An affordable price is probably the major benefit persuading people to buy drugs at www.americanbestpills.com. The cost of medications in Canadian drugstores is considerably lower than anywhere else simply because the medications here are oriented on international customers. In many cases, you will be able to cut your costs to a great extent and probably even save up a big fortune on your prescription drugs. What's more, pharmacies of Canada offer free-of-charge shipping, which is a convenient addition to all other benefits on offer. Cheap price is especially appealing to those users who are tight on a budget
Service Quality and Reputation Although some believe that buying online is buying a pig in the poke, it is not. Canadian online pharmacies are excellent sources of information and are open for discussions. There one can read tons of users' feedback, where they share their experience of using a particular pharmacy, say what they like or do not like about the drugs and/or service. Reputable online pharmacy canadianrxon.com take this feedback into consideration and rely on it as a kind of expert advice, which helps them constantly improve they service and ensure that their clients buy safe and effective drugs. Last, but not least is their striving to attract professional doctors. As a result, users can directly contact a qualified doctor and ask whatever questions they have about a particular drug. Most likely, a doctor will ask several questions about the condition, for which the drug is going to be used. Based on this information, he or she will advise to use or not to use this medication.

DPRK Missiles, China and Global Nuclear Footprint and Russia’s Veto

Graphic on the estimated global atomic weapons stockpile

After almost five years of difficult negotiations, Russia and China moved to a new level of arms trade in 2015. Russia finally agreed to sell China 24 Sukhoi‑35 (Su-35) combat aircraft and four S-400 SAM systems for approximately USD $7 billion. These are currently among the most advanced weapons Russia produces. This agreement marked a turning point. It was the first significant sale of Russian major weapons to China since the mid-2000s, representing a sizeable addition to Russia’s total annual value of arms exports, which has hovered between USD $13.5 billion and USD $15 billion in recent years.

The agreement could herald a new phase of large sales of Russia’s most sophisticated arms to China. However, it could also be viewed as a last chance for Russia to gain some income from arms sales to China before the latter becomes self-sufficient. The first scenario would fit the picture of warming Russian–Chinese relations, following the crisis in Ukraine. The second scenario is more tightly bound to Russian financial hardships and the difficulties in its arms industry since 2015. This sale could well be the last chance for Russia to engage in a major sale of military equipment to China. At the same time as the Su-35 and S-400 are due for delivery, China will be introducing its own more advanced Jian-20 (J-20) combat aircraft, as well as its own advanced jet engines, large transport aircraft, helicopters and long-range SAM systems—many of which are on a par with or even better than Russian systems.

When it comes to the arms trade, China has not only learned from Russia, but succeeded in challenging it. Given its financial and defence industrial base, China is likely to have more chances to develop new military technologies than Russia. China’s electronics, composites, advanced materials and shipbuilding industries are all more advanced than those in Russia. The size of the Chinese economy means that it has many more resources and much more manpower to invest in research and development. Thus, it is more than likely that China’s military technology will surpass that of Russia on all levels. More detail and history here.

 

SEOUL, July 7 (Yonhap) — South Korean President Moon Jae-in sought to rally support from other global leaders Friday in condemning North Korea for its recent missile provocation and ridding the communist state of its nuclear ambitions, his presidential office Cheong Wa Dae said.

“It is not a scheduled topic for discussion, but as president of the Republic of Korea I cannot but talk to you about another serious challenge that urgently requires the joint interest and action of the G20,” the South Korean president said in the Leaders’ Retreat on the sidelines of the Group of 20 summit held in Hamburg, Germany, referring to South Korea by its official name.

“And that is North Korea’s nuclear and missile provocations,” he added, according to a script of his remarks released by Cheong Wa Dae.

Moon’s remarks came after the communist North launched what it claimed to be its first intercontinental ballistic missile (ICBM) earlier in the week, prompting fresh condemnations from Seoul and its allies.

In a three-way meeting with U.S. President Donald Trump and Japanese Prime Minister Shinzo Abe in Hamburg on Thursday, the South Korean leader was joined by his U.S. and Japanese counterparts in calling for stronger sanctions by the international community to bring North Korea to a dialogue table to discuss its denuclearization.

