In a post on their home page, the Flock developers have announced that support for their Chromium-based social web browser will officially be discontinued on 26 April 2011. Thanking their "loyal users" for their support, the developers encourage the Flock community to migrate to another browser.
Flock began life as a cross-platform browser start-up in April 2005. Distinguishing itself from other browsers, Flock automatically managed updates and media from several popular social services, including MySpace, Facebook, Bebo, Digg, YouTube and Twitter.
Prior to version 3.x, the browser was based on Mozilla's Gecko HTML rendering engine, the same used by the 3.x branch of Firefox. However, when the Flock 3 beta arrived, it dropped the engine used by Firefox and switched to Google's open source Chromium browser platform. The last major update to Flock was version 3.5 from late November 2010; three point updates were later released to address various bugs.
Continued : http://www.h-online.com/security/news/item/Chromium-based-Flock-social-web-browser-is-no-more-1227009.html
Also: Flock Browser Enters Death Spiral After Devs Leave for Zynga
Reply 1 : NEWS - April 13, 2011
In parallel with its release of 17 bulletins on Patch Tuesday this month, Microsoft also unveiled two new tools that are meant to help make a couple of common exploitation scenarios more difficult for attackers.
The company released a tool called Office File Validation for some older versions of Office, including Office 2003 and 2007. The feature is specifically designed to give users information about whether there's a potentially malicious component in an Office file that the user is trying to open. When the user attempts to open a file, the Office File Validation tool will inspect it and look for any signs of malicious behavior. If there's a problem, the user will get a warning dialog box giving him the opportunity to cancel the operation.
Attackers in the past few months have taken to embedding malicious Flash files inside Word and Excel documents as part of spear phishing campaigns. This was the primary attack vector used to compromise RSA last month.
"Office File Validation helps detect and prevent a kind of exploit known as a file format attack. File format attacks exploit the integrity of a file, and occur when the structure of a file is modified with the intent of adding malicious code. Usually the malicious code is run remotely and is used to elevate the privilege of restricted accounts on the computer. As a result, an attacker could gain access to a computer that was not previously accessible," Microsoft said in its advisory on the validation tool.
"This could enable an attacker to read sensitive information from the computer's hard disk drive or to install malware, such as a worm or a key logging program. The Office File Validation feature helps prevent file format attacks by scanning and validating files before they are opened. To validate files, Office File Validation compares a file's structure to a predefined file schema, which is a set of rules that define what a readable file looks like. If Office File Validation detects that a file's structure does not follow all rules described in the schema, the file does not pass validation."
The second enhancement Microsoft pushed out on Tuesday is an update to winload.exe, the component that loads Windows. The update is designed to help prevent some techniques that rootkits use to evade detection and remain persistent on infected machines.
"For a rootkit to be successful it must stay hidden and persistent on a system. One way we have seen rootkits hide themselves on 64-bit systems is bypassing driver signing checks done by winload.exe. While the update itself won't remove a rootkit, it will expose an installed rootkit and give your anti-malware software the ability to detect and remove the rootkit," Microsoft's Dustin Childs said.
https://threatpost.com/en_us/blogs/microsoft-pushes-out-two-new-security-tools-041211
The company released a tool called Office File Validation for some older versions of Office, including Office 2003 and 2007. The feature is specifically designed to give users information about whether there's a potentially malicious component in an Office file that the user is trying to open. When the user attempts to open a file, the Office File Validation tool will inspect it and look for any signs of malicious behavior. If there's a problem, the user will get a warning dialog box giving him the opportunity to cancel the operation.
Attackers in the past few months have taken to embedding malicious Flash files inside Word and Excel documents as part of spear phishing campaigns. This was the primary attack vector used to compromise RSA last month.
"Office File Validation helps detect and prevent a kind of exploit known as a file format attack. File format attacks exploit the integrity of a file, and occur when the structure of a file is modified with the intent of adding malicious code. Usually the malicious code is run remotely and is used to elevate the privilege of restricted accounts on the computer. As a result, an attacker could gain access to a computer that was not previously accessible," Microsoft said in its advisory on the validation tool.
"This could enable an attacker to read sensitive information from the computer's hard disk drive or to install malware, such as a worm or a key logging program. The Office File Validation feature helps prevent file format attacks by scanning and validating files before they are opened. To validate files, Office File Validation compares a file's structure to a predefined file schema, which is a set of rules that define what a readable file looks like. If Office File Validation detects that a file's structure does not follow all rules described in the schema, the file does not pass validation."
