Tumgik
#cyber in South Asia
thehellsitenewsie · 6 months
Text
Cambodia: Hundreds of Indians rescued from cyber-scam factories (BBC)
The Indian government has so far rescued 250 citizens in Cambodia who were forced to run online scams.
They were promised jobs but "forced to undertake illegal cyber work", India's foreign ministry said.
Recent reports have said more than 5,000 Indians stuck in Cambodia were forced to operate cyber-fraud schemes.
Hundreds of thousands of people from around the world are estimated to have fallen prey to human traffickers running job scams in South East Asia.
Victims, mostly young and tech-savvy, are promised jobs and then lured into illegal online work ranging from money laundering and crypto fraud to so-called love scams, where they pose as lovers online.
Read more
0 notes
neoncitynights · 8 months
Text
instagram
1 note · View note
iamadarshbadri · 1 year
Text
Digitised Archival Sources on India and South Asia
The days when only members of the upper class of urban society had access to knowledge-producing sites (mostly archives) are long gone. Today, one may easily access digitised archival sources thanks to the internet on mobile phones. The growth of digital technology has also enabled a new arena of history-keeping. Publicly-owned digitised archival sources have gained popularity in recent years as…
Tumblr media
View On WordPress
0 notes
afeelgoodblog · 1 year
Text
The Best News of Last Week - May 15, 2023
🐕 - Now It's a Paw-ty
1. World's oldest ever dog celebrates 31st birthday
Tumblr media
Bobi was born on 11 May 1992, making him 31 years old, in human years. A big birthday party is planned for Bobi today, according to Guinness World Records.
It will take place at his home in the rural Portuguese village of Conqueiros in Leiria, western Portugal, where he has lived his entire life.
2. The FDA has officially changed its policy to allow more gay and bisexual men to donate blood
Tumblr media
The Food and Drug Administration (FDA) has announced that they’ve eased restrictions on blood donations by men who have sex with men in an effort to address blood shortages. The new policy recommends a series of individual risk-based questions that will apply to all donors, regardless of their sexual orientation, sex, or gender. Gay or bisexual men in monogamous relationships will now be permitted to donate blood.
3. Illinois passes bill to ensure community college credits transfer to public universities
Tumblr media
The Illinois General Assembly has passed a bill that would help community college students transfer to public universities.
It would ensure that certain classes taken at community colleges could be transferred to any higher education institution in the state. Some schools currently only count community college coursework as elective credits.
4. Brazilian President Lula recognizes 6 new indigenous territories stretching 620,000 hectares, banning mining and restricting farming within them
Tumblr media
Brazilian President Luiz Inácio Lula da Silva has decreed six new indigenous reserves, banning mining and restricting commercial farming there. The lands - including a vast area of Amazon rainforest - cover about 620,000 hectares (1.5m acres).
Indigenous leaders welcomed the move, but said more areas needed protection.
5. More than 1,000 trafficking victims rescued in separate operations in Southeast Asia
More than 1,000 trafficking victims were rescued in separate operations in Southeast Asia over the last week, officials in Indonesia and the Philippines said. 
Indonesian officials said Sunday they freed 20 of their nationals who were trafficked to Myanmar as part of a cyber scam, amid an increase in human trafficking cases in Southeast Asia. Fake recruiters had offered the Indonesians high-paying jobs in Thailand but instead trafficked them to Myawaddy, about 567 kilometers (352 miles) south of Naypyidaw, the capital, to perform cyber scams for crypto websites or apps, said Judha Nugraha, an official in Indonesia's Foreign Affairs Ministry.
6. A peanut allergy patch is making headway in trials
Tumblr media
An experimental “peanut patch” is showing some promise for toddlers who are highly allergic to peanuts. The patch, called Viaskin, was tested on children ages one to three for a late-stage trial, and the results show that the patch helped children whose bodies could not tolerate even a small piece of peanuts safely eat a few.
After one year, two-thirds of the children who used the patch and one-third of the placebo group met the trial’s primary endpoint. The participants with a less sensitive peanut allergy could safely tolerate the peanut protein equivalent of eating three or four peanuts.
7. Critically endangered lemur born at Calgary Zoo
Tumblr media
The Calgary Zoo has released pictures of its newest addition, a baby lemur. The zoo says its four-year-old female black-and-white ruffed lemur, Eny, gave birth on April 7. The pup’s father is eight-year-old Menabe. The gender of the pup has not been confirmed but the Calgary Zoo says the pup appears bright-eyed and active and is on the move.
The black-and-white ruffed lemur is registered among the 25 most endangered primates in the world, due mostly to habitat loss and hunting.
----
That's it for this week :)
This newsletter will always be free. If you liked this post you can support me with a small kofi donation:
Buy me a coffee ❤️
Also don’t forget to reblog.
SUBCRIBE HERE for more good news in your inbox
658 notes · View notes
ohnoitstbskyen · 2 years
Note
what;s your thoughts on ionia if you have any? from a design perspective? I personally feel like ionia lacks design coherency, and kind of forces a bunch of unrelated design elements into what is suppose to be a single nation.
I feel pretty mixed. The concept art and conceptual ideas behind Ionia's aesthetics are genuinely beautiful - if you check the Universe page for the art, you'll find some visual absolute bangers.
Tumblr media
One of the major ideas of Ionia is the idea that people live in symbiotic harmony with nature by way of magic and spirit magic, and one of the very clever ways this is reflected is that Ionian buildings are not built by felling trees, but by asking trees to arrange themselves into structures that buildings can be built around, in return for the occupants nourishing and honouring the tree that shelters them, which is a super cool idea and genuinely comes across in a lot of the region's concept art:
Tumblr media Tumblr media Tumblr media
And the artists at Riot explored some genuinely incredibly creative visual ideas for the aesthetics of the region that draw from various fantasy aesthetics without feeling like it's merely regurgitating lesser imitations of Chinese, Korean or Japanese fantasy. Like, it does at least try to imagine and synthesize something novel out of its influences, mixing stark rocky environments with impossibly vibrant nature colors to create the sense of a dreamlike, shifting landscape, something that makes sense in a region defined by a living environment animated by magic. Plants and rocks flow into one another and merge, rock formations sprout like trees, the boundaries between land and life blur.
