Have you met Professor Tim Anderson?

Still Che-zy after all these years You think American universities are Marxist? Check out this professor. If you can stand it, check out the video below.

Note the shirt and poster..

Sydney, April 12, 2017:

Australian university students really need Hezbollah’s take on the Syrian conflict. Because Hezbollah will totally give them the inside scoop.

Why are we paying this idiot?

Assad-loving academic Tim Anderson uses his human rights lectures to spruik his book and hand out pamphlets urging students to attend a conference on Syria which includes a seminar on the war from Hezbollah’s perspective.

The Sydney University academic, who has repeatedly visited Syria as a guest of Bashar al-Assad’s government, used his food security lecture yesterday to take aim at the media as part of a conspiracy involving three US administrations.

He also handed students information on the conference which promoted a talk by his colleague Jay Tharappel, who met with a senior Assad cabinet minister in 2015.

‘Syria hoax’: Sydney University at centre of pro-Assad push

One of Australia’s most prestigious universities has become the centre of a movement that believes Syrian dictator Bashar al-Assad has been framed by the West for last week’s chemical weapons attack.

The University of Sydney is standing by a controversial senior lecturer, Tim Anderson, who has dismissed the sarin gas attack in the Idlib Province as a “hoax” and called Syria’s six-year civil war a “fiction” perpetrated by the US “to destroy an independent nation”.

Fairfax Media can reveal Dr Anderson is just one among a number of Australian academics who have formed a pro-Assad outfit called the Centre for Counter Hegemonic Studies, based in Sydney, to counter “censorship” by their universities.

The centre was formed “after concern that many Western academic bodies constrain, censor and marginalise counter-hegemonic or anti-imperial research and discussion, due to their close ties with government and corporate sponsors”.

In this photo released by the Syrian official news agency SANA, Syrian President Bashar al-Assad meets with Australian ...In this photo released by the Syrian official news agency SANA, Syrian President Bashar al-Assad meets with Australian professor Tim Anderson and a delegation including academics, researchers and activists in Damascus in 2013.  Photo: HOPD

As well as Dr Anderson, its editorial board consists of Luis Angosto-Ferrandez, another Sydney University senior lecturer, Drew Cottle from Western Sydney University, Rodrigo Acuna at Macquarie University and a number of other academics, including two from East Timor.

Next week the Centre will hold a two-day conference at the University of Sydney, including a discussion of the Syrian conflict “from Hezbollah’s perspective”. The event is endorsed by the University of Sydney Union-funded Political Economy Society.

An enthusiastic supporter of the Syrian state and lifetime radical, Dr Anderson was convicted in 1990 over the 1978 Hilton Hotel bombing in Sydney, but acquitted the following year. He has travelled to Syria several times to meet with Assad.

After his most recent pro-Assad tweets were reported by the ABC’s Media Watch and News Corp’s Daily Telegraph, Dr Anderson and his supporters labelled the reports “fake news” and launched extraordinary personal attacks on a journalist involved.

Sydney University senior lecturer Tim Anderson (centre) believes Bashar al-Assad has been framed.Sydney University senior lecturer Tim Anderson (centre) believes Bashar al-Assad has been framed. Photo: Facebook

Jay Tharappel, who tutors human rights in the same Sydney University department as Dr Anderson, called News Corp journalist Kylar Loussikian “traitorous scum who desperately wants a second Armenian genocide”. Loussikian is of Armenian background.

Mr Tharappel defended the remarks when contacted by Fairfax Media on Tuesday. “If people like him wage war on our post-colonial homeland then I will wage war against them,” he said. “They can choose to fight me and I will fight them … with words.”

The University of Sydney said it was aware the CCHS was due to host next week’s conference on campus, and noted it did not provide financial or administrative support to the centre.

Dr Anderson told Fairfax Media the CCHS had “zero budget” and its mission was to create a “virtual library” of literature in support of sovereignty and self-determination.