The second enhancement Microsoft pushed out on Tuesday is an update to winload.exe, the component that loads Windows. The update is designed to help prevent some techniques that rootkits use to evade detection and remain persistent on infected machines.
"For a rootkit to be successful it must stay hidden and persistent on a system. One way we have seen rootkits hide themselves on 64-bit systems is bypassing driver signing checks done by winload.exe. While the update itself won't remove a rootkit, it will expose an installed rootkit and give your anti-malware software the ability to detect and remove the rootkit," Microsoft's Dustin Childs said.
https://threatpost.com/en_us/blogs/microsoft-pushes-out-two-new-security-tools-041211
Reply 2 : NEWS - April 13, 2011
..Account Protection
Today Yahoo! is enhancing account security by allowing users to monitor their recent login activity and consequently better protect their account access. Online accounts are regularly phished or hijacked. Abusers can then use these compromised accounts to send email spam or defraud unsuspecting users. The latest incident of email breach at Dallas-based Epsilon, where millions of stolen email addresses potentially could be used for targeted "spear-phishing" further emphasizes the importance of safeguarding your online account. In fact, I was among the millions of consumers who received an alert email from Chase Bank regarding the Epsilon security breach. Everyone is at risk at any time.
Being able to view your Yahoo! account login activity will allow you to monitor and confirm any suspicious event before taking the correct course of action to remedy it. A detected suspicious login event is highlighted by an "alert" icon - see the screenshot below. You should then take the recommended actions including:
• Changing your password;
• Setting up a Yahoo! sign-in seal; and
• Updating your account security questions.
To access the new "Login Activity" page, simply navigate to Yahoo! Account Info and click on the View your recent login activity link.
Continued : http://developer.yahoo.com/blogs/ydn/posts/2011/04/yahoo-enables-monitoring-of-login-activity-for-better-account-protection/
Today Yahoo! is enhancing account security by allowing users to monitor their recent login activity and consequently better protect their account access. Online accounts are regularly phished or hijacked. Abusers can then use these compromised accounts to send email spam or defraud unsuspecting users. The latest incident of email breach at Dallas-based Epsilon, where millions of stolen email addresses potentially could be used for targeted "spear-phishing" further emphasizes the importance of safeguarding your online account. In fact, I was among the millions of consumers who received an alert email from Chase Bank regarding the Epsilon security breach. Everyone is at risk at any time.
Being able to view your Yahoo! account login activity will allow you to monitor and confirm any suspicious event before taking the correct course of action to remedy it. A detected suspicious login event is highlighted by an "alert" icon - see the screenshot below. You should then take the recommended actions including:
• Changing your password;
• Setting up a Yahoo! sign-in seal; and
• Updating your account security questions.
To access the new "Login Activity" page, simply navigate to Yahoo! Account Info and click on the View your recent login activity link.
Continued : http://developer.yahoo.com/blogs/ydn/posts/2011/04/yahoo-enables-monitoring-of-login-activity-for-better-account-protection/
Reply 3 : NEWS - April 13, 2011
From the CA Security Advisor Research Blog:
CA ISBU came across an active spam email campaign containing a malware as file attachment, as seen on [Figure 1]. The spam mail informs the recipient that their "Reqest" has been rejected. It requires recipients to check the attachment containing the PDF document for more information. [Screenshot]
Distinctive Spam Email Characteristics
The email contains the Subject: Reqest rejected
The email contains the Body:
Dear Sirs,
Thank you for your letter!
Unfortunately we can not confirm your request!
More information attached in document below.
Thank you
Best regards
File Attachment: EX-38463.pdf.zip
The file EX-38463.pdf.zip contains a file EX-38463.pdf.exe which CA detects as Win32/SillyDl.XRH.
If the file EX-38463.pdf.exe was executed, it will connect to hdjfskh.net to download and execute the file pusk.exe which is a variant of Win32/FakeAV.
The downloaded FakeAV is known using different names as it uses a template to construct its product name based on the infected system's Windows operating system version.
Below is the format it uses, where <OS Version> can be XP, Vista or Win7.