Tumblr media Tumblr media Tumblr media Tumblr media Tumblr media Tumblr media
Unfortunately, outside of the concept art, Ionia really is just treated as Magic Asia: The Region. China, Korea and Japan, with sometimes a bit of south and south-east Asia conglomerated in there, it's all just mushed together into one homogenate; and that rankles a bit in a game that devotes four entire regions to various flavors and time periods of Europe Shit.™
And that's where your complaint comes from, I think. Ionia is a big soup of pan-Asian fantasy tropes all packed into a single compressed region, where none of them really have enough room to define themselves, and it leads to a lot of incoherency. Wukong is drawn straight out of Wuxia, and he runs around alongside a Batteries Not Included minor Teenage Mutant Ninja Turtle villain-looking cyber samurai in Master Yi, a samurai-ninja in Shen, a Korean kumiho in Ahri, a fantasy Yakuza in Sett and random spirit creatures like Treebeard On Weed Ivern and Disney Princess Bambi in Lillia. It's messy.
It could be genuinely brilliant, I think, if Riot committed more to inventing their own mythology and aesthetic here, rather than merely reproduce pop-culture tropes and archetypes, but we're 150 champions deep in this now and I don't think there's much chance they'll pivot at this point.
212 notes · View notes
writingmochi · 10 months
Text
Tumblr media
a terra incognita introduction
cast: jake ✗ fem.reader
synopsis: as the world entered the middle of the 21st century, many things have changed for the better or for worse in the newly united korea peninsula: the preparation for the succession of the new conglomerates of the past decade, the uprising of deviant androids, and the new layer of life shield by walls of codes. in the middle of it, two beings are trying to understand each other and the situation of the world they live in; an unknown territory
genre: cyberpunk, cyber noir, psychological thriller, science fiction, dystopian future, politics and philosophies regarding artificial intelligence and humanity, romance, drama, angst, mature content (war and revolution, explicit smut)
based on: video game cyberpunk 2077 (2020) and detroit: become human (2018), anime serial experiments lain (1998), and tv show succession (2018-2023)
masterlist
Tumblr media
united korea
the united republic of korea (known as "united korea") is an east asia nation on the korean peninsula. as a result of the reunification agreement back in 2025 of the former north and south korea, the state has now prospered in terms of sociopolitical and economic issues from the korean war. it now excels technologically as one of the firsts in the world to introduce commercialized androids along with other east asian countries such as japan and china. in the aftermath of the social media collapse and the cyber world war of 2027-2030, the private conglomerates of the state have released a new way to connect to the information superhighway.
FLAG
Tumblr media
(flag link to r/alternatehistory on reddit)
INFORMATION
capital cities: neo seoul | neo pyongyang
population: 65.5 million
language: korean | english | japanese | chinese
>> HISTORY
>> GEOGRAPHY
>> GOVERNMENT
>> SOCIETY
>> ECONOMY
>> MILITARY
>> MAJOR CITIES
neo seoul
one of the capital cities of united korea and the former capital of south korea, neo seoul is a metropolis for the state's bustling life from the most traditional to the most modern. neo seoul is known for six districts that are divided by the han river flowing in the middle, known as the division of north seoul and south seoul
Tumblr media
north seoul encapsulates the traditional side of neo seoul and the center for the city's and state's government administration
south seoul lies the center of neo seoul's economy where conglomerates build their headquarters. a distinct living cost gap can be seen to compare those living in the north and those in the south where it is connected to incheon, a major city of transportation with its international seaports and airport
neo pyongyang
one of the capital cities of united korea and the former capital of north korea, neo pyongyang is the capital of the parliament of united korea. it's located on the taedong river kilometers upstream from the yellow sea. it is known as the city where the declaration of unification was signed along with its establishment as half of the capitals of the unified countries. much of the population of neo pyongyang are citizens coming from the southern of the peninsula as they migrate to fill in the spaces and utilize materials. it is also a growing industrial hub where conglomerates built their factories, along with kaesong.
with the rise of deviancies from androids made by shim laboratories, journalists have made observations and assume that neo pyongyang is the main hub of the rebellion between androids and their creator (as one human equates to two androids), creating unrest between the two parties. yet, they also say that neo pyongyang is a better refuge for deviant androids than neo seoul.
Tumblr media
taglist: @raeyunshm @endzii23 @fluffyywoo @camipendragon @hiqhkey @wccycc @cha0thicpisces @y4wnjunz @yeehawnana @beansworldsstuff @kimipxl @blurryriki @reallysmolrenjun @frukkoneeeeg
© writingmochi on tumblr, 2021-2024. all rights reserved
36 notes · View notes
wolfliving · 9 days
Text
Tumblr media
The Federal Bureau of Investigation (FBI), Cyber National Mission Force (CNMF), and National Security Agency (NSA) assess that People’s Republic of China (PRC)-linked cyber actors have compromised thousands of Internet-connected devices, including small office/home office (SOHO) routers, firewalls, network-attached storage (NAS) and Internet of Things (IoT) devices with the goal of creating a network of compromised nodes (a “botnet”) positioned for malicious activity. The actors may then use the botnet as a proxy to conceal their identities while deploying distributed denial of service (DDoS) attacks or compromising targeted U.S. networks.
