At #AIWA! NO! News, we focus on people and events that affect people's lives. We bring topics to light that often go under-reported, listening to all sides of the story and giving a 'voice to the voiceless'.
British Prime Minister Theresa May has admitted the country faces a political crisis as she prepares to ask the European Union to allow Britain to delay Brexit.
She will deliver her plea for extra time ahead of a Brussels summit on Thursday at which EU leaders are expected to spell out their exasperation over the chaos surrounding Brexit. The turmoil has been triggered by two crushing Commons defeats for her withdrawal plans and her continuing failure to win over Tory Eurosceptics and DUP MPs to supporting her Brexit blueprint.
It has been compounded by Speaker John Bercow’s warning that she cannot make a third attempt to win approval for her proposals unless they are substantially rewritten.
The Prime Minister’s spokesman said she told MPs last week that “we would be in crisis” if they rejected her plans. EU Chief Brexit negotiator Michel Barnier says something new is needed if Article 50 is to be extended [Getty Images]
Referring to Mr Bercow’s surprise intervention, he added: “I think events yesterday tell you that that situation has come to pass.” Downing Street has admitted that time has run out for Britain to leave the EU on its scheduled departure date of 29 March and acknowledged the need for more time. Its preference is to hold a third “meaningful vote” next week – possibly on Thursday 28 March – followed by a short extension to pass the legislation required to pass the necessary legislation for Brexit.
Mrs May will make her case in a letter to Donald Tusk, the European Council president, to be sent on Wednesday. She is expected to call for postponement of Britain’s departure by at least three months, although reports have suggested that she could raise the prospect a far longer delay. However, Brussels warned that she will only be granted a lengthy delay if she produces a “concrete plan” for using the extra time.
The ultimatum was delivered by Michel Barnier, the EU’s chief Brexit negotiator. In words that appeared to open the door to a soft Brexit, second referendum or even general election, Mr Barnier said extra time would be granted for a “new event or a new political process”.
Is an extension useful?
It came as Germany, France and Ireland signalled their frustration at the latest impasse in the Brexit process. But Mr Barnier told journalists: “It is our duty to ask whether this extension would be useful because an extension will be something which would extend uncertainty and uncertainty costs.” He warned that the UK would need to propose “something new” to justify a lengthy extension, he said. It has been suggested that Mrs May could ask for a lengthy extension to Article 50, with the option of an early break in May or June if she manages to get her Withdrawal Agreement through Parliament. But Mr Barnier said it was time for the government to spell out a clear preference, adding: “it’s either one or the other, isn’t it?”
Michael Roth, Germany’s Europe minister, said EU member states were “really exhausted” by the UK’s approach to talks, warning the situation was “not just a game”. His French counterpart Nathalie Loiseau said Ms May would have to present “something new” that did not just result in an extension of “the same deadlock”. Simon Coveney, the Irish foreign minister, said Britain would need to provide a “very persuasive plan” to accompany its request for a delay to Brexit. He added: “It’s also been very clear that there is absolutely no appetite to reopen the Withdrawal Agreement or the detail of that.”
March 14 (UPI) — Boeing stands to lose billions over the fallout from the global grounding of its 737 Max 8 aircraft and airlines are reshuffling flights to accommodate concern for the new airliner’s safety.
After days of resisting, Boeing made a recommendation to the Federal Aviation Administration Wednesday to temporarily suspend flights of its 737 Max 8 and Max 9 aircraft. Many others, including the European Union, Britain and Canada, had already grounded the plane and barred flights in their airspace.
The decision came three days after an Ethiopian Airlines 737 Max 8 crashed and killed all 157 people aboard. The crash had many similarities to an accident involving another Max 8, flown by Indonesia’s Lion Air, in October.
“We are doing everything we can to understand the cause of the accidents in partnership with the investigators, deploy safety enhancements and help ensure this does not happen again, Boeing CEO Dennis Muilenburg said.