Continued : http://community.ca.com/blogs/securityadvisor/archive/2011/04/13/beware-if-you-got-your-reqest-rejected.aspx
CA ISBU came across an active spam email campaign containing a malware as file attachment, as seen on [Figure 1]. The spam mail informs the recipient that their "Reqest" has been rejected. It requires recipients to check the attachment containing the PDF document for more information. [Screenshot]
Distinctive Spam Email Characteristics
The email contains the Subject: Reqest rejected
The email contains the Body:
Dear Sirs,
Thank you for your letter!
Unfortunately we can not confirm your request!
More information attached in document below.
Thank you
Best regards
File Attachment: EX-38463.pdf.zip
The file EX-38463.pdf.zip contains a file EX-38463.pdf.exe which CA detects as Win32/SillyDl.XRH.
If the file EX-38463.pdf.exe was executed, it will connect to hdjfskh.net to download and execute the file pusk.exe which is a variant of Win32/FakeAV.
The downloaded FakeAV is known using different names as it uses a template to construct its product name based on the infected system's Windows operating system version.
Below is the format it uses, where <OS Version> can be XP, Vista or Win7.
Continued : http://community.ca.com/blogs/securityadvisor/archive/2011/04/13/beware-if-you-got-your-reqest-rejected.aspx
Reply 4 : NEWS - April 13, 2011
Malaysia's top news website, Malaysiakini.com, was the victim of a distributed denial-of-service (DDoS) attack yesterday which rendered it unreachable.
It's unclear who instrumented the attack or what was their intention, but it coincided with the start of elections in Sarawak, the largest Malaysian state located on the island of Borneo.
Malaysiakini provides news in English, Malay, Chinese and Tamil and has over 1.6 million monthly unique visitors. Since mid-2008, the website is the most popular online news source in the Asian country.
The attack was so powerful that both data centers housing the site's servers were affected. JARING, one of Malaysia's top ISPs that operates one of the centers also reported service disruptions across several regions at around the same time.
"A cyber attack beginning at 11am today shut down Malaysiakiniservers simultaneously, making the website inaccessible to readers.
"The Malaysiakini technical team has determined it to be a denial-of-service attack, where an attacker uses computers in different parts of the world to swarm Malaysiakini servers to the point that they are unable to cope with the massive traffic.
"Both our servers, which are hosted at two data centres - TM Brickfields and Jaring - have been affected by the attack," Malaysiakini's official announcement reads.
Continued : http://news.softpedia.com/news/Malaysia-s-Top-News-Website-Hit-by-DDoS-Attack-194680.shtml
Also: Malaysia's Most Popular News Website Shutdown's after cyber attack!
It's unclear who instrumented the attack or what was their intention, but it coincided with the start of elections in Sarawak, the largest Malaysian state located on the island of Borneo.
Malaysiakini provides news in English, Malay, Chinese and Tamil and has over 1.6 million monthly unique visitors. Since mid-2008, the website is the most popular online news source in the Asian country.
The attack was so powerful that both data centers housing the site's servers were affected. JARING, one of Malaysia's top ISPs that operates one of the centers also reported service disruptions across several regions at around the same time.
"A cyber attack beginning at 11am today shut down Malaysiakiniservers simultaneously, making the website inaccessible to readers.
"The Malaysiakini technical team has determined it to be a denial-of-service attack, where an attacker uses computers in different parts of the world to swarm Malaysiakini servers to the point that they are unable to cope with the massive traffic.
"Both our servers, which are hosted at two data centres - TM Brickfields and Jaring - have been affected by the attack," Malaysiakini's official announcement reads.
Continued : http://news.softpedia.com/news/Malaysia-s-Top-News-Website-Hit-by-DDoS-Attack-194680.shtml
Also: Malaysia's Most Popular News Website Shutdown's after cyber attack!
Reply 5 : NEWS - April 13, 2011
.. fight
Australian security firm TrustDefender is expanding into fraud detection with the release of software designed to spot banking Trojans that manipulate web sessions.
Variants of the ZeuS Trojan and other strains of malware use tricks such as installing phoney dialogue boxes when users log into online banking sites from malware-infected machines.
These so-called man-in-the browser attacks are designed to fool marks into handing over confidential data to fraudsters, such as bank card PINs or one-time login codes. Traditional antivirus software often struggles to quickly identify and block such tactics, which fraudsters employ as a means to get around two-factor authentication for bank logins.
TrustDefender Zero detects these attacks by comparing the content served from a server to the content as seen by a client to detect whether other components of a web page have been added along the way, a probable sign of malfeasance. Andreas Baumhof, CTO and co-founder of TrustDefender, told El Reg that the benefit of the approach is that it is device independent and works without the need to run blacklists or updating.
