Government constitutes Multi-Disciplinary Terror Monitoring Group for J&K
Tags: Tackling Security Threats, Security Threats
Published on: 30 March 2019
GREVD: SIPRI launches Global Registry of Violent Deaths
Tags: Security Threats
Published on: 04 May 2019
</div>
<input type="hidden" name="articlecount" id="articlecount" value="<?php echo $this->Paginator->params()['pageCount'];?>">
<?php if($this->Paginator->params()['pageCount']>1){?>
$viewFile = '/var/www/currentaffairs.studyiq.com/plugins/Studyiq/src/Template/Pages/tags.ctp' $dataForView = [ 'headertags' => [ (int) 0 => object(Cake\ORM\Entity) {}, (int) 1 => object(Cake\ORM\Entity) {}, (int) 2 => object(Cake\ORM\Entity) {}, (int) 3 => object(Cake\ORM\Entity) {}, (int) 4 => object(Cake\ORM\Entity) {}, (int) 5 => object(Cake\ORM\Entity) {}, (int) 6 => object(Cake\ORM\Entity) {}, (int) 7 => object(Cake\ORM\Entity) {}, (int) 8 => object(Cake\ORM\Entity) {}, (int) 9 => object(Cake\ORM\Entity) {}, (int) 10 => object(Cake\ORM\Entity) {}, (int) 11 => object(Cake\ORM\Entity) {}, (int) 12 => object(Cake\ORM\Entity) {}, (int) 13 => object(Cake\ORM\Entity) {} ], 'breadcrumb' => [ (int) 0 => [ 'name' => 'Home', 'link' => 'https://currentaffairs.studyiq.com/' ], (int) 1 => [ 'name' => 'Security Threats', 'link' => 'https://currentaffairs.studyiq.com/tags/security-treats' ] ], 'currentaffairs' => [ (int) 0 => object(Cake\ORM\Entity) {}, (int) 1 => object(Cake\ORM\Entity) {}, (int) 2 => object(Cake\ORM\Entity) {}, (int) 3 => object(Cake\ORM\Entity) {}, (int) 4 => object(Cake\ORM\Entity) {}, (int) 5 => object(Cake\ORM\Entity) {}, (int) 6 => object(Cake\ORM\Entity) {}, (int) 7 => object(Cake\ORM\Entity) {}, (int) 8 => object(Cake\ORM\Entity) {}, (int) 9 => object(Cake\ORM\Entity) {}, (int) 10 => object(Cake\ORM\Entity) {}, (int) 11 => object(Cake\ORM\Entity) {} ], 'tagname' => 'Security Threats', 'metadescription' => 'Defence security Current Affairs, Security burning issues, latest news and more details get here with depth analysis of Defence security Current Affairs', 'metakeyword' => 'Defence security Current Affairs, Security burning issues, latest news ', 'title' => 'Security Threats | Defence security Current Affairs Gk News', 'sbanners' => [ (int) 0 => object(Cake\ORM\Entity) {}, (int) 1 => object(Cake\ORM\Entity) {}, (int) 2 => object(Cake\ORM\Entity) {}, (int) 3 => object(Cake\ORM\Entity) {} ], 'params' => [ (int) 0 => 'security-treats' ] ] $headertags = [ (int) 0 => object(Cake\ORM\Entity) { 'id' => (int) 3, 'name' => 'Art & Culture', 'parent_id' => (int) 2, 'description' => '', 'keyword' => 'art-culture', 'sortorder' => (int) 0, 'status' => (int) 1, 'metatitle' => 'Current Affairs Arts and Cultures Articles | Current Affairs', 'metakeyword' => 'Current Affairs Arts, Cultures Articles, Cultures Current Affairs Articles, Cultures Current Affairs, Current Affairs, Current Affair GK, General Knowledage', 'metadescription' => 'Current Affairs Arts and Cultures Articles complete current affairs details of Arts and cultures with complete depth analysis or full details of all current affair Articles', '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'cacategories' }, (int) 1 => object(Cake\ORM\Entity) { 'id' => (int) 4, 'name' => 'Polity & Governance', 'parent_id' => (int) 2, 'description' => '', 'keyword' => 'polity-governance', 'sortorder' => (int) 0, 'status' => (int) 1, 'metatitle' => 'Polity Current Affairs | Governance Current Affair | Polity GK', 'metakeyword' => 'Polity Current Affairs, Governance Current Affair, Polity GK, Current Affairs of Polity, Current Affairs of Governance, Current affair Polity', 'metadescription' => 'Polity Current Affairs, Governance Current Affair, and current affairs of Polity and Governance and more get with Study IQ Education Articles and full details', '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'cacategories' }, (int) 2 => object(Cake\ORM\Entity) { 'id' => (int) 5, 'name' => 'International Affairs', 'parent_id' => (int) 2, 'description' => '', 'keyword' => 'international-affairs', 'sortorder' => (int) 0, 'status' => (int) 1, 'metatitle' => 'International Affairs | International Current Affairs, GK, News', 'metakeyword' => 'International Affairs, International Current Affairs, International GK, International News, International burning Issues, International Today Affairs, International Current Affair, International current affairs 2019', 'metadescription' => 'International Affairs, International Current Affairs, GK, News, burning issues and all relative information of Internation you can get here for depth knowledge', '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'cacategories' }, (int) 3 => object(Cake\ORM\Entity) { 'id' => (int) 6, 'name' => 'Economy', 'parent_id' => (int) 2, 'description' => '', 'keyword' => 'economy', 'sortorder' => (int) 0, 'status' => (int) 1, 'metatitle' => 'Economy Current Affairs | Economy Current Affair 2019 | Study IQ', 'metakeyword' => 'Economy Current Affairs, Economy Current Affair, Economy Current Affair 2019, Economy GK news, Economy Affairs, Current Affairs Economy, Current Affair Economy', 'metadescription' => 'Economy Current Affairs, Economy Current Affair 2019 and all the Economy Current Affair, GK, Burning Issues, News, get on study IQ education for exams preparation', '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'cacategories' }, (int) 4 => object(Cake\ORM\Entity) { 'id' => (int) 7, 'name' => 'Banking Awareness', 'parent_id' => (int) 2, 'description' => '', 'keyword' => 'banking-awareness', 'sortorder' => (int) 0, 'status' => (int) 1, 'metatitle' => 'Banking Awareness Current Affairs, GK, News, Burning Issues', 'metakeyword' => 'Banking Awareness, Current Affairs, Current Affair, bANKING CURRENT AFFAIRS, Current affair of Banking, Current affair of Bank, Current affairs of Bank, BAnk current affairs', 'metadescription' => 'Banking Awareness Current Affairs, GK, News, Burning Issues, and all the latest current affairs of Banking Awareness or Banking for Govt exams preparation', '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'cacategories' }, (int) 5 => object(Cake\ORM\Entity) { 'id' => (int) 8, 'name' => 'Defence & Security', 'parent_id' => (int) 2, 'description' => '', 'keyword' => 'defence-security', 'sortorder' => (int) 0, 'status' => (int) 1, 'metatitle' => 'Defence Current Affairs | Defence & Security Current Affairs', 'metakeyword' => 'Defence Current Affairs, Current Affairs, Current Affair, Current Affairs of Defence, Security Current Affairs, Security Current Affairs 2019, Security Current Affairs daily, Defence Current Affairs Daily', 'metadescription' => 'Defence Current Affairs, Defence & Security Current Affairs and complete details of Defence & Security current affairs, burning issues of Defence, Defence Today News ', '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'cacategories' }, (int) 6 => object(Cake\ORM\Entity) { 'id' => (int) 9, 'name' => 'Environment', 'parent_id' => (int) 2, 'description' => '', 'keyword' => 'environment', 'sortorder' => (int) 0, 'status' => (int) 1, 'metatitle' => 'Environment Current Affairs, Current Affairs 2019- Study IQ', 'metakeyword' => 'Environment Current Affairs, Current Affairs Articles, Current Affairs of Environment, Current Affairs Environment', 'metadescription' => 'Environment Current Affairs, Current Affairs 2019, Study IQ provide complete information of Environment Current Affairs, GK, Bunrning Issues, latest news and more', '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'cacategories' }, (int) 7 => object(Cake\ORM\Entity) { 'id' => (int) 10, 'name' => 'Science & Technology', 'parent_id' => (int) 2, 'description' => '', 'keyword' => 'science-technology', 'sortorder' => (int) 0, 'status' => (int) 1, 'metatitle' => 'Science & Technology Current Affairs | Science Current Affairs', 'metakeyword' => 'Science & Technology Current Affairs, Science & Technology Current Affair, Science Current Affairs, Science Current Affair, Technology Current Affair, Technology Current Affairs', 'metadescription' => 'Science & Technology Current Affairs, Science Current Affairs, Technology today affairs and more relative Science & Technology information get here free', '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'cacategories' }, (int) 8 => object(Cake\ORM\Entity) { 'id' => (int) 11, 'name' => 'Miscellaneous', 'parent_id' => (int) 2, 'description' => '', 'keyword' => 'miscellaneous', 'sortorder' => (int) 0, 'status' => (int) 1, 'metatitle' => 'Miscellaneous Current Affairs Articles 2019, GK News | Study IQ', 'metakeyword' => 'Current Affairs Articles 2019, Miscellaneous Current Affairs, GK News, Current Affairs Articles', 'metadescription' => 'Current Affairs Articles, Current Affairs GK News analysis, and all topic relative information get here free and online so no need go anywhere that makes time saving ', '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'cacategories' }, (int) 9 => object(Cake\ORM\Entity) { 'id' => (int) 12, 'name' => 'Government Schemes', 'parent_id' => (int) 2, 'description' => '', 'keyword' => 'government-schemes', 'sortorder' => (int) 0, 'status' => (int) 1, 'metatitle' => 'Government Schemes Current Affairs | Govt Current Affairs StudyIQ', 'metakeyword' => 'Government Schemes Current Affairs, Government Current Affairs, Current Affairs of government, ', 'metadescription' => 'Government Schemes Current Affairs, Government Current Affairs ad all government relative latest information, news, burning issues and more get here', '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'cacategories' }, (int) 10 => object(Cake\ORM\Entity) { 'id' => (int) 13, 'name' => 'Persons in News', 'parent_id' => (int) 2, 'description' => '', 'keyword' => 'persons-in-news', 'sortorder' => (int) 0, 'status' => (int) 1, 'metatitle' => 'Persons in News | Current Affairs, Awards, Books, Obituaries News', 'metakeyword' => 'Persons in News, Current Affairs, Awards, Books, Obituaries News', 'metadescription' => 'Persons in News, Current Affairs, Awards, Books, Obituaries News, and all the daily current affairs news you will get here with complete information', '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'cacategories' }, (int) 11 => object(Cake\ORM\Entity) { 'id' => (int) 14, 'name' => 'Constitution', 'parent_id' => (int) 2, 'description' => '', 'keyword' => 'constitution', 'sortorder' => (int) 0, 'status' => (int) 1, 'metatitle' => 'Constitution | Indian Constitution | World Constitution ', 'metakeyword' => 'constitution, Indian Constitution, World Constitution, Country Constitution ', 'metadescription' => 'Get the all the country constitution like Indian constitution, world constitution and more here you can get all the latest information relative to constitution', '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'cacategories' }, (int) 12 => object(Cake\ORM\Entity) { 'id' => (int) 15, 'name' => 'Biodiversity', 'parent_id' => (int) 2, 'description' => '', 'keyword' => 'biodiversity', 'sortorder' => (int) 0, 'status' => (int) 1, 'metatitle' => 'Biodiversity | ??? ??????? | Biodiversity Current affairs', 'metakeyword' => 'Biodiversity, ??? ???????, Biodiversity Current affairs', 'metadescription' => 'Biodiversity, ??? ???????, Biodiversity Current affairs, Get the latest Biodiversity information with us where you get all the latest information about Biodiversity', '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'cacategories' }, (int) 13 => object(Cake\ORM\Entity) { 'id' => (int) 16, 'name' => 'Ecology', 'parent_id' => (int) 2, 'description' => '', 'keyword' => 'ecology', 'sortorder' => (int) 0, 'status' => (int) 1, 'metatitle' => 'Ecology Topic Wise Current afairs | Ecology Current Affairs ', 'metakeyword' => 'Ecology Current Affairs, Ecology Current Affairs 2021, Best Ecology Current Affairs, ecology topic wise current affairs, ecology', 'metadescription' => 'Best Ecology Current affairs - Get the ecology topic current affairs for all the govt exams preparation with best studyiq faculties and also get free ecology topic pdf on daily basis ', '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'cacategories' } ] $breadcrumb = [ (int) 0 => [ 'name' => 'Home', 'link' => 'https://currentaffairs.studyiq.com/' ], (int) 1 => [ 'name' => 'Security Threats', 'link' => 'https://currentaffairs.studyiq.com/tags/security-treats' ] ] $currentaffairs = [ (int) 0 => object(Cake\ORM\Entity) { 'tag' => 'Security Threats', 'keyword' => 'security-treats', 'id' => (int) 588, 'title' => 'Government constitutes Multi-Disciplinary Terror Monitoring Group for J&K', 'description' => '<p style="margin-left:0in; margin-right:0in; text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">Union Ministry of Home Affairs (MHA) has constituted eight memnber Multi-Disciplinary Terror Monitoring Group (MDTMG) for Jammu and Kashmir. It aims to ensure concerted action against terror financing and other terror related activities in J&K and bring them to a logical conclusion. It will meet on weekly basis and submit its action report regularly.</span></span></span></p> <p style="margin-left:0in; margin-right:0in; text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-family:"Quicksand",serif">Members of MDTMG</span></strong></span></span></p> <p style="margin-left:0in; margin-right:0in; text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">It will be headed by Additional Director General of Police (CID) of J&K Police. Its member will have representatives from J&K Police, Central Bureau of Investigation (CBI), Intelligence Bureau (IB), National Investigation Agency (NIA), Central Board of Direct Taxes (CBDT) and Central Board of Indirect Taxes and Customs.</span></span></span></p> <p style="margin-left:0in; margin-right:0in; text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-family:"Quicksand",serif">Terms of Reference of MDTMG</span></strong></span></span></p> <ul> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">Identify all key persons including leaders of organisations who are involved in supporting terrorism in any form. </span></span></span></li> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">Take action against hardcore supporters among government employees including teachers who are providing support to terror activities. </span></span></span></li> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">Take coordinated action in all terror registered cases, terror financing and terror-related activities and bring them to logical conclusion.</span></span></span></li> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">Investigate networks of various channels being used to fund terror and terror-related activities and will undertake action to stop flow of such funds.