Integrity Technology Group, a PRC-based company, has controlled and managed a botnet active since mid- 2021. The botnet has regularly maintained between tens to hundreds of thousands of compromised devices. As of June 2024, the botnet consisted of over 260,000 devices. Victim devices part of the botnet have been observed in North America, South America, Europe, Africa, Southeast Asia and Australia.
While devices aged beyond their end-of-life dates are known to be more vulnerable to intrusion, many of the compromised devices in the Integrity Tech controlled botnet are likely still supported by their respective vendors.
FBI, CNMF, NSA, and allied partners are releasing this Joint Cyber Security Advisory to highlight the threat posed by these actors and their botnet activity and to encourage exposed device vendors, owners, and operators to update and secure their devices from being compromised and joining the botnet. Network defenders are advised to follow the guidance in the mitigations section to protect against the PRC-linked cyber actors’ botnet activity. Cyber security companies can also leverage the information in this advisory to assist with identifying malicious activity and reducing the number of devices present in botnets worldwide.
For additional information, see U.S. Department of Justice (DOJ) press release....
4 notes · View notes
zvaigzdelasas · 11 months
Text
NATO is seeking to expand its cooperation structures globally and also intensify its cooperation with Jordan, Indonesia and India. A “NATO-Indonesia meeting” was held yesterday (Wednesday) on the sidelines of the NATO foreign ministers’ meeting in Brussels – a follow-up to talks between Indonesia’s Foreign Minister Retno Marsudi and NATO Secretary General Jens Stoltenberg in mid-June 2022. Last week, a senior NATO official visited Jordan’s capital Amman to promote the establishment of a NATO liaison office. Already back in June, a US Congressional Committee focused on China, had advocated linking India more closely to NATO. India’s External Affairs Minister Subrahmanyam Jaishankar, however, quickly rejected the suggestion. NATO diplomats are quoted saying that the Western military alliance could conceive of cooperating with South Africa or Brazil, for example. These plans would escalate the West’s power struggle against Russia and China, while non-Western alliances such as the Shanghai Cooperation Organization (SCO) are expanding their membership.
Already since some time, NATO has been seeking to expand its cooperation structures into the Asia-Pacific region, for example to include Japan. Early this year, NATO Secretary General Jens Stoltenberg was in Tokyo, among other things, to sign a joint declaration with Prime Minister Fumio Kishida.[1] In addition, it is strengthening its cooperation with South Korea, whose armed forces are participating in NATO cyber defense and are to be involved more intensively in future conventional NATO maneuvers.[2] Japan’s prime minster and South Korea’s president have already regularly attended NATO summits. The Western military alliance is also extending its cooperation with Australia and New Zealand. This development is not without its contradictions. France, for example, opposes the plan to establish a NATO liaison office in Japan, because it considers itself an important Pacific power and does not want NATO’s influence to excessively expand in the Pacific. Nevertheless, the Western military alliance is strengthening its presence in the Asia-Pacific region – with maneuvers conducted by its member states, including Germany (german-foreign-policy.com reported.[3]).[...]
NATO has been cooperating with several Mediterranean countries since 1994 within the framework of its Mediterranean Dialogue and also since 1994, with several Arab Gulf countries as part of its Istanbul Cooperation Initiative.[4] However, the cooperation is not considered very intensive. At the beginning of this week, NATO diplomats have been quoted saying “we remain acutely aware of developments on our southern flank,” and are planning appropriate measures. The possibility of establishing a Liaison Office in Jordan is being explored “as a move to get closer to the ground and develop the relationship in the Middle East.[5] Last week, a senior NATO official visited Jordan’s capital Amman to promote such a liaison office.[6][...]
NATO diplomats informed the online platform “Euractiv” that “many members of the Western military alliance believe that political dialogue does not have to be limited to the southern neighborhood. One can also seek cooperation with states further away. Brazil, South Africa, India, and Indonesia are mentioned as examples.[7][...]
In a paper containing strategic proposals for the U.S. power struggle against China, the Committee also advocated strengthening NATO’s cooperation with India.[8] The proposal caused a stir in the run-up to Indian Prime Minister Narendra Modi’s visit to Washington on June 22. He was able to draw on the fact that India is cooperating militarily in the Quad format with the USA as well as NATO partners Japan and Australia in order to gain leverage against China. Close NATO ties could also facilitate intelligence sharing, allowing New Delhi to access advanced military technology.[9] India’s External Affairs Minister Subrahmanyam Jaishankar, however, rejected Washington’s proposal, stating that the “NATO template does not apply to India”.[10] Indian media explained that New Delhi was still not prepared to be pitted against Russia and to limit its independence.[11] Both would be entailed in close ties to NATO.