Continued : http://www.theregister.co.uk/2011/04/13/trustdefender_transaction_security/
Australian security firm TrustDefender is expanding into fraud detection with the release of software designed to spot banking Trojans that manipulate web sessions.
Variants of the ZeuS Trojan and other strains of malware use tricks such as installing phoney dialogue boxes when users log into online banking sites from malware-infected machines.
These so-called man-in-the browser attacks are designed to fool marks into handing over confidential data to fraudsters, such as bank card PINs or one-time login codes. Traditional antivirus software often struggles to quickly identify and block such tactics, which fraudsters employ as a means to get around two-factor authentication for bank logins.
TrustDefender Zero detects these attacks by comparing the content served from a server to the content as seen by a client to detect whether other components of a web page have been added along the way, a probable sign of malfeasance. Andreas Baumhof, CTO and co-founder of TrustDefender, told El Reg that the benefit of the approach is that it is device independent and works without the need to run blacklists or updating.
Continued : http://www.theregister.co.uk/2011/04/13/trustdefender_transaction_security/
Reply 6 : NEWS - April 13, 2011
Vendor Oculis Labs has announced that its PrivateEye security software is now also available as an enterprise version. PrivateEye is designed to protect screen contents from prying eyes by permanently monitoring the area in front of the screen via a webcam and blurring contents as soon as the user looks away or another person looks over the user's shoulder. A face recognition algorithm reportedly ensures that the screen content is only accessible to specific persons. If an unknown face approaches the protected computer, the software takes a picture and displays it on screen for deterrence until the legitimate user returns.
Unlike the standard version, which currently costs around $10, the enterprise version can be centrally managed via group policies. It also records events in a comprehensive log file. With these features, the program developers plan to establish the product as a serious business security solution. In a short test carried out by The H's associates at heise Security, PrivateEye only responded unreliably. While it did blur the screen content when the user left the camera's field of vision, the software unlocked the computer for an unauthorised colleague, apparently mistaking the colleague for the computer owner. People looking over the user's shoulder were only detected when standing directly behind the user.
http://www.h-online.com/security/news/item/Software-to-protect-users-from-prying-eyes-1227562.html
Unlike the standard version, which currently costs around $10, the enterprise version can be centrally managed via group policies. It also records events in a comprehensive log file. With these features, the program developers plan to establish the product as a serious business security solution. In a short test carried out by The H's associates at heise Security, PrivateEye only responded unreliably. While it did blur the screen content when the user left the camera's field of vision, the software unlocked the computer for an unauthorised colleague, apparently mistaking the colleague for the computer owner. People looking over the user's shoulder were only detected when standing directly behind the user.
http://www.h-online.com/security/news/item/Software-to-protect-users-from-prying-eyes-1227562.html
Reply 7 : NEWS - April 13, 2011
Toshiba announces a family of self-encrypting hard disk drives (HDDs) engineered to automatically invalidate protected data when connected to an unknown host.
The new Toshiba Self-Encrypting Drive (SED) models enable OEMs to configure different data invalidation options that align with various end-user scenarios.
Designed to address the increasing need for IT departments to comply with privacy laws and regulations governing data security, the drives are ideally suited for PC, copier and multi-function printer, and point-of-sale systems used in government, financial, medical, or similar environments with an acute need to protect sensitive information.
Building on the industry-standard Trusted Computing Group "Opal" Specification, the new Toshiba MKxx61GSYG models leverage advanced access security and on-board encryption alongside second generation data wipe technology.
Whether to protect against data loss resulting from lost or stolen notebooks or to maintain the security of document image data stored within copier and printer systems, Toshiba SEDs can securely invalidate protected data.
Continued : http://www.net-security.org/secworld.php?id=10894
The new Toshiba Self-Encrypting Drive (SED) models enable OEMs to configure different data invalidation options that align with various end-user scenarios.
Designed to address the increasing need for IT departments to comply with privacy laws and regulations governing data security, the drives are ideally suited for PC, copier and multi-function printer, and point-of-sale systems used in government, financial, medical, or similar environments with an acute need to protect sensitive information.
Building on the industry-standard Trusted Computing Group "Opal" Specification, the new Toshiba MKxx61GSYG models leverage advanced access security and on-board encryption alongside second generation data wipe technology.
