recognizing you.

But its also very different from an app like Waze because adversaries will be constantly trying to take it offline, Roper said. So the real secret sauce is going to be when the disconnect happens, how much are we able to locally store and process? Can I inform you how long you will have digital superiority, digital stealth so that when you connect back up because I dont think any adversary will be able to keep us disconnected forever we can immediately refresh your data, almost like were kind of resetting the clock.

To do that, he said, the military is going on the same digital journey that many successful companies have already gone on. Roper said the Air Force has already recruited a cadre of internet-type gurus who have joined our team as pioneers to build this system-of-systems out. So were not designing this in a traditional defense fashion. Were designing this with champions of commercial internet technology who are willing, just out of patriotism, to be contracted designers, to make sure that we dont get outside of what worked for the internet.

If the Air Force gets theABMS program right, the benefit will be that finally for once, if the government has a piece of data that can help the warfighter, we can getit to them, Roper said. And its crazy in the world we live in where you right now with your personal device are connected to the entire world. Think about how much ability there is to interact, to understand, to command control things, your house, your car, you control everything. We live in that world. Our operators go home with that capability. And they come into a military where things cant talk to each other.

The biggest challenge in all of this, Roper said, will beconvincing Congress to deliver the required funding.Its a big risk to put billions of dollars into digital transformation, he said. You cant take a picture of it. But you know that behind your phone is an amazing, powerful architecture that allows that phone to be so much more than a platform.

But, he anticipates sizable dollars will be dedicated in fiscal 2021 to support the ABMS development.

Itsenough money to actually do real stuff, and its not tied to any platform, Roper said. So, ABMS will basically be a competition among existing platforms. Whoever can kind of make their platform look more like an Internet of Things-type system, you get first dibs to the pot.

See the original post here:
Multi-domain operations: Like bringing Waze to the battlefield - FedScoop

Read More..

With Brutal Crackdown, Iran Is Convulsed by Worst Unrest in 40 Years – The New York Times

Iran is experiencing its deadliest political unrest since the Islamic Revolution 40 years ago, with at least 180 people killed and possibly hundreds more as angry protests have been smothered in a government crackdown of unbridled force.

It began two weeks ago with an abrupt increase of at least 50 percent in gasoline prices. Within 72 hours, outraged demonstrators in cities large and small were calling for an end to the Islamic Republics government and the downfall of its leaders.

In many places, security forces responded by opening fire on unarmed protesters, largely unemployed or low-income young men between the ages of 19 and 26, according to witness accounts and videos. In the southwest city of Mahshahr alone, witnesses and medical personnel said, Islamic Revolutionary Guards Corps members surrounded, shot and killed 40 to 100 demonstrators mostly unarmed young men in a marsh where they had sought refuge.

The recent use of lethal force against people throughout the country is unprecedented, even for the Islamic Republic and its record of violence, said Omid Memarian, the deputy director at the Center for Human Rights in Iran, a New York-based group.

Altogether, from 180 to 450 people, and possibly more, were killed in four days of intense violence after the gasoline price increase was announced on Nov. 15, with at least 2,000 wounded and 7,000 detained, according to international rights organizations, opposition groups and local journalists.

The last enormous wave of protests in Iran in 2009 after a contested election, which was also met with a deadly crackdown left 72 people dead over a much longer period of about 10 months.

Only now, nearly two weeks after the protests were crushed and largely obscured by an internet blackout in the country that was lifted recently have details corroborating the scope of killings and destruction started to dribble out.

The latest outbursts not only revealed staggering levels of frustration with Irans leaders, but also underscored the serious economic and political challenges facing them, from the Trump administrations onerous sanctions on the country to the growing resentment toward Iran by neighbors in an increasingly unstable Middle East.

The gas price increase, which was announced as most Iranians had gone to bed, came as Iran is struggling to fill a yawning budget gap. The Trump administration sanctions, most notably their tight restrictions on exports of Irans oil, are a big reason for the shortfall. The sanctions are meant to pressure Iran into renegotiating the 2015 nuclear agreement between Iran and major world powers, which President Trump abandoned, calling it too weak.

