Jump to content

Coss

Board Sponsors
  • Posts

    17384
  • Joined

  • Days Won

    356

Everything posted by Coss

  1. Coss

    Koh Tao Murders

    Thailand backpacker murders: DNA evidence 'lost' - police (BBC) Crucial DNA evidence in the case of the murder of two British backpackers cannot be retested because it no longer exists, Thai police have told the BBC. The evidence is central to the prosecution case against two Burmese migrants on trial for killing David Miller, 24, from Jersey, and Hannah Witheridge, 23, from Norfolk. The defence had wanted it re-examined. It comes as Zaw Lin and Wai Phyo, who both deny murder, rape and robbery, appear in court for a second day. Full story: http://www.bbc.com/news/uk-33457038 Via Thai Visa
  2. Coss

    Koh Tao Murders

    Day two of the Koh Tao murder trial KOH SAMUI: -- Today the Koh Tao murder trial resumed for day two at the Samui Provincial Court. The defense lawyers acting for Zaw Lin and Wei Phyo accused of the murders of Hannah Witheridge and David Miller remained concerned about the DNA evidence being used against their clients. A decision was due to be made by the judge today as to whether independent DNA testing could be carried out. However a senior police officer today told the court that the DNA found on the cigarettes is “finished†and other samples were only suitable for one test or may have been lost. In a dramatic development is now appears that evidence provided by the British authorities could prove the innocence of the two suspects. However the defense team were only able to confirm that recent significant information had been received from the UK that highlights important contradictions in the prosecution evidence they were not able to elaborate on what that evidence might be. One witness was called to stand today, a 45 year old woman who was working on Koh Tao at the time of the murders. She recalled seeing some people playing guitar on the beach in the early hours of the morning of September the 15th 2014 but was not able to say with any degree of certainty who those people actually were. The defendants looked tired in court today, yesterday’s hearing going on until 7-45pm meant there was nobody available to remove their shackles when they arrived back at the prison. Both said they had not been able to get much sleep and both men continue to deny having any involvement in the horrific murders of the two British backpackers. The court hearing, that adjourned today at around 11am is due to be back in session at 9am tomorrow morning. -- Samui Times 2015-07-09 Vis Thai Visa
  3. Coss

