blog trackingRealtime Web Statistics Iran Archives - Page 5 of 12 - Gregory D. Evans | Worlds No. 1 Security Consultant

Posts Tagged ‘Iran’

Iran has repelled a cyber attack on Oil Ministry: report

TEHRAN, April 23 (MNA) – The Iranian Oil Ministry, the National Iranian Oil Company, and a number of other companies affiliated with the ministry, were targeted by a computer worm on Sunday, but the malware was detected before it could infect the systems, the Persian service of the Mehr News Agency reported.

View full post on computer worm – Yahoo! News Search Results

View full post on National Cyber Security » Virus/Malware/Worms

Mossad Cutting Back on Covert Operations Inside Iran, Officials Say

Israel’s intelligence services have scaled back covert operations inside Iran, ratcheting down by “dozens of percent” in recent months secret efforts to disable or delay the enemy state’s nuclear program, senior Israeli security officials tell TIME.  The reduction runs across a wide spectrum of operations, cutting back not only alleged high-profile missions such as assassinations and detonations at Iranian missile bases, but also efforts to gather firsthand on-the-ground intelligence and recruit spies inside the Iranian program, according to the officials.

The new hesitancy has caused “increasing dissatisfaction” inside Mossad, Israel’s overseas spy agency, says one official. Another senior security officer attributes the reluctance to Prime Minister Benjamin Netanyahu, who the official describes as worried about the consequences of a covert operation being discovered or going awry.  Netanyahu was Prime Minister in 1997 when a Mossad attempt to assassinate senior Hamas official Khaled Meshaal in Amman Jordan ended in fiasco.  Two Mossad operatives were captured after applying a poison to Meshaal’s skin, and returned to Israel only after Netanyahu ordered the release of the antidote.  The Prime Minister also was forced to release Hamas’ spiritual leader Sheik Ahmed Yassin from an Israeli prison, dramatically boosting the fortunes of the religious militant movement.

“Bibi is traumatized from the Meshaal incident,” the official says. “He is afraid of another failure, that something will blow up in his face.”

Iranian intelligence already has cracked one cell trained and equipped by Mossad, Western intelligence officials earlier confirmed to TIME.  The detailed confession on Iranian state television last year by Majid Jamali Fashid for the January 2010 assassination by motorcycle bomb of nuclear scientist Massoud Ali Mohmmadi was genuine, those officials said, blaming a third country for exposing the cell.

(PHOTOS:Explosion by New Delhi’s Israeli Embassy)

In that case, the public damage to Israel was circumscribed by the limits of Iran’s credibility: Officials in Tehran routinely blame setbacks of all stripes on the “Zionists” and “global arrogance,” their labels for Israel and the United States.  But that could change if the Islamic Republic produced a captured Israeli national or other direct evidence – something on the lines of the closed circuit video footage and false passports that recorded the presence of Mossad agents in the Dubai hotel where Hamas arms runner Mahmoud al-Mabhouh was found dead in his room in January 2010.  Difficult-to-deny evidence of Israeli involvement trickled out for weeks; Netanyahu was Prime Minister then as well.

The stakes are higher now. With the Iranian issue at the forefront of the international agenda, a similar embarrassment could undo the impressive global front Washington has assembled against the mullahs — perhaps by allowing Iran to cast itself as victim, or simply by recasting the nuclear issue itself, from one of overarching global concern into a contest confined to a pair of longtime enemies.

Some warn that the assassinations already run that risk.  After the most recent killing, of nuclear scientist Mostafa Ahmadi-Roshan in January, the United States “categorically” denied involvement in the death and issued a condemnation.  Western intelligence officials say he was at least the third Iranian scientist killed by Mossad operatives, who lately are running short of new targets, according to Israeli officials.

(MORE: Zip for Tzipi: Change Atop Israel’s Kadima Signals Opposition in Disarray)

“It undercuts the consensus, the international consensus on sanctions,” says Mark Fitzpatrick, a former State Department nuclear proliferation specialist who opposes the assassinations.

The covert campaign also invites retribution from Iran’s own far-reaching underground.  In the space of just days last month,  alleged Iranian plots against Israeli targets in Thailand, Azerbaijan, Singapore and Georgia were announced as thwarted, and Indian officials blamed Iran for a nearly fatal attack that went forward in New Delhi.  The wife of an Israeli diplomat was injured by a magnetic bomb attached to her car by a passing motorcyclist, the precise method Israeli agents are alleged to have used repeatedly on the crowded streets of Tehran.