“To resolve the North Korean nuclear issue that has become a global threat, the international community will have to put enhanced pressure on North Korea,” partly by issuing a new U.N. Security Council resolution, Moon told other G20 leaders at their retreat.

“By doing so, we must make the North Korean regime realize that its nuclear arms and missiles will never guarantee its existence and come to the dialogue table,” he added.

The South Korean president also rallied support for what he called the “clear determination” of G20 leaders to jointly address the issue at their gathering this week, apparently seeking a joint reaction or a statement from the global leaders condemning the North’s missile provocations.

“I ask for you, G20 leaders’ full interest and support,” he said.

Kim Jong Un’s Big Nuclear Push Is Closing In on America

Bloomberg: Kim Jong Un has sped up North Korea’s nuclear program since he took power in late 2011, testing more powerful weapons and developing longer-range missiles to carry them.

On July 4, North Korea said it had successfully test-fired an intercontinental ballistic missile called the Hwasong-14, a claim that brings the isolated state closer to its aim of building a device capable of hitting the U.S. mainland with a nuclear warhead. The United Nations Security Council will hold an emergency meeting later Wednesday after the U.S. confirmed North Korea’s rocket launch was its first intercontinental ballistic missile.

Still, the launch risks a serious escalation with North Korea’s neighbors and the U.S. over its weapons program. The regime is thought to possess rockets that can hit South Korea and Japan with as many as 20 atomic bombs. More here with graphics.

 

***

Meanwhile:

Russia objected Thursday to a United Nations Security Council resolution condemning North Korea’s recent ballistic missile launch because the Kremlin doesn’t agree with the U.S. that the rocket was an intercontinental missile.

According to Reuters, Moscow said it believes North Korea fired an intermediate-range ballistic missile on Tuesday.

The Trump administration has confirmed it was, in fact, a longer-range intercontinental missile that has the potential to reach the U.S.

“The rationale is that based on our (Ministry of Defense’s) assessment we cannot confirm that the missile can be classified as an ICBM,” Russia’s U.N. mission said in an email to its Security Council colleagues, Reuters reported.

“Therefore we are not in a position to agree to this classification on behalf of the whole council since there is no consensus on this issue,” the email said.

U.S. Ambassador to the United Nations Nikki Haley criticized Russia’s reluctance to recognize North Korea launched an intercontinental missile capable of reaching the U.S. according to experts, a threshold North Korea has not reached before.

“If you need any sort of intelligence to let you know that the rest of the world sees this as an ICBM, I’m happy to provide it,” she told the Security Council on Wednesday.

Security Council resolutions have to be agreed to by all 15 members.

Reuters reported it’s uncertain if the U.S. will negotiate with Russia to adjust the resolution.

DHS, FBI Declare Hackers Target Nuclear Facilities

Bloomberg: Specialized teams from Homeland Security and the FBI have been scrambled to help extricate the hackers from the power stations, in some cases without informing local and state officials. Meanwhile, the U.S. National Security Agency is working to confirm the identity of the hackers, who are said to be using computer servers in Germany, Italy, Malaysia and Turkey to cover their tracks.

Many of the power plants are conventional, but the targeting of a nuclear facility adds to the pressure. While the core of a nuclear generator is heavily protected, a sudden shutdown of the turbine can trigger safety systems. These safety devices are designed to disperse excess heat while the nuclear reaction is halted, but the safety systems themselves may be vulnerable to attack.

Homeland Security and the FBI sent out a general warning about the cyberattack to utilities and related parties on June 28, though it contained few details or the number of plants affected. The government said it was most concerned about the “persistence” of the attacks on choke points of the U.S. power supply. That language suggests hackers are trying to establish backdoors on the plants’ systems for later use, according to a former senior DHS official who asked not to be identified.

Those backdoors can be used to insert software specifically designed to penetrate a facility’s operational controls and disrupt critical systems, according to Galina Antova, co-founder of Claroty, a New York firm that specializes in securing industrial control systems.