    Koh Tao Murders

    British backpacker murder trial in Thailand stalls over key DNA evidence Critical forensic evidence not available to court on second day of trial of suspects accused of killing tourists Hannah Oliver Holmes in Koh Samui KOH SAMUI: -- A Thai court hearing the case of two Burmese men accused of murdering two British backpackers stalled on the second day of a three-month trial after a police officer failed to present what the defence says is key DNA evidence. The head judge on a panel of three in a court on the tropical holiday-making island of Koh Samui said that he would rule on the matter on Thursday, when Police Lieutenant Colonel Somsak Nurod, who is believed to hold evidence related to the case, would appear to testify. But Nurod spent only a few minutes in the court, where he showed the judge of list of evidence exhibits. This included the alleged murder weapon, a hoe, which was used to kill Hannah Witheridge, 23, from Norfolk and David Miller, 24, from Jersey on Sairee beach on the nearby Koh Tao island on September 15. Full story: http://www.theguardi...ey-dna-evidence Via Thai Visa
  4. Now let this be a lesson to you.... ______________________________ Misbehaviour and "inappropropriate dress standards" by Thai officials during a visit to Laos have prompted a stern order from Education Minister Narong Pipatanasai. Adm Narong has ordered all ministry staff and students to dress and behave properly when making official visits to the country. The Thai embassy in Vientiane was informed that several Thai delegates dressed and behaved improperly when visiting government agencies there. The embassy wrote to the Foreign Ministry, which passed on the news. A source at the embassy said complaints arose about Thai delegations wearing attire regarded as improper for visiting government buildings or educational institutions. "The casual dress problem has come up several times in Laos," the source said. "Sometimes we received phone calls telling us politely that wearing shorts, sandals or skinny jeans in official buildings is not proper." Some female delegates wore skinny jeans to parliament and students wore mini-skirts to universities, the source said. Adm Narong said Wednesday the ministry received a letter from the Foreign Ministry asking for cooperation over dress and manners when visiting Laos since the number of Thai delegations to Laos has been increasing. Several needed advice on how to dress and behave properly, he said. "The ministry aims to avoid misunderstandings and prevent problems that could affect our relations. We [the Education Ministry] will strictly follow the practice,'' Adm Narong said. The minister said similar incidents had been reported in visits to other countries including Europe and Australia. He said the ministry set standards for education ministry officials who make business trips overseas to protect the image of the country. http://www.bangkokpost.com/news/general/617440/thais-dress-improperly-in-laos
  5. Essentially it works like this. I borrow money, I then pay it back. Simple really. If I fail to pay it back, because my circumstances have changed, or because I entered into an agreement whose conditions were so onerous that I couldn't pay it back, or I just borrowed more that I could possibly pay back, like twice or three times my earning potential, then, I am in the same position as Greece.
  6. The FBI Spent $775K on Hacking Team’s Spy Tools Since 2011 THE FBI IS one of the clients who bought hacking software from the private Italian spying agency Hacking Team, which was itself the victim of a recent hack. It’s long been suspected that the FBI used Hacking Team’s tools, but with the publication yesterday of internal documents, invoices, emails and even product source code from the company, we now have the first concrete evidence that this is true. The FBI is not in good company here. According to several spreadsheets within the hacked archive, which contain a list of Hacking Team’s customers, many of the other governments who bought the same software are repressive regimes, such as Sudan and Bahrain. The documents show that the FBI first purchased the company’s “RCS†in 2011. RCS stands for “Remote Control Service,†otherwise known as “Galileo,†Hacking Team’s premiere spy product. RCS is a simple piece of hacking software that has been used by the Ethiopian regime to target journalists based in Washington DC. It has also been detected in an attack on a Moroccan media outlet, and a human rights activist from the United Arab Emirates. Once a target’s computer has been infected, RCS is able to siphon off data, and listen in on communications before they have been encrypted. According to researchers based at the University of Toronto’s Citizen Lab, who have monitored the use of RCS throughout the world, the tool can also “record Skype calls, e-mails, instant messages, and passwords typed into a Web browser.†To top that off, RCS is also capable of switching on a target’s web camera and microphone. Hacking Team has generated a total of 697,710 Euros ($773,226.64) from the FBI since 2011, according to the hacked spreadsheets. In 2015, the FBI spent 59,855 Euros on “maintenance,†and in 2014 the agency spent the same amount on “license/upgrades.†No expenditure was recorded for the whole of 2013. In 2012, however, the FBI allegedly spent 310,000 Euros for Hacking Team’s services, all on licenses or upgrades, and the year before it spent 268,000 Euros. A final column on one of the hacked spreadsheets is entitled “Exploitâ€. For the FBI, the entry is written as “Yes.†Though it’s unclear exactly what this means, we can infer that the FBI’s version of RCS came with an exploit of some kind that could gain access to user’s computers, rather than being deployed through social-engineering means. Regardless, the FBI has been known to hack the computers of criminals in the past. In fact, the agency has been using malware since at least 2002 for all sorts of criminal cases, and the FBI develops some of its own tools. In 2012, “Operation Torpedo†was launched, which involved loading malware onto a number of child pornography sites, and identifying the IP addresses of anyone who visited. A similar operation was launched shortly after, in order to catch users of Freedom Hosting, a dark web hosting company. Those were both broad attacks, designed to sweep up as many offenders as possible. Hacking Team’s tools, on the other hand, are used for more targeted surveillance of specific individuals or groups. According to the hacked spreadsheets, the FBI has used RCS against 35 targets, although it is unclear who these targets are. The FBI did not immediately respond to multiple requests for comment. One interesting tidbit from the spreadsheet is that it appears that Hacking Team has not been selling these products directly to the FBI. Though the FBI is listed as the client, its “Partner/Fulfillment Vehicle†is listed as “CICOM USA.†That name is familiar. Earlier this year, an investigation from Motherboard revealed that the Drug Enforcement Administration had been secretly purchasing surveillance technology from Hacking Team. Within that contract, $2.4 million was sent “between the DEA’s Office of Investigative Technology and a government contractor named Cicom USA,†according to Motherboard. An invoice with the file name “Commessa019.2014. CICOM USA x FBI.xls,†also included in the Hacking Team archive, lists a “One year renewal for Remote Control System,†charged to Cicom USA. The invoice says that the product lasts from July 1, 2014 to the June 30, 2015. The file name for the invoice explicitly includes the FBI, and not the DEA. However, the spreadsheet with the client list shows that the FBI is, in fact, joined by the DEA and the DOD in buying products from Hacking Team, which both also use Cicom USA as their “fulfilment vehicles.†Cicom USA is little more than a shell company for Hacking Team. “They have the same address, they have the same telephone number,†as Hacking Team’s US office, Edin Omanovic, a technologist at Privacy International, told WIRED in a phone interview. As for what protections might be in place to make sure that the FBI (or any US government agency) is using this technology responsibly, it’s all a bit hazy. “We think they get court orders, and we have even seen a few, but the applications don’t really describe how the software works, or how they will get it onto the target’s device,†Christopher Soghoian, Principal Technologist at the American Civil Liberties Union, told WIRED in an encrypted chat. The problem is that the discussion around law enforcement using hacking as a means of information gathering has never been carried out in public. “Congress has never explicitly granted law enforcement agencies the power to hack. And there have never been any congressional hearings on the topic,†Soghoian continued. “We need to have a national debate about whether we want law enforcement agencies to be able to hack into the computers of targets. This is too dangerous a tool for them to start using by themselves.†Wired.com