But scaling back covert operations against Iran also carries costs, especially as Iran hurries to disperse its centrifuges, some into facilities deep underground. Quoting an intelligence finding, one Israeli official says Iran itself estimates that sabotage to date has set back its centrifuge program by two full years. The computer virus known as Stuxnet — a joint effort by intelligence services in Israel and a European nation, Western intelligence officials say — is only the best known of a series of efforts to slow the Iranian program, dating back years. That alleged effort involves a variety of governments besides Israel, involving equipment made to purposely malfunction after being tampered with before it physically entered Iran.  The resulting setbacks prompted Iran to announce it would manufacture all components of its nuclear program itself –  something outside experts are highly skeptical Tehran has the ability to actually do.

“Iran has said for some time that they’re self-sufficient, but that’s a bag of wind,” says Fitzpatrick, now at London’s International Institute for Strategic Studies.  For example,  Iranian President Mahmoud Ahmedinejad in February announced that Iran had perfected a far more efficient centrifuge — a “fourth-generation” machine, three levels beyond its original centrifuges, made from designs purchased from Pakistan’s A.Q. Khan.  Fitzpatrick has his doubts. “They haven’t been able to get the second generation to work over the last ten years,” he says.

The alternative is importing equipment, which leaves the product vulnerable to continued tampering — especially in the shadowy markets of front companies where Iran has been forced by U.S. and international sanctions to do much of its business.  It can be almost impossible to know whom you’re actually doing business with, a circumstance that favors Western intelligence agencies.

“The easiest way to sabotage is to introduce faulty parts into the inventory from abroad,” says Fitzpatrick.

Between assassination and silent sabotage lies another covert option: Very loud sabotage. Recent years have brought a series of mysterious explosions at complexes associated with Iran’s nuclear program.  TIME has reported Western sources saying that Israel was responsible for the massive November blast at a Revolutionary Guard missile base outside Tehran, which by dumb luck also claimed the life of the godfather of Iran’s missile program.

But other blasts remain genuine mysteries. Weeks after a huge explosion darkened the sky over a uranium enrichment site in Isfahan, in central Iran, Israeli officials appeared eager to see what had actually happened.  “I’m not sure what,” a retired senor intelligence official said two weeks afterward, then offered an analysis based on open-source satellite photos available to anyone with an internet connection.

– Aaron J. Klein contributed from Jerusalem 

PHOTOS: Tempers Flare Across the Middle East

Article source: http://globalspin.blogs.time.com/2012/03/30/mossad-cutting-back-on-covert-operations-inside-iran-officials-say/?xid=rss-topstories

View full post on National Cyber Security » Virus/Malware/Worms

MTN’s cash, weapons and diplomatic influence in Iran

Cellphone giant MTN was so desperate to win a mobile operating licence in the “virgin” territory of Iran that it allegedly put together a package of bribes, trading opportunities in sophisticated weaponry, capital investment and diplomatic influence that the Islamic Republic could not resist.


That is the claim of rival firm Turkcell, which was pushed out of the deal when MTN arrived on the scene. It backs up the allegation with a raft of what appears to be internal MTN documents, leaked from the heart of the company’s Iran operation.

The allegations are set out in a $4-billion (R32-billion) lawsuit launched in the United States District Court of Columbia in Washington DC this week.

The scheme, allegedly known in MTN as “Project Snooker”, was allegedly driven from the top by then-chief executive Phuthuma Nhleko, with the assistance of Irene Charnley (then-commercial director), and Sifiso Dabengwa (then chief operating officer).

It included alleged bribes to South Africa’s ambassador to Iran, Yusuf “Jo-Jo” Saloojee, and Iran’s deputy foreign minister, Javid Ghorbanoghli; the involvement of former defence minister Mosiuoa Lekota in the procurement of highly sensitive weapons systems from parastatal Denel; and access for Iranian officials to South Africa’s top nuclear envoy, Abdul Minty.

The memos attached to the court papers apparently set out how Ghorbanoghli, dubbed “Long John”, was allegedly paid $400 000 to politically undermine Turkcell’s position while Saloojee, codenamed “Short John”, was allegedly paid $200 000 to help MTN deliver pro-Iran votes from South Africa at the International Atomic Energy Agency (IAEA) amid controversy over Iran’s nuclear plans.

The Irancell cellphone network was projected to be worth $31.6-billion in revenues over 15 years for a licence fee of $380-billion. The licence holder and the Iranian state-owned telecommunications company were to enjoy exclusive use of the market for two years before a third competing licence would be awarded.

Turkcell won the bid on February 18 2004 and MTN came second. But Turkcell claims that MTN, through “unprecedented corrupt acts”, blocked it from entering the agreements, clearing the regulatory environment and completing post-award obligations.

To secure the 49% stake in Irancell, MTN effectively also allegedly carried all the costs for its 51% partner through “sham loans”, Turkcell says.

