[11 Dec 2013] Court says Germany not responsible for damages in...
A German court has ruled that the country is not liable for damages relating to the 2009 bombing of hijacked tanker trucks that killed dozens of...
A German court has ruled that the country is not liable for damages relating to the 2009 bombing of hijacked tanker trucks that killed dozens of civilians in Afghanistan.
The trucks hijacked by members of the Taliban were bombed by American fighter jets at the request of Germany\'s armed forces. But the court ruled that German commanders did not breach their terms of military duty. The airstrike killed about 100 Taliban militants and Afghan civilians who were near the trucks. The incident is one of the most devastating attacks linked to German troops since the end of the Second World War.
2m:46s
4717
Cracking Stuxnet - A 21st-century cyber weapon against Iran - Ralph...
When first discovered in 2010, the Stuxnet computer worm posed a baffling puzzle. Beyond its unusually high level of sophistication loomed a more...
When first discovered in 2010, the Stuxnet computer worm posed a baffling puzzle. Beyond its unusually high level of sophistication loomed a more troubling mystery: its purpose. Ralph Langner and team helped crack the code that revealed this digital warhead's final target -- and its covert origins. In a fascinating look inside cyber-forensics, he explains how.
The idea behind the Stuxnet computer worm is actually quite simple. We don't want Iran to get the Bomb. Their major asset for developing nuclear weapons is the Natanz uranium enrichment facility. The gray boxes that you see, these are real-time control systems. Now if we manage to compromise these systems that control drive speeds and valves, we can actually cause a lot of problems with the centrifuge. The gray boxes don't run Windows software; they are a completely different technology. But if we manage to place a good Windows virus on a notebook that is used by a maintenance engineer to configure this gray box, then we are in business. And this is the plot behind Stuxnet.
So we start with a Windows dropper. The payload goes onto the gray box, damages the centrifuge, and the Iranian nuclear program is delayed -- mission accomplished. That's easy, huh? I want to tell you how we found that out. When we started our research on Stuxnet six months ago, it was completely unknown what the purpose of this thing was. The only thing that was known is very, very complex on the Windows part, the dropper part, used multiple zero-day vulnerabilities. And it seemed to want to do something with these gray boxes, these real-time control systems. So that got our attention, and we started a lab project where we infected our environment with Stuxnet and checked this thing out. And then some very funny things happened. Stuxnet behaved like a lab rat that didn't like our cheese -- sniffed, but didn't want to eat. Didn't make sense to me. And after we experimented with different flavors of cheese, I realized, well, this is a directed attack. It's completely directed. The dropper is prowling actively on the gray box if a specific configuration is found, and even if the actual program that it's trying to infect is actually running on that target. And if not, Stuxnet does nothing.
So that really got my attention, and we started to work on this nearly around the clock, because I thought, well, we don't know what the target is. It could be, let's say for example, a U.S. power plant, or a chemical plant in Germany. So we better find out what the target is soon. So we extracted and decompiled the attack code, and we discovered that it's structured in two digital bombs -- a smaller one and a bigger one. And we also saw that they are very professionally engineered by people who obviously had all insider information. They knew all the bits and bites that they had to attack. They probably even know the shoe size of the operator. So they know everything.
And if you have heard that the dropper of Stuxnet is complex and high-tech, let me tell you this: the payload is rocket science. It's way above everything that we have ever seen before. Here you see a sample of this actual attack code. We are talking about -- round about 15,000 lines of code. Looks pretty much like old-style assembly language. And I want to tell you how we were able to make sense out of this code. So what we were looking for is first of all is system function calls, because we know what they do.
And then we were looking for timers and data structures and trying to relate them to the real world -- to potential real world targets. So we do need target theories that we can prove or disprove. In order to get target theories, we remember that it's definitely hardcore sabotage, it must be a high-value target, and it is most likely located in Iran, because that's where most of the infections had been reported. Now you don't find several thousand targets in that area. It basically boils down to the Bushehr nuclear power plant and to the Natanz fuel enrichment plant.
So I told my assistant, "Get me a list of all centrifuge and power plant experts from our client base." And I phoned them up and picked their brain in an effort to match their expertise with what we found in code and data. And that worked pretty well. So we were able to associate the small digital warhead with the rotor control. The rotor is that moving part within the centrifuge, that black object that you see. And if you manipulate the speed of this rotor, you are actually able to crack the rotor and eventually even have the centrifuge explode. What we also saw is that the goal of the attack was really to do it slowly and creepy -- obviously in an effort to drive maintenance engineers crazy, that they would not be able to figure this out quickly.