The efforts to link third countries around the world more closely to NATO are being undertaken at a time when not only western countries are escalating their power struggles against Russia and above all against China and are therefore tightening their alliance structures. They are also taking place when non-Western alliances are gaining ground. This is true not only for the BRICS, which decided, in August, to admit six new members on January 1, 2024 (german-foreign-policy.com reported [12]). This is also true for the Shanghai Cooperation Organization (SCO), a security alliance centered around Moscow and Beijing that has grown from its original six to currently nine members, including India, Pakistan and Iran, and continues to attract new interested countries. In addition to several countries in Southern Asia and the South Caucasus, SCO “dialogue partners” now include Turkey, Egypt and five Arabian Peninsula states, including Saudi Arabia, the United Arab Emirates and Qatar. Iin light of the BRICS expansion, the admission of additional countries as full SCO members is considered quite conceivable. Western dominance will thus be progressively weakened.[13]
12 Oct 23
16 notes · View notes
dzthenerd490 · 2 months
Text
News Post
Israel war on Gaza updates: Health Ministry declares polio epidemic in Gaza | Israel-Palestine conflict News | Al Jazeera
Palestine Is a Core Election Issue, and We Won’t Let Our Politicians Ignore It | Truthout
Turkey threatens to ‘enter’ Israel to protect Palestinians – POLITICO
14 Palestinian groups, including Hamas and Fatah, sign China-brokered deal: Why it matters | Explained News - The Indian Express
Ukraine
US will send $1.7 billion in military aid to Ukraine | AP News
Tuaregs photographed with Ukrainian flag after defeating Wagnerites in Mali | Ukrainska Pravda
‘Nowhere is safe in Belgorod’: Fears grip Russian region bordering Ukraine | Russia-Ukraine war News | Al Jazeera
Ukraine's hopes and challenges after long wait for F16s (bbc.com)
Sudan
Khartoum: Women and girls subjected to widespread sexual violence by warring parties, HRW report finds | CNN
https://sudantribune.com/article288840/
South Sudan Considering Oil Pipeline Shutdown Amid Economic Crisis | Pipeline Technology Journal (pipeline-journal.net)
Sudan civil war hits close to home for CT’s Sudanese community | Connecticut Public (ctpublic.org)
Other
Egypt warns of dangers of new war in Lebanon | Arab News
Prosecution calls for 25 death sentences in DR Congo rebellion trial (voanews.com)
Mike Kalambay: Nine die in DR Congo gospel concert chaos (bbc.com)
The Taliban say they no longer recognize Afghan diplomatic missions set up by the former government | AP News
In Afghanistan, Taliban ban on girls’ education leaves thousands of classrooms empty | Arab News
Ethiopia boat disaster kills 19 in Amhara region (bbc.com)
Horror, grief, trauma in Ethiopia’s Gofa a week after deadly landslides | Environment News | Al Jazeera
The Silent Winner of Myanmar’s Northern Conflict – The Diplomat
China and neighbors pressure Myanmar as regime reels from battle losses - Nikkei Asia
Under siege in Myanmar’s cyber-scam capital | Crime News | Al Jazeera
Russia's Wagner has deadliest loss in Africa’s Sahel, highlighting the region's instability | AP News
2 notes · View notes
southeastasianists · 1 year
Text
It is now common knowledge that whenever protest movements could make political gains through digital media and technologies, the regimes these very movements seek to challenge would catch up with their progress.  From the 2010-2011 Arab Spring to popular contestations of Southeast Asia’s autocracies in 2020-2021, optimism regarding digital activism has been met with regime adoption of digital repression. 1 This development has reinforced ‘digital authoritarianism’ in the region. 2 Digital arsenals to suppress dissent have multiplied and diversified over the past decades, following disruptive mass mobilizations that challenged the status quo in countries such as Cambodia (2013), Malaysia (2015-16), Myanmar (2021-present), Thailand (2020-21) and Indonesia (2020). In long-standing autocracies like Vietnam in which the Internet is a potential regime destabilizer, stringent cyber laws and information manipulation through cyber troops enable ruling elites to tighten their grip on the population. 3 While domestic factors are key drivers, there is reason to believe that governments in Southeast Asia‘cross-learn’ tactics of digital repression and inspire one another. 4
Digital arsenals to suppress dissent have multiplied and diversified over the past decades, following disruptive mass mobilizations that challenged the status quo in countries such as Cambodia (2013), Malaysia (2015-16), Myanmar (2021-present), Thailand (2020-21) and Indonesia (2020). In long-standing autocracies like Vietnam in which the Internet is a potential regime destabilizer, stringent cyber laws and information manipulation through cyber troops enable ruling elites to tighten their grip on the population. 3 While domestic factors are key drivers, there is reason to believe that governments in Southeast Asia‘cross-learn’ tactics of digital repression and inspire one another. 4
Digital repression encompasses various methods of social control to preemptively deter and lower the impact of protest movements. Digital repression toolkits include Internet filtering, surveillance via high-tech spyware 5 and social media monitoring, state-aligned misinformation online, 6 prosecution of activists through cyber- or information-related laws, 7 and Internet shutdowns. 8 These can help governments achieve the goal of control, in many cases, without resorting to armed clampdown of challengers.
Governments in the region possess varying degrees of digital capacities, leading to their different tactical preferences.  Based on the 2019 Digital Society Project data, the most oft-used form of digital repression in Singapore and Vietnam is prosecuting online users, while in Cambodia, it is Internet filtering. In Malaysia and Thailand, social media monitoring was the most common trend. The two remaining electoral democracies – Indonesia and the Philippines – lean toward misinformation campaigns. Myanmar seems to be the only one among its autocratic counterparts that most frequently relies on Internet shutdowns.