</span></span></span></li> </ul> ', 'created_date' => object(Cake\I18n\FrozenDate) {}, 'posturl' => 'govt-constitutes-multi-disciplinary-terror-monitoring-group-jk', 'image' => 'https://www.mediafire.com/convkey/3fb0/orazy7j0mqlacng6g.jpg', 'fbimage' => 'https://www.mediafire.com/convkey/3fb0/orazy7j0mqlacng6g.jpg', 'metatitle' => 'Constitutes Multi-Disciplinary Terror Monitoring Group for J&K', 'metakeyword' => 'In National Current Affairs, Ministry of Home Affairs, MHA, constituted, eight memnber, Multi-Disciplinary Terror Monitoring Group, MDTMG, Jammu and Kashmir', 'metadescription' => 'Ministry of Home Affairs (MHA) has constituted eight memnber Multi-Disciplinary Terror Monitoring Group (MDTMG) for Jammu and Kashmir', 'author' => 'Nikhil Paigude', 'downlaodpdf' => 'https://www.mediafire.com/file/jr1sbo37v7rbaot/Government_constitutes_Multi-Disciplinary.pdf/file', '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'currentaffairs' }, (int) 1 => object(Cake\ORM\Entity) { 'tag' => 'Security Threats', 'keyword' => 'security-treats', 'id' => (int) 1010, 'title' => 'GREVD: SIPRI launches Global Registry of Violent Deaths', 'description' => '<p style="margin-left:0in; margin-right:0in; text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-size:10.0pt"><span style="font-family:"Quicksand","serif"">Stockholm International Peace Research Institute (SIPRI) has launched new initiative named Global Registry of Violent Deaths (GReVD) to count deaths caused by all forms of violence across the world and display these in open-source database. It aims to establish annual number of violent deaths worldwide and enable monitoring of progress on world’s commitment to ‘significantly reduce all forms of violence and related death rates everywhere’ by 2030 as set out in Sustainable Development Goals (SDGs)-Goal 16.</span></span></span></span></p> <p style="margin-left:0in; margin-right:0in; text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-size:10.0pt"><span style="font-family:"Quicksand","serif"">Global Registry of Violent Deaths (GReVD) </span></span></strong></span></span></p> <ul> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-size:10.0pt"><span style="font-family:"Quicksand","serif"">It will be open-source database that will allow researchers, policymakers and general public to track trends in violence at global, regional, national, provincial, city and municipal levels.</span></span></span></span></li> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-size:10.0pt"><span style="font-family:"Quicksand","serif"">It will hold single entry for every violent death, including time, location, perpetrator, victim and type of violence.</span></span></span></span></li> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-size:10.0pt"><span style="font-family:"Quicksand","serif"">The sources will be verifiable news reports of lethal events and processing will be done by machine coding to handle volume of entries, as well as human coding to ensure accuracy and consistency.</span></span></span></span></li> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-size:10.0pt"><span style="font-family:"Quicksand","serif"">Supporting agencies:</span></span></strong><span style="font-size:10.0pt"><span style="font-family:"Quicksand","serif""> For this project, SIPRI has already brought together main groups that monitor violent deaths, as well as leading big data labs. </span></span></span></span></li> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-size:10.0pt"><span style="font-family:"Quicksand","serif"">The first-phase of the project is funded by Swedish Postcode Foundation and United Kingdom’s Department for International Development.</span></span></span></span></li> </ul> <p style="margin-left:0in; margin-right:0in; text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-size:10.0pt"><span style="font-family:"Quicksand","serif"">Stockholm International Peace Research Institute (SIPRI)</span></span></strong></span></span></p> <ul> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-size:10.0pt"><span style="font-family:"Quicksand","serif"">It is international institute dedicated to research into conflict, armaments, arms control and disarmament. It was established in 1966 and is based in Stockholm, Sweden.</span></span></span></span></li> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-size:10.0pt"><span style="font-family:"Quicksand","serif"">It provides data, recommendations and analysis to policymakers, researchers, media and interested public based on open sources,.</span></span></span></span></li> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-size:10.0pt"><span style="font-family:"Quicksand","serif"">It was ranked among top three non-US world-wide think tanks in 2014 Global Go To Think Tanks Report by University of Pennsylvania Lauder Institute.</span></span></span></span></li> </ul> ', 'created_date' => object(Cake\I18n\FrozenDate) {}, 'posturl' => 'global-registry-violent-deaths', 'image' => 'https://www.mediafire.com/convkey/58de/5nk8q9k33vey6qt6g.jpg', 'fbimage' => 'https://www.mediafire.com/convkey/58de/5nk8q9k33vey6qt6g.jpg', 'metatitle' => 'GREVD: SIPRI launches Global Registry of Violent Deaths', 'metakeyword' => 'Stockholm International Peace Research Institute (SIPRI), launched, Gobal Registry of Violent Deaths, GReVD, count deaths caused by all forms of violence across the world', 'metadescription' => 'SIPRI launches Global Registry of Violent Deaths (GReVD) to count deaths caused by all forms of violence across the world', 'author' => 'Nikhil Paigude', 'downlaodpdf' => 'https://www.mediafire.com/file/rbm1m4i2vzeon9j/GREVD.pdf/file', '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'currentaffairs' }, (int) 2 => object(Cake\ORM\Entity) { 'tag' => 'Security Threats', 'keyword' => 'security-treats', 'id' => (int) 1103, 'title' => 'WhatsApp Spyware Attack', 'description' => '<p style="margin-left:0in; margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-size:10.0pt"><span style="font-family:"Quicksand","serif"">Facebook Inc owned WhatsApp has confirmed that it has detected zero-day vulnerability on its platform that targeted surveillance (spyware) attack on its users. It has urged its users to install latest version of the app which has patch to close this vulnerablity. </span></span></span></span></p> <p style="margin-left:0in; margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-size:10.0pt"><span style="font-family:"Quicksand","serif"">What is this spyware attack?</span></span></strong></span></span></p> <p style="margin-left:0in; margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-size:10.0pt"><span style="font-family:"Quicksand","serif"">Zero-day vulnerability in WhatsApp has led to targeted surveillance attack on its users that Leave users open to spyware that could turn on their phone’s camera and microphone, and collect location data.</span></span></span></span></p> <p style="margin-left:0in; margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-size:10.0pt"><span style="font-family:"Quicksand","serif"">Software called Pegasus created by private Israeli firm NSO Group is able to take advantage of security loophole in WhatsApp’s voice call function to carry out the attack. It can also trawl through emails and messages. This software is mainly operated by intelligence and law enforcement agencies</span></span></span></span></p> <p style="margin-left:0in; margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-size:10.0pt"><span style="font-family:"Quicksand","serif"">How it attacks?</span></span></strong></span></span></p> <p style="margin-left:0in; margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-size:10.0pt"><span style="font-family:"Quicksand","serif"">Using Pegasus, attackers could simply call user to install malicious surveillance software (spyaware), even when call was not taken. It also claimed that call would sometimes not even show up in the user’s call log. </span></span></span></span></p> <p style="margin-left:0in; margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-size:10.0pt"><span style="font-family:"Quicksand","serif"">It exploited buffer overflow vulnerability in WhatsApp VOIP (voice over internet protocol) stack, which allowed remote code execution via specially crafted series of SRTCP packets sent to a target phone number.</span></span></span></span></p> <p style="margin-left:0in; margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-size:10.0pt"><span style="font-family:"Quicksand","serif"">This could leave users open to spyware that could turn on their phone’s camera and microphone, and collect location data.</span></span></span></span></p> ', 'created_date' => object(Cake\I18n\FrozenDate) {}, 'posturl' => 'whatsapp-spyware-attack', 'image' => 'https://www.mediafire.com/convkey/0c3b/qc10xwbeb4bk33i6g.jpg', 'fbimage' => 'https://www.mediafire.com/convkey/0c3b/qc10xwbeb4bk33i6g.jpg', 'metatitle' => 'WhatsApp Spyware Attack | Spyware Attack | WhatsApp Attack', 'metakeyword' => 'Facebook Inc, WhatsApp,detected, zero-day vulnerability, targeted surveillance, spyware attack ', 'metadescription' => 'Facebook Inc owned WhatsApp has confirmed that it has detected zero-day vulnerability on its platform that targeted surveillance (spyware) attack on its users.', 'author' => 'Nikhil Paigude', 'downlaodpdf' => 'https://www.mediafire.com/file/blbpscs9559y23s/WhatsApp.pdf/file', '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'currentaffairs' }, (int) 3 => object(Cake\ORM\Entity) { 'tag' => 'Security Threats', 'keyword' => 'security-treats', 'id' => (int) 2651, 'title' => 'WhatsApp spying with Pegasus malware', 'description' => '<p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Issue</strong></span></span></p> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">WhatsApp has confirmed that at least two dozen journalists, academicians, Dalit and human rights activists, in India have been targeted for surveillance for a two week period until May 2019. The hackers allegedly used an Israeli technology, Pegasus to conduct the spying.</span></span></p> <p style="margin-right:0in"> </p> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Background</strong></span></span></p> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">In May 2019, WhatsApp identified that a bug in the app’s call function was used to install a malicious code into users’ phones. On October 29, it identified the malicious code as Pegasus, a spyware developed by an Israeli company, NSO.</span></span></p> <p style="margin-right:0in"> </p> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Details</strong></span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The code is transmitted by calling the target phone on WhatsApp. The code enters the phone even if the call is not answered.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">This is only one of the ways of delivering Pegasus. There are several other cases such as alarming SMSs that prompt targets to click on a link.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Once installed, Pegasus can send the target’s contacts, calendar events, phone calls on and messages on communication apps like WhatsApp and Telegram to the spyware’s controller.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The controller can also turn the phone into a spying device by switching on its camera or microphone.</span></span></p> </li> </ul> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Malwares</strong></span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Malware, or malicious software, is any program or file that is harmful to a computer user. Types of malware can include computer viruses, worms, Trojan horses and spyware.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">These malicious programs can perform a variety of different functions such as stealing, encrypting or deleting sensitive data, altering or hijacking core computing functions and monitoring users' computer activity without their permission.</span></span></p> </li> </ul> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Types of malware</strong></span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">A <strong>virus</strong> is the most common type of malware which can execute itself and spread by infecting other programs or files.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">A <strong> worm</strong> can self-replicate without a host program and typically spreads without any human interaction or directives from the malware authors.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">A <strong>Trojan horse </strong> is designed to appear as a legitimate program in order to gain access to a system. Once activated following installation, Trojans can execute their malicious functions. </span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Spyware </strong> is made to collect information and data on the device user and observe their activity without their knowledge.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Ransomware</strong> is designed to infect a user's system and encrypt the data. Cybercriminals then demand a ransom payment from the victim in exchange for decrypting the system's data.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">A <strong>rootkit </strong> is created to obtain administrator-level access to the victim's system. Once installed, the program gives threat actors root or privileged access to the system.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">A backdoor virus or <strong>remote access Trojan</strong> (RAT) secretly creates a backdoor into an infected system that allows threat actors to remotely access it without alerting the user or the system's security programs.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Adware</strong> is used to track a user’s browser and download history with the intent to display pop-up or banner advertisements that lure the user into making a purchase. For example, an advertiser might use cookies to track the web pages a user visits to better target advertising.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Keyloggers</strong>, also called system monitors, are used to see nearly everything a user does on their computer. This includes emails, opened web-pages, programs and keystrokes</span></span></p> </li> </ul> ', 'created_date' => object(Cake\I18n\FrozenDate) {}, 'posturl' => 'whatsapp-spying-with-pegasus-malware', 'image' => 'https://www.mediafire.com/convkey/3cfe/qymkxg8yus572ij6g.jpg', 'fbimage' => 'https://www.mediafire.com/convkey/3cfe/qymkxg8yus572ij6g.jpg', 'metatitle' => 'WhatsApp spying with Pegasus malware', 'metakeyword' => 'WhatsApp spying with Pegasus malware', 'metadescription' => 'WhatsApp has confirmed that at least two dozen journalists, academicians, Dalit and human rights activists, in India have been targeted for surveillance', 'author' => null, 'downlaodpdf' => 'https://www.mediafire.com/file/vr19kejmnbodrmc/WhatsApp_spying_with_Pegasus_malware.pdf/file', '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'currentaffairs' }, (int) 4 => object(Cake\ORM\Entity) { 'tag' => 'Security Threats', 'keyword' => 'security-treats', 'id' => (int) 2653, 'title' => 'Indian card details selling on Dark Web', 'description' => '<p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Issue</strong></span></span></p> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Nearly 1.3 million debit and credit card data of Indian banking<strong> </strong>customers that can fetch up to $130 million for cybercriminals are available on Dark Web for open sale.</span></span></p> <p style="margin-right:0in"> </p> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Background</strong></span></span></p> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"> Data analysis suggests the card details may have been obtained via skimming devices, installed either on ATMs or point of sale (PoS) systems.</span></span></p> <p style="margin-right:0in"> </p> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Details</strong></span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">According to ZDNet, the cards’ details is available on Joker’s Stash, one of the oldest card shops on the dark web which is known to be the place where major hackers sell card dumps.