CONTINUES BELOW
Click here

It is alleged in the papers that MTN paid the €300-million licence fee, capitalisation costs and share transfer tax of Iran’s state-owned defence company, Sairan (also known as Iran Electronic Industries or IEI) and Bonyad (one of the five Iranian quasi-independent charitable foundations that is integral to Iran’s defence establishment) in exchange for their assistance within the ministry of defence and the “Supreme Leader”.

What follows is a summary of Turkcell’s claims in its court application and the supporting documentation that allegedly emanates from within MTN. It has not yet been tested in court, nor has MTN commented on the authenticity of the documents.

The cash bribes: the “Long John” and “Short John” story
A few weeks after Turkcell was made the preferred bidder, Charnley met with Ghorbanoghli (Long John) in Tehran where the minister told her that MTN’s only chance to oust Turkcell was to win political influence in Iran and use South Africa’s influence to favour the Iranian government at the UN Security Council.

And so began “Project Snooker” — the plan on how best to use Iranian and South African government officials to allegedly gain political influence. MTN reached out to a former deputy minister for the Iranian ministry of information and communications technology and to Mohammed Mokhber, the deputy president of a major charitable foundation known as Bonyad Mostazafan, controlled by the supreme leader of Iran.

The Bonyad foundation is controlled by the Iran Revolutionary Guard Corps, the military complex formed by Iran’s supreme leader, Ayatollah Ali Khamenei, and is believed to control about one-third of the Iranian economy. It is known for engaging in Iran’s shadow foreign policy.

MTN was then introduced to Ebrahim Mahmoudzadeh, a former Iranian deputy minister of defence and then-president of Iran Electronic Industries, who reported directly to the Iranian minister of defence.

As one of Turkcell’s local minority partners in the Irancell consortium, Mokhber and Mahmoudzadeh told MTN executives they would be willing to work with the South African company and dump Turkcell if MTN could obtain certain defence equipment, support its nuclear programme and pay for the licence and other benefits.

For example, MTN was urged to facilitate the purchase of certain military equipment from South Africa for Iran’s state-owned defence company, Sairan, which was previously blocked by South Africa’s national conventional arms control committee. For more than a year, MTN executives regularly visited Mahmoudzadeh and the ministry of foreign affairs to reinforce its political influence.

In about April 2004, the Iranians tested MTN’s ability to deliver on defence products and nuclear votes. Sairan requested that MTN arrange a meeting with Denel, South Africa’s largest manufacturer of defence equipment, as well as then-defence minister Mosiuoa Lekota.

MTN was told Iran was building its defence force and it wanted to purchase military radios, encryption technologies and pilot display computer chips manufactured in the Western Cape, which South Africa refused to sell them previously. MTN made a commitment that it could procure this equipment as well as facilitate installation of eavesdropping technologies on MTN devices were they to be awarded the 49% stake in Irancell.

The MTN board of directors, including Cyril Ramaphosa, Nhleko, Dabengwa and Charnley, received regular reports on the status of Turkcell’s licence and MTN’s strategies.

Enter Saloojee, “aka Small John”, who was appointed South Africa’s ambassador to Iran on May 23 2004. Before he left for Tehran, MTN briefed him about the licence situation and about its desire to win the licence from Turkcell. “Small John” started working closely with “Long John” and convinced the Iranian government that MTN had enough political clout to help Iran on its nuclear and defence equipment needs. Charnley was key to that mix because of her political connections in South Africa, particularly with Lekota — she worked closely with him in the United Democratic Front during the 1980s. Ramaphosa also enjoyed a close relationship with Lekota because of their ties in the ANC.

It is well known in political circles that Charnley and Nhleko were closely aligned with former president Thabo Mbeki. Charnley is friends with Mbeki’s wife, Zanele, who assisted the former MTN executive with funds to help start Smile Communications, a telecoms company.

“Small John” was also allegedly close to Mbeki, with whom he had shared a house at some point during the struggle.

In about June 2004, Saloojee invited Charnley and Nhleko to his house for dinner and that’s where the discussion of the bribes for both “Small John” and “Long John” took place. Saloojee explained that he was hoping to purchase a house in South Africa for $200 000. On April 26 2007, MTN made a direct payment into a trust account for Saloojee, which was received by his property attorneys, Gildenhuys Lessing Malatji Inc. The property transaction was closed on September 26 2007.

MTN had also made a promise to Ghorbanoghli to reimburse him for his assistance and Saloojee had helped the Iranian with personal favours, such as arranging for his children to be educated in South Africa.

It was at a dinner in May 2005 that Charnley offered Ghorbanoghli a $400 000 bribe through a “sham” consultancy agency agreement to reward his efforts to politically undermine and destroy Turkcell’s position as the licence holder and to deliver the licence to MTN instead. The “sham” consultancy payment was authorised by Nhleko on behalf of MTN in a memo dated December 11 2006.