Most of the nationwide unrest seemed concentrated in neighborhoods and cities populated by low-income and working-class families, suggesting this was an uprising born in the historically loyal power base of Irans post-revolutionary hierarchy.

Many Iranians, stupefied and embittered, have directed their hostility directly at the supreme leader, Ayatollah Ali Khamenei, who called the crackdown a justified response to a plot by Irans enemies at home and abroad.

The killings prompted a provocative warning from Mir Hussein Moussavi, an opposition leader and former presidential candidate whose 2009 election loss set off peaceful demonstrations that Ayatollah Khamenei also suppressed by force.

In a statement posted Saturday on an opposition website, Mr. Moussavi, who has been under house arrest since 2011 and seldom speaks publicly, blamed the supreme leader for the killings. He compared them to an infamous 1978 massacre by government forces that led to the downfall of Shah Mohammed Reza Pahlavi a year later, at the hands of the Islamic revolutionaries who now rule the country.

The killers of the year 1978 were the representatives of a nonreligious regime and the agents and shooters of November 2019 are the representatives of a religious government, he said. Then the commander in chief was the shah and today, here, the supreme leader with absolute authority.

The authorities have declined to specify casualties and arrests and have denounced unofficial figures on the national death toll as speculative. But the nations interior minister, Abdolreza Rahmani Fazli, has cited widespread unrest around the country.

On state media, he said that protests had erupted in 29 out of 31 provinces and 50 military bases had been attacked, which if true suggested a level of coordination absent in the earlier protests. Irans official media have reported that several members of the security forces were killed and injured during the clashes.

The property damage also included 731 banks, 140 public spaces, nine religious centers, 70 gasoline stations, 307 vehicles, 183 police cars, 1,076 motorcycles and 34 ambulances, the interior minister said.

The worst violence documented so far happened in the city of Mahshahr and its suburbs, with a population of 120,000 people in Irans southwest Khuzestan Province a region with an ethnic Arab majority that has a long history of unrest and opposition to the central government. Mahshahr is adjacent to the nations largest industrial petrochemical complex and serves as a gateway to Bandar Imam, a major port.

The New York Times interviewed six residents of the city, including a protest leader who had witnessed the violence; a reporter based in the city who works for Iranian media, and had investigated the violence but was banned from reporting it; and a nurse at the hospital where casualties were treated.

They each provided similar accounts of how the Revolutionary Guards deployed a large force to Mahshahr on Monday, Nov. 18, to crush the protests. All spoke on condition of anonymity for fear of retribution by the Guards.

For three days, according to these residents, protesters had successfully gained control of most of Mahshahr and its suburbs, blocking the main road to the city and the adjacent industrial petrochemical complex. Irans interior minister confirmed that the protesters had gotten control over Mahshahr and its roads in a televised interview last week, but the Iranian government did not respond to specific questions in recent days about the mass killings in the city.

Local security forces and riot police officers had attempted to disperse the crowd and open the roads, but failed, residents said. Several clashes between protesters and security forces erupted between Saturday evening and Monday morning before the Guards were dispatched there.

When the Guards arrived near the entrance to a suburb, Shahrak Chamran, populated by low-income members of Irans ethnic Arab minority, they immediately shot without warning at dozens of men blocking the intersection, killing several on the spot, according to the residents interviewed by phone.

The residents said the other protesters scrambled to a nearby marsh, and that one of them, apparently armed with an AK-47, fired back. The Guards immediately encircled the men and responded with machine gun fire, killing as many as 100 people, the residents said.

The Guards piled the dead onto the back of a truck and departed, the residents said, and relatives of the wounded then transported them to Memko Hospital.

One of the residents, a 24-year-old unemployed college graduate in chemistry who had helped organize the protests blocking the roads, said he had been less than a mile away from the mass shooting and that his best friend, also 24, and a 32-year-old cousin were among the dead.

He said they both had been shot in the chest and their bodies were returned to the families five days later, only after they had signed paperwork promising not to hold funerals or memorial services and not to give interviews to media.