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The card dump includes Track 2 data, usually found on a payment card’s magnetic stripe. </span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The presence of this kind of data automatically rules out skimmers installed on websites (Magecart attacks), where Track 1 and Track 2 is never used.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Criminals who buy card dumps from Joker’s Stash typically use the data to clone legitimate cards and withdraw money from ATMs in so called “cash outs”.</span></span></p> </li> </ul> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Dark Web</strong></span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The dark web refers to encrypted online content that is not indexed by conventional search engines. </span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Also known as the "darknet," the dark web is a component of the deep web that describes the wider breadth of content that does not appear through regular internet browsing activities.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Specific browsers like Tor are required to access dark web sites, which contain anonymous message boards, online marketplaces for drugs, exchanges for stolen financial and private data, and other illegal content. </span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Transactions in this hidden economy are often paid for with bitcoin, and physical goods are routinely shipped in ways that cloak both buyers and sellers from the watchful eyes of law enforcement.</span></span></p> </li> </ul> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Working</strong></span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The dark web attracts users who seek anonymity when conducting business. Intentions can be noble, such as with journalists seeking to interview citizens of repressive countries, where communications are monitored.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The anonymity of the dark web attracts criminal actors like drug-dealers, hackers, and child pornography peddlers. </span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">There is also a growing service economy within the dark web in which hitmen and other illegal operatives advertise their services in ways they could not over traditional channels.</span></span></p> </li> </ul> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Deep web</strong></span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The dark web and the deep web are often erroneously used interchangeably. To clarify: the deep web includes all the pages that don’t pop up when you run a web search. </span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">This covers everything requiring a login, such as personal email, online banking, or other such sites.</span></span></p> </li> </ul> ', 'created_date' => object(Cake\I18n\FrozenDate) {}, 'posturl' => 'indian-card-details-selling-on-dark-web', 'image' => 'https://www.mediafire.com/convkey/9245/s1i6umkju1mat9a6g.jpg', 'fbimage' => 'https://www.mediafire.com/convkey/9245/s1i6umkju1mat9a6g.jpg', 'metatitle' => 'Indian card details selling on Dark Web', 'metakeyword' => 'Indian card details selling on Dark Web', 'metadescription' => 'Nearly 1.3 million debit and credit card data of Indian banking customers that can fetch up to $130 million for cybercriminals are available on Dark Web for open sale.', 'author' => null, 'downlaodpdf' => 'https://www.mediafire.com/file/utvpj8ao6sla0w1/Indian_card_details_selling_on_Dark_Web.pdf/file', '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'currentaffairs' }, (int) 5 => object(Cake\ORM\Entity) { 'tag' => 'Security Threats', 'keyword' => 'security-treats', 'id' => (int) 2680, 'title' => 'Lone wolf attacks warning', 'description' => '<p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Issue</strong></span></span></p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">A high alert has been issued to security forces across the country by central intelligence agencies, warning of possible ‘lone wolf’ attacks by Islamic State (IS) operatives.</span></span></p> <p style="margin-right:0cm"> </p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Background</strong></span></span></p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The Home ministry said that the overall security scenario in the country remained a cause for concern on account of the threat emerging from Pakistan and the Afghanistan-Pakistan belt.</span></span></p> <p style="margin-right:0cm"> </p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Details</strong></span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The reported nexus between home-grown terror outfits and Pakistan-based extremist organisations in terms of procurement of weapons, technology and training has added a new dimension to the threat scenario.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The porous coastline of southeastern and southwestern India was an easy landing ground for terror outfits to push their men and material into the country, the note said.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Inputs indicated that Sri Lanka and Maldives were used by Pakistan-based terrorist elements for anti-India activities.</span></span></p> </li> </ul> <p style="margin-right:0cm"> </p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Lone wolf attacks</strong></span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">A lone-actor terrorist, or lone wolf is someone who prepares and commits violent acts alone, outside of any command structure and without material assistance from any group.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The term lone wolf is used to distinguish terrorist actions carried out by individuals from those coordinated by large groups.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Terrorist attacks that are carried out by small cells are not classified as lone wolf attacks.</span></span></p> </li> </ul> ', 'created_date' => object(Cake\I18n\FrozenDate) {}, 'posturl' => 'lone-wolf-attacks-warning', 'image' => 'https://www.mediafire.com/convkey/781c/uk286r0jdjlctjy6g.jpg', 'fbimage' => 'https://www.mediafire.com/convkey/781c/uk286r0jdjlctjy6g.jpg', 'metatitle' => 'Lone wolf attacks warning', 'metakeyword' => 'A high alert has been issued to security forces across', 'metadescription' => 'A high alert has been issued to security forces across the country by central intelligence agencies, warning of possible ‘lone wolf’ attacks by Islamic State (IS) operatives.', 'author' => null, 'downlaodpdf' => 'https://www.mediafire.com/file/lbvrqz39t2pwcup/Lone_wolf_attacks_warning.pdf/file', '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'currentaffairs' }, (int) 6 => object(Cake\ORM\Entity) { 'tag' => 'Security Threats', 'keyword' => 'security-treats', 'id' => (int) 3289, 'title' => 'Al Shabaab militant group', 'description' => '<p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Issue</strong></span></span></p> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">A military base in Kenya, used by US and Kenyan forces, came under attack from the Al Shabaab militant group. US aircraft and vehicles were destroyed in the assault.</span></span></p> <p style="margin-right:0in"> </p> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Background</strong></span></span></p> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">There have been confrontations between the US and Al Shabaab in the past, but this is the first time the latter has struck US forces inside Kenya, considered to be a key base for fighting the highly resilient militant group.</span></span></p> <p style="margin-right:0in"> </p> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Details</strong></span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The Islamist Al Shabaab group is active in East Africa and is involved in the ongoing civil war in Somalia. The group has been fighting to overthrow the weak West-backed Somali government, the latter being supported by a 21,000-strong African Union peacekeeping force.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The US established Camp Simba in Kenya’s Lamu county more than a decade ago, where it maintains under a 100 personnel. The US trains and gives counterterror support to its East African partners at the Manda Bay airfield that also acts as a base fighting against the group.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The group is responsible for many attacks such as suicide attack on an upscale hotel and office complex in Nairobi, raid on the Baledogle base in Somalia, which is used by both Somali special forces and American troops etc.</span></span></p> </li> </ul> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Al Shabaab</strong></span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Harakat al-Shabaab al-Mujahideen, more commonly known as al-Shabaab is a <a href="https://en.wikipedia.org/wiki/Jihadism" title="Jihadism">jihadist</a> <a href="https://en.wikipedia.org/wiki/Islamic_fundamentalism" title="Islamic fundamentalism">fundamentalist group</a> based in <a href="https://en.wikipedia.org/wiki/East_Africa" title="East Africa">East Africa</a> (Somalia in particular). In 2012, it pledged <a href="https://en.wikipedia.org/wiki/Allegiance" title="Allegiance">allegiance</a> to the <a href="https://en.wikipedia.org/wiki/Militant_Islamism" title="Militant Islamism">militant Islamist</a> organization <a href="https://en.wikipedia.org/wiki/Al-Qaeda" title="Al-Qaeda">Al-Qaeda</a>. </span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The group has <a href="https://en.wikipedia.org/wiki/Withdrawal_(military)" title="Withdrawal (military)">retreated</a> from the major cities; however, al-Shabaab still controls large parts of the rural areas. </span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Al-Shabaab has been designated as a <a href="https://en.wikipedia.org/wiki/Terrorist_organization" title="Terrorist organization">terrorist organization</a> by Australia, Canada, the United Arab Emirates, the United Kingdom and the United States.</span></span></p> </li> </ul> ', 'created_date' => object(Cake\I18n\FrozenDate) {}, 'posturl' => 'ai-shabaab-militant-group', 'image' => 'https://www.mediafire.com/convkey/af68/wwdr7736g7d3j8m6g.jpg', 'fbimage' => 'https://www.mediafire.com/convkey/af68/wwdr7736g7d3j8m6g.jpg', 'metatitle' => 'Al Shabaab militant group', 'metakeyword' => 'Al Shabaab militant group', 'metadescription' => 'A military base in Kenya, used by US and Kenyan forces, came under attack from the Al Shabaab militant group. US aircraft and vehicles were destroyed', 'author' => null, 'downlaodpdf' => 'https://www.mediafire.com/file/tqw0hilsi310br6/Al_Shabaab_militant_group.pdf/file', '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'currentaffairs' }, (int) 7 => object(Cake\ORM\Entity) { 'tag' => 'Security Threats', 'keyword' => 'security-treats', 'id' => (int) 4664, 'title' => 'Chinese aggression at border', 'description' => '<p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Issue</strong></span></span></p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The unprecedented high levels of tension at multiple locations in eastern Ladakh on the disputed India-China border, where Chinese soldiers have moved into Indian territory across the Line of Actual Control (LAC), has raised questions about the Chinese motives for this action. </span></span></p> <p style="margin-right:0cm"> </p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Background</strong></span></span></p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">With multiple intrusions, the Chinese have upped the ante with a view to pressure India. This can also be considered a diversionary tactics, considering pressure on China on international platform.</span></span></p> <p style="margin-right:0cm"> </p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Details</strong></span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The simplest explanation perhaps is that China is responding to India’s efforts to bolster border-area infrastructure in Ladakh after the completion of the DSDBO road. </span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">After India’s move into Doklam in 2017, China is especially sensitive to Indian activity along the disputed border. Around Galwan, in particular, China may be seeking to pre-empt an Indian effort to improve its links to the LAC.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">There are some major changes from the earlier pattern with regard to the Chinese behaviour on the border: one, they have reportedly come in large numbers into a new area (Galwan river valley) which had not been contentious in terms of the alignment of the LAC; two, they are staying put, dug down and in tents and not just as a short-term patrol.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Three, these incursions are happening in multiple locations; and four, they have become more assertive and aggressive in their behaviour.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The broader context is the need for China to show strength amid the pandemic that originated in Wuhan, which has harmed the Chinese economy and worsened relations with many countries.</span></span></p> </li> <li> <p><span style="font-size:11.0pt"><span style="font-family:"Calibri","sans-serif"">The activation of border areas by China could also be part of its pressure tactics and its desire to gain leverage vis-a-vis India with regard to issues in bilateral relations and matters like Covid and WHO.</span></span></p> </li> </ul> ', 'created_date' => object(Cake\I18n\FrozenDate) {}, 'posturl' => 'chinese-aggression-at-border', 'image' => '', 'fbimage' => '', 'metatitle' => 'Chinese aggression at border', 'metakeyword' => 'Chinese aggression at border', 'metadescription' => 'The unprecedented high levels of tension at multiple locations in eastern Ladakh on the disputed India-China border, where Chinese soldiers have moved into Indian territory', 'author' => null, 'downlaodpdf' => '', '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'currentaffairs' }, (int) 8 => object(Cake\ORM\Entity) { 'tag' => 'Security Threats', 'keyword' => 'security-treats', 'id' => (int) 5063, 'title' => 'Patrolling Points', 'description' => '<p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Issue</strong></span></span></p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The standoffs between Indian and Chinese troops in Ladakh on the Line of Actual Control (LAC), where initial steps towards disengagement have taken place, are around a number of patrolling points or PPs in Galwan, Hot Springs and Gogra areas.</span></span></p> <p style="margin-right:0cm"> </p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Details</strong></span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">PPs are patrolling points identified and marked on the LAC, which are patrolled with a stipulated frequency by the security forces. </span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">They serve as a guide to the location of the LAC for the soldiers, acting as indicators of the extent of ‘actual control’ exercised on the territory by India.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">By regularly patrolling up to these PPs, the Indian side is able to establish and assert its physical claim about the LAC.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Some of the PPs are prominent and identifiable geographical features, such as a pass, or a nala junction where no numerals are given. Only those PPs, where there are no prominent features, are numbered as in the case of PP14 in Galwan Valley.