Boeing’s Max series aircraft replaced the 737-800 and made its first commercial flight in 2017. A high-density version of the Max 8, the Max 200, was set to enter service next month. It’s unclear whether the Ethiopian crash will affect its launch. The Max 9, with a longer fuselage, entered service last year. The new planes cost about $50 million each.
Wall Street firms Melius Research and Jefferies estimate the grounding could cost Boeing between $1 billion and $5 billion. The estimates are based on the planes being grounded for three months. Boeing reported a profit of $10.6 billion in 2018.
This isn’t the first time this decade Boeing has faced trouble with a new aircraft model. In 2013, it grounded the new 787 Dreamliner after lithium ion batteries caught fire on multiple flights. With only about 50 Dreamliners in service at the time, however, the impact was smaller.
Wednesday’s decision sent U.S. carriers United, American and Southwest scrambling to replace Max 8 and Max 9 aircraft on their flight schedules. American and Southwest fly the Max 8 and United has Max 9s. American had been flying more than 80 Max 8 flights per day.
Southwest said it plans to operate its schedule with every available airplane in the fleet to meet the changes. The airline won’t charge passengers to change flights within 14 days of the original date of travel.
“We have been constant contact with the FAA and Boeing since Ethiopian Airlines’ accident,” Southwest said in a statement. “While we remain confident in the Max 8 after completing more than 88,000 flight hours accrued over 41,000 flights, we support the actions of the FAA and other regulatory agencies and governments across the globe that have asked for further review of the data — including information from the flight data recorder.”RELATED Dow Jones rebounds from Boeing losses, closes up 201 points
Southwest CEO Gary Kelly said the carrier is working to “minimize disruptions to our customers’ travel plans.”
KIEV|AIWA! NO!| — To see the warfare of the future, head to the top floor of a nondescript office tower on a potholed street on the scruffy outskirts of Ukraine’s capital. There, next to a darkened conference room, engineers sit at dark gray monitors, waging war with lines of code.
“Attacks are happening every day,” says Oleh Derevianko, founder of the Ukrainian cybersecurity firm that employs them, Information Systems Security Partners. “We never thought we were going to be the front line of cyber and hybrid war.”
There may be no better place to witness cyber conflict in action than Ukraine today. Open warfare with Russia, a highly skilled, computer-literate pool of talent and a uniquely vulnerable political, economic and IT environment have made the country the perfect sandbox for those looking to test new cyberweapons, tactics and tools.
“Ukraine is live-fire space,” says Kenneth Geers, a veteran cybersecurity expert and senior fellow at the Atlantic Council who advises NATO’s Tallinn cyber center and spent time on the ground in Ukraine to study the country’s cyber conflict. Much like global powers fought proxy wars in the Middle East or Africa during the Cold War, Ukraine has become a battleground in a cyberwar arms race for global influence.
Derevianko’s outfit works closely with the Ukrainian government and its U.S. and European allies to fend off onslaughts against the country’s networks. On the other side of the virtual front line: Not just sophisticated Russian-affiliated hacker groups like Fancy Bear, Cozy Bear and Sandworm — the group behind “NotPetya,” the most devastating cyberattack to date — but also hosts of other governmental, nongovernmental and criminal players testing out their capabilities on the country’s networks.
“They’re not only testing destruction but also testing your reflexes” — Oleh Derevianko, founder of Information Systems Security Partners
Activity has spiked ahead of presidential elections in March, says Derevianko. Since November, hacker groups have been shelling Ukrainian magistrates, government officials, attorneys and others with emails that contain attachments with malware and viruses — sometimes disguised as Christmas greetings, or as messages from the prime minister’s office — in what Derevianko describes as “mass phishing.”
Russian hacker groups are repeatedly attempting to get into the country’s systems, Ukraine’s national security service told POLITICO. Critical infrastructure and election systems are under constant stress, it said.
“They’re not only testing destruction but also testing your reflexes,” says Derevianko.
The war in eastern Ukraine has given Russian-affiliated hackers the opportunity to perfect their ability to launch cyberattacks with a series of major intrusions in Ukraine over the past few years.