A spokeswoman said the university did not endorse Dr Anderson’s statements but was committed to free speech for academic staff in their area of expertise.

“This means tolerance of a wide range of views, even when the views expressed are unpopular or controversial,” she said. In a statement, the student-run Political Economy Society also said it would continue to endorse the event “at this time”.

Dr Anderson has stated on Twitter that US presidents George Bush, Barack Obama and Donald Trump are the real “masterminds of Middle East terrorism”. He stood by those comments on Tuesday. “Absolutely. The evidence is overwhelming,” he said.

Dr Anderson has also written a book, The Dirty War on Syria, published by the Montreal-based Centre for Research on Globalisation. The centre has been dismissed by PolitiFact and the Associated Press as a website that promotes conspiracy theories.

Mr Trump last week authorised the US firing 59 Tomahawk missiles at the Syrian airfield from which he said the deadly chemical attack was launched. The Assad regime has denied responsibility, while ally Russia said the Syrian army hit rebel-owned chemicals on the ground.

Asked about the matter while in India on Tuesday, Prime Minister Malcolm Turnbull said he had not been briefed on Dr Anderson’s activities, but reiterated his support for the US air strikes and condemned the Assad regime’s “horrendous criminal conduct”.

FBI Global Hackers Sweeping Sting Arrests

So many complain the FBI is slow-walking cyber and hacking operations especially when it comes to the Russian investigations. Well, the FBI rarely announces cases and prosecutions. When it comes to the recent Russian hacking scandal into the United States election and campaign infrastructure, perhaps the Department of Justice and the FBI are building a huge file for proof.

So, try this:

NBC/McClatchy

 

U.S. sweeping up Russian hackers in a broad global dragnet

BY TIM JOHNSON/WASHINGTON

McClatchy: The arrests caught the Russian hackers totally by surprise. One was at a Finnish border crossing. Another was arriving at an airport in Spain. A third was dining at a restaurant in Prague. Still others were at luxury resorts in the Maldives and Thailand.

Many have now turned up in U.S. courts. The long arm of U.S. law enforcement is spanning the globe like never before to bring criminal hackers to justice.

And it may not be just about crime. The Justice Department cites fuzzy and overlapping boundaries between criminal hackers and Russian intelligence agencies, the same ones the U.S. accuses of coordinating the hacking and subsequent disclosure of emails from the Democratic National Committee and the Hillary Clinton presidential campaign.

President Donald Trump dismisses allegations that Russia meddled in the election as “fake news,” but the FBI and congressional committees have launched probes and the Obama administration ordered the expulsion of 35 Russian diplomats in late December.

Rubio says Russian hackers targeted his presidential campaign

During a Senate committee hearing on Thursday, Florida Senator Marco Rubio stated that his 2016 presidential campaign staff members were the targets of Russian hackers in July 2016 and March 2017, but both efforts were unsuccessful.

The U.S. campaign leaves Russian hackers with a dilemma: If they leave the safe confines of Russia, which has no extradition treaty with the United States, or Russia’s most ardent allies, they may get picked up and sent to the U.S.

“They no longer travel, the high-profile hackers. They understand the danger,” said Arkady Bukh, a criminal defense lawyer in New York City who has defended numerous accused Russian cybercriminals.

Still, some Russian and Eastern European hackers do enjoy holidays abroad – and live to regret it. Just this week, Maxim Senakh, a 41-year-old Russian, pleaded guilty in a Minneapolis courtroom to operating a massive robotic network that generated tens of millions of spam emails a day in a zombie criminal enterprise that purportedly brought in millions in profits.

Senakh didn’t come voluntarily. He’d been visiting a sister in Finland before that country put him on a U.S.-bound plane in January, answering a U.S. extradition request.

“He fought it, the Russian government fought it, and the Russian government put political pressure on its neighbor, Finland,” federal prosecutor Kevin S. Ueland said at a Feb. 19 hearing.