Charnley was sent a confidential memo in which Ghorbanoghli says he has arranged for a friend in Dubai to receive the funds on his behalf through a company called Aristo Oil International Services.

In an invoice from Aristo it described the scope of the responsibilities as “introduce MTN-Iran to key role-players, arrange meetings and generally provide support and assistance during the negotiations and conclusion of the necessary agreements that will provide for MTN’s entry into the Iranian mobile market”.

Ghorbanoghli delivered on that. On September 17 2005 MTN’s executive team flew to Iran and finalised agreements with the IEDC and payment structures. A day later MTN issued a notice to its board members regarding “Project Snooker” and its decision to officially take up the GSM licence in Iran.

On September 21 2005, two months before being awarded the licence, Nhleko delivered a confidential memorandum to Dabengwa, Charnley and MTN’s former chief financial officer, Robert Nisbet, which was copied to the Chris Kilowan and Paul Norman setting out in detail the ground rules for “Project Snooker” and how MTN would deliver on the defence and nuclear support promises.

Weapons: The promised Denel collaboration, which clearly came off
In August 2004, MTN accompanied Lekota on a trip to Iran, which the cellphone company organised and paid for, where they struck an “arms- for-licence” deal with the Iranian ministry of defence to deliver “The Fish”. Nhleko and Charnley were present at the meeting where they signed a confidential memorandum of understanding, promising that South Africa would deliver “heaven, earth, and fish”, meaning the elicit arms and technology in exchange for the licence.

“The Fish” was a code for the name for a combination of military co-operation and big-ticket defence equipment, including Rooivalk helicopters, frequency-hopping encrypted military radios, sniper rifles, G5 howitzers, cannons, armoured landmine-proof personnel carriers, radar technology, pilot “heads-up” display technology and other defence articles that included US systems and components. Iran didn’t have access to this equipment legitimately because of US and international sanctions against it at the time.

To reassure the Iranian authorities, MTN paid for Iran’s nuclear negotiator to meet with then-president Mbeki at his Cape Town residence, a meeting which was apparently facilitated by Charnley, Ramaphosa and Saloojee through their political connections.

On November 16 2004, Charnley sent a letter via fax on behalf of MTN, copied to Saloojee, facilitating a meeting between Denel and the Iran Helicopter Support and Renewal Co. The letter indicated that Charnley had met with then-Denel chief executive Victor Moche to provide helicopter technology from Denel to produce helicopters with US Apache technology in Iran.

Denel’s former head for North Africa and the Middle East, Donald Romfolo, confirmed they had been in talks with Iran’s defence ministry and state arms company, Sairan, in 2004.

But he said the national conventional arms control committee barred the company from trading in Iran “because of the US sanctions”. He denied any knowledge of Charnley and said he knew of no talks with MTN or pressure applied by the company.

Lekota, now president of Cope, flatly denied on Thursday that MTN had paid for any visit by him to Iran. “This is absolutely fallacious. Defence was never bankrupt when I was there.”

However, he confirmed one or more visits “in my official capacity” to Iran, and he confirmed that “in one of those visits it coincided with the MTN people also travelling there — they did form part of the South African delegation going there”.

“I had meetings with the relevant minister and I think even the head of state … but at no stage did I have any meetings with the cellphone company MTN, I was never in any meeting. I had no obligation or, in fact, no power to negotiate anything on behalf of MTN. I think MTN negotiated their business with their counterparts quite independent of their mission. I could not have made any promises to the Iranian government on defence co-operation without going through Cabinet.”

Later, confronted with a specific allegation that he had met his Iranian counterpart in the presence of MTN officials, he conceded that “when official business had been done … we might have been entertained, and that the businesspeople that may have been part of this visit may have been part of that”.

“I deny that there was any negotiations around MTN’s business interests by the ministry of defence led by myself.”

Lekota denied that he would have promised any weapons outside of the arms control committee’s approvals that would have to follow. “I never made any commitments of the nature you are suggesting.”

In the end, and once Iran had handed the licence to MTN, it seems whatever promises about defence materiel may have been made, came to naught.

In March 2007, a year and half after MTN was awarded the licence, MTN began facing even greater pressure from its Iranian partners to deliver on some of its defence and nuclear-related promises. MTN’s representative in Iran, Chris Kilowan, sent a memo to Nhleko from the Iranians calling on the company to deliver on its defence promises. “[MTN's chief executive Nhleko] should attempt as a matter of urgency to contact the president of South Africa and impress upon him that the failure to resolve the defence matters to the satisfaction of Iran will have severe negative repercussions for MTN,” read the memo attached as an exhibit.