The young protest organizer said he, too, was shot in the ribs on Nov. 19, the day after the mass shooting, when the Guards stormed with tanks into his neighborhood, Shahrak Taleghani, among the poorest suburbs of Mahshahr.

He said a gun battle erupted for hours between the Guards and ethnic Arab residents, who traditionally keep guns for hunting at home. Iranian state media and witnesses reported that a senior Guards commander had been killed in a Mahshahr clash. Video on Twitter suggests tanks had been deployed there.

A 32-year-old nurse in Mahshahr reached by the phone said she had tended to the wounded at the hospital and that most had sustained gunshot wounds to the head and chest.

She described chaotic scenes at the hospital, with families rushing to bring in the casualties, including a 21-year-old who was to be married but could not be saved. Give me back my son!, the nurse quoted his sobbing mother as saying. Its his wedding in two weeks!

The nurse said security forces stationed at the hospital arrested some of the wounded protesters after their conditions had stabilized. She said some relatives, fearing arrest themselves, dropped wounded loved ones at the hospital and fled, covering their faces.

On Nov. 25, a week after it happened, the citys representative in Parliament, Mohamad Golmordai, vented outrage in a blunt moment of searing antigovernment criticism that was broadcast on Iranian state television and captured in photos and videos uploaded to the internet.

What have you done that the undignified Shah did not do? Mr. Golmordai screamed from the Parliament floor, as a scuffle broke out between him and other lawmakers, including one who grabbed him by the throat.

The local reporter in Mahshahr said the total number of people killed in three days of unrest in the area had reached 130, including those killed in the marsh.

In other cities such as Shiraz and Shahriar, dozens were reported killed in the unrest by security forces who fired on unarmed protesters, according to rights groups and videos posted by witnesses.

This regime has pushed people toward violence, said Yousef Alsarkhi, 29, a political activist from Khuzestan who migrated to the Netherlands four years ago. The more they repress, the more aggressive and angry people get.

Political analysts said the protests appeared to have delivered a severe blow to President Hassan Rouhani, a relative moderate in Irans political spectrum, all but guaranteeing that hard-liners would win upcoming parliamentary elections and the presidency in two years.

The tough response to the protests also appeared to signal a hardening rift between Irans leaders and sizable segments of the population of 83 million.

The governments response was uncompromising, brutal and rapid, said Henry Rome, an Iran analyst at the Eurasia Group, a political risk consultancy in Washington. Still, he said, the protests also had demonstrated that many Iranians are not afraid to take to the streets.

Follow this link:
With Brutal Crackdown, Iran Is Convulsed by Worst Unrest in 40 Years - The New York Times

Read More..

What is the Internet of Things? Your IoT roadmap – Ericsson

Cellular IoT can address both the relatively simpler requirements of connecting devices that have a lower complexity such as wearables, simple metering, etc. as well as the highly specific, sensitive demands of complex environments and applications such as manufacturing or logistics.

Cellular IoT itself is a rapidly growing ecosystem based on 3rd Generation Partnership Project (3GPP) global standards. 3GPP works with telecommunications standard development organizations and provides its members with a stable environment to produce the reports and specifications that define 3GPP technologies.

3GPP standards are supported by an increasing number of communications service providers (CSPs) as well as device, chipset, module and network infrastructure vendors. It offers better performance than other Low-power wide-area (LPWA) network technologies in terms of unmatched global coverage, quality of service, scalability, security and the flexibility to handle the different requirements for a comprehensive range of use cases.

View original post here:
What is the Internet of Things? Your IoT roadmap - Ericsson

Read More..

Can New Norms of Behavior Extend the Rules-Based Order Into Cyberspace? – World Politics Review

Over the past quarter century, the internet has transformed human existence, dramatically altering everything from daily life, societal interactions and economic exchange, to political debates and geopolitical rivalries. In 1996, only 36 million people were online. Today, 3.7 billion are, and the remaining half of humanity will soon join them in the connected world. Although the benefits of cyberspace are undeniable, malicious state and criminal actors often use it to further their nefarious ends, while at times endangering its digital infrastructure. Hoping to protect this vulnerable domain, the Global Commission on the Stability of Cyberspace recently issued its final report, Advancing Cyberstability.