Whether to protect against data loss resulting from lost or stolen notebooks or to maintain the security of document image data stored within copier and printer systems, Toshiba SEDs can securely invalidate protected data.
Continued : http://www.net-security.org/secworld.php?id=10894
Reply 8 : NEWS - April 13, 2011
If you sign up for an unlimited Internet service, you expect it to be a service that comes, well, without limits, right?
That's what Jim P. expected when he subscribed to Clearwire's high-speed wireless Internet service. What he got, however, was Internet service that was so slow, it became unusable. The reason, Clearwire told him: He used his "unlimited" account too much. Company representatives said that because of his "excessive bandwidth" use, his Internet speeds were being throttled.
Jim P., who posted about his experience at Clearwiresucks.com, is far from alone. Browsing the gripe site reveals dozens of users with similar complaints. You'll also find them on the Clearwire Sucks Twitter feed, as well as at ComplaintBoards.com. Clearwire is now facing a class-action lawsuit over this very issue.
But the wireless Internet service provider is hardly the only company to place limits on its so-called unlimited services. Online backup providers do it, and so do VoIP providers. Chances are, just about any unlimited tech service comes with plenty of limits. And it's making consumers angry.
Continued : http://www.pcworld.com/businesscenter/article/224908/many_unlimited_tech_services_appear_to_have_limits.html
That's what Jim P. expected when he subscribed to Clearwire's high-speed wireless Internet service. What he got, however, was Internet service that was so slow, it became unusable. The reason, Clearwire told him: He used his "unlimited" account too much. Company representatives said that because of his "excessive bandwidth" use, his Internet speeds were being throttled.
Jim P., who posted about his experience at Clearwiresucks.com, is far from alone. Browsing the gripe site reveals dozens of users with similar complaints. You'll also find them on the Clearwire Sucks Twitter feed, as well as at ComplaintBoards.com. Clearwire is now facing a class-action lawsuit over this very issue.
But the wireless Internet service provider is hardly the only company to place limits on its so-called unlimited services. Online backup providers do it, and so do VoIP providers. Chances are, just about any unlimited tech service comes with plenty of limits. And it's making consumers angry.
Continued : http://www.pcworld.com/businesscenter/article/224908/many_unlimited_tech_services_appear_to_have_limits.html
Reply 9 : NEWS - April 13, 2011
.. message from Facebook support
Repeat after me: It's "Facebook", not "FaceBook".
Learn that lesson and it can be one of the tricks you can use to protect yourself against a spammed-out malware campaign, which tries to trick you into believing that Facebook support has changed your password.
Computer users are receiving emails claiming that the popular social network has automatically changed their password to secure their account.
Here's a typical message: [Screesnhot]
Dear user of FaceBook.
Your password is not safe!
To secure your account the password has been changed automatically.
Attached document contains a new password to your account and detailed information about new security measures.
Thank you for attention,
Administration of Facebook.
Your alarm bells should be ringing instantly when you receive this message for a number of reason, not least that it can't decide if it's "Facebook" or "FaceBook", but also because why would Facebook ever email you an attachment? And why are they being so impersonal and not using your name?
Continued : http://nakedsecurity.sophos.com/2011/04/13/facebook-password-changed-malware-attack-support/
Repeat after me: It's "Facebook", not "FaceBook".
Learn that lesson and it can be one of the tricks you can use to protect yourself against a spammed-out malware campaign, which tries to trick you into believing that Facebook support has changed your password.
Computer users are receiving emails claiming that the popular social network has automatically changed their password to secure their account.
Here's a typical message: [Screesnhot]
Dear user of FaceBook.
Your password is not safe!
To secure your account the password has been changed automatically.
Attached document contains a new password to your account and detailed information about new security measures.
Thank you for attention,
Administration of Facebook.
Your alarm bells should be ringing instantly when you receive this message for a number of reason, not least that it can't decide if it's "Facebook" or "FaceBook", but also because why would Facebook ever email you an attachment? And why are they being so impersonal and not using your name?
Continued : http://nakedsecurity.sophos.com/2011/04/13/facebook-password-changed-malware-attack-support/
Reply 10 : NEWS - April 13, 2011
From the WordPress Weblog:
Tough note to communicate today: Automattic had a low-level (root) break-in to several of our servers, and potentially anything on those servers could have been revealed.