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The PPs are not posts and thus not manned. Unlike on the Line of Control (LoC) with Pakistan, the border with China is not physically held by the Army all along. </span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">They are just physical markers on the ground, chosen for their location, and have no defensive potential or tactical importance for the Army.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The claim is asserted by the Army or joint Army-ITBP patrols as they show a more visible presence in these areas. This is done by physically visiting PPs with a higher frequency, as the deployment has moved closer to the LAC and due to improved infrastructure. </span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">These PPs have been identified by the high-powered China Study Group, starting from 1975 when patrolling limits for Indian forces were specified.</span></span></p> </li> <li> <p><span style="font-size:11.0pt"><span style="font-family:"Calibri","sans-serif"">The frequency of reaching various PPs are given in the annual patrolling programme. Based on the terrain, the ground situation, and the location of the LAC, the duration for visiting each PP is specified – it can vary from once a month to twice a year.</span></span></p> </li> </ul> ', 'created_date' => object(Cake\I18n\FrozenDate) {}, 'posturl' => 'patrolling-points', 'image' => 'https://www.mediafire.com/convkey/3c52/kbje81w6ulsa1ax6g.jpg', 'fbimage' => 'https://www.mediafire.com/convkey/3c52/kbje81w6ulsa1ax6g.jpg', 'metatitle' => 'Patrolling Points', 'metakeyword' => 'Patrolling Points', 'metadescription' => 'The standoffs between Indian and Chinese troops in Ladakh on the Line of Actual Control (LAC), where initial steps towards disengagement have taken place,', 'author' => null, 'downlaodpdf' => 'http://www.mediafire.com/file/k8pzhl9pvkzus6v/2.Patrolling_Points.pdf/file', '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'currentaffairs' }, (int) 9 => object(Cake\ORM\Entity) { 'tag' => 'Security Threats', 'keyword' => 'security-treats', 'id' => (int) 8181, 'title' => 'Preventing drone attack', 'description' => '<p style="margin-left:0cm; margin-right:0cm"><span style="font-size:10pt"><span style="font-family:"Liberation Mono""><strong><span style="font-size:11.0pt"><span style="font-family:"Calibri","sans-serif"">Issue</span></span></strong></span></span></p> <p style="margin-left:0cm; margin-right:0cm"><span style="font-size:10pt"><span style="font-family:"Liberation Mono""><span style="font-size:11.0pt"><span style="font-family:"Calibri","sans-serif"">A drone was involved in dropping bombs at an IAF base in Jammu. This issue has brought focus on anti-drone system.</span></span></span></span></p> <p style="margin-left:0cm; margin-right:0cm"> </p> <p style="margin-left:0cm; margin-right:0cm"><span style="font-size:10pt"><span style="font-family:"Liberation Mono""><strong><span style="font-size:11.0pt"><span style="font-family:"Calibri","sans-serif"">Background</span></span></strong></span></span></p> <p style="margin-left:0cm; margin-right:0cm"><span style="font-size:10pt"><span style="font-family:"Liberation Mono""><span style="font-size:11.0pt"><span style="font-family:"Calibri","sans-serif"">This is not the first time that drone has been involved in terrorist activities. A few months back, drones had attacked Saudi Arabia’s largest oil facility.</span></span></span></span></p> <p style="margin-left:0cm; margin-right:0cm"> </p> <p style="margin-left:0cm; margin-right:0cm"><span style="font-size:10pt"><span style="font-family:"Liberation Mono""><strong><span style="font-size:11.0pt"><span style="font-family:"Calibri","sans-serif"">Details</span></span></strong></span></span></p> <ul> <li><span style="font-size:10pt"><span style="font-family:"Liberation Mono""><span style="font-size:11.0pt"><span style="font-family:"Calibri","sans-serif"">This is the first instance of drone weaponisation in India. They have earlier been used by US to kill terrorists in Iraq and Afghanistan.</span></span></span></span></li> <li><span style="font-size:10pt"><span style="font-family:"Liberation Mono""><span style="font-size:11.0pt"><span style="font-family:"Calibri","sans-serif"">A drone attack had killed Qasem Soleimani, the chief of Revolutionary Guards of Iran, in Iraq.</span></span></span></span></li> <li><span style="font-size:10pt"><span style="font-family:"Liberation Mono""><span style="font-size:11.0pt"><span style="font-family:"Calibri","sans-serif"">Companies from Israel, China and US have been offering anti-UAV technology to protect against potential attack. They have made use of radars, optical sensors and jammers to develop them.</span></span></span></span></li> <li><span style="font-size:10pt"><span style="font-family:"Liberation Mono""><span style="font-size:11.0pt"><span style="font-family:"Calibri","sans-serif"">All systems are not capable of destroying drones. Some of them simply indicate presence of such devices while others monitor.</span></span></span></span></li> </ul> <p style="margin-left:0cm; margin-right:0cm"> </p> <p style="margin-left:0cm; margin-right:0cm"><span style="font-size:10pt"><span style="font-family:"Liberation Mono""><strong><span style="font-size:11.0pt"><span style="font-family:"Calibri","sans-serif"">Anti-drone systems</span></span></strong></span></span></p> <ul> <li><span style="font-size:10pt"><span style="font-family:"Liberation Mono""><span style="font-size:11.0pt"><span style="font-family:"Calibri","sans-serif"">At present, Dome company of Israel has offered its Drone Dome to identify and intercept drones. They are similar to anti-missile systems.</span></span></span></span></li> <li><span style="font-size:10pt"><span style="font-family:"Liberation Mono""><span style="font-size:11.0pt"><span style="font-family:"Calibri","sans-serif"">The system also has the capability to prevent transmission of signals from handlers and also visuals from the camera mounted on the device.</span></span></span></span></li> </ul> <p style="margin-left:0cm; margin-right:0cm"> </p> <p style="margin-left:0cm; margin-right:0cm"><span style="font-size:10pt"><span style="font-family:"Liberation Mono""><strong><span style="font-size:11.0pt"><span style="font-family:"Calibri","sans-serif"">Domestic system</span></span></strong></span></span></p> <ul> <li><span style="font-size:10pt"><span style="font-family:"Liberation Mono""><span style="font-size:11.0pt"><span style="font-family:"Calibri","sans-serif"">State-run DRDO has developed <span style="color:#3e3e3e">‘Anti Drone System’ that will be installed later this year in several strategic locations.</span></span></span></span></span></li> <li><span style="font-size:10pt"><span style="font-family:"Liberation Mono""><span style="font-size:11.0pt"><span style="font-family:"Calibri","sans-serif""><span style="color:#3e3e3e">The system is capable of detecting and jamming drones in a 3 km radius. It later uses laser weapon to fire at drones that are 1- 2.5 km away from the location.</span></span></span></span></span></li> <li><span style="font-size:11.0pt"><span style="font-family:"Arial","sans-serif""><span style="color:#3e3e3e"><span style="font-size:11.0pt"><span style="font-family:"Calibri","sans-serif""><span style="color:#3e3e3e">Private entity, Adani Defence Systems and Technologies has developed an anti-drone system that has been currently demonstrated to defence officials.</span></span></span></span></span></span></li> </ul> ', 'created_date' => object(Cake\I18n\FrozenDate) {}, 'posturl' => 'preventing-drone-attack', 'image' => 'https://www.mediafire.com/file/2jxtlwg8fvr73uk/2.jpg', 'fbimage' => 'https://www.mediafire.com/file/2jxtlwg8fvr73uk/2.jpg', 'metatitle' => 'Preventing drone attack', 'metakeyword' => 'Preventing drone attack | Anti-drone systems | Domestic system', 'metadescription' => 'This is not the first time that drone has been involved in terrorist activities. A few months back, drones had attacked Saudi Arabia’s largest oil facility.', 'author' => null, 'downlaodpdf' => 'https://www.mediafire.com/file/o4v5dp7cxcpedhh/2._Preventing_drone_attack.pdf/file', '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'currentaffairs' }, (int) 10 => object(Cake\ORM\Entity) { 'tag' => 'Security Threats', 'keyword' => 'security-treats', 'id' => (int) 9756, 'title' => 'Strategic importance of bridge on Pangong Tso', 'description' => '<p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,"sans-serif""><strong>Issue</strong></span></span></p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,"sans-serif"">China has been indulged in construction of a bridge across the contentious Pangong Tso lake in eastern Ladakh.</span></span></p> <p style="margin-right:0cm"> </p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,"sans-serif""><strong>Background</strong></span></span></p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,"sans-serif"">India and China were involved in a standoff on the shores of the lake. Currently, the faceoff is taking place between armies of the two countries.</span></span></p> <p style="margin-right:0cm"> </p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,"sans-serif""><strong>Details</strong></span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,"sans-serif"">The bridge is about 400 m long and 8 m wide and is near the friction points of north banks and the Chushul sub-sector on the south bank of the lake.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,"sans-serif"">The bridge lies east of the finger 8 on the lake bank. India claims finger 8 as the LAC and the proposed lake lies within its perceived territory, but currently controlled by China since 1958.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,"sans-serif"">The site is nearby Khurnak Fort, which China considers part of its Rutong County. China maintains a frontier defence company at Khurnak Fort.</span></span></p> </li> </ul> <p style="margin-right:0cm"> </p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,"sans-serif""><strong>Importance of area</strong></span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,"sans-serif"">The lake banks were among the most sensitive friction points, especially finger 4. Both the countries had assembled troops and tanks.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,"sans-serif"">India outmaneuvered China to occupy heights of Kailash range, especially Magar hill and Gurung hill, which allowed it to monitor Spanggur gap.</span></span></p> </li> </ul> <p style="margin-right:0cm"> </p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,"sans-serif""><strong>Importance of bridge</strong></span></span></p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,"sans-serif"">It will allow greater mobilization of troops on both sides of the lake bank. The troops will be saved the time to traverse the treacherous routes along the lake.</span></span></p> <p style="margin-right:0cm"> </p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,"sans-serif""><strong>India’s response</strong></span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,"sans-serif"">India has been rapidly building roads and bridges to connect forward areas. This will allow faster movement of troops and equipments.</span></span></p> </li> <li> <p><span style="font-size:11.0pt"><span style="font-family:"Calibri","sans-serif"">India is making efforts to improve surveillance along the border, along with building new airstrips and landing areas.</span></span></p> </li> </ul> ', 'created_date' => object(Cake\I18n\FrozenDate) {}, 'posturl' => 'strategic-importance-bridge-pangong', 'image' => 'https://www.mediafire.com/file/0kheeh4w7z2r0n0/4_%25281%2529.jpg', 'fbimage' => 'https://www.mediafire.com/file/0kheeh4w7z2r0n0/4_%25281%2529.jpg', 'metatitle' => 'Strategic importance of bridge on Pangong Tso', 'metakeyword' => 'Strategic importance of bridge on Pangong Tso', 'metadescription' => 'India and China were involved in a standoff on the shores of the lake. Currently, the faceoff is taking place between armies of the two countries.', 'author' => null, 'downlaodpdf' => 'https://www.mediafire.com/file/a9kssh9bdoaxdv5/4._Strategic_importance_of_bridge_on_Pangong_Tso.pdf/file', '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'currentaffairs' }, (int) 11 => object(Cake\ORM\Entity) { 'tag' => 'Security Threats', 'keyword' => 'security-treats', 'id' => (int) 9764, 'title' => 'Australia’s online safety bill', 'description' => '<p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,"sans-serif""><strong>Issue</strong></span></span></p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,"sans-serif"">Australia’s Online Safety Act has come into effect. The law was passed in July 2021 and allows adults to report cases of online bullying in the country.</span></span></p> <p style="margin-right:0cm"> </p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,"sans-serif""><strong>Details</strong></span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,"sans-serif"">The eSafety commissioner has powers to order social media websites to take down content related to bullying against Australian adults within 24 hours.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,"sans-serif"">Failure of conforming to the order can lead to heavy fines up to $555,000. The issue of is bullying is more detailed than current cyber laws in the country. </span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,"sans-serif"">The removal of bullying content from online site has been shortened to 24 hours from the present 48 hours. The law is especially made for adults.</span></span></p> </li> </ul> <p style="margin-right:0cm"> </p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,"sans-serif""><strong>The act</strong></span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,"sans-serif"">The eSafety commissioner will be responsible for implementing the act to promote the online safety of Australians.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,"sans-serif"">The commissioner will be required to supervise the complaints and objections regarding sharing intimate images without consent.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,"sans-serif"">After a complaint is registered, a removal notice would also be sent to the hosting service provider or the person who had posted the cyber-bullying content.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,"sans-serif"">A similar process will be followed for non-consensual posting of intimate pictures. They will be liable for penalty if not adhered.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,"sans-serif"">The commissioner can send a link-deletion notice to search engines to stop providing links to certain material.</span></span></p> </li> </ul> <p style="margin-right:0cm"> </p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,"sans-serif""><strong>Process</strong></span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,"sans-serif"">Firstly, individuals have to report on the social media app they are being bullied or abused. Next, a complaint with the police should be filed.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,"sans-serif"">The issue can be reported to the eSafety commissioner if the content is not removed. They will provide notice for removing the content.