Another Russian, Mark Vartanyan, 29, pleaded guilty March 20 to computer fraud in an Atlanta courtroom after reaching a deal with prosecutors to offer far-reaching cooperation that would limit a prison term to five years or less.

Norway extradited Vartanyan to the U.S. in December.

David Hickton, a former U.S. attorney in Pittsburgh who made the city a hub for prosecutions of foreign hackers, said such actions are a sign of the new dimensions of crime.

IT’S NO DIFFERENT THAN IF SOMEONE PULLED A TRUCK UP TO YOUR HOUSE AND STOLE VALUABLE MATERIAL. David Hickton, former federal prosecutor

“This is 21st century burglary. It’s no different than if someone pulled a truck up to your house and stole valuable material,” said Hickton, who now directs the Institute for Cyber Law, Policy and Security at the University of Pittsburgh.

But Hickton acknowledged that carrying off successful prosecutions is a challenge.

“These cyber investigations are very, very hard. You’re talking about evaporating evidence, borderless crimes and defendants who can hide behind the borders of countries that don’t have extradition treaties with us,” he said.

It is not easy to pigeonhole the accused and convicted hackers. Some are brainy but merely cogs in larger crime groups. Others flash their wealth and opulent lifestyles.

NOT ALL OF THEM ARE RICH. 

Arkady Bukh, criminal defense attorney in New York City

“Not all of them are rich,” Bukh said. “A lot of them are involved in computer intrusion and that does not bring much money.”

Bukh recalled one client, Aleksandr Panin, who was placed by authorities on a plane in the Dominican Republic to 2013 bound for Atlanta, put on trial and convicted.

“The guy couldn’t afford a car even with (having caused) a billion dollars in losses. He’s like a mad scientist geek,” Bukh said.

Then there are those on the opposite extreme, who pose for photos with piles of cash or at luxury beach resorts. One of them, Roman Seleznev, was convicted last year in Seattle on 38 counts related to cybercrime. His father is a deputy in the Russian parliament, or Duma. Prosecutors retrieved a photo from his cell phone of him standing next to a yellow Dodge Challenger muscle car in Red Square near the Kremlin.

The magnitude of damages that prosecutors have alleged can be mind-boggling.

Vartanyan, the young Russian hacker brought to Atlanta from Norway, was part of the development team that created Citadel, a “universal spyware system” sold on underground Russian criminal hacker forums that ended up lodged on 11 million infected computers around the world.

In their complaint against him, prosecutors cited industry estimates that Citadel caused “over $500 million in losses” in a three-year period.

The investigations can be incredibly complex, leading federal investigators to call in specialized cybersecurity firms to conduct forensics. In the probe of Senakh, whose guilty plea came last month, the feds turned to ESET, a cybersecurity firm with 18 offices around the world.

ESET analyzed the malicious code Senakh used, dubbed Ebury malware, and found that it had compromised 25,000 servers around the world, researcher Marc-Etienne Leveille said in an email.

Stanislav Lisov, a computer programmer from Taganrog, a town on Russia’s Black Sea coast, had arrived at Barcelona’s international airport with his wife on Jan. 13 when Spanish Civil Guard police arrested him on an FBI warrant issued through Interpol. The charges: electronic and computer fraud.

WE WERE DETAINED AT THE AIRPORT IN BARCELONA. 

Darya Lisova, wife of accused Russian hacker Stanislav Lisov

“We were detained at the airport in Barcelona, when we came to return a rented car before flying out to Lyon, to continue our trip and visit friends. When we were getting out of the car, two police officers approached, showed us the badge, and said they were detaining my husband,” Darya Lisova told the Russian state-operated RT network.

Spain has not yet extradited Lisov, who is blamed for being the architect of a sophisticated Trojan, NeverQuest, used in stealing log-in credentials for bank accounts.

Here is a rundown of some other recent cases:

Yevgeniy Nikulin, 29, was arrested by police while dining with his girlfriend in a hotel restaurant in Prague’s Old Town Oct. 5. He has been indicted by a federal grand jury in northern California on charges of computer intrusion, identity theft and other crimes for penetrating into the systems of high-tech companies LinkedIn, Dropbox and Formspring. Since then, Washington and Moscow have been in a tug-of-war over Nikulin’s extradition.