The “highly confidential” memo recounts Saloojee’s description of visits to South Africa by top Iranian officials on behalf of supreme leader Ayatollah Ali Khamenei and President Mahmoud Ahmadinejad.

Khamenei dispatched Ali Larijani, then the secretary of Iran’s Supreme National Security Council, to remind Mbeki “that certain defence-related promises were made by the South African minister of defence in 2004 in exchange for which MTN was allowed to replace Turkcell in the Irancell consortium”.

The same memo reports that Manouchehr Mottaki, then Iran’s foreign minister, was sent by Ahmadinejad to “get a direct answer” from Mbeki about South Africa’s alleged promises to sell arms to Iran. Kilowan wrote in the memo: “Mottaki reiterated their understanding that MTN was allowed to replace Turkcell in exchange for defense co-operation.”

On the UN Security Council vote, the memo said: “It is now a matter of public record what happened to the vote on Saturday … that South Africa also voted in favour of the sanctions.”

The memo also relates Saloojee’s concerns. “The Iranians did not expect the voting to go otherwise, although they were hopeful that South Africa would at least abstain. As it is, South Africa is now seen as having made a U-turn on the matter and we will have to closely monitor the reaction of the Iranians to the fact.”

MTN also found itself being threatened in late 2007 by “Long John” for not delivering on its promises.

Mbeki’s spokesperson, Mukoni Ratshitanga, told the MG: “Former president Thabo Mbeki does not believe that he should oblige attempts to drag his name into this matter and will therefore not comment.”

The Votes: International Atomic Energy Agency and the United Nations
Throughout 2004 and 2005, at the same time that MTN was lobbying hard to displace Turkcell, Iran came under intense pressure over its nuclear enrichment programme.

The international community had repeatedly voted against the state before the International Atomic Energy Authority and the UN Security Council, calling on it to meet its obligations under the Nuclear Non-Proliferation Treaty.

In fact, as Turkcell detailed, from 2004 to 2008, South Africa largely joined the votes against Iran except for a brief hiatus at the end of 2005 and the beginning of 2006, which coincided with the November 2005 license award.

“MTN learned that the Iranians understood South Africa to play a critical role in being able to lead the ‘non-aligned’ nations on nuclear votes in international bodies,” Turkcell stated.

And so, Turkcell claims, the cellphone giant orchestrated an “informal” meeting between Mbeki and Iran’s nuclear chief, Hassan Rowhani, at a dinner at Mbeki’s Cape Town residence.

“MTN paid for adviser Rowhani to stay at a hotel in Cape Town, sponsored the large dinner party, and covered all travel logistics,” Turkcell claims. “Consistent with MTN’s promises, the president assured adviser Rowhani that the South African government would support Iran at the [International Atomic Energy Authority].”

But Mbeki, through his spokesperson, refused to comment on this account.

That September, when the International Atomic Energy Authority board found Iran not to be complying with its non-proliferation treaty obligations, South Africa abstained.

Come November 20, Turkcell detailed, MTN expected it was to be awarded the licence. Instead, the Iranians are said to have delivered the message that should South Africa vote against Iran at a crucial November 24 vote before the IAEA, it would “cause trouble”.

The decision the IAEA has to make was on whether to refer Iran to the UN Security Council for breaching the NPT.

This appears to have sent the company’s mavericks into a bit of a spin.

It is alleged they approached Saloojee, who approached South African ambassador to the IAEA Abdul Minty. Other frantic calls were made, and as it happened, South Africa abstained from the vote.

Three days later the Iranians issued the GSM license to MTN.

The MG was unable to reach Minty on Thursday, but when he was approached on the matter in February, he strenuously denied having been influenced: “At no point did [MTN] approach me to influence me in any direction.”

According to him, South Africa’s policy on Iran at the IAEA had been “very consistent”.

The “loan” to the 51% partner
After being awarded the 49% stake, MTN made good on its promises to its 51% shareholder, carrying all its costs. MTN agreed to pay the IEDC’s $88-million capital share of MTN Irancell as well as their share of the $300-million licence fee.

The Iranian partners were clear that they were not willing to pay any “interest” on, or put up security for, a “loan”. Charnley presented the proposed arrangement to MTN. Rob Nisbett, the chief financial officer, was apparently shocked at the proposal and refused to permit the deal on “improper and unsecured terms”.

He insisted that a formal loan agreement be negotiated and entered into with the parties. He also threatened to resign if this was not done.

On November 15 2005 MTN Group directed its subsidiary, MTN International (Mauritius) Ltd, to enter into sham “loan” agreements with the IEDC. Nisbett still voiced concern about this arrangement and informed the executive team that the “loans” put MTN at huge risk. Nhleko issued Nisbett with a formal written warning for opposing the financial terms and was instructed to authorise the transaction.