</span></span></p> </li> </ul> <p style="margin-right:0cm"> </p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,"sans-serif""><strong>The online trolling bill</strong></span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,"sans-serif"">The proposed bill would allow the government to hold social media companies responsible for the trolling comments and content posted on their website.</span></span></p> </li> <li> <p><span style="font-size:11.0pt"><span style="font-family:"Calibri","sans-serif"">Social media organization would be asked to unveil the identity of the trolls, failing of which would attract penalty.</span></span></p> </li> </ul> ', 'created_date' => object(Cake\I18n\FrozenDate) {}, 'posturl' => 'australias-online-safety-bill', 'image' => 'https://www.mediafire.com/file/8t16rt9vpkmgttr/3.jpg', 'fbimage' => 'https://www.mediafire.com/file/8t16rt9vpkmgttr/3.jpg', 'metatitle' => 'Australia’s online safety bill and The online trolling bill', 'metakeyword' => 'Australia’s online safety bill and The online trolling bill', 'metadescription' => 'Australia’s Online Safety Act has come into effect. The law was passed in July 2021 and allows adults to report cases of online bullying in the country.', 'author' => null, 'downlaodpdf' => 'https://www.mediafire.com/file/6hgmcbhinuhgs3s/3._Australia%25E2%2580%2599s_online_safety_bill.pdf/file', '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'currentaffairs' } ] $tagname = 'Security Threats' $metadescription = 'Defence security Current Affairs, Security burning issues, latest news and more details get here with depth analysis of Defence security Current Affairs' $metakeyword = 'Defence security Current Affairs, Security burning issues, latest news ' $title = 'Security Threats | Defence security Current Affairs Gk News' $sbanners = [ (int) 0 => object(Cake\ORM\Entity) { 'id' => (int) 61, 'bannername' => 'http://www.mediafire.com/convkey/5f54/lodkrbkhwk5lg1q6g.jpg', 'bannerlink' => 'https://www.studyiq.com/course-detail/ssc-bank-combo', 'isright' => (int) 0, 'status' => (int) 1, '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'sitebanners' }, (int) 1 => object(Cake\ORM\Entity) { 'id' => (int) 62, 'bannername' => 'http://www.mediafire.com/convkey/0552/k9b1o467l8edtbc6g.jpg', 'bannerlink' => 'https://studyiq.com/courses/state-exams', 'isright' => (int) 0, 'status' => (int) 1, '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'sitebanners' }, (int) 2 => object(Cake\ORM\Entity) { 'id' => (int) 63, 'bannername' => 'http://www.mediafire.com/convkey/154a/6y1qvv7v118759h6g.jpg', 'bannerlink' => 'https://www.studyiq.com/course-detail/upsc-ias-pre-mains', 'isright' => (int) 0, 'status' => (int) 1, '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'sitebanners' }, (int) 3 => object(Cake\ORM\Entity) { 'id' => (int) 64, 'bannername' => 'http://www.mediafire.com/convkey/563c/o65x6jso51flz886g.jpg', 'bannerlink' => 'https://studyiq.com/courses/upsc/optional-subjects', 'isright' => (int) 0, 'status' => (int) 1, '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'sitebanners' } ] $params = [ (int) 0 => 'security-treats' ] $b = [ 'name' => 'Security Threats', 'link' => 'https://currentaffairs.studyiq.com/tags/security-treats' ] $currentaffair = object(Cake\ORM\Entity) { 'tag' => 'Security Threats', 'keyword' => 'security-treats', 'id' => (int) 9764, 'title' => 'Australia’s online safety bill', 'description' => '<p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,"sans-serif""><strong>Issue</strong></span></span></p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,"sans-serif"">Australia’s Online Safety Act has come into effect. The law was passed in July 2021 and allows adults to report cases of online bullying in the country.</span></span></p> <p style="margin-right:0cm"> </p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,"sans-serif""><strong>Details</strong></span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,"sans-serif"">The eSafety commissioner has powers to order social media websites to take down content related to bullying against Australian adults within 24 hours.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,"sans-serif"">Failure of conforming to the order can lead to heavy fines up to $555,000. The issue of is bullying is more detailed than current cyber laws in the country. </span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,"sans-serif"">The removal of bullying content from online site has been shortened to 24 hours from the present 48 hours. The law is especially made for adults.</span></span></p> </li> </ul> <p style="margin-right:0cm"> </p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,"sans-serif""><strong>The act</strong></span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,"sans-serif"">The eSafety commissioner will be responsible for implementing the act to promote the online safety of Australians.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,"sans-serif"">The commissioner will be required to supervise the complaints and objections regarding sharing intimate images without consent.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,"sans-serif"">After a complaint is registered, a removal notice would also be sent to the hosting service provider or the person who had posted the cyber-bullying content.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,"sans-serif"">A similar process will be followed for non-consensual posting of intimate pictures. They will be liable for penalty if not adhered.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,"sans-serif"">The commissioner can send a link-deletion notice to search engines to stop providing links to certain material.</span></span></p> </li> </ul> <p style="margin-right:0cm"> </p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,"sans-serif""><strong>Process</strong></span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,"sans-serif"">Firstly, individuals have to report on the social media app they are being bullied or abused. Next, a complaint with the police should be filed.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,"sans-serif"">The issue can be reported to the eSafety commissioner if the content is not removed. They will provide notice for removing the content.</span></span></p> </li> </ul> <p style="margin-right:0cm"> </p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,"sans-serif""><strong>The online trolling bill</strong></span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,"sans-serif"">The proposed bill would allow the government to hold social media companies responsible for the trolling comments and content posted on their website.</span></span></p> </li> <li> <p><span style="font-size:11.0pt"><span style="font-family:"Calibri","sans-serif"">Social media organization would be asked to unveil the identity of the trolls, failing of which would attract penalty.</span></span></p> </li> </ul> ', 'created_date' => object(Cake\I18n\FrozenDate) {}, 'posturl' => 'australias-online-safety-bill', 'image' => 'https://www.mediafire.com/file/8t16rt9vpkmgttr/3.jpg', 'fbimage' => 'https://www.mediafire.com/file/8t16rt9vpkmgttr/3.jpg', 'metatitle' => 'Australia’s online safety bill and The online trolling bill', 'metakeyword' => 'Australia’s online safety bill and The online trolling bill', 'metadescription' => 'Australia’s Online Safety Act has come into effect. The law was passed in July 2021 and allows adults to report cases of online bullying in the country.', 'author' => null, 'downlaodpdf' => 'https://www.mediafire.com/file/6hgmcbhinuhgs3s/3._Australia%25E2%2580%2599s_online_safety_bill.pdf/file', '[new]' => false, '[accessible]' => [ '*' => true ], '[dirty]' => [], '[original]' => [], '[virtual]' => [], '[errors]' => [], '[invalid]' => [], '[repository]' => 'currentaffairs' } $tags = '<a href="https://currentaffairs.studyiq.com/tags/security-treats">Security Threats</a>'
include - ROOT/plugins/Studyiq/src/Template/Pages/tags.ctp, line 64 Cake\View\View::_evaluate() - CORE/src/View/View.php, line 1196 Cake\View\View::_render() - CORE/src/View/View.php, line 1157 Cake\View\View::render() - CORE/src/View/View.php, line 765 Cake\Controller\Controller::render() - CORE/src/Controller/Controller.php, line 623 Cake\Http\ActionDispatcher::_invoke() - CORE/src/Http/ActionDispatcher.php, line 125 Cake\Http\ActionDispatcher::dispatch() - CORE/src/Http/ActionDispatcher.php, line 93 Cake\Http\BaseApplication::__invoke() - CORE/src/Http/BaseApplication.php, line 108 Cake\Http\Runner::__invoke() - CORE/src/Http/Runner.php, line 65 Cake\Routing\Middleware\RoutingMiddleware::__invoke() - CORE/src/Routing/Middleware/RoutingMiddleware.php, line 104 Cake\Http\Runner::__invoke() - CORE/src/Http/Runner.php, line 65 Cake\Routing\Middleware\AssetMiddleware::__invoke() - CORE/src/Routing/Middleware/AssetMiddleware.php, line 88 Cake\Http\Runner::__invoke() - CORE/src/Http/Runner.php, line 65 Cake\Error\Middleware\ErrorHandlerMiddleware::__invoke() - CORE/src/Error/Middleware/ErrorHandlerMiddleware.php, line 98 Cake\Http\Runner::__invoke() - CORE/src/Http/Runner.php, line 65 Cake\Http\Runner::run() - CORE/src/Http/Runner.php, line 51 Cake\Http\Server::run() - CORE/src/Http/Server.php, line 81
Notice (8): Undefined index: pageCount [ROOT/plugins/Studyiq/src/Template/Pages/tags.ctp, line 65]Code Context<input type="hidden" name="articlecount" id="articlecount" value="<?php echo $this->Paginator->params()['pageCount'];?>">
<?php if($this->Paginator->params()['pageCount']>1){?>
<div class="show-more">
$viewFile = '/var/www/currentaffairs.studyiq.com/plugins/Studyiq/src/Template/Pages/tags.ctp' $dataForView = [ 'headertags' => [ (int) 0 => object(Cake\ORM\Entity) {}, (int) 1 => object(Cake\ORM\Entity) {}, (int) 2 => object(Cake\ORM\Entity) {}, (int) 3 => object(Cake\ORM\Entity) {}, (int) 4 => object(Cake\ORM\Entity) {}, (int) 5 => object(Cake\ORM\Entity) {}, (int) 6 => object(Cake\ORM\Entity) {}, (int) 7 => object(Cake\ORM\Entity) {}, (int) 8 => object(Cake\ORM\Entity) {}, (int) 9 => object(Cake\ORM\Entity) {}, (int) 10 => object(Cake\ORM\Entity) {}, (int) 11 => object(Cake\ORM\Entity) {}, (int) 12 => object(Cake\ORM\Entity) {}, (int) 13 => object(Cake\ORM\Entity) {} ], 'breadcrumb' => [ (int) 0 => [ 'name' => 'Home', 'link' => 'https://currentaffairs.studyiq.com/' ], (int) 1 => [ 'name' => 'Security Threats', 'link' => 'https://currentaffairs.studyiq.com/tags/security-treats' ] ], 'currentaffairs' => [ (int) 0 => object(Cake\ORM\Entity) {}, (int) 1 => object(Cake\ORM\Entity) {}, (int) 2 => object(Cake\ORM\Entity) {}, (int) 3 => object(Cake\ORM\Entity) {}, (int) 4 => object(Cake\ORM\Entity) {}, (int) 5 => object(Cake\ORM\Entity) {}, (int) 6 => object(Cake\ORM\Entity) {}, (int) 7 => object(Cake\ORM\Entity) {}, (int) 8 => object(Cake\ORM\Entity) {}, (int) 9 => object(Cake\ORM\Entity) {}, (int) 10 => object(Cake\ORM\Entity) {}, (int) 11 => object(Cake\ORM\Entity) {} ], 'tagname' => 'Security Threats', 'metadescription' => 'Defence security Current Affairs, Security burning issues, latest news and more details get here with depth analysis of Defence security Current Affairs', 'metakeyword' => 'Defence security Current Affairs, Security burning issues, latest news ', 'title' => 'Security Threats | Defence security Current Affairs Gk News', 'sbanners' => [ (int) 0 => object(Cake\ORM\Entity) {}, (int) 1 => object(Cake\ORM\Entity) {}, (int) 2 => object(Cake\ORM\Entity) {}, (int) 3 => object(Cake\ORM\Entity) {} ], 'params' => [ (int) 0 => 'security-treats' ] ] $headertags = [ (int) 0 => object(Cake\ORM\Entity) { 'id' => (int) 3, 'name' => 'Art & Culture', 'parent_id' => (int) 2, 'description' => '', 'keyword' => 'art-culture', 'sortorder' => (int) 0, 'status' => (int) 1, 'metatitle' => 'Current Affairs Arts and Cultures Articles | Current Affairs', 'metakeyword' => 'Current Affairs Arts, Cultures Articles, Cultures Current Affairs Articles, Cultures Current Affairs, Current Affairs, Current Affair GK, General Knowledage', 'metadescription' => 'Current Affairs Arts and Cultures Articles complete current affairs details of Arts and cultures with complete depth analysis or full details of all current affair Articles', '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'cacategories' }, (int) 1 => object(Cake\ORM\Entity) { 'id' => (int) 4, 'name' => 'Polity & Governance', 'parent_id' => (int) 2, 'description' => '', 'keyword' => 'polity-governance', 'sortorder' => (int) 0, 'status' => (int) 1, 'metatitle' => 'Polity Current Affairs | Governance Current Affair | Polity GK', 'metakeyword' => 'Polity Current Affairs, Governance Current Affair, Polity GK, Current Affairs of Polity, Current Affairs of Governance, Current affair Polity', 'metadescription' => 'Polity Current Affairs, Governance Current Affair, and current affairs of Polity and Governance and more get with Study IQ Education Articles and full details', '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'cacategories' }, (int) 2 => object(Cake\ORM\Entity) { 'id' => (int) 5, 'name' => 'International Affairs', 'parent_id' => (int) 2, 'description' => '', 'keyword' => 'international-affairs', 'sortorder' => (int) 0, 'status' => (int) 1, 'metatitle' => 'International Affairs | International Current Affairs, GK, News', 'metakeyword' => 'International Affairs, International Current Affairs, International GK, International News, International burning Issues, International Today Affairs, International Current Affair, International current affairs 2019', 'metadescription' => 'International Affairs, International Current Affairs, GK, News, burning issues and all relative information of Internation you can get here for depth knowledge', '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'cacategories' }, (int) 3 => object(Cake\ORM\Entity) { 'id' => (int) 6, 'name' => 'Economy', 'parent_id' => (int) 2, 'description' => '', 'keyword' => 'economy', 'sortorder' => (int) 0, 'status' => (int) 1, 'metatitle' => 'Economy Current Affairs | Economy Current Affair 2019 | Study IQ', 'metakeyword' => 'Economy Current Affairs, Economy Current Affair, Economy Current Affair 2019, Economy GK news, Economy Affairs, Current Affairs Economy, Current Affair Economy', 'metadescription' => 'Economy Current Affairs, Economy Current Affair 2019 and all the Economy Current Affair, GK, Burning Issues, News, get on study IQ education for exams preparation', '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'cacategories' }, (int) 4 => object(Cake\ORM\Entity) { 'id' => (int) 7, 'name' => 'Banking Awareness', 'parent_id' => (int) 2, 'description' => '', 'keyword' => 'banking-awareness', 'sortorder' => (int) 0, 'status' => (int) 1, 'metatitle' => 'Banking Awareness Current Affairs, GK, News, Burning Issues', 'metakeyword' => 'Banking Awareness, Current Affairs, Current Affair, bANKING CURRENT AFFAIRS, Current affair of Banking, Current affair of Bank, Current affairs of Bank, BAnk current affairs', 'metadescription' => 'Banking Awareness Current Affairs, GK, News, Burning Issues, and all the latest current affairs of Banking Awareness or Banking for Govt exams preparation', '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'cacategories' }, (int) 5 => object(Cake\ORM\Entity) { 'id' => (int) 8, 'name' => 'Defence & Security', 'parent_id' => (int) 2, 'description' => '', 'keyword' => 'defence-security', 'sortorder' => (int) 0, 'status' => (int) 1, 'metatitle' => 'Defence Current Affairs | Defence & Security Current Affairs', 'metakeyword' => 'Defence Current Affairs, Current Affairs, Current Affair, Current Affairs of Defence, Security Current Affairs, Security Current Affairs 2019, Security Current Affairs daily, Defence Current Affairs Daily', 'metadescription' => 'Defence Current Affairs, Defence & Security Current