We have been diligently reviewing logs and records about the break-in to determine the extent of the information exposed, and re-securing avenues used to gain access. We presume our source code was exposed and copied. While much of our code is Open Source, there are sensitive bits of our and our partners' code. Beyond that, however, it appears information disclosed was limited.
Based on what we've found, we don't have any specific suggestions for our users beyond reiterating these security fundamentals:
• Use a strong password, meaning something random with numbers and punctuation.
• Use different passwords for different sites.
• If you have used the same password on different sites, switch it to something more secure.
(Tools like 1Password, LastPass, and KeePass make it easy to keep track of different unique logins.)
Our investigation into this matter is ongoing and will take time to complete. As I said above, we've taken comprehensive steps to prevent an incident like this from occurring again. If you have any questions or concerns, please leave a comment below or contact our support.
http://en.blog.wordpress.com/2011/04/13/security/
Tough note to communicate today: Automattic had a low-level (root) break-in to several of our servers, and potentially anything on those servers could have been revealed.
We have been diligently reviewing logs and records about the break-in to determine the extent of the information exposed, and re-securing avenues used to gain access. We presume our source code was exposed and copied. While much of our code is Open Source, there are sensitive bits of our and our partners' code. Beyond that, however, it appears information disclosed was limited.
Based on what we've found, we don't have any specific suggestions for our users beyond reiterating these security fundamentals:
• Use a strong password, meaning something random with numbers and punctuation.
• Use different passwords for different sites.
• If you have used the same password on different sites, switch it to something more secure.
(Tools like 1Password, LastPass, and KeePass make it easy to keep track of different unique logins.)
Our investigation into this matter is ongoing and will take time to complete. As I said above, we've taken comprehensive steps to prevent an incident like this from occurring again. If you have any questions or concerns, please leave a comment below or contact our support.
http://en.blog.wordpress.com/2011/04/13/security/
Reply 11 : NEWS - April 13, 2011
"A Group of Expatriate Executives and Engineers Furtively Restore Telecommunications for the Libyan Opposition"
A team led by a Libyan-American telecom executive has helped rebels hijack Col. Moammar Gadhafi's cellphone network and re-establish their own communications.
The new network, first plotted on an airplane napkin and assembled with the help of oil-rich Arab nations, is giving more than two million Libyans their first connections to each other and the outside world after Col. Gadhafi cut off their telephone and Internet service about a month ago.
That March cutoff had rebels waving flags to communicate on the battlefield. The new cellphone network, opened on April 2, has become the opposition's main tool for communicating from the front lines in the east and up the chain of command to rebel brass hundreds of miles away.
While cellphones haven't given rebel fighters the military strength to decisively drive Col. Gadhafi from power, the network has enabled rebel leaders to more easily make the calls needed to rally international backing, source weapons and strategize with their envoys abroad.
To make that possible, engineeers hived off part of the Libyana cellphone network-owned and operated by the Tripoli-based Libyan General Telecommunications Authority, which is run by Col. Gadhafi's eldest son-and rewired it to run independently of the regime's control. Government spokesman Moussa Ibrahim, asked about the rebel cellphone network, said he hadn't heard of it.
Continued : http://online.wsj.com/article/SB10001424052748703841904576256512991215284.html
A team led by a Libyan-American telecom executive has helped rebels hijack Col. Moammar Gadhafi's cellphone network and re-establish their own communications.
The new network, first plotted on an airplane napkin and assembled with the help of oil-rich Arab nations, is giving more than two million Libyans their first connections to each other and the outside world after Col. Gadhafi cut off their telephone and Internet service about a month ago.
That March cutoff had rebels waving flags to communicate on the battlefield. The new cellphone network, opened on April 2, has become the opposition's main tool for communicating from the front lines in the east and up the chain of command to rebel brass hundreds of miles away.
While cellphones haven't given rebel fighters the military strength to decisively drive Col. Gadhafi from power, the network has enabled rebel leaders to more easily make the calls needed to rally international backing, source weapons and strategize with their envoys abroad.
To make that possible, engineeers hived off part of the Libyana cellphone network-owned and operated by the Tripoli-based Libyan General Telecommunications Authority, which is run by Col. Gadhafi's eldest son-and rewired it to run independently of the regime's control. Government spokesman Moussa Ibrahim, asked about the rebel cellphone network, said he hadn't heard of it.
Continued : http://online.wsj.com/article/SB10001424052748703841904576256512991215284.html
No comments:
Post a Comment