Documents show MTN made the “loans” through a series of complex “round trip” agreements by shifting the funds around between the IEDC, MTN-Irancell, and MTN Group, which it then recorded on its books as loans.

By the time the loans were due, MTN-Irancell was highly profitable — $118-million profit in 2007, $234-million in 2008, $516-million in 2009, $583-million in 2010 and at least $503-million projected for 2011.

Charnley did not respond to numerous messages left on her cellphone and with an assistant in her office. An automatic message at Saloojee’s office — the South African embassy in Oman where he is ambassador — said staff did not work on Thursdays, and emails were not answered.

Spokespeople for Nhleko and Ramaphosa said they would pass on the MG‘s respective messages, but neither responded in time for print deadline.

Department of International Affairs and Cooperation spokesperson Clayson Monyela could not be reached, but last month he denied that any company had influence over South Africa’s foreign policy.

Calls to Iran’s embassy in South Africa were placed on hold, after which no calls were answered.

Claim ‘has no legal merit and will be opposed’
MTN and its legal advisers were locked in all-day meetings yesterday, filing its JSE news service (Sens) announcement only at 5.30pm in response to the explosive claims made by Turkcell in a lawsuit filed in the Washington Federal Court at 2am South African time.

Africa’s largest cellphone operator said the claim had still not been served, but that it would oppose it. The company reiterated that there was “no legal merit” to Turkcell’s claim and no basis for such a claim to be brought before a United States court. It also noted the South African government’s denial of the allegations that MTN exercised influence over it.

In advance of Turkcell filing its claim, MTN announced the formation of an independent committee, under the chairmanship of internationally renowned jurist Lord Hoffmann, to investigate Turkcell’s allegations. The Hoffmann committee has already begun its investigations and will report its findings to the MTN board, with any recommendations on actions to be taken as a result of its findings, including their publication.

“The Hoffmann committee has invited Turkcell to participate in its investigation, but Turkcell has to date not done so,” MTN said in the statement. “The invitation remains open to Turkcell to participate in the Hoffmann committee’s investigation.”

Turkcell has been threatening to take MTN to the US courts for corruption since February 2, but held out for a settlement from MTN first before it filed. MTN has been calling its bluff by refusing to settle out of court, claiming extortion.

Turkcell has argued that MTN has many business interests in the US and that the cellphone company has violated the Alien Tort Statute, a 1789 law that gives US courts jurisdiction in some instances to consider claims by foreigners for illegal conduct that occurred in another country. The law is usually cited in human rights and torture cases.

Meanwhile, Turkcell was yesterday dealing with its own set of issues relating to infighting among its board and shareholders.

Reuters reported that the board met to discuss its structure and independent board members. Having founded Turkcell in 1994, Mehmet Emin Karamehmet is locked in a boardroom struggle with the other main shareholders in Turkcell: Altimo and Nordic telecommunications group TeliaSonera.

Turkcell’s board has seven members. The three main shareholders — Cukurova, Altimo and TeliaSonera — each has two seats. Chairperson Colin Williams is the designated independent board member. Altimo and TeliaSonera want him replaced because they say he sides with Cukurova, Reuters reports. TeliaSonera has a 37% stake in Turkcell, whereas Altimo has a 13.2% stake it bought from Karamehmet in 2005. However, Cukurova’s 13.8% stake carries controlling rights because of Turkcell’s structure. — Sharda Naidoo

Sharda Naidoo is assistant business editor; Craig McKune and Stefaans Brümmer are investigators with the MG Centre for Investigative Journalism (amaBhungane).

Article source: http://mg.co.za/article/2012-03-30-mtns-cash-weapons-and-diplomatic-influence-in-iran/

View full post on National Cyber Security

BBC Falls Victim To ‘Iran Cyber Attack’

Hackers launched a "sophisticated cyber-attack" on the BBC, director general Mark Thompson has revealed.

View full post on cyber attack – Yahoo! News Search Results

View full post on National Cyber Security

EU bans export of Internet surveillance gear to Iran

On Friday, the Council of the European Union approved new measures against Iran, adding 17 Iranian officials to the list of those forbidden to enter the 27-member bloc, as well as an asset freeze. The Council’s new measures also bans all exports of equipment and software “intended for use in the monitoring or interception of internet and telephone communications by the Iranian authorities.”

“The EU remains deeply concerned by the deteriorating human rights situation in Iran,” said Catherine Ashton, the EU’s High Representative, in a statement.

“We deplore the continuing increase in executions and the widespread repression of Iranian citizens, including human rights defenders, journalists and members of the opposition. We renew our calls on the Iranian authorities to live up to their international human rights obligations and to protect all fundamental freedoms to which the Iranian people are entitled.”