The big digital warhead -- we had a shot at this by looking very closely at data and data structures. So for example, the number 164 really stands out in that code; you can't overlook it. I started to research scientific literature on how these centrifuges are actually built in Natanz and found they are structured in what is called a cascade, and each cascade holds 164 centrifuges. So that made sense, it was a match.
And it even got better. These centrifuges in Iran are subdivided into 15, what is called, stages. And guess what we found in the attack code? An almost identical structure. So again, that was a real good match. And this gave us very high confidence for what we were looking at. Now don't get me wrong here, it didn't go like this. These results have been obtained over several weeks of really hard labor. And we often went into just a dead-end and had to recover.
Anyway, so we figured out that both digital warheads were actually aiming at one and the same target, but from different angles. The small warhead is taking one cascade, and spinning up the rotors and slowing them down, and the big warhead is talking to six cascades and manipulating valves. So in all, we are very confident that we have actually determined what the target is. It is Natanz, and it is only Natanz. So we don't have to worry that other targets might be hit by Stuxnet.
Here's some very cool stuff that we saw -- really knocked my socks off. Down there is the gray box, and on the top you see the centrifuges. Now what this thing does is it intercepts the input values from sensors -- so for example, from pressure sensors and vibration sensors -- and it provides legitimate code, which is still running during the attack, with fake input data. And as a matter of fact, this fake input data is actually prerecorded by Stuxnet. So it's just like from the Hollywood movies where during the heist, the observation camera is fed with prerecorded video. That's cool, huh?
The idea here is obviously not only to fool the operators in the control room. It actually is much more dangerous and aggressive. The idea is to circumvent a digital safety system. We need digital safety systems where a human operator could not act quick enough. So for example, in a power plant, when your big steam turbine gets too over speed, you must open relief valves within a millisecond. Obviously, this cannot be done by a human operator. So this is where we need digital safety systems. And when they are compromised, then real bad things can happen. Your plant can blow up. And neither your operators nor your safety system will notice it. That's scary.
But it gets worse. And this is very important, what I'm going to say. Think about this. This attack is generic. It doesn't have anything to do, in specifics, with centrifuges, with uranium enrichment. So it would work as well, for example, in a power plant or in an automobile factory. It is generic. And you don't have -- as an attacker -- you don't have to deliver this payload by a USB stick, as we saw it in the case of Stuxnet. You could also use conventional worm technology for spreading. Just spread it as wide as possible. And if you do that, what you end up with is a cyber weapon of mass destruction. That's the consequence that we have to face. So unfortunately, the biggest number of targets for such attacks are not in the Middle East. They're in the United States and Europe and in Japan. So all of the green areas, these are your target-rich environments. We have to face the consequences, and we better start to prepare right now.
Thanks.
(Applause)
Chris Anderson: I've got a question. Ralph, it's been quite widely reported that people assume that Mossad is the main entity behind this. Is that your opinion?
Ralph Langner: Okay, you really want to hear that? Yeah. Okay. My opinion is that the Mossad is involved, but that the leading force is not Israel. So the leading force behind that is the cyber superpower. There is only one, and that's the United States -- fortunately, fortunately. Because otherwise, our problems would even be bigger.
CA: Thank you for scaring the living daylights out of us. Thank you Ralph.
(Applause)
10m:40s
9305
[09 Mar 2013] پروگرام گھرانہ - خاندان اور...
[09 Mar 2013] پروگرام گھرانہ - خاندان اور معاشرے پر غیبت کے نقصانات - Program Gharana - Urdu
[09 Mar 2013] پروگرام گھرانہ - خاندان اور معاشرے پر غیبت کے نقصانات - Program Gharana - Urdu
42m:49s
5080
[30 May 13] US Sanctions create problems for Iran MS patients - English
Marking the World MS Day; Iran\\\'s M. S. Society has held a ceremony to commemorate the World MS Day to focus attention on the disease which...
Marking the World MS Day; Iran\\\'s M. S. Society has held a ceremony to commemorate the World MS Day to focus attention on the disease which damages the body\\\'s nerve system. World MS Day is the only global awareness raising campaign for the disease. Every year Iran for its part launches such a campaign to provide the public with information about MS and how it affects the lives of people often between 20-40 years old. The uneven distribution of MS worldwide has been the subject of investigation over the last few decades. Although the main cause of MS is still unclear, genetic susceptibility as well as other factors including age, latitude, trauma, gender, pregnancy, race, viral infections and psychological and behavioral factors have been studied.
Saman Kojouri, Press TV, Tehran
2m:44s
5162
[31 Dec 2013] US drones in pakistan mainly killed civilians - English
This is North Wazirstan, Pakistan\\\'s tribal region bordering with Afghanistan, the favourite target of US drone attacks. Drones frequently fly...