“The annexation of Crimea and war in Donbas, it has created a volatile political environment,” says Merle Maigre, the former head of NATO’s cyberdefense center in Tallinn who is now executive vice president at the Estonian cybersecurity firm CybExer.
Even as Russian tanks crossed the physical border into eastern Ukraine in the spring of 2014, Russian-affiliated hackers were sending malicious code onto Ukraine’s IT systems, providing political chaos as a smokescreen.
Three days before the presidential election in May 2014, hackers broke into Ukraine’s Central Election Commission and disabled parts of the network using advanced cyberespionage malware, according to a report by the International Foundation of Electoral Systems funded by the U.S. and U.K. and seen by POLITICO. The Central Election Commission was hit again later that year, when hackers took down its website ahead of a parliamentary vote in October.
Large-scale attacks followed the next year, and again in 2016. The targets, this time, were companies running Ukraine’s power grid. In 2015, hackers used so-called BlackEnergy malware, dropped on companies’ networks using spear phishing attacks that tricked employees into downloading from mock emails. So-called KillDisk malware later destroyed parts of the grid.
The resulting blackouts — the world’s first known successful cyberattack on an energy company at scale — affected about 230,000 Ukrainians for up to six hours. A year later, in December 2016, hackers relied on even more sophisticated tools to successfully turn off the lights in large parts of the Ukrainian capital yet again.
But the widest-reaching attack — and the world’s most financially damaging to date — took place in 2017, when hackers combined code tested in the power grid attacks with malware known as “Petya” and a security vulnerability initially discovered by the U.S. National Security Agency called EternalBlue.
The resulting malware — “NotPetya” — compromised the software of a small tech firm called Linkos Group, providing it access to the computers of utility companies, banks, airports and government agencies in Ukraine. It also crippled multinationals like the Danish shipping giant Maersk, logistics giant FedEx, pharma company Merck and other major corporations.
The NotPetya attack — which cost an estimated $10 billion to clean up — was “as close to cyberwar” as we’ve come, says Geers. “This was the most damaging attack in history, of a scale and cost that would far exceed a missile fired from the Donbas into Kiev.”
The free-for-all environment of a country at war has turned Ukraine into a magnet for players of all types looking to test their cyber capabilities. In addition to hostile Russian hackers, the country has attracted cybersecurity firms looking to get close to the action, Western intelligence agencies seeking to understand the nature of modern conflict and criminals looking to make a buck.
“Donbas is basically lit up with malware. That’s intelligence services trying to figure out what Russia is going to do next in Donbas, trying to figure out what [Russian President Vladimir] Putin is up to,” says Geers, the Atlantic Council’s cybersecurity expert. “The U.S., China, Russia, Israel, Turkey, Iran — it’s coming from everywhere.”
In addition to the ongoing military conflict, Ukraine offers a tempting target because so many of the country’s computers run pirated software, which doesn’t receive standard security patches. And, because it is well integrated with Western European internet networks, the country offers a backdoor to hack the rest of Europe.
Constant attempted attacks by hacker groups such as Fancy Bear, Cozy Bear and Turla are putting critical infrastructure and election systems under constant stress, Ukraine’s national security told POLITICO.
The goal, say experts, is to test the West’s defenses. The U.S. and other intelligence agencies have responded by moving into the Ukrainian networks to pick up the signals.
“Getting intelligence ahead of time is important,” says Dymtro Shymkiv, the former head of Microsoft in Ukraine and President Petro Poroshenko’s chief adviser on cyber between 2014 and 2018. “Some of the viruses and malware in the energy blackouts in Ukraine were later found in the U.S. and Israel.”
Ukrainian authorities, he says, exchange cyber intel for help in fending off the hackers.
“Whenever we identified malware, we uploaded it to special services where manufacturers of anti-virus could analyze it,” says Shymkiv. His cyber team sometimes worked with expert communities on platforms like Hybrid Analysis or ANY.RUN, a technique known as “cloud-based sandboxing,” where researchers can access the data and get in touch with those affected by malware, he says.