Affairs and complete details of Defence & Security current affairs, burning issues of Defence, Defence Today News ', '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'cacategories' }, (int) 6 => object(Cake\ORM\Entity) { 'id' => (int) 9, 'name' => 'Environment', 'parent_id' => (int) 2, 'description' => '', 'keyword' => 'environment', 'sortorder' => (int) 0, 'status' => (int) 1, 'metatitle' => 'Environment Current Affairs, Current Affairs 2019- Study IQ', 'metakeyword' => 'Environment Current Affairs, Current Affairs Articles, Current Affairs of Environment, Current Affairs Environment', 'metadescription' => 'Environment Current Affairs, Current Affairs 2019, Study IQ provide complete information of Environment Current Affairs, GK, Bunrning Issues, latest news and more', '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'cacategories' }, (int) 7 => object(Cake\ORM\Entity) { 'id' => (int) 10, 'name' => 'Science & Technology', 'parent_id' => (int) 2, 'description' => '', 'keyword' => 'science-technology', 'sortorder' => (int) 0, 'status' => (int) 1, 'metatitle' => 'Science & Technology Current Affairs | Science Current Affairs', 'metakeyword' => 'Science & Technology Current Affairs, Science & Technology Current Affair, Science Current Affairs, Science Current Affair, Technology Current Affair, Technology Current Affairs', 'metadescription' => 'Science & Technology Current Affairs, Science Current Affairs, Technology today affairs and more relative Science & Technology information get here free', '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'cacategories' }, (int) 8 => object(Cake\ORM\Entity) { 'id' => (int) 11, 'name' => 'Miscellaneous', 'parent_id' => (int) 2, 'description' => '', 'keyword' => 'miscellaneous', 'sortorder' => (int) 0, 'status' => (int) 1, 'metatitle' => 'Miscellaneous Current Affairs Articles 2019, GK News | Study IQ', 'metakeyword' => 'Current Affairs Articles 2019, Miscellaneous Current Affairs, GK News, Current Affairs Articles', 'metadescription' => 'Current Affairs Articles, Current Affairs GK News analysis, and all topic relative information get here free and online so no need go anywhere that makes time saving ', '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'cacategories' }, (int) 9 => object(Cake\ORM\Entity) { 'id' => (int) 12, 'name' => 'Government Schemes', 'parent_id' => (int) 2, 'description' => '', 'keyword' => 'government-schemes', 'sortorder' => (int) 0, 'status' => (int) 1, 'metatitle' => 'Government Schemes Current Affairs | Govt Current Affairs StudyIQ', 'metakeyword' => 'Government Schemes Current Affairs, Government Current Affairs, Current Affairs of government, ', 'metadescription' => 'Government Schemes Current Affairs, Government Current Affairs ad all government relative latest information, news, burning issues and more get here', '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'cacategories' }, (int) 10 => object(Cake\ORM\Entity) { 'id' => (int) 13, 'name' => 'Persons in News', 'parent_id' => (int) 2, 'description' => '', 'keyword' => 'persons-in-news', 'sortorder' => (int) 0, 'status' => (int) 1, 'metatitle' => 'Persons in News | Current Affairs, Awards, Books, Obituaries News', 'metakeyword' => 'Persons in News, Current Affairs, Awards, Books, Obituaries News', 'metadescription' => 'Persons in News, Current Affairs, Awards, Books, Obituaries News, and all the daily current affairs news you will get here with complete information', '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'cacategories' }, (int) 11 => object(Cake\ORM\Entity) { 'id' => (int) 14, 'name' => 'Constitution', 'parent_id' => (int) 2, 'description' => '', 'keyword' => 'constitution', 'sortorder' => (int) 0, 'status' => (int) 1, 'metatitle' => 'Constitution | Indian Constitution | World Constitution ', 'metakeyword' => 'constitution, Indian Constitution, World Constitution, Country Constitution ', 'metadescription' => 'Get the all the country constitution like Indian constitution, world constitution and more here you can get all the latest information relative to constitution', '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'cacategories' }, (int) 12 => object(Cake\ORM\Entity) { 'id' => (int) 15, 'name' => 'Biodiversity', 'parent_id' => (int) 2, 'description' => '', 'keyword' => 'biodiversity', 'sortorder' => (int) 0, 'status' => (int) 1, 'metatitle' => 'Biodiversity | ??? ??????? | Biodiversity Current affairs', 'metakeyword' => 'Biodiversity, ??? ???????, Biodiversity Current affairs', 'metadescription' => 'Biodiversity, ??? ???????, Biodiversity Current affairs, Get the latest Biodiversity information with us where you get all the latest information about Biodiversity', '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'cacategories' }, (int) 13 => object(Cake\ORM\Entity) { 'id' => (int) 16, 'name' => 'Ecology', 'parent_id' => (int) 2, 'description' => '', 'keyword' => 'ecology', 'sortorder' => (int) 0, 'status' => (int) 1, 'metatitle' => 'Ecology Topic Wise Current afairs | Ecology Current Affairs ', 'metakeyword' => 'Ecology Current Affairs, Ecology Current Affairs 2021, Best Ecology Current Affairs, ecology topic wise current affairs, ecology', 'metadescription' => 'Best Ecology Current affairs - Get the ecology topic current affairs for all the govt exams preparation with best studyiq faculties and also get free ecology topic pdf on daily basis ', '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'cacategories' } ] $breadcrumb = [ (int) 0 => [ 'name' => 'Home', 'link' => 'https://currentaffairs.studyiq.com/' ], (int) 1 => [ 'name' => 'Security Threats', 'link' => 'https://currentaffairs.studyiq.com/tags/security-treats' ] ] $currentaffairs = [ (int) 0 => object(Cake\ORM\Entity) { 'tag' => 'Security Threats', 'keyword' => 'security-treats', 'id' => (int) 588, 'title' => 'Government constitutes Multi-Disciplinary Terror Monitoring Group for J&K', 'description' => '<p style="margin-left:0in; margin-right:0in; text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">Union Ministry of Home Affairs (MHA) has constituted eight memnber Multi-Disciplinary Terror Monitoring Group (MDTMG) for Jammu and Kashmir. It aims to ensure concerted action against terror financing and other terror related activities in J&K and bring them to a logical conclusion. It will meet on weekly basis and submit its action report regularly.</span></span></span></p> <p style="margin-left:0in; margin-right:0in; text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-family:"Quicksand",serif">Members of MDTMG</span></strong></span></span></p> <p style="margin-left:0in; margin-right:0in; text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">It will be headed by Additional Director General of Police (CID) of J&K Police. Its member will have representatives from J&K Police, Central Bureau of Investigation (CBI), Intelligence Bureau (IB), National Investigation Agency (NIA), Central Board of Direct Taxes (CBDT) and Central Board of Indirect Taxes and Customs.</span></span></span></p> <p style="margin-left:0in; margin-right:0in; text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-family:"Quicksand",serif">Terms of Reference of MDTMG</span></strong></span></span></p> <ul> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">Identify all key persons including leaders of organisations who are involved in supporting terrorism in any form. </span></span></span></li> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">Take action against hardcore supporters among government employees including teachers who are providing support to terror activities. </span></span></span></li> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">Take coordinated action in all terror registered cases, terror financing and terror-related activities and bring them to logical conclusion.</span></span></span></li> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Quicksand",serif">Investigate networks of various channels being used to fund terror and terror-related activities and will undertake action to stop flow of such funds.</span></span></span></li> </ul> ', 'created_date' => object(Cake\I18n\FrozenDate) {}, 'posturl' => 'govt-constitutes-multi-disciplinary-terror-monitoring-group-jk', 'image' => 'https://www.mediafire.com/convkey/3fb0/orazy7j0mqlacng6g.jpg', 'fbimage' => 'https://www.mediafire.com/convkey/3fb0/orazy7j0mqlacng6g.jpg', 'metatitle' => 'Constitutes Multi-Disciplinary Terror Monitoring Group for J&K', 'metakeyword' => 'In National Current Affairs, Ministry of Home Affairs, MHA, constituted, eight memnber, Multi-Disciplinary Terror Monitoring Group, MDTMG, Jammu and Kashmir', 'metadescription' => 'Ministry of Home Affairs (MHA) has constituted eight memnber Multi-Disciplinary Terror Monitoring Group (MDTMG) for Jammu and Kashmir', 'author' => 'Nikhil Paigude', 'downlaodpdf' => 'https://www.mediafire.com/file/jr1sbo37v7rbaot/Government_constitutes_Multi-Disciplinary.pdf/file', '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'currentaffairs' }, (int) 1 => object(Cake\ORM\Entity) { 'tag' => 'Security Threats', 'keyword' => 'security-treats', 'id' => (int) 1010, 'title' => 'GREVD: SIPRI launches Global Registry of Violent Deaths', 'description' => '<p style="margin-left:0in; margin-right:0in; text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-size:10.0pt"><span style="font-family:"Quicksand","serif"">Stockholm International Peace Research Institute (SIPRI) has launched new initiative named Global Registry of Violent Deaths (GReVD) to count deaths caused by all forms of violence across the world and display these in open-source database. It aims to establish annual number of violent deaths worldwide and enable monitoring of progress on world’s commitment to ‘significantly reduce all forms of violence and related death rates everywhere’ by 2030 as set out in Sustainable Development Goals (SDGs)-Goal 16.</span></span></span></span></p> <p style="margin-left:0in; margin-right:0in; text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-size:10.0pt"><span style="font-family:"Quicksand","serif"">Global Registry of Violent Deaths (GReVD) </span></span></strong></span></span></p> <ul> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-size:10.0pt"><span style="font-family:"Quicksand","serif"">It will be open-source database that will allow researchers, policymakers and general public to track trends in violence at global, regional, national, provincial, city and municipal levels.</span></span></span></span></li> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-size:10.0pt"><span style="font-family:"Quicksand","serif"">It will hold single entry for every violent death, including time, location, perpetrator, victim and type of violence.</span></span></span></span></li> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-size:10.0pt"><span style="font-family:"Quicksand","serif"">The sources will be verifiable news reports of lethal events and processing will be done by machine coding to handle volume of entries, as well as human coding to ensure accuracy and consistency.</span></span></span></span></li> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-size:10.0pt"><span style="font-family:"Quicksand","serif"">Supporting agencies:</span></span></strong><span style="font-size:10.0pt"><span style="font-family:"Quicksand","serif""> For this project, SIPRI has already brought together main groups that monitor violent deaths, as well as leading big data labs. </span></span></span></span></li> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-size:10.0pt"><span style="font-family:"Quicksand","serif"">The first-phase of the project is funded by Swedish Postcode Foundation and United Kingdom’s Department for International Development.</span></span></span></span></li> </ul> <p style="margin-left:0in; margin-right:0in; text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-size:10.0pt"><span style="font-family:"Quicksand","serif"">Stockholm International Peace Research Institute (SIPRI)</span></span></strong></span></span></p> <ul> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-size:10.0pt"><span style="font-family:"Quicksand","serif"">It is international institute dedicated to research into conflict, armaments, arms control and disarmament. It was established in 1966 and is based in Stockholm, Sweden.</span></span></span></span></li> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-size:10.0pt"><span style="font-family:"Quicksand","serif"">It provides data, recommendations and analysis to policymakers, researchers, media and interested public based on open sources,.</span></span></span></span></li> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-size:10.0pt"><span style="font-family:"Quicksand","serif"">It was ranked among top three non-US world-wide think tanks in 2014 Global Go To Think Tanks Report by University of Pennsylvania Lauder Institute.</span></span></span></span></li> </ul> ', 'created_date' => object(Cake\I18n\FrozenDate) {}, 'posturl' => 'global-registry-violent-deaths', 'image' => 'https://www.mediafire.com/convkey/58de/5nk8q9k33vey6qt6g.jpg', 'fbimage' => 'https://www.mediafire.com/convkey/58de/5nk8q9k33vey6qt6g.jpg', 'metatitle' => 'GREVD: SIPRI launches Global Registry of Violent Deaths', 'metakeyword' => 'Stockholm International Peace Research Institute (SIPRI), launched, Gobal Registry of Violent Deaths, GReVD, count deaths caused by all forms of violence across the world', 'metadescription' => 'SIPRI launches Global Registry of Violent Deaths (GReVD) to count deaths caused by all forms of violence across the world', 'author' => 'Nikhil Paigude', 'downlaodpdf' => 'https://www.mediafire.com/file/rbm1m4i2vzeon9j/GREVD.pdf/file', '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'currentaffairs' }, (int) 2 => object(Cake\ORM\Entity) { 'tag' => 'Security Threats', 'keyword' => 'security-treats', 'id' => (int) 1103, 'title' => 'WhatsApp Spyware Attack', 'description' => '<p style="margin-left:0in; margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-size:10.0pt"><span style="font-family:"Quicksand","serif"">Facebook Inc owned WhatsApp has confirmed that it has detected zero-day vulnerability on its platform that targeted surveillance (spyware) attack on its users. It has urged its users to install latest version of the app which has patch to close this vulnerablity. </span></span></span></span></p> <p style="margin-left:0in; margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-size:10.0pt"><span style="font-family:"Quicksand","serif"">What is this spyware attack?</span></span></strong></span></span></p> <p style="margin-left:0in; margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-size:10.0pt"><span style="font-family:"Quicksand","serif"">Zero-day vulnerability in WhatsApp has led to targeted surveillance attack on its users that Leave users open to spyware that could turn on their phone’s camera and microphone, and collect location data.</span></span></span></span></p> <p style="margin-left:0in; margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-size:10.0pt"><span style="font-family:"Quicksand","serif"">Software called Pegasus created by private Israeli firm NSO Group is able to take advantage of security loophole in WhatsApp’s voice call function to carry out the attack. It can also trawl through emails and messages. This software is mainly operated by intelligence and law enforcement agencies</span></span></span></span></p> <p style="margin-left:0in; margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-size:10.0pt"><span style="font-family:"Quicksand","serif"">How it attacks?