13 notes · View notes
drmajalis · 1 year
Text
Every now and then I think about how a game with the plot of Splinter Cell: Chaos Theory could NEVER be made today
I felt like talking about this in light of some recent news in East Asia. TL;DR but Chaos Theory, despite being a game ostensibly inspired by the writings of Tom Clancy, is essentially a political thriller where a rogue American PMC company and Japanese Admiral try to start WWIII, and where China and NORTH KOREA are kind of presented as the good guys in the conflict?! Here's a general plot summary: Japan has just created a new warfare branch, the "Information Self-Defence Force" or ISDF, headed by Admiral Toshiro Otomo. The role of the ISDF is to conduct and intercept electronic warfare, which many in Asia feel is a violation of Japan's post war constitution forbidding them from maintaining a military force capable of striking outside its borders. In response, China and North Korea mobilize a naval blockade in the Yellow Sea to intercept and search all Japanese shipping, so America sends their newest electronics warfare ship, the USS Clarence E. Walsh to the area as a show of force, carrying the NSA's top operative (and player character) Sam Fisher. While on the way, Sam is sent to Peru to rescue kidnapped American computer programmer Bruce Morgenholt, who was part of a two-man United Nations to decipher a cyber warfare weapon called the "Masse Kernels" which were part of a previous game. Sam unfortunately finds Morgenholt dead, and pursues the kidnappers to sea, where he finds they were paid for their services using a Panamanian bank as a proxy. Sam is then sent to Panama, where he finds evidence that the payment was went by the other member of the UN task force, computer programmer Abrahim Zherkezhi (and also steals $50 million in French bearer bonds in the process, best level in the game). Further implicating Zherkezhi is that both New York and Japan are hit with a Masse Kernel attack that shuts off their entire electricity grids,so Sam is sent to his Penthouse in New York to investigate, where he finds out that he has a protection detail from American PMC outfit Displace International, headed by his best friend and former war buddy, Douglas Shetland, who were also supposedly protecting Morgenholt. Reluctantly, Fisher infiltrates the offices of Displace and learns that Zherkezhi was relocated to Hokkaido for his protection, so he is sent there, meeting up with Shetland along the way, and the two watch on the news in the bar that the USS Walsh was just hit and sunk by a North Korean anti-ship missile. North Korean officials, backed by China, claim they did not intentionally fire the missile, and the Secretary of Defence claims that the Walsh's cyber warfare systems were way too advanced to be tracked and hit by a fifty year old Chinese-manufactured missile, but Sam's boss, Irving Lambert, believes that before the attack, the Walsh was hit by a Masse Kernel attack disabling it's defence systems. Fisher is sent to Hokkaido to bring Zherkezhi in for questioning, but as he witnesses a meeting between him and Shetland, the latter reveals his intentions to start a war in Asia before murdering Zherkezhi.
Fisher wants to go after Shetland, but with diplomacy rapidly deteriorating after the sinking of the Walsh, war in Korea seems inevitable, so he is instead sent to the North Korean missile battery that sank the Walsh to find proof of the North Korean claims. Fisher finds evidence of the Masse Kernals being used to force launch the missile, but before the information can be sent, North Korea crosses the DMZ and invades the South.
After a stop in Seoul to gather information from a data routing centre, Fisher learns that Shetland is meeting a third party at a bathhouse in Tokyo, which turns out to be the ISDF, who are revealed to be collaborating with Shetland to start a war. Fisher catches and kills Shetland, and is then sent to the Japanese Ministry of Defence to find out if the Japanese government itself is involved. There, Fisher eavesdrops a meeting between high ranking SDF members and finds out that it was Admiral Otomo acting alone, wishing to use the pretext of a war to restart Japanese Imperialism. The GSDF attempt to apprehend Otomo, but fail, and in retaliation, he uses the Mass Kernels to launch a North Korean missile aimed at Japan, knowing that if it hits, World War III will truly be inevitable.
Fisher stops the attack by destroying the ISDF's servers, and apprehends Otomo as he tries to commit seppuku. Otomo confesses to his actions, North Korea withdraws its forces, Displace and the ISDF are disbanded, and the Chinese Ambassador to the United States wins the noble peace prize for his efforts in trying to mediate peace in Asia. Job finished, game over. So, you can probably see why this would never be made today, right? Anything that even remotely positively portrays China, let alone North Korea in a positive light nowadays would get torn to shreds, not to mention the game makes the taboo of bringing light to how the Japanese government has never really owned up to the crimes they committed during WWII because of Cold War politics, as well as showing how Japan rebuilding its military has created lots of tensions in East Asia.
No other real point to this, I just wish we had more complex stories like this where the stereotypical "good and bad guys" don't automatically fill their roles.
20 notes · View notes
Text
ASATA Statement on Palestine | October 2023
Tumblr media
ASATA members joined hundreds of protesters in front of the Israeli consulate in San Francisco on October 8, 2023.
The Alliance of South Asians Taking Action stands in solidarity with the people of Palestine in the face of the current escalation of violence unfolding in Gaza and the West Bank. Over the last two weeks, ASATA members looked to the leadership of Palestinian activists in the San Francisco Bay Area who continue to lead protests that lift up the unrelenting resistance of those living under violent occupation. 
As we mobilized for direct actions and joined the call for Palestinian liberation, we also deepened our understanding of how the state of Israel’s settler colonial tactics are proliferated and being replicated in the Indian government’s violent occupation of Kashmir. As part of a diverse South Asian Diaspora, ASATA members clearly see the close relationship between Hindutva (Hindu Nationalism) and Zionist ideologies. As South Asians, we challenge all forms of imperialism. Thus, we oppose Zionism, a settler colonial project displacing indigenous Palestinians, resulting in the world’s largest diasporic refugee population. 
The current close relationship between India and Israel has enabled a security regime where India has adopted Israeli tactics of collective punishment (such as the arbitrary revocation of residency and citizenship rights, arbitrary detention, statewide suspension of internet, etc.) in its occupation of Kashmir.  The deployment of the Israeli hacking software Pegasus to spy on Indian journalists, lawyers, activists, academics, supreme court judges, opposition politicians, and many others must be seen in the context of the announcement by India and Israel that cyber security is a key area of cooperation between them. The NSO group, an Israeli firm that’s an expert in cyber surveillance, has in effect abetted the Indian government’s surveillance of its own citizens as it has done in a dozen other countries.  
The Israeli government’s alliance with and support of the BJP’s Hindutva agenda is part of a longer history where it has exported its violent policies and military tactics to South Asia in order to suppress resistance movements there. For example, The New York Times has reported that as early as the 1980s, Israeli intelligence agents trained their Sri Lankan counterparts in their fight against Tamil groups. Israeli human rights lawyer Eitay Mack has raised questions about Israel’s more recent role in war crimes committed during the Sri Lankan civil war, and has called for criminal investigations into the involvement of Israeli companies, officials, and individuals. 
India’s embrace of Israel is polarizing the Indian-American diaspora, and has exacerbated the islamophobia of those who subscribe to the toxic ideology of Hindutva. The US-India Political Action Committee (USINPAC) is modeled after AIPAC and the AJC, and the Hindutva lobby’s use of the accusation of “Hinduphobia” to shut down critical discourse is inspired by the Zionist lobby’s success in silencing critics of Israel’s policies by weaponizing charges of anti-semitism.  