Olga Komova, a 26-year-old Uzbek, and Dmitry Ukrainsky, a Russian, were arrested in mid-2016 at beach resorts in Thailand and accused of stealing more than $28 million as part of a mega cyber bank fraud ring. Komova has turned up in U.S. custody and faces federal charges of wire fraud and money laundering. How she was brought to the United States is unclear. Her U.S. lawyer, Michael Soroka, declined to discuss the case.

When extradition isn’t an option, U.S. authorities lure alleged hackers to jurisdictions where they can be arrested. Such tactics have been decried by Moscow as “kidnapping.”

Seleznev, the identity thief who is the son of the Duma deputy, chose to vacation at a five-star resort in the Indian Ocean archipelago nation of the Maldives in 2014 precisely because it has no extradition treaty with the United States.

U.S. officials got word and persuaded Maldives authorities to intercept Seleznev at the airport, where in a fast-paced operation he was bundled on a private plane to Guam, a U.S. territory in the western Pacific, then flown to Seattle to face federal charges.

Upon his conviction last August, prosecutors said Seleznev had stolen millions of credit card numbers, causing 3,700 banks $169 million in losses. He faces a 40-year jail term.

No matter where the hackers travel, prosecutors say they will follow.

The U.S. attorney in Atlanta, John Horn, who has also made a name for himself in prosecuting Russian hackers, offered an unapologetic defense last year of the global reach of U.S. justice.

“Cybercrime is borderless, but increasingly, so too are our law enforcement capabilities,” Horn said.

Punish Malaysia due to Funding North Korea?

Maybe there is much more to this story than being reported: Kim Jong Un’s half brother killed in Malaysia, sources report  but read on.

Image result for half brother killed in malaysia IndiaExpress

Exclusive – ‘Dollars and euros’: How a Malaysian firm helped fund North Korea’s leadership

Reuters: Over the past two decades, North Korean-born Han Hun Il, the founding chief executive of a Malaysian conglomerate, funneled money to the leadership in Pyongyang, a North Korean defector, speaking out for the first time, told Reuters.

Malaysian -North Korea

A sign outside the Malaysia-Korea Partners Holdings headquarters in Kuala Lumpur, Malaysia.(Reuters Photo)

Han’s conglomerate, Malaysia Korea Partners (MKP), worked in partnership with Jang Song Thaek, according to Lee Chol Ho, who worked as a trader for Han for nine years until he defected to Seoul in 2010. Jang, the uncle of North Korea’s ruler Kim Jong Un, was considered one of North Korea’s most powerful men until he was executed for treason in 2013.

Reuters was unable to independently confirm Lee’s account of Han’s relationship with North Korea’s leadership, including his assertion that money was funneled to North Korea’s leadership body, the central committee of the ruling Workers’ Party.

Reuters also couldn’t determine how the central committee, which controls North Korea’s highly sanctioned nuclear and weapons program, used the funds from Han or if the payments are continuing.

The new disclosures come at a time when United Nations sanctions monitors are intensifying scrutiny of both Han and MKP.

A February report by experts monitoring U.N. sanctions on North Korea says MKP’s bank subsidiary in Pyongyang is a particular focus. A 2013 U.N. resolution bars foreign companies or foreign joint ventures with a North Korean company from having a financial subsidiary in North Korea.

The U.N. report says the bank, called International Consortium Bank, was established as a joint venture between MKP and Jang’s Sungri Economic Group. The bank is licensed by North Korea’s central bank and registered with the Pyongyang Municipal People’s Committee, it said.

If the U.N. experts find sanctions have been violated, they could recommend the U.N. Security Council blacklist MKP, its executives or one or more of its subsidiaries, subjecting them to a global travel ban and asset freeze.