UK, Finnish-German firms under fire

Catherine Ashton said the sales ban was imposed for human rights reasons

Since the contested Iranian presidential election of June 2009, various European companies have been implicated in selling hardware and software than can be used to conduct surveillance and other intelligence-gathering capabilities.

In November, the British government said it would consider banning the sale of mobile phone surveillance software to Iran and Syria.

A British company, Creativity Software, had admitted that it does sell location-based services technology to MTN Irancell in Iran, but suggested that these were limited to “zone billing” and “friend finder” applications. In a November 10, 2011 statement on its website, the company emphatically writes: “Creativity Software has not supplied technology to any other entity in Iran.”

Previously, Nokia Siemens Networks, a joint Finnish-German venture, came under fire during the aftermath of the controversial June 2009 Iranian presidential election. Critics said its hardware had been used to monitor and surveil Iranians. The company maintains that what it sold to Iran was legal and that a “lawful intercept” capability is common in such packages.

Rick Falkvinge, left, said that all people have the right to communicate privately

Internet activists approve

The new law designates local entities in member states, usually a cabinet-level ministry, such as the Foreign Ministry or Ministry of Economy, to be responsible for evaluating possible export cases. In the case of a sale of material that could fall under this ban, it is incumbent upon the firm to submit an application to the relevant government agency for review before the sale is complete.

The Council of the European Union noted that the new language concerning a ban on Internet surveillance equipment was copied from existing export bans concerning nuclear-related material.

“The competent authorities of the member states, as identified in the websites referred to in Annex II, shall not grant any authorization under paragraph 1 if they have reasonable grounds to determine that the equipment, technology or software in question would be used for monitoring or interception, by Iran’s government, public bodies, corporations and agencies or any person or entity acting on their behalf or at their direction, of internet or telephone communications in Iran,” the new measure states.

Longtime privacy activists and others who support a free Internet in Iran have applauded this move.

“It used to be that there were gun export controls for countries engaged in war against other nations – this seems to expand now to countries waging war against their own citizens,” wrote Rick Falkvinge, the founder of the Swedish Pirate Party, in an e-mail sent to DW.

“In such a shift, it is both imperative and natural to include surveillance products used to wage war against the civil population. I welcome this development; it is fully in line with the grassroots fight for securing civil liberties. Everybody has the right to communicate and express opinions in private.”

Yet Eric King, of Privacy International, an advocacy group in London, cautioned that the ban might not go far enough.

“For a country like Iran in which all companies administering national infrastructure are effectively controlled by the state, it is still unclear whether the ban on exports of equipment and software “intended for use…by the Iranian authorities” goes far enough,” he wrote in an e-mail sent to DW.

“Until such time as the Iranian government corrects its appalling attitude to human rights, there can be no guarantee that any surveillance technology exported to the country will not be used to facilitate torture, execution and unlawful detention.”

Author: Cyrus Farivar
Editor: Andreas Illmer

Article source: http://www.dw.de/dw/article/0,,15829335,00.html?maca=en-rss-en-all-1573-rdf

View full post on National Cyber Security » Spyware/ Cyber Snooping

BBC suffers cyber-attack following Iran campaign – chief

LONDON (Reuters) – The BBC has suffered a sophisticated cyber-attack following a campaign by Iranian authorities against its Persian service, director-general Mark Thompson said on Wednesday. Thompson …

View full post on cyber attack – Yahoo! News Search Results

View full post on National Cyber Security

Iran window of opportunity for diplomatic solution ‘shrinking’, Barack Obama warns

Barack Obama encourages Iran to avert "even worse consequences".

View full post on germany cyber attack – Yahoo! News Search Results

View full post on National Cyber Security

Iran blamed for major cyberattack on BBC

Iran is privately being blamed for a major cyber-attack on the BBC earlier this month that blocked access to its popular Persian TV service and disrupted the Corporation’s IT.

The multi-pronged 2 March attack took down much of the BBC’s email, overloaded its telephone switchboard with automatic phone calls, and blocked a satellite feed for the BBC Persian station. BBC servers were also on the receiving end of a DDoS attack.

In an unprecedented tactic, the BBC has trailed a speech to be given this week to the Royal Television Society in which Director General Mark Thompson will mention the attacks in some detail while stopping short of formally naming Iran as the perpetrator.

“It now looks as if those who seek to disrupt or block BBC Persian may be widening their tactics,” Thompson will reportedly say.

“It is difficult, and may prove impossible, to confirm the source of these attacks, though attempted jamming of BBC services into Iran is nothing new and we regard the coincidence of these different attacks as self-evidently suspicious. We are taking every step we can, as we always do, to ensure that this vital service continues to reach the people who need it.”

Iran’s motivation for the attack – and few seriously doubt that Iran is the most likely culprit – is believed to be viewing figures released by the BBC only days before the attack showing the rising popularity of its Persian TV channel, which has doubled its audience to 6 million people.