</span></span></strong></span></span></p> <p style="margin-left:0in; margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-size:10.0pt"><span style="font-family:"Quicksand","serif"">Using Pegasus, attackers could simply call user to install malicious surveillance software (spyaware), even when call was not taken. It also claimed that call would sometimes not even show up in the user’s call log. </span></span></span></span></p> <p style="margin-left:0in; margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-size:10.0pt"><span style="font-family:"Quicksand","serif"">It exploited buffer overflow vulnerability in WhatsApp VOIP (voice over internet protocol) stack, which allowed remote code execution via specially crafted series of SRTCP packets sent to a target phone number.</span></span></span></span></p> <p style="margin-left:0in; margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-size:10.0pt"><span style="font-family:"Quicksand","serif"">This could leave users open to spyware that could turn on their phone’s camera and microphone, and collect location data.</span></span></span></span></p> ', 'created_date' => object(Cake\I18n\FrozenDate) {}, 'posturl' => 'whatsapp-spyware-attack', 'image' => 'https://www.mediafire.com/convkey/0c3b/qc10xwbeb4bk33i6g.jpg', 'fbimage' => 'https://www.mediafire.com/convkey/0c3b/qc10xwbeb4bk33i6g.jpg', 'metatitle' => 'WhatsApp Spyware Attack | Spyware Attack | WhatsApp Attack', 'metakeyword' => 'Facebook Inc, WhatsApp,detected, zero-day vulnerability, targeted surveillance, spyware attack ', 'metadescription' => 'Facebook Inc owned WhatsApp has confirmed that it has detected zero-day vulnerability on its platform that targeted surveillance (spyware) attack on its users.', 'author' => 'Nikhil Paigude', 'downlaodpdf' => 'https://www.mediafire.com/file/blbpscs9559y23s/WhatsApp.pdf/file', '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'currentaffairs' }, (int) 3 => object(Cake\ORM\Entity) { 'tag' => 'Security Threats', 'keyword' => 'security-treats', 'id' => (int) 2651, 'title' => 'WhatsApp spying with Pegasus malware', 'description' => '<p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Issue</strong></span></span></p> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">WhatsApp has confirmed that at least two dozen journalists, academicians, Dalit and human rights activists, in India have been targeted for surveillance for a two week period until May 2019. The hackers allegedly used an Israeli technology, Pegasus to conduct the spying.</span></span></p> <p style="margin-right:0in"> </p> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Background</strong></span></span></p> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">In May 2019, WhatsApp identified that a bug in the app’s call function was used to install a malicious code into users’ phones. On October 29, it identified the malicious code as Pegasus, a spyware developed by an Israeli company, NSO.</span></span></p> <p style="margin-right:0in"> </p> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Details</strong></span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The code is transmitted by calling the target phone on WhatsApp. The code enters the phone even if the call is not answered.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">This is only one of the ways of delivering Pegasus. There are several other cases such as alarming SMSs that prompt targets to click on a link.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Once installed, Pegasus can send the target’s contacts, calendar events, phone calls on and messages on communication apps like WhatsApp and Telegram to the spyware’s controller.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The controller can also turn the phone into a spying device by switching on its camera or microphone.</span></span></p> </li> </ul> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Malwares</strong></span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Malware, or malicious software, is any program or file that is harmful to a computer user. Types of malware can include computer viruses, worms, Trojan horses and spyware.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">These malicious programs can perform a variety of different functions such as stealing, encrypting or deleting sensitive data, altering or hijacking core computing functions and monitoring users' computer activity without their permission.</span></span></p> </li> </ul> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Types of malware</strong></span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">A <strong>virus</strong> is the most common type of malware which can execute itself and spread by infecting other programs or files.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">A <strong> worm</strong> can self-replicate without a host program and typically spreads without any human interaction or directives from the malware authors.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">A <strong>Trojan horse </strong> is designed to appear as a legitimate program in order to gain access to a system. Once activated following installation, Trojans can execute their malicious functions. </span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Spyware </strong> is made to collect information and data on the device user and observe their activity without their knowledge.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Ransomware</strong> is designed to infect a user's system and encrypt the data. Cybercriminals then demand a ransom payment from the victim in exchange for decrypting the system's data.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">A <strong>rootkit </strong> is created to obtain administrator-level access to the victim's system. Once installed, the program gives threat actors root or privileged access to the system.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">A backdoor virus or <strong>remote access Trojan</strong> (RAT) secretly creates a backdoor into an infected system that allows threat actors to remotely access it without alerting the user or the system's security programs.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Adware</strong> is used to track a user’s browser and download history with the intent to display pop-up or banner advertisements that lure the user into making a purchase. For example, an advertiser might use cookies to track the web pages a user visits to better target advertising.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Keyloggers</strong>, also called system monitors, are used to see nearly everything a user does on their computer. This includes emails, opened web-pages, programs and keystrokes</span></span></p> </li> </ul> ', 'created_date' => object(Cake\I18n\FrozenDate) {}, 'posturl' => 'whatsapp-spying-with-pegasus-malware', 'image' => 'https://www.mediafire.com/convkey/3cfe/qymkxg8yus572ij6g.jpg', 'fbimage' => 'https://www.mediafire.com/convkey/3cfe/qymkxg8yus572ij6g.jpg', 'metatitle' => 'WhatsApp spying with Pegasus malware', 'metakeyword' => 'WhatsApp spying with Pegasus malware', 'metadescription' => 'WhatsApp has confirmed that at least two dozen journalists, academicians, Dalit and human rights activists, in India have been targeted for surveillance', 'author' => null, 'downlaodpdf' => 'https://www.mediafire.com/file/vr19kejmnbodrmc/WhatsApp_spying_with_Pegasus_malware.pdf/file', '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'currentaffairs' }, (int) 4 => object(Cake\ORM\Entity) { 'tag' => 'Security Threats', 'keyword' => 'security-treats', 'id' => (int) 2653, 'title' => 'Indian card details selling on Dark Web', 'description' => '<p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Issue</strong></span></span></p> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Nearly 1.3 million debit and credit card data of Indian banking<strong> </strong>customers that can fetch up to $130 million for cybercriminals are available on Dark Web for open sale.</span></span></p> <p style="margin-right:0in"> </p> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Background</strong></span></span></p> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"> Data analysis suggests the card details may have been obtained via skimming devices, installed either on ATMs or point of sale (PoS) systems.</span></span></p> <p style="margin-right:0in"> </p> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Details</strong></span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">According to ZDNet, the cards’ details is available on Joker’s Stash, one of the oldest card shops on the dark web which is known to be the place where major hackers sell card dumps.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The card dump includes Track 2 data, usually found on a payment card’s magnetic stripe. </span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The presence of this kind of data automatically rules out skimmers installed on websites (Magecart attacks), where Track 1 and Track 2 is never used.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Criminals who buy card dumps from Joker’s Stash typically use the data to clone legitimate cards and withdraw money from ATMs in so called “cash outs”.</span></span></p> </li> </ul> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Dark Web</strong></span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The dark web refers to encrypted online content that is not indexed by conventional search engines. </span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Also known as the "darknet," the dark web is a component of the deep web that describes the wider breadth of content that does not appear through regular internet browsing activities.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Specific browsers like Tor are required to access dark web sites, which contain anonymous message boards, online marketplaces for drugs, exchanges for stolen financial and private data, and other illegal content. </span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Transactions in this hidden economy are often paid for with bitcoin, and physical goods are routinely shipped in ways that cloak both buyers and sellers from the watchful eyes of law enforcement.</span></span></p> </li> </ul> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Working</strong></span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The dark web attracts users who seek anonymity when conducting business. Intentions can be noble, such as with journalists seeking to interview citizens of repressive countries, where communications are monitored.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The anonymity of the dark web attracts criminal actors like drug-dealers, hackers, and child pornography peddlers. </span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">There is also a growing service economy within the dark web in which hitmen and other illegal operatives advertise their services in ways they could not over traditional channels.</span></span></p> </li> </ul> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Deep web</strong></span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The dark web and the deep web are often erroneously used interchangeably. To clarify: the deep web includes all the pages that don’t pop up when you run a web search. </span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">This covers everything requiring a login, such as personal email, online banking, or other such sites.</span></span></p> </li> </ul> ', 'created_date' => object(Cake\I18n\FrozenDate) {}, 'posturl' => 'indian-card-details-selling-on-dark-web', 'image' => 'https://www.mediafire.com/convkey/9245/s1i6umkju1mat9a6g.jpg', 'fbimage' => 'https://www.mediafire.com/convkey/9245/s1i6umkju1mat9a6g.jpg', 'metatitle' => 'Indian card details selling on Dark Web', 'metakeyword' => 'Indian card details selling on Dark Web', 'metadescription' => 'Nearly 1.3 million debit and credit card data of Indian banking customers that can fetch up to $130 million for cybercriminals are available on Dark Web for open sale.', 'author' => null, 'downlaodpdf' => 'https://www.mediafire.com/file/utvpj8ao6sla0w1/Indian_card_details_selling_on_Dark_Web.pdf/file', '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'currentaffairs' }, (int) 5 => object(Cake\ORM\Entity) { 'tag' => 'Security Threats', 'keyword' => 'security-treats', 'id' => (int) 2680, 'title' => 'Lone wolf attacks warning', 'description' => '<p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Issue</strong></span></span></p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">A high alert has been issued to security forces across the country by central intelligence agencies, warning of possible ‘lone wolf’ attacks by Islamic State (IS) operatives.</span></span></p> <p style="margin-right:0cm"> </p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Background</strong></span></span></p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The Home ministry said that the overall security scenario in the country remained a cause for concern on account of the threat emerging from Pakistan and the Afghanistan-Pakistan belt.</span></span></p> <p style="margin-right:0cm"> </p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Details</strong></span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The reported nexus between home-grown terror outfits and Pakistan-based extremist organisations in terms of procurement of weapons, technology and training has added a new dimension to the threat scenario.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The porous coastline of southeastern and southwestern India was an easy landing ground for terror outfits to push their men and material into the country, the note said.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Inputs indicated that Sri Lanka and Maldives were used by Pakistan-based terrorist elements for anti-India activities.</span></span></p> </li> </ul> <p style="margin-right:0cm"> </p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Lone wolf attacks</strong></span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">A lone-actor terrorist, or lone wolf is someone who prepares and commits violent acts alone, outside of any command structure and without material assistance from any group.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The term lone wolf is used to distinguish terrorist actions carried out by individuals from those coordinated by large groups.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Terrorist attacks that are carried out by small cells are not classified as lone wolf attacks.</span></span></p> </li> </ul> ', 'created_date' => object(Cake\I18n\FrozenDate) {}, 'posturl' => 'lone-wolf-attacks-warning', 'image' => 'https://www.mediafire.com/convkey/781c/uk286r0jdjlctjy6g.jpg', 'fbimage' => 'https://www.mediafire.com/convkey/781c/uk286r0jdjlctjy6g.jpg', 'metatitle' => 'Lone wolf attacks warning', 'metakeyword' => 'A high alert has been issued to security forces across', 'metadescription' => 'A high alert has been issued to security forces across the country by central intelligence agencies, warning of possible ‘lone wolf’ attacks by Islamic State (IS) operatives.', 'author' => null, 'downlaodpdf' => 'https://www.mediafire.com/file/lbvrqz39t2pwcup/Lone_wolf_attacks_warning.pdf/file', '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'currentaffairs' }, (int) 6 => object(Cake\ORM\Entity) { 'tag' => 'Security Threats', 'keyword' => 'security-treats', 'id' => (int) 3289, 'title' => 'Al Shabaab militant group', 'description' => '<p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Issue</strong></span></span></p> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">A military base in Kenya, used by US and Kenyan forces, came under attack from the Al Shabaab militant group. US aircraft and vehicles were destroyed in the assault.