The BJP’s fearsome “IT Cell” is a massive disinformation machine that amplifies Hindutva propaganda through an army of paid employees and volunteers that flood social media with fake news, and through a large-scale use of bots that power harassment and trolling campaigns. Many accounts known to push Hindutva content are now being used to spread disinformation about Hamas while continuing their systematic spreading of islamophobic content. 
Indeed, as documented by BOOM, one of India's most reputable fact-checking websites, India is now one of the largest sources for disinformation targeting Palestinians negatively. We call on fellow South Asians in the diaspora to condemn the demonization of Palestinians, and ensure we do not contribute to the spread of disinformation and anti-Muslim hate. 
We take inspiration from the women of India’s National Federation of Dalit Women (NFDW) who have declared their solidarity with Palestinians —  invoking the “historic oppression” and “systematic dehumanization” that both communities have faced. 
We are also in solidarity with the many anti-Zionist Jewish groups and individuals both within Israel and world-wide that are opposing the Israeli state’s attacks on Palestine, and its long standing policy of apartheid against the Palestinian people.  
We call on our fellow South Asians and South Asia- led organizations in the United States to reject the “both sides” argument that invisiblizes the experiences and dignity of the Palestinian people. We call for an immediate ceasefire and end to the ongoing siege and genocide in Gaza. We call on the US to stop arming the Israeli apartheid regime with billions’ of dollars worth of weaponry. And finally, We invite our communities to embrace the ways our histories of anti-imperialist struggles are connected so that we may build power and protect our communities against anti-Musilm hate violence and state-sponsored terrorism. Free Palestine.  
4 notes · View notes
mariacallous · 1 year
Text
A mention of North Korean hackers typically conjures images of either crippling cyberattacks or, more often, massive cryptocurrency heists. But a new report on the authoritarian state’s capabilities and tendencies paints a different picture.
The report, prepared by cyber-intelligence firm Recorded Future and shared exclusively with Foreign Policy, labels espionage as the predominant motive of North Korea’s cyberprogram. Recorded Future analyzed 273 cyberattacks over a 14-year period linked to North Korean state-sponsored groups and found that information collection was the primary motivation for more than 70 percent of them.
“The narrative seems to be that North Korea is a bunch of cybercriminals that are backed by a state, but they’re just pulling off all of this financially motivated cybercrime, and that is one aspect of their strategy,” said Mitch Haszard, a senior threat intelligence analyst at Recorded Future and lead author of the report.
“But what this report shows is that they’re still heavily focused on information collection, or cyber-espionage, and they conduct more of those operations than they do financially motivated or financial theft operations.”
Pyongyang predominantly seeks to use cyber-operations to either “gain insight into how its adversaries think” or “access to information on technologies” that will help it in a conflict with those adversaries, the report said. Government entities are the most frequent targets, followed by cryptocurrency, media, finance, defense, and nongovernmental organizations.
“North Korea’s leadership appears to be much more interested in learning about what others think of them, gathering information that can help them develop nuclear and ballistic missile technology, and stealing money to fund their regime,” the report added.
However, North Korea’s obsession with cryptocurrency is unique, and the country’s cyber-operations are one of its biggest avenues to prop up its nuclear arsenal. Anne Neuberger, the White House’s cyber czar, said at an event in Washington last month that half of the regime’s missile program is funded by cryptocurrency and cyberheists.
“There aren’t really any other states or countries that are trying to steal cryptocurrency, so North Korea is unique in that perspective, but they still do a lot of things that other states do,” Haszard said.
The heists tend to make headlines, with North Korean hackers linked to thefts worth billions of dollars from cryptocurrency exchanges around the world in recent years, with two high-profile attacks on exchanges in Estonia and California so far this year. Beyond crypto, North Korea has been linked to larger and more disruptive global attacks, starting with the crippling of Sony Pictures just under a decade ago that put its cybercapabilities on the map. That was followed by a hack of Bangladesh’s central bank that compromised the global financial transfer system known as Swift, and a crippling of the United Kingdom’s National Health Service.
However, Haszard and his colleagues found that the vast majority of North Korea’s cyberactivity goes after targets much closer to home. Nearly 80 percent of the attacks for which geographic information is available took place in Asia, according to the report. Most of that is in its immediate neighborhood: South Korea accounted for just over 65 percent of the targets among the 29 countries where attacks took place. The United States is a distant second, at 8.5 percent, and no other country accounted for more than 3 percent of North Korean attacks.
Recorded Future found that Lazarus, the most notorious and high-profile hacking group linked to the authoritarian regime, tends to go after more global targets but is not the most common perpetrator of cyberattacks. That distinction belongs to a group called Kimsuky, which mainly targets Asian government and civil society entities and accounted for more than one-third of total attacks. According to multiple U.S. law enforcement agencies, Kimsuky hackers pose as South Korean journalists, exchanging emails with their targets on the pretext of setting up interviews before sending them a link or document embedded with malware. That malware, known as BabyShark, gives hackers access to the victims’ device and communications. “Kimsuky actors have also been known to configure a victim’s email account to quietly auto-forward all emails to another actor-controlled email,” a joint cybersecurity advisory by the FBI, National Security Agency, and South Korean authorities earlier this month said.
While Pyongyang has established its ability to disrupt critical infrastructure in the West and conduct ransomware attacks, it is increasingly less likely to conduct those types of attacks compared to other cyber-capable adversaries such as Russia and China. It prefers to go smaller, faster, and more frequently, deploying more basic techniques such as stealing passwords or phishing emails, which infect systems with viruses by fooling users into clicking on dodgy links.