STRAINED TIES

Han, also known as Dr. Edward Hahn, hung up the phone and blocked a Reuters reporter on his messaging app when contacted for comment.

MKP did not respond to requests for comment on Lee’s assertions. The company issued a statement dated March 23 saying MKP had “no reason to hide the fact” that Han is North Korean. It denied owning ICB or any other North Korean bank and said nobody from the United Nations has contacted the company.

The U.N. said it does not comment on its ongoing investigations.

Lee’s description of how MKP operated appears to shed fresh light on the close ties between Malaysia and North Korea, which have come under strain following the assassination of Kim Jong Nam, the elder half-brother of North Korea’s ruler, with the highly toxic VX nerve agent in February.

Reuters reported in February that North Korea’s spy agency was running an arms export operation out of Malaysia.

Malaysia’s foreign ministry did not respond to Reuters’ requests for comment.

 

PYONGYANG BANK

MKP, which Han formed in 1996 with his Malaysian partner, Yong Kok Yeap, operates in 20 countries in Asia, Africa and the Middle East, piling up contracts worth at least $350 million, an MKP corporate video and promotional brochures shows.

Yong declined requests to be interviewed.

MKP’s main business is construction, but it is also involved in a number of other activities, including financial services and coal trading, according to U.N. reports, company sources, registration documents and MKP promotional material.

ICB is among several banks the U.N. is currently investigating for possible breaches of various U.N. Security Council resolutions. These include one from 2013 calling on members states to prohibit financial service companies where there are “reasonable grounds to believe that such financial services could contribute to [North Korea’s] nuclear or ballistic weapons programs.”

In its March 23 statement, MKP said its website had been “hacked” to insert ICB under its list of service companies and place a “doctored photograph” of “MKP personnel”, including Yong, visiting ICB’s office in Pyongyang.

A search of archive.org, a database of old websites, shows ICB has been listed on MKP’s website since 2009, including under its earlier name, Sungri Hi-Fund International Bank. As of April 10, ICB was still listed on the website.

In its February report, the U.N. said it had inquired with Malaysia and MKP about ICB and had “yet to receive a reply.”

 

‘CONTROL TOWER’

Lee said Han had used MKP as the “control tower” of a vast business empire, making him one of the isolated country’s richest men. He said Han began his career in Africa with North Korea’s Reconnaissance Bureau, its premier spy agency.

“When people from the Central Committee visited Malaysia, they only met with Han,” Lee said. “They didn’t even bother to see the ambassador.”

The Central Committee directs the development and financing of North Korea’s nuclear and missile programs, said Michael Madden, a North Korea expert at Johns Hopkins University’s 38 North website.

Once a year, Lee said, high-ranking Pyongyang officials traveled to Kuala Lumpur to meet Han and instruct him to wire money to North Korea via banks in Malaysia.

“It was all dollars and euros,” said Lee.

Lee said Han was part of Jang’s overseas network of businessmen.

Two current company sources said MKP’s fortunes – with the exception of its African businesses – declined after 2013 and Han became an infrequent visitor to Malaysia. They said they didn’t know whether the downturn was related to Jang’s demise.

Pyotr Levashov Arrested in Barcelona, Hacker

All domestic news media has been blaming the Russians for cyber election intrusion. Conservative outlets have pushed back asking for evidence. There are investigations on The Hill regarding Russian interference and the House Intelligence Committee, chaired by Devin Nunes has seen the documents and share them with the White House. The committee co-chair Adam Schiff was angry he was not read on early enough. A big political conflict has occurred and Nunes recused himself from the specific committee investigation regarding Russia as Nunes remains chairman of the committee.

Okay so what you ask?

Well we want to blame the FBI, Comey and ODNI, Clapper for not being more forthcoming on the matter. Slow down everyone, as cyber investigations are international in scope and it takes a mobilized set of experts and agencies and international collaboration to make attribution by using exceptional tools, cyber talent and agreements. So….what does all this mean? It means the lid could soon blow off this whole operation.