This is North Wazirstan, Pakistan\\\'s tribal region bordering with Afghanistan, the favourite target of US drone attacks. Drones frequently fly apparently to find and hit at suspected militants but mostly they kill civilians.
There has been a lot of propaganda--- both by the US and Pakistan--- to underreport and conceal facts about the scale of collateral damages and civilian causalities caused by the US drone attacks.
1m:59s
4147
[30 Jan 2014] Afghan refugee receives payout from UK Paper after Taliban...
An Afghan refugee who was granted asylum in the UK has accepted substantial libel compensation at the high court in London after the daily express...
An Afghan refugee who was granted asylum in the UK has accepted substantial libel compensation at the high court in London after the daily express newspaper falsely accused him of being a member of the Taliban.
Abdol Shazad who is 20 was recognized as a refugee by the Home Office last February after a four-year battle in which it was found that he was at fear of being persecuted by the Taliban. But a month later The express published a story saying that he was a member of the Taliban and posted an online version of the story under which hateful and abusive comments were posted causing great distress to Mr Shazad Journalists say this type of behavior is indicative of the lack of ethics of large segments of the right wing media.The Legal Counsel for the Express, Chloe Strong Said: \"The allegation in the articles was false and the defendant wishes to offer its sincerest apologies to the claimant for the damage, distress and embarrassment which the publication of the articles has caused him.\" The Daily Express has apologized and agreed to pay him substantial damages. The exact figure is undisclosed. But this type of behavior from elements of the right wing press is unlikely to stop as a result For Mr Shazid at least, there has been some kind of accountability for this unethical journalism.
2m:3s
6142
[05 Feb 2014] Intl. Natural Disaster Congress in Tehran - English
6TH International Congress on Health in Emergencies and Disasters in Tehran. Top professors and scientists in the area of disaster control and...
6TH International Congress on Health in Emergencies and Disasters in Tehran. Top professors and scientists in the area of disaster control and related fields from United States, France, Finland, Sweden and Norway attended the event to share their knowledge with Iranian counterparts and colleagues. The Congress analyzed the important role of health services including psychology after any disaster.
The Head of Physical Rehabilitation Programs Health Unit at International Committee of Red Cross was at the event. He shared his professional opinion on Iran and its capability to manage disasters. Iranian professors at this event talked about response time in time of emergency. They said Iran needs to improve in this area. Recently two of Iran\'s Northern provinces were hit by heavy snow and as a result electricity was cut off. For a few days many people were trapped. The head of Iran National Disaster Management Organization used the opportunity to talk about the latest natural disaster in Iran and how it is being dealt with. According to officials 86 percent of Iran\'s urban population lives on earthquake fault lines and 70 percent of natural disaster damages during the past decades have been caused by floods.
2m:21s
5530
[20 Feb 2014] Egypt further delays resumption of academic year - English
Egypt\'s military backed government has decided to further postpone the beginning of the second half of the school year from 22 February till 8...
Egypt\'s military backed government has decided to further postpone the beginning of the second half of the school year from 22 February till 8 March.
According to the interim government, the postponement will continue until security is restored and university campuses refurbished following damages from recurrent clashes that rocked several universities across the country. Many here have expressed their dissatisfaction with the decision blaming authorities for failing to restore order and security in universities across the country.
2m:15s
5183
18 Easy Embroidery Hacks for kids - All Languages
I\'ll show you how to make basic sewing stitches: running stitch, backstitch, split stitch, french knot and chain stitch.
I\'ll also show you how...
I\'ll show you how to make basic sewing stitches: running stitch, backstitch, split stitch, french knot and chain stitch.
I\'ll also show you how to make beautiful yet very simple embroidered flowers, such as rose, dandelion, lazy daisy, hyacinth, satin flower and chamomile.Stay creative and have fun! :)
----------------------------------------------------------------------------------------
5-Minute Crafts: https://www.goo.gl/8JVmuC
Facebook: https://www.facebook.com/5min.crafts/
Instagram: https://www.instagram.com/5.min.crafts/
Twitter: https://twitter.com/5m_crafts
Subscribe to 5-Minute Crafts GIRLY: https://goo.gl/fWbJqz
Subscribe to 5-Minute Workouts: https://goo.gl/67owiQ
The Bright Side of Youtube: https://goo.gl/rQTJZz
----------------------------------------------------------------------------------------
For more videos and articles visit: http://www.brightside.me/ This video is made for entertainment purposes. We do not make any warranties about the completeness, safety and reliability. Any action you take upon the information on this video is strictly at your own risk, and we will not be liable for any damages or losses. It is the viewer\'s responsibility to use judgment, care and precautions if one plans to replicate.
The following video might feature activity performed by our actors within controlled environment- please use judgment, care, and precaution if you plan to replicate.
8m:25s
2942