“The thing that I see in my tracking of North Korean threat actors is an incredible amount of activity that is generally low-sophistication in nature,” Haszard said, adding that that’s likely a matter of strategy rather than ability. “They’re achieving a lot of success doing the kind of lowest-common-denominator cyberattacks. So if it were me, why would I change?”
3 notes · View notes
youre-ackermine · 1 year
Note
For the ask game - Cyber
Terra Darling ❤️🌹❤️
Cyber: yeeesss!!! I'm online almost 24 hours a day, my Tumblr & Twitter moots live mostly in North & South America or in Asia, so I must be awake if I want to interact with them lmao
But don't worry, sometimes I fall asleep (at least for 2 hours) or I have to work / do irl stuff or I'm with my family so I'm afk 😉
Thanks for asking, I didn't mean to make you worry about me 🥺🥺 I'll touch grass & breathe fresh air & enjoy nature in a few days in the Alps 🏞️
Lots of love for my Darling 😘🌹❤️
3 notes · View notes
tushar38 · 9 days
Text
Distributed Denial-of-Service (DDoS) Protection Market: Competitive Landscape and Key Players
Tumblr media
Introduction to Distributed Denial-of-Service (DDoS) Protection market
The Distributed Denial-of-Service (DDoS) Protection market is witnessing rapid growth as cyber threats escalate across industries. As businesses increasingly digitize, the demand for advanced security solutions to mitigate DDoS attacks is surging. DDoS attacks, which aim to disrupt service availability, have evolved in complexity and frequency, driving the need for multi-layered defense systems. Key players offer solutions ranging from cloud-based protection to on-premise services, catering to the diverse needs of enterprises, governments, and critical infrastructure sectors.
The Distributed Denial-of-Service (DDoS) Protection Market is Valued USD 4.1 billion in 2024 and projected to reach USD XX billion by 2030, growing at a CAGR of 14.3% During the Forecast period of 2024-2032. As global internet use and connected devices proliferate, industries face higher risks from sophisticated DDoS attacks. The market comprises cloud, hardware, and software solutions, designed to detect, absorb, and mitigate attacks in real time. Major sectors deploying these solutions include telecom, banking, healthcare, and e-commerce. Increasing awareness of cybersecurity, growing cloud adoption, and regulatory pressure propel market demand.
Access Full Report :https://www.marketdigits.com/checkout/113?lic=s
Major Classifications are as follows:
By Component
Hardware Solutions
Software Solutions
Mitigation Techniques
Network Layer
Null Routing
Sinkholing
Scrubbing
Application Layer
Domain Name System (DNS) routing
Border Gateway Protocol (BGP) routing
Services
Professional Services
Design and Implementation
Consulting and Advisory
Training and Education
Support and Maintenance
Managed Services
By Deployment Mode
On-Premises
Cloud
Hybrid
By Organization Size
Large Enterprises
SME’s
By Application
Network
Application
Database
Endpoint
By Vertical
BFSI
IT & Telecommunication
Education
Government and Defense
Retail
Healthcare
Manufacturing
Others
Key Region/Countries are Classified as Follows:
◘ North America (United States, Canada,) ◘ Latin America (Brazil, Mexico, Argentina,) ◘ Asia-Pacific (China, Japan, Korea, India, and Southeast Asia) ◘ Europe (UK,Germany,France,Italy,Spain,Russia,) ◘ The Middle East and Africa (Saudi Arabia, UAE, Egypt, Nigeria, and South
Key Players of Distributed Denial-of-Service (DDoS) Protection market
NetScout, Akamai, Radware, Huawei Technology, Fortinet, Link11, Imperva, Cloudflare, BT, A10 Networks, Fastly, Nexusguard, Corero, RioRey, PhoenixNAP, Allot, StrataCore, Sucuri, Verisign, StackPath, Seceon, Haltdos, DDoS-Guard, Indusface, Activereach, Mlytics, and Others.
Market Drivers in Distributed Denial-of-Service (DDoS) Protection Market:
Several factors are propelling the growth of the DDoS Protection market:
Increased Cyber Threats: The rise in large-scale DDoS attacks targeting businesses of all sizes necessitates robust protection systems.
Digital Transformation: With cloud adoption accelerating, the need for secure, scalable protection has grown.
Government Regulations: Increasing regulatory requirements for data security encourage businesses to adopt DDoS protection solutions.
Market Challenges in Distributed Denial-of-Service (DDoS) Protection Market:
The DDoS protection market faces several key challenges:
Evolving Threat Landscape: Attackers continuously adapt, developing more sophisticated and varied attack strategies that make protection solutions complex.
Cost of Implementation: High initial costs and ongoing maintenance of DDoS protection solutions can deter smaller businesses from adopting them.
False Positives: DDoS protection systems must balance security and access, but overly aggressive filters can block legitimate traffic, negatively affecting user experience.
Market Opportunities in Distributed Denial-of-Service (DDoS) Protection Market:
Cloud-based Protection Solutions: Cloud-based DDoS protection offers scalability and flexibility, attracting companies with dynamic workloads and decentralized operations.
AI and Machine Learning: Integrating AI-driven analytics into DDoS protection can improve real-time detection and response to emerging threats.
SME Adoption: As DDoS solutions become more affordable, small and medium-sized enterprises (SMEs) represent a vast untapped market for vendors.
Conclusion:
The Distributed Denial-of-Service (DDoS) Protection market is positioned for robust growth, driven by increasing cyber threats and the expanding digital economy. Companies must continuously innovate to stay ahead of attackers, offering scalable, cost-effective solutions that meet regulatory and operational needs. Challenges such as cost and technical complexity remain, but advancements in AI, cloud solutions, and the growing awareness of cybersecurity's critical role present ample opportunities for vendors and businesses alike.