  7. FEW NEWS EVENTS can unleash more schadenfreude within the security community than watching a notorious firm of hackers-for-hire become a hack target themselves. In the case of the freshly disemboweled Italian surveillance firm Hacking Team, the company may also serve as a dark example of a global surveillance industry that often sells to any government willing to pay, with little regard for that regime’s human rights record. On Sunday night, unidentified hackers published a massive, 400 gigabyte trove on bittorrent of internal documents from the Milan-based Hacking Team, a firm long accused of unethical sales of tools that help governments break into target computers and phones. The breached trove includes executive emails, customer invoices and even source code; the company’s twitter feed was hacked, controlled by the intruders for nearly 12 hours, and used to distribute samples of the company’s hacked files. The security community spent Sunday night picking through the spy firm’s innards and in some cases finding what appear to be new confirmations that Hacking Team sold digital intrusion tools to authoritarian regimes. Those revelations may be well timed to influence an ongoing U.S. policy debate over how to control spying software, with a deadline for public debate on new regulations coming this month. One document pulled from the breached files, for instance, appears to be a list of Hacking Team customers along with the length of their contracts. These customers include Azerbaijan, Bahrain, Egypt, Ethiopia, Kazakhstan, Morocco, Nigeria, Oman, Saudi Arabia, Sudan, and several United States agencies including the DEA, FBI and Department of Defense. Other documents show that Hacking Team issued an invoice to Ethiopia’s Information Network Security Agency (the spy agency of a country known to surveil and censor its journalists and political dissidents) for licensing its Remote Control System, a spyware tool. For Sudan, a country that’s the subject of a UN embargo, the documents show a $480,000 invoice to its National Intelligence and Security Services for the same software. “These are the equivalents of the Edward Snowden leaks for the surveillance industry,†says Eric King, the deputy director of Privacy International. “There are few countries [Hacking Team] aren’t willing to sell to. There are few lines they aren’t willing to cross.†In its marketing materials, Hacking Team describes its RCS product as “a solution designed to evade encryption by means of an agent directly installed on the device†an agency is monitoring. “You want to look through your target’s eyes,†reads the script of one of the company’s videos, shown below. “You have to hack your target.†Last year, researchers at Toronto-based Internet surveillance analysis group Citizen Lab and antivirus firm Kaspersky revealed Hacking Team software that targets every mobile operating system to take total control over phones. Hacking Team hasn’t yet responded to WIRED’s request for comment. One Hacking Team engineer, Christian Pozzi, seemed to defend his employer briefly on Twitter, writing that the company’s attackers were “spreading lies about the services we provide.†His feed was soon hacked and then deleted. Hacking Team’s newly exposed business practices call into question whether current regulations effectively prevent a private firm from selling hacking software to any government in the world. One written exchange between Hacking Team’s executives and UN officials shows the UN questioning Hacking Team’s sales to Sudan. A letter from the UN to the company references a March 2015 letter Hacking Team sent the UN, in which it argued that its spying tools didn’t count as a weapon, and so didn’t fall under the UN’s arms embargo. (The UN disagreed.) “Sudan is one of the most strictly embargoed countries in the world,†says Chris Soghoian, a privacy activist and lead technologist for the American Civil Liberties Union who first spotted the UN correspondence in the Hacking Team data dump. “If Hacking Team believes they can lawfully sell to Sudan, they believe they can sell to anyone.†That issue of whether hacking tools are defined as weapons in the terms of arms control agreements couldn’t be more timely: An arms control pact called the Wassenaar Arrangement has been hotly debated in recent weeks over its measures that would control the international export of intrusion software. The US Department of Commerce has opened the process to public comment, a window that ends on July 20. The Wassenaar Arrangement has been criticized by the hacker community as limiting security research and preventing the sharing of penetration testing tools. But Privacy International’s Eric King argues that the practices of Hacking Team demonstrate why the pact is necessary, along with what he describes as “carve-outs†to protect security research. “What’s clear is that these companies can’t be left to their own devices,†says King. “Some form of regulation is needed to prevent these companies from selling to human rights abusers. That’s a hard policy question, and one tool won’t be a silver bullet. But regulation and export controls should be part of the policy response.†The issue of whether hacking tools are defined as weapons in the terms of arms control agreements couldn't be more timely Despite Hacking Team being based in Italy, the US Department of Commerce’s still-evolving export control regulations may still apply to the company, says the ACLU’s Chris Soghoian. He points to two firms he spotted in Hacking Team’s breached files who appeared to be reselling the company’s tools: Cyber Point International in Maryland and Horizon Global Group in California. The hacked documents are far from the first evidence that Hacking Team has sold its tools to authoritarian governments. Researchers at Citizen Lab have accused Hacking Team of selling to countries including Sudan and the United Arab Emirates, who used it to spy on a political dissident who was later beaten by thugs. WIRED reported in 2013 on an American activist who was apparently targeted by Turkey using Hacking Team tools. But Hacking Team has responded with denials, criticisms of Citizen Lab’s methods, and claims that it doesn’t sell to “repressive regimes.†“Hacking Team has continuously thrown mud, obfuscated, tried to confuse the truth,†says Privacy International’s King. “This release helps set the record straight on that, and shows their deviousness and duplicity in responding to what are legitimate criticisms.†Wired.com
  8. At the private school where I did a bit of teaching, the two cute lady teachers would often sit in the back of my class, I sure just to listen to my accent, coz they never said "Hello Hansum Man"
  9. The Second Best Exotic Marigold Hotel 2015 - I really liked the first one, this is arguably better than the first. You don't need to see the first one first, but it expands the story if you do. If there's a third I'll definitely see it. The cast is pure quality, the stories good and the setting not so far from LOS. Well worth a watch.
  10. Coss