Starsalliance

Hackers Are Targeting Nuclear Facilities, Homeland Security Dept. and F.B.I. Say

Since May, hackers have been penetrating the computer networks of companies that operate nuclear power stations and other energy facilities, as well as manufacturing plants in the United States and other countries.

Among the companies targeted was the Wolf Creek Nuclear Operating Corporation, which runs a nuclear power plant near Burlington, Kan., according to security consultants and an urgent joint report issued by the Department of Homeland Security and the Federal Bureau of Investigation last week.

The joint report was obtained by The New York Times and confirmed by security specialists who have been responding to the attacks. It carried an urgent amber warning, the second-highest rating for the sensitivity of the threat.

The report did not indicate whether the cyberattacks were an attempt at espionage — such as stealing industrial secrets — or part of a plan to cause destruction. There is no indication that hackers were able to jump from their victims’ computers into the control systems of the facilities, nor is it clear how many facilities were breached.

Wolf Creek officials said that while they could not comment on cyberattacks or security issues, no “operations systems” had been affected and that their corporate network and the internet were separate from the network that runs the plant.

In a joint statement with the F.B.I., a spokesman for the Department of Homeland Security said, “There is no indication of a threat to public safety, as any potential impact appears to be limited to administrative and business networks.”

The hackers appeared determined to map out computer networks for future attacks, the report concluded. But investigators have not been able to analyze the malicious “payload” of the hackers’ code, which would offer more detail into what they were after.

John Keeley, a spokesman for the Nuclear Energy Institute, which works with all 99 electric utilities that operate nuclear plants in the United States, said nuclear facilities are required to report cyberattacks that relate to their “safety, security and operations.” None have reported that the security of their operations was affected by the latest attacks, Mr. Keeley said.

In most cases, the attacks targeted people — industrial control engineers who have direct access to systems that, if damaged, could lead to an explosion, fire or a spill of dangerous material, according to two people familiar with the attacks who could not be named because of confidentiality agreements.

The origins of the hackers are not known. But the report indicated that an “advanced persistent threat” actor was responsible, which is the language security specialists often use to describe hackers backed by governments.

The two people familiar with the investigation say that, while it is still in its early stages, the hackers’ techniques mimicked those of the organization known to cybersecurity specialists as “Energetic Bear,” the Russian hacking group that researchers have tied to attacks on the energy sector since at least 2012.

Hackers wrote highly targeted email messages containing fake résumés for control engineering jobs and sent them to the senior industrial control engineers who maintain broad access to critical industrial control systems, the government report said.

The fake résumés were Microsoft Word documents that were laced with malicious code. Once the recipients clicked on those documents, attackers could steal their credentials and proceed to other machines on a network.

In some cases, the hackers also compromised legitimate websites that they knew their victims frequented — something security specialists call a watering hole attack. And in others, they deployed what are known as man-in-the-middle attacks in which they redirected their victims’ internet traffic through their own machines.

Energy, nuclear and critical manufacturing organizations have frequently been targets for sophisticated cyberattacks. The Department of Homeland Security has called cyberattacks on critical infrastructure “one of the most serious national security challenges we must confront.”

On May 11, during the attacks, President Trump signed an executive order to strengthen the cybersecurity defenses of federal networks and critical infrastructure. The order required government agencies to work with public companies to mitigate risks and help defend critical infrastructure organizations “at greatest risk of attacks that could reasonably result in catastrophic regional or national effects on public health or safety, economic security, or national security.”

The order specifically addressed the threats from “electricity disruptions and prolonged power outages resulting from cybersecurity incidents.”

Jon Wellinghoff, the former chairman of the Federal Energy Regulatory Commission, said in an interview last week that while the security of United States’ critical infrastructure systems had improved in recent years, they were still vulnerable to advanced hacking attacks, particularly those that use tools stolen from the National Security Agency.

“We never anticipated that our critical infrastructure control systems would be facing advanced levels of malware,” Mr. Wellinghoff said.

In 2008, an attack called Stuxnet that was designed by the United States and Israel to hit Iran’s main nuclear enrichment facility, demonstrated how computer attacks could disrupt and destroy physical infrastructure.