You see, there was malware, phishing and countless botnet systems that were part of the U.S. election interference as we saw with the DNC hack and the John Podesta emails via WikiLeaks. There are countless moving parts and they are international. It is gratifying to know however, not only is government part of the investigation, but outside cyber corporations are doing their own due diligence and offering additional clues, evidence and assistance to the FBI. How so you ask?

From Krebs on Security: Then, on Jan. 26. 2012, I ran a story featuring a trail of evidence suggesting a possible identity of “Severa (a.k.a. “Peter Severa”), another SpamIt affiliate who is widely considered the author of the Waledac botnet (and likely the Storm Worm). In that story, I included several screen shots of Severa chatting on Spamdot.biz, an extremely secretive Russian forum dedicated to those involved in the spam business. In one of the screen shots, Severa laments the arrest of Alan Ralsky, a convicted American spam kingpin who specialized in stock spam and who — according to the U.S. Justice Department – was partnered with Severa. Anti-spam activists at Spamhaus.org maintain that Peter Severa’s real name is Peter Levashov (although the evidence I gathered also turned up another name, Viktor Sergeevich Ivashov). Read more here, it is fascinating and well done.

*** No wonder attribution takes a very long time right? Yes so read on please…..

Programmer Pyotr Levashov reportedly suspected in US election hacking arrested

Madrid: A Russian computer programmer, Pyotr Levashov, has been arrested in the Spanish city of Barcelona, a spokesman for the Russian embassy in Madrid said on Sunday.

It was unclear why Levashov was arrested. The embassy spokesman declined to give details for his arrest, and Spanish police and the interior ministry were not available for comment on Sunday.

Russian television station RT reported that Levashov was arrested under a US international arrest warrant and was suspected of being involved in hacking attacks linked to alleged interference in last year’s US election.

Peter Carr, a spokesman for the US Justice Department’s criminal division, said: “The US case remains under seal, so we have no information to provide at this time.”

The criminal division is separate from the national security division, which is responsible for investigating state-sponsored cyber crimes.

A US Department of Justice official said it was a criminal matter without an apparent national security connection.

Spanish authorities notified the Russian embassy of Levashov’s arrest on Friday, the embassy spokesman said.

In January, Spanish police arrested another Russian computer programmer, whose name was given as “Lisov” and who was wanted by the United States for leading a financial fraud network.

Russia's embassy in Madrid.Russia’s embassy in Madrid. Photo: Wikimedia/Luis García (Zaqarbal)

The US government has formally accused Russia of hacking Democratic Party emails to help the campaign of Republican President Donald Trump. The US Congress is also examining links between Russia and Trump during the election campaign.

Russian officials, including President Vladimir Putin, have repeatedly denied that Russia tried to influence the election.

Reuters

Related reading: Spain arrests Russian bank-account hacker wanted by FBI

January 2017: Spain has arrested a 32-year-old Russian computer programmer at Barcelona airport who is alleged to have designed and used software to steal bank account details from banks and individuals, Spanish police said on Friday.

Working with the U.S. Federal Bureau of Investigation (FBI), the man, named Lisov, was arrested by Spanish police on Jan. 13 as he waited to take a flight to another European country. He is suspected of leading a financial fraud network, the police said in a statement.

Lisov, wanted by the United States under an international arrest warrant, had been under observation by authorities for several days in the north-eastern region of Catalonia, police said. Police did not give the man’s first name. More here.

Related reading: Russian FSB Officers Charged in Yahoo Hack and More

Tip sheet on above:

ALEXSEY BELAN

Conspiring to Commit Computer Fraud and Abuse; Accessing a Computer Without Authorization for the Purpose of Commercial Advantage and Private Financial Gain; Damaging a Computer Through the Transmission of Code and Commands; Economic Espionage; Theft of Trade Secrets; Access Device Fraud; Aggravated Identity Theft; Wire Fraud

   Seems we need to be more patient when it comes to the FBI and associated international agencies…eh?