0 notes
harsh24mr · 14 days
Text
Veterinary Stereotactic Radiosurgery System Market, Global Outlook and Forecast 2024-2030
The global Veterinary Stereotactic Radiosurgery System market was valued at US$ 17.67 million in 2023 and is projected to reach US$ 29.35 million by 2030, at a CAGR of 7.3% during the forecast period. The influence of COVID-19 and the Russia-Ukraine War were considered while estimating market sizes.
Radioactive medical equipment for animals can send high-dose radiation focused on a small and precise area.
Get FREE Sample of this Report at https://www.24marketreports.com/report-sample/global-veterinary-stereotactic-radiosurgery-system-forecast-2024-2030-658
Report Sample includes:
Table of Contents
List of Tables & Figures
Charts
Research Methodology
This report aims to provide a comprehensive presentation of the global market for Veterinary Stereotactic Radiosurgery System, with both quantitative and qualitative analysis, to help readers develop business/growth strategies, assess the market competitive situation, analyze their position in the current marketplace, and make informed business decisions regarding Veterinary Stereotactic Radiosurgery System. This report contains market size and forecasts of Veterinary Stereotactic Radiosurgery System in global, including the following market information: Global Veterinary Stereotactic Radiosurgery System Market Revenue, 2019-2024, 2025-2030, ($ millions) Global Veterinary Stereotactic Radiosurgery System Market Sales, 2019-2024, 2025-2030, (K Units) Global top five Veterinary Stereotactic Radiosurgery System companies in 2023 (%) The US Market is Estimated at $ Million in 2023, While China is Forecast to Reach $ Million. Gamma Knife Segment to Reach $ Million by 2030, with a % CAGR in the next six years.
The global key manufacturers of Veterinary Stereotactic Radiosurgery System include PetCure Oncology, Varian Medical Systems, Accuray and Elekta AB, etc. in 2023, the global top five players have a share approximately % in terms of revenue.
We surveyed the Veterinary Stereotactic Radiosurgery System manufacturers, suppliers, distributors and industry experts on this industry, involving the sales, revenue, demand, price change, product type, recent development and plan, industry trends, drivers, challenges, obstacles, and potential risks.
Total Market by Segment: Global Veterinary Stereotactic Radiosurgery System Market, by Type, 2019-2024, 2025-2030 ($ Millions) & (K Units) Global Veterinary Stereotactic Radiosurgery System Market Segment Percentages, by Type, 2023 (%) Gamma Knife PBRT Cyber Knife Global Veterinary Stereotactic Radiosurgery System Market, by Application, 2019-2024, 2025-2030 ($ Millions) & (K Units) Global Veterinary Stereotactic Radiosurgery System Market Segment Percentages, by Application, 2023 (%) Animal Hospital Research center other Global Veterinary Stereotactic Radiosurgery System Market, By Region and Country, 2019-2024, 2025-2030 ($ Millions) & (K Units) Global Veterinary Stereotactic Radiosurgery System Market Segment Percentages, By Region and Country, 2023 (%) North America (United States, Canada, Mexico) Europe (Germany, France, United Kingdom, Italy, Spain, Rest of Europe) Asia-Pacific (China, India, Japan, South Korea, Australia, Rest of APAC) The Middle East and Africa (Middle East, Africa) South and Central America (Brazil, Argentina, Rest of SCA)
Competitor Analysis The report also provides analysis of leading market participants including: Key companies Veterinary Stereotactic Radiosurgery System revenues in global market, 2019-2024 (Estimated), ($ millions) Key companies Veterinary Stereotactic Radiosurgery System revenues share in global market, 2023 (%) Key companies Veterinary Stereotactic Radiosurgery System sales in global market, 2019-2024 (Estimated), (K Units) Key companies Veterinary Stereotactic Radiosurgery System sales share in global market, 2023 (%) Further, the report presents profiles of competitors in the market, key players include: PetCure Oncology Varian Medical Systems Accuray Elekta AB Outline of Major Chapters: Chapter 1: Introduces the definition of Veterinary Stereotactic Radiosurgery System, market overview. Chapter 2: Global Veterinary Stereotactic Radiosurgery System market size in revenue and volume. Chapter 3: Detailed analysis of Veterinary Stereotactic Radiosurgery System manufacturers competitive landscape, price, sales and revenue market share, latest development plan, merger, and acquisition information, etc. Chapter 4: Provides the analysis of various market segments by type, covering the market size and development potential of each market segment, to help readers find the blue ocean market in different market segments. Chapter 5: Provides the analysis of various market segments by application, covering the market size and development potential of each market segment, to help readers find the blue ocean market in different downstream markets. Chapter 6: Sales of Veterinary Stereotactic Radiosurgery System in regional level and country level. It provides a quantitative analysis of the market size and development potential of each region and its main countries and introduces the market development, future development prospects, market space of each country in the world. Chapter 7: Provides profiles of key players, introducing the basic situation of the main companies in the market in detail, including product sales, revenue, price, gross margin, product introduction, recent development, etc. Chapter 8: Global Veterinary Stereotactic Radiosurgery System capacity by region & country. Chapter 9: Introduces the market dynamics, latest developments of the market, the driving factors and restrictive factors of the market, the challenges and risks faced by manufacturers in the industry, and the analysis of relevant policies in the industry. Chapter 10: Analysis of industrial chain, including the upstream and downstream of the industry. Chapter 11: The main points and conclusions of the report.
Get the Complete Report & TOC at https://www.24marketreports.com/lif…ic-radiosurgery-system-forecast-2024-2030-658 CONTACT US: 276 5th Avenue, New York , NY 10001,United States International: (+1) 646 781 7170 Follow Us On linkedin :- https://www.linkedin.com/company/24-market-reports
Get FREE Sample of this Report at https://www.24marketreports.com/report-sample/global-veterinary-stereotactic-radiosurgery-system-forecast-2024-2030-658
0 notes