Iran has previously tried to jam the radio signals for service, which marks the 2 March attack out as a significant escalation.

The country heavily moderates and controls access to the Internet or its own people, including slowing connection speeds to disrupt the distribution of video by its citizens to foreigners.

Article source: http://rss.feedsportal.com/c/270/f/3551/s/1d6ecf9f/l/0Lnews0Btechworld0N0Csecurity0C3344360A0Ciran0Eblamed0Efor0Emajor0Ecyberattack0Eon0Ebbc0C0Dolo0Frss/story01.htm

View full post on National Cyber Security » Computer Hacking

Iran blamed for major cyberattack on BBC

Iran is privately being blamed for a major cyber-attack on the BBC earlier this month that blocked access to its popular Persian TV service and disrupted the Corporation’s IT.

The multi-pronged 2 March attack took down much of the BBC’s email, overloaded its telephone switchboard with automatic phone calls, and blocked a satellite feed for the BBC Persian station. BBC servers were also on the receiving end of a DDoS attack.

In an unprecedented tactic, the BBC has trailed a speech to be given this week to the Royal Television Society in which Director General Mark Thompson will mention the attacks in some detail while stopping short of formally naming Iran as the perpetrator.

“It now looks as if those who seek to disrupt or block BBC Persian may be widening their tactics,” Thompson will reportedly say.

“It is difficult, and may prove impossible, to confirm the source of these attacks, though attempted jamming of BBC services into Iran is nothing new and we regard the coincidence of these different attacks as self-evidently suspicious. We are taking every step we can, as we always do, to ensure that this vital service continues to reach the people who need it.”

Iran’s motivation for the attack – and few seriously doubt that Iran is the most likely culprit – is believed to be viewing figures released by the BBC only days before the attack showing the rising popularity of its Persian TV channel, which has doubled its audience to 6 million people.

Iran has previously tried to jam the radio signals for service, which marks the 2 March attack out as a significant escalation.

The country heavily moderates and controls access to the Internet or its own people, including slowing connection speeds to disrupt the distribution of video by its citizens to foreigners.

Article source: http://rss.feedsportal.com/c/270/f/3551/s/1d6ecf9f/l/0Lnews0Btechworld0N0Csecurity0C3344360A0Ciran0Eblamed0Efor0Emajor0Ecyberattack0Eon0Ebbc0C0Dolo0Frss/story01.htm

View full post on National Cyber Security » Computer Hacking

New malware preys on Iran nuclear weapons tension

Chinese cybercriminals have crafted a sophisticated, robust malware attack that exploits growing political tension and fear over Iran’s alleged covert nuclear weapons program to infect PCs.

The goal of the hackers is to corrupt the computers of U.S. military employees, according to researchers from the security firm Bitdefender, who detected the malware.

Calling it “the perfect firebomb,” the China-borne malware embeds itself in an email with an attached Microsoft Word document titled “Iran’s Oil and Nuclear Situation.doc.” The document, Bitdefender explained, contains an Adobe Shockwave Flash applet that attempts to get the recipients to load a fake YouTube video.

While the rigged video (an .mp4 file) loads, the malware exploits an Adobe Flash flaw that sneaks an executable file into the initial Word document.

If it sounds complicated, that’s the point, Bitdefender’s Bogdan Botezatu said.

“The operation is covert: the MP4 file triggering the exploit is streamed from the Web, which means the PC will be exploited by the time an anti-virus would generally scan a file,” he wrote. “Further, the malicious file delivered inside the doc file (us.exe) has multiple layers of obfuscation to dodge detection.”

Once the malware is implanted on a victim’s computer, it communicates with a command-and-control server in China.

Carefully crafted exploits aimed at military targets are nothing new; a November congressional report outlined state-sponsored cybercrime missions carried out by Chinese and Russian criminals against U.S. government agencies.

And the infamous “Operation Aurora” attacks, launched by Chinese cybercriminals, targeted more than 200 major U.S. companies, including Google and Morgan Stanley.

Because advanced persistent threats like this can be difficult to detect and eliminate once they’re on your system, it’s important to never click on any attachment that appears at all suspicious. It’s also crucial to install a software firewall and run strong anti-virus software on your computer, and to download security patches for vulnerable programs as soon as they become available.

© 2012 SecurityNewsDaily. All rights reserved

Article source: http://www.msnbc.msn.com/id/46722543/ns/technology_and_science-security/

View full post on National Cyber Security » Virus/Malware/Worms

Page 5 of 12« First...«34567»10...Last »

Get The New Book By Gregory Evans

Everyone Is Talking About!

Are You Hacker Proof?
$15.95

Find Out More, Click Here!