    Mailchimp

    Yes, email marketing in particular.
  11. Hey Kong, for the sake of argument, who paid for your education and health care, even if it was sub-standard or other wise, in your opinion, pre and post puberty?
  12. Coss

    Mailchimp

    The place where I spend 8 hours a day, at the moment, recommends this one, to clients, as we don't do email set ups or marketing. Regarded as a good solution for people who want to send and handle emails in a commercial manner. My 2 bahts worth.
  13. Write it yourself, they won't check.
  14. "police believe that it is a case of suicide but until the note is translated the case will remain open" At least they are appearing to keep an open mind.
  15. Man crushed to death by robot at car factory A worker at a Volkswagen factory in Germany has died, after a robot grabbed him and crushed him against a metal plate. The 22-year-old man died in hospital after the accident at a plant in Baunatal, 100km north of Frankfurt. He was working as part of a team of contractors installing the robot when it grabbed him, according to the German car manufacturer. Heiko Hillwig, from Volkswagen, blamed "human error" rather than the robot. Image caption Volkswagen CEO Martin Winterkorn visited the Kassel-Baunatal plant in 2010, where the worker was killed He said: "It [robot] can be programmed to perform various tasks in the assembly process. "It normally operates within a confined area at the plant, grabbing auto parts and manipulating them." Another contractor was there at the time when the accident happened, on Monday, but wasn't harmed, He declined to give any more details about the case, citing an "ongoing investigation". German news agency dpa reported that prosecutors were now investigating and deciding who to prosecute. http://www.bbc.co.uk...-at-car-factory
  16. Police hunting down blowjob bargirl Pattaya Police have put out a dragnet on a hunt for a woman who damaged that coastal community’s pristine image with one photograph. Long held by the public as an esteemed home of the virtuous and upright, Pattaya’s image was possibly forever soiled yesterday by a photograph of a woman on her knees giving a blowjob to an Asian tourist in the middle of a public bar on Pattaya's Walking Street. Responding to the photos which spread online to the shock and outrage of two or three people, police Cmd. Sukkatat Poompanmuang said yesterday he has ordered his officers to track down the lady in question to charge her with public obscenity. The photos spread online yesterday provoking an uproar among a public part-titillated and part-horrified. "Oh woman! She feels like sucking it, so she just does, showing off her pro skill in the middle of the pub!†wrote user Nangfa Yakuza, who first posted the photo online. “The guy seems satisfied and doesn't shy away at all!" The photos were soon taken offline. "This is too nasty,†another user commented. “This is why foreigners look down on Thai women.†Sukkatat added that police have been able to identify the entertainment complex where the BJ seen-round-the-net was given, but admitted he’s uncertain whether "she's a woman or not." If found guilty, the bar's owner and the lady in question will be prosecuted, INN reported. http://bangkok.coconuts.co/2015/06/30/police-hunting-down-blowjob-bargirl
  17. Slightly related occurrence, I can remember seeing wives and children of Lao Important folk, being allowed to greet their Family at the plane door and then waltzing straight through the airport, through doors that bypassed all the immigration and customs. They still do it, on exit, they call it a VIP lounge, only the best of the evil communists get to use that, guided by uniformed staff
  18. How bizarre, and yet fabulous, this should increase tourism from San Francisco
×
×
  • Create New...