The government hackers infiltrated the systems that controlled Iran’s nuclear centrifuges and spun them wildly out of control, or stopped them from spinning entirely, destroying a fifth of Iran’s centrifuges.

In retrospect, Mr. Wellinghoff said that attack should have foreshadowed the threats the United States would face on its own infrastructure.

Critical infrastructure is increasingly controlled by Scada, or supervisory control and data acquisition systems. They are used by manufacturers, nuclear plant operators and pipeline operators to monitor variables like pressure and flow rates through pipelines. The software also allows operators to monitor and diagnose unexpected problems.

But like any software, Scada systems are susceptible to hacking and computer viruses. And for years, security specialists have warned that hackers could use remote access to these systems to cause physical destruction.

Chicago: ISNA has Linda Calling for Jihad Against Trump

Title of the conference:54th Annual ISNA Convention

Hope and Guidance Through the Qur’an

Chicago Tribune: “ISNA’s Annual Convention is more than simply a coming together of the Muslim community,” said Azhar Azeez, ISNA President. “Our goal is to unite people across different faiths and backgrounds in the spirit of peace and better understanding. We hope the convention will be used as platform and catalyst for social change”, he added.

ISNA has invited a rich list of speakers, scholars, community leaders and public servants to address Convention attendees. Linda Sarsour, co-chair of the National Women’s March, will be the keynote speaker during the Community Service Recognition Luncheon which will honor Dr. Sayyid M. Syeed for his lifelong dedication to serving the community, building interfaith relationships and social justice advocacy.

Complementing the main ISNA offering of programs, there are conferences being hosted by the Muslim Students Association of the U.S. & Canada (MSA National) and the Muslim Youth of North America (MYNA).

ISNA is the largest and oldest Islamic umbrella organization in North America. Its mission is to foster the development of the Muslim community, interfaith relations, civic engagement, and better understanding of Islam.

*** So, what did one of these esteemed speakers have to say at this convention?

Do you suppose anyone from CNN, MSNBC or NBC attended and reported this? Nah….but the Huffington Post did publish a report and well, they used the same definition of ‘jihad’ that former CIA Director John Brennan used…..it just means struggle. Ah sure… Anwar al Awlaki called for peaceful demonstrations too. Maybe HuffPo should check with their counterpart Peter Bergen at CNN on al Awlaki. After the Secret Service visited with Kathy Griffin for an hour, will they too go pay a visit to ISNA or to Linda?

In part:

Conservative news sites are targeting activist Linda Sarsour again, this time for using the word “jihad” in a speech to a mainly Muslim audience. 

Speaking in Chicago at the annual Islamic Society of North America convention over the weekend, Sarsour, an organizer of January’s Women’s March, discussed what it means to be a patriot in the United States.

In her speech, which was posted online Monday, Sarsour discussed leaders like Malcolm X and Muhammad Ali who helped shift culture by being unapologetically themselves.

A number of conservative outlets zeroed in on a particular section of Sarsour’s speech, in which she used the word “jihad” to describe efforts to resist unjust policies.

The word “jihad” has long been misused and misunderstood by both Muslim extremists and people seeking to spread hatred against Muslims. But for the majority of the world’s 1.6 billion Muslims, “jihad” is a word that literally means “to struggle.” It’s a concept within Islam that represents a commitment to serve God, and to be good to yourself and your neighbors. It can be personal, like struggling to get through a rough workday, or overarching, like striving to seek justice for all people.

As Sarsour recounted in her speech, the Prophet Muhammad is said to have described the best form of jihad as “a word of truth in front of a tyrant, ruler or leader.”

FBN: She said that Muslim-Americans’ number one priority should be protecting and defending their communities, not assimilating or pleasing people in power.

“I hope, that when we stand up to those who oppress our communities, that Allah accepts from us that as a form of jihad, that we are struggling against tyrants and rulers not only abroad in the Middle East or the other side of the world, but here in these United States of America, where you have fascists and white supremacists and Islamophobes reining in the White House,” she said.

Sarsour was a leader behind January’s Women’s March, and she was named a “Champion of Change” by the Obama administration in 2012.

Watch her full address above, and see Asra Nomani weigh in on Sarsour and the anti-Trump movement using this link.