“U.S. counterparts, they are requesting a lot of information and interacting very productively” — Roman Boyarchuk, head of Ukraine’s State Cyber Protection Center
Washington has invested heavily in cyber resilience in Ukraine since 2014. USAID alone freed up a pot of $10 million (€8.9 million) for cybersecurity defenses, and a sizeable part of its much larger budget to support Ukraine goes to securing IT systems in the country.
U.S. companies, such as tech giant Microsoft, have also beefed up their presence in the country. Hardware leader Cisco has a strong foothold that includes its renowned cyberintelligence unit Talos. And U.S. cyber firm CrowdStrike, known for bullishly calling out state-sponsored hacks, is also active in the country, as are many others.
The U.S. and Europe are also investing in seminars and training for Ukrainian cybersecurity staff, and are involved in day-to-day assistance via the International Foundation for Electoral Systems (IFES), an international organization backed by democracies worldwide to help out with holding elections, and other channels.
“U.S. counterparts, they are requesting a lot of information and interacting very productively,” says Roman Boyarchuk, the head of Ukraine’s State Cyber Protection Center, the authority tasked with fending off attackers from government networks. American and European cybersecurity authorities regularly ask for more details about his agency’s analysis of major threats, he says.
Activity has increased ahead of Ukraine’s national election in March, experts say, as smaller groups and individual hackers and criminals look for financial gain.
“They’re scanning the networks and sending a lot of malware in order to find the breaches, the vulnerabilities,” says Boyarchuck, of the national cyber emergency team. “They are taking control, recording this control, putting it into databases and selling it.”
The hackers then find buyers for these credentials or access into confidential networks. Large data sets are sold on dark web marketplaces to anyone willing to pay the price.
“Everyone is buying it,” says Boyarchuk. “Corporate competitors, state actors, anybody.”
Fears of contagion
For Kiev’s cyber helpers, the goal is not just to help out a developing country under pressure. As Ukraine becomes ever more integrated with the West, there’s a strong fear of contagion. A successful cyberattack in Kiev, they fear, can easily slip the country’s borders and infect computers across the globe.
That’s become especially true following Ukraine’s shift toward the West, which triggered Russia’s aggression. The country’s 2014 Association Agreement with the EU came with a “deep and comprehensive free-trade agreement” in place since 2016 that has strengthened economic ties. And with the increase in trade has come added data flows and interactions in its internet networks.
The 2017 “NotPetya” attack was a painful example of the risks that come with this kind of entanglement: An attack starting in a small tech firm in Ukraine spread to companies and government agencies across the world, grinding the business of international heavy-hitters to a halt.
“We provided them with political support, we’ve supported Ukraine in providing guns and ammo. Now we’re moving to cyber” — Edvinas Kerza, Lithuania’s vice minister of national defense
NotPetya “was when everybody realized how vulnerable we are when Ukraine gets hit,” says Maigre, the former head of NATO’s cyberdefense center. “It easily blows over to Europe and beyond.”
For the EU, in particular, the attack underlined the urgency of beefing up Ukraine’s cyberdefenses.
Since then, European countries have set up bilateral assistance deals. Estonia, for example, is heavily involved in helping Ukrainian authorities set up a secure electoral IT system. Lithuania is also active, according to Edvinas Kerza, the country’s vice minister of national defense.
“We provided them with political support, we’ve supported Ukraine in providing guns and ammo,” says Kerza. “Now we’re moving to cyber.”
The EU’s eye is now on securing the upcoming presidential election at the end of March.
“We strongly expect Russia will try to influence the course of Ukraine’s presidential and parliamentary elections in 2019,” Ukraine’s security service said in an email, adding that the greatest threat comes from special services launching “purposeful, long-term cyberattacks with state interests in mind.”
Above all, the March vote could provide valuable insight for the EU, as it braces for cyberattacks on its European election at the end of May. That vote — in which voters in 27 countries will choose a new European Parliament and by extension decide who sits at the helm of the EU’s top institutions — is uniquely vulnerable to interference.