The commission, co-chaired by former U.S. Secretary of Homeland Security Michael Chertoff and former Indian Deputy National Security Adviser Latha Reddy, toiled for three years, consulting globally with governments, international organizations, private corporations, technical experts and members of civil society. According to Foreign Minister Stef Blok of the Netherlands, which helped underwrite the commissions work, one overriding conviction animated its efforts: Cyberspace cannot be an ungoverned space where bad guys can do what they want, he said in issuing the report at last months Paris Peace Forum. The rules-based order and international law must extend into cyberspace. ...

Link:
Can New Norms of Behavior Extend the Rules-Based Order Into Cyberspace? - World Politics Review

Read More..

FBI classifies FaceApp as counterintelligence threat, citing ties to Russian intelligence | TheHill – The Hill

The FBI has classified FaceApp as a counterintelligence threat due toits ties to Russia, with the FBI emphasizing that it will take action if it assesses the face-editing app is involved in election interference efforts.

In a letter sent to Senate Minority Leader Charles SchumerCharles (Chuck) Ellis SchumerWhy a second Trump term and a Democratic Congress could be a nightmare scenario for the GOP Army taking security assessment of TikTok after Schumer warning Trump signs short-term spending bill to avert shutdown MORE (D-N.Y.) on Nov. 25 that was made public on Monday, Jill Tyson, the assistant director of the FBIs Office of Congressional Affairs, wrote that given that the company that develops FaceApp is based in St. Petersburg, certain intelligence concerns were raised.

The FBI considers any mobile application or similar product developed in Russia, such as FaceApp, to be a potential counterintelligence threat, based on the data the product collects, its privacy and terms of use policies, and the legal mechanisms available to the Government of Russia that permit access to data within Russias borders, Tyson wrote.

In classifying FaceApp as a threat, Tyson pointed to the ability of the Russian Federal Security Service to remotely access all communications and servers on Russian networks without making a request to [internet service providers].

FaceApp involves the use of consumer data, including the uploading of a photo to manipulate. Tyson wrote that FaceApp uploads these photos to cloud servers in the United States, Singapore, Australia and New Zealand, and that the organization has previously claimed that it deletes photos from its servers within 48 hours of them being uploaded.

Due to concerns around Russian efforts to interfere in U.S. elections in 2016, Tyson emphasized that if FaceApp was found to be interfering with future U.S. elections in any way, the agency would take action.

If the FBI assesses that elected officials, candidates, political campaigns, or political parties are targets of foreign influence operations involving FaceApp, the FBI would coordinate notifications, investigate, and engage the Foreign Influence Task Force, as appropriate, Tyson wrote.

Tyson sent the letter in response to a separate letter sent to both the FBI and the Federal Trade Commission (FTC) by Schumer in July. Schumer asked that the agencies look into potential national security and privacy concerns involved with FaceApp.

During a Senate floor speech on Monday, Schumer strongly urged Americans to delete apps like FaceApp, and emphasized that Russiamight not be the only country to pose a threat to national security through apps.

In light of the FBIs warning, I strongly urge all Americans to consider deleting apps like FaceApp immediately and to proceed with extreme caution when downloading apps developed in foreign countries that are known adversaries, Schumer said. The personal data it collects from a users device could end up in the hands of Russian Intelligence Services. Its simply not worth the risk.

Schumer added that Americans should be aware of the risks posed by certain mobile apps, particularly those developed in foreign countries that are known adversaries before they download them. The FBI didnt name other countries but Id certainly name not only Russia but China, Iran, and there are others.

FaceApp did not immediately respond to The Hills request for comment. FaceApp CEO Yaroslav Goncharov previously told The Guardian that user data was never transferred to Russia, and was instead stored on U.S.-controlled Amazon and Google cloud servers.

Schumer is not alone in expressing security concerns around FaceApp. In July, the Democratic National Committeesent out an alert to candidates warning them and their staff to not use FaceApp due to ties with Russia.

View post:
FBI classifies FaceApp as counterintelligence threat, citing ties to Russian intelligence | TheHill - The Hill

Read More..