What happens in Kiev today could easily happen in Berlin, Rome or Amsterdam tomorrow, experts say. Ukraine “is sort of like a litmus test,” says Maigre. The stream of phishing emails, the data sold on the dark web, the new types of malware — all of it can pop up west of Ukraine at any time. “That’s why it is interesting to see how it all plays out in the elections,” she says.
Microsoft Corp on Wednesday said it will offer its cyber security service AccountGuard to 12 new markets in Europe including Germany, France and Spain, to close security gaps and protect customers in political space from hacking.
(Reuters) (AIWA! NO!)- Microsoft Corp on Wednesday said it had discovered hacking targeting democratic institutions, think tanks and non-profit organizations in Europe and plans to offer a cyber security service to several countries to close security gaps.
The attacks occurred between September and December 2018, targeting employees of the German Council on Foreign Relations and European offices of The Aspen Institute and The German Marshall Fund, the company said here in a blog post.
Microsoft said the activity, which was found through the company’s Threat Intelligence Center and Digital Crimes Unit, targeted 104 employee accounts in Belgium, France, Germany, Poland, Romania, and Serbia.
Microsoft said many of the attacks originated from a group called Strontium, which the company has previously associated with the Russian government.
Strontium, one of the world’s oldest cyber espionage groups, has also been called APT 28, Fancy Bear, Sofancy and Pawn Storm by a range of security firms and government officials. Security firm CrowdStrike has said the group may be associated with the Russian military intelligence agency GRU.
Microsoft said it will expand its cyber security service AccountGuard to 12 new markets in Europe including Germany, France and Spain to help customers secure their accounts.
The AccountGuard service will also be available in Sweden, Denmark, Netherlands, Finland, Estonia, Latvia, Lithuania, Portugal and Slovakia.
Ahead of a critical European Parliament election in May, German officials are trying to bolster cyber security after a far-reaching data breach by a 20-year-old student laid bare the vulnerability of Europe’s largest economy.
AIWA! NO!|European nations must take back hundreds of Islamic State group fighters captured in Syria, US President Donald Trump has said, after a delay in announcing what he said would be the end of the “caliphate”.
The pending US pullout set off a countdown for governments whose citizens, having joined IS, were captured by the US-backed, Kurdish-led Syrian Democratic Forces (SDF).
“The United States is asking Britain, France, Germany and other European allies to take back over 800 ISIS fighters that we captured in Syria and put them on trial,” Mr Trump said in a tweet, using another acronym for IS.
“The Caliphate is ready to fall. The alternative is not a good one in that we will be forced to release them. The US does not want to watch as these ISIS fighters permeate Europe, which is where they are expected to go.”
When that happens, the risk is high that “foreign terrorist fighters” will escape SDF control, posing a new threat.
For about two weeks, the Trump administration has been pushing its allies to take their citizens home, and the US said it was ready to help in the repatriation, but time has been running out.
Several countries, including France, that have chosen to leave the jihadists in SDF detention now confront a diplomatic, legal, political and logistical puzzle.
“We do so much, and spend so much – Time for others to step up and do the job that they are so capable of doing. We are pulling back after 100% Caliphate victory!” Mr Trump said in his tweets.
On Friday, he said announcements on the fall of the caliphate would be made “over the next 24 hours,” but that deadline came and went.
An SDF commander said his US-backed forces slowed their advance to protect civilians.
The jihadists declared a “caliphate” in large parts of Syria and neighbouring Iraq in 2014, but have since lost all but a tiny patch of territory near the Iraqi border.
Mr Trump’s Syria pullout has highlighted the deep transatlantic rift that emerged under his presidency, and the differing views of the two sides were on display Saturday at a security conference in Munich.
A French government source criticised the Trump administration’s approach as “we’re leaving, you’re staying” and added: “They’re trying to manage the consequences of a hasty decision and making us carry the responsibility.”