</span></span></p> <p style="margin-right:0in"> </p> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Background</strong></span></span></p> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">There have been confrontations between the US and Al Shabaab in the past, but this is the first time the latter has struck US forces inside Kenya, considered to be a key base for fighting the highly resilient militant group.</span></span></p> <p style="margin-right:0in"> </p> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Details</strong></span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The Islamist Al Shabaab group is active in East Africa and is involved in the ongoing civil war in Somalia. The group has been fighting to overthrow the weak West-backed Somali government, the latter being supported by a 21,000-strong African Union peacekeeping force.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The US established Camp Simba in Kenya’s Lamu county more than a decade ago, where it maintains under a 100 personnel. The US trains and gives counterterror support to its East African partners at the Manda Bay airfield that also acts as a base fighting against the group.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The group is responsible for many attacks such as suicide attack on an upscale hotel and office complex in Nairobi, raid on the Baledogle base in Somalia, which is used by both Somali special forces and American troops etc.</span></span></p> </li> </ul> <p style="margin-right:0in"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Al Shabaab</strong></span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Harakat al-Shabaab al-Mujahideen, more commonly known as al-Shabaab is a <a href="https://en.wikipedia.org/wiki/Jihadism" title="Jihadism">jihadist</a> <a href="https://en.wikipedia.org/wiki/Islamic_fundamentalism" title="Islamic fundamentalism">fundamentalist group</a> based in <a href="https://en.wikipedia.org/wiki/East_Africa" title="East Africa">East Africa</a> (Somalia in particular). In 2012, it pledged <a href="https://en.wikipedia.org/wiki/Allegiance" title="Allegiance">allegiance</a> to the <a href="https://en.wikipedia.org/wiki/Militant_Islamism" title="Militant Islamism">militant Islamist</a> organization <a href="https://en.wikipedia.org/wiki/Al-Qaeda" title="Al-Qaeda">Al-Qaeda</a>. </span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The group has <a href="https://en.wikipedia.org/wiki/Withdrawal_(military)" title="Withdrawal (military)">retreated</a> from the major cities; however, al-Shabaab still controls large parts of the rural areas. </span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Al-Shabaab has been designated as a <a href="https://en.wikipedia.org/wiki/Terrorist_organization" title="Terrorist organization">terrorist organization</a> by Australia, Canada, the United Arab Emirates, the United Kingdom and the United States.</span></span></p> </li> </ul> ', 'created_date' => object(Cake\I18n\FrozenDate) {}, 'posturl' => 'ai-shabaab-militant-group', 'image' => 'https://www.mediafire.com/convkey/af68/wwdr7736g7d3j8m6g.jpg', 'fbimage' => 'https://www.mediafire.com/convkey/af68/wwdr7736g7d3j8m6g.jpg', 'metatitle' => 'Al Shabaab militant group', 'metakeyword' => 'Al Shabaab militant group', 'metadescription' => 'A military base in Kenya, used by US and Kenyan forces, came under attack from the Al Shabaab militant group. US aircraft and vehicles were destroyed', 'author' => null, 'downlaodpdf' => 'https://www.mediafire.com/file/tqw0hilsi310br6/Al_Shabaab_militant_group.pdf/file', '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'currentaffairs' }, (int) 7 => object(Cake\ORM\Entity) { 'tag' => 'Security Threats', 'keyword' => 'security-treats', 'id' => (int) 4664, 'title' => 'Chinese aggression at border', 'description' => '<p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Issue</strong></span></span></p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The unprecedented high levels of tension at multiple locations in eastern Ladakh on the disputed India-China border, where Chinese soldiers have moved into Indian territory across the Line of Actual Control (LAC), has raised questions about the Chinese motives for this action. </span></span></p> <p style="margin-right:0cm"> </p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Background</strong></span></span></p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">With multiple intrusions, the Chinese have upped the ante with a view to pressure India. This can also be considered a diversionary tactics, considering pressure on China on international platform.</span></span></p> <p style="margin-right:0cm"> </p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Details</strong></span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The simplest explanation perhaps is that China is responding to India’s efforts to bolster border-area infrastructure in Ladakh after the completion of the DSDBO road. </span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">After India’s move into Doklam in 2017, China is especially sensitive to Indian activity along the disputed border. Around Galwan, in particular, China may be seeking to pre-empt an Indian effort to improve its links to the LAC.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">There are some major changes from the earlier pattern with regard to the Chinese behaviour on the border: one, they have reportedly come in large numbers into a new area (Galwan river valley) which had not been contentious in terms of the alignment of the LAC; two, they are staying put, dug down and in tents and not just as a short-term patrol.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Three, these incursions are happening in multiple locations; and four, they have become more assertive and aggressive in their behaviour.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The broader context is the need for China to show strength amid the pandemic that originated in Wuhan, which has harmed the Chinese economy and worsened relations with many countries.</span></span></p> </li> <li> <p><span style="font-size:11.0pt"><span style="font-family:"Calibri","sans-serif"">The activation of border areas by China could also be part of its pressure tactics and its desire to gain leverage vis-a-vis India with regard to issues in bilateral relations and matters like Covid and WHO.</span></span></p> </li> </ul> ', 'created_date' => object(Cake\I18n\FrozenDate) {}, 'posturl' => 'chinese-aggression-at-border', 'image' => '', 'fbimage' => '', 'metatitle' => 'Chinese aggression at border', 'metakeyword' => 'Chinese aggression at border', 'metadescription' => 'The unprecedented high levels of tension at multiple locations in eastern Ladakh on the disputed India-China border, where Chinese soldiers have moved into Indian territory', 'author' => null, 'downlaodpdf' => '', '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'currentaffairs' }, (int) 8 => object(Cake\ORM\Entity) { 'tag' => 'Security Threats', 'keyword' => 'security-treats', 'id' => (int) 5063, 'title' => 'Patrolling Points', 'description' => '<p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Issue</strong></span></span></p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The standoffs between Indian and Chinese troops in Ladakh on the Line of Actual Control (LAC), where initial steps towards disengagement have taken place, are around a number of patrolling points or PPs in Galwan, Hot Springs and Gogra areas.</span></span></p> <p style="margin-right:0cm"> </p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong>Details</strong></span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">PPs are patrolling points identified and marked on the LAC, which are patrolled with a stipulated frequency by the security forces. </span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">They serve as a guide to the location of the LAC for the soldiers, acting as indicators of the extent of ‘actual control’ exercised on the territory by India.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">By regularly patrolling up to these PPs, the Indian side is able to establish and assert its physical claim about the LAC.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Some of the PPs are prominent and identifiable geographical features, such as a pass, or a nala junction where no numerals are given. Only those PPs, where there are no prominent features, are numbered as in the case of PP14 in Galwan Valley.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The PPs are not posts and thus not manned. Unlike on the Line of Control (LoC) with Pakistan, the border with China is not physically held by the Army all along. </span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">They are just physical markers on the ground, chosen for their location, and have no defensive potential or tactical importance for the Army.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">The claim is asserted by the Army or joint Army-ITBP patrols as they show a more visible presence in these areas. This is done by physically visiting PPs with a higher frequency, as the deployment has moved closer to the LAC and due to improved infrastructure. </span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">These PPs have been identified by the high-powered China Study Group, starting from 1975 when patrolling limits for Indian forces were specified.</span></span></p> </li> <li> <p><span style="font-size:11.0pt"><span style="font-family:"Calibri","sans-serif"">The frequency of reaching various PPs are given in the annual patrolling programme. Based on the terrain, the ground situation, and the location of the LAC, the duration for visiting each PP is specified – it can vary from once a month to twice a year.</span></span></p> </li> </ul> ', 'created_date' => object(Cake\I18n\FrozenDate) {}, 'posturl' => 'patrolling-points', 'image' => 'https://www.mediafire.com/convkey/3c52/kbje81w6ulsa1ax6g.jpg', 'fbimage' => 'https://www.mediafire.com/convkey/3c52/kbje81w6ulsa1ax6g.jpg', 'metatitle' => 'Patrolling Points', 'metakeyword' => 'Patrolling Points', 'metadescription' => 'The standoffs between Indian and Chinese troops in Ladakh on the Line of Actual Control (LAC), where initial steps towards disengagement have taken place,', 'author' => null, 'downlaodpdf' => 'http://www.mediafire.com/file/k8pzhl9pvkzus6v/2.Patrolling_Points.pdf/file', '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'currentaffairs' }, (int) 9 => object(Cake\ORM\Entity) { 'tag' => 'Security Threats', 'keyword' => 'security-treats', 'id' => (int) 8181, 'title' => 'Preventing drone attack', 'description' => '<p style="margin-left:0cm; margin-right:0cm"><span style="font-size:10pt"><span style="font-family:"Liberation Mono""><strong><span style="font-size:11.0pt"><span style="font-family:"Calibri","sans-serif"">Issue</span></span></strong></span></span></p> <p style="margin-left:0cm; margin-right:0cm"><span style="font-size:10pt"><span style="font-family:"Liberation Mono""><span style="font-size:11.0pt"><span style="font-family:"Calibri","sans-serif"">A drone was involved in dropping bombs at an IAF base in Jammu. This issue has brought focus on anti-drone system.</span></span></span></span></p> <p style="margin-left:0cm; margin-right:0cm"> </p> <p style="margin-left:0cm; margin-right:0cm"><span style="font-size:10pt"><span style="font-family:"Liberation Mono""><strong><span style="font-size:11.0pt"><span style="font-family:"Calibri","sans-serif"">Background</span></span></strong></span></span></p> <p style="margin-left:0cm; margin-right:0cm"><span style="font-size:10pt"><span style="font-family:"Liberation Mono""><span style="font-size:11.0pt"><span style="font-family:"Calibri","sans-serif"">This is not the first time that drone has been involved in terrorist activities. A few months back, drones had attacked Saudi Arabia’s largest oil facility.</span></span></span></span></p> <p style="margin-left:0cm; margin-right:0cm"> </p> <p style="margin-left:0cm; margin-right:0cm"><span style="font-size:10pt"><span style="font-family:"Liberation Mono""><strong><span style="font-size:11.0pt"><span style="font-family:"Calibri","sans-serif"">Details</span></span></strong></span></span></p> <ul> <li><span style="font-size:10pt"><span style="font-family:"Liberation Mono""><span style="font-size:11.0pt"><span style="font-family:"Calibri","sans-serif"">This is the first instance of drone weaponisation in India. They have earlier been used by US to kill terrorists in Iraq and Afghanistan.</span></span></span></span></li> <li><span style="font-size:10pt"><span style="font-family:"Liberation Mono""><span style="font-size:11.0pt"><span style="font-family:"Calibri","sans-serif"">A drone attack had killed Qasem Soleimani, the chief of Revolutionary Guards of Iran, in Iraq.</span></span></span></span></li> <li><span style="font-size:10pt"><span style="font-family:"Liberation Mono""><span style="font-size:11.0pt"><span style="font-family:"Calibri","sans-serif"">Companies from Israel, China and US have been offering anti-UAV technology to protect against potential attack. They have made use of radars, optical sensors and jammers to develop them.</span></span></span></span></li> <li><span style="font-size:10pt"><span style="font-family:"Liberation Mono""><span style="font-size:11.0pt"><span style="font-family:"Calibri","sans-serif"">All systems are not capable of destroying drones. Some of them simply indicate presence of such devices while others monitor.</span></span></span></span></li> </ul> <p style="margin-left:0cm; margin-right:0cm"> </p> <p style="margin-left:0cm; margin-right:0cm"><span style="font-size:10pt"><span style="font-family:"Liberation Mono""><strong><span style="font-size:11.0pt"><span style="font-family:"Calibri","sans-serif"">Anti-drone systems</span></span></strong></span></span></p> <ul> <li><span style="font-size:10pt"><span style="font-family:"Liberation Mono""><span style="font-size:11.0pt"><span style="font-family:"Calibri","sans-serif"">At present, Dome company of Israel has offered its Drone Dome to identify and intercept drones. They are similar to anti-missile systems.</span></span></span></span></li> <li><span style="font-size:10pt"><span style="font-family:"Liberation Mono""><span style="font-size:11.0pt"><span style="font-family:"Calibri","sans-serif"">The system also has the capability to prevent transmission of signals from handlers and also visuals from the camera mounted on the device.</span></span></span></span></li> </ul> <p style="margin-left:0cm; margin-right:0cm"> </p> <p style="margin-left:0cm; margin-right:0cm"><span style="font-size:10pt"><span style="font-family:"Liberation Mono""><strong><span style="font-size:11.0pt"><span style="font-family:"Calibri","sans-serif"">Domestic system</span></span></strong></span></span></p> <ul> <li><span style="font-size:10pt"><span style="font-family:"Liberation Mono""><span style="font-size:11.0pt"><span style="font-family:"Calibri","sans-serif"">State-run DRDO has developed <span style="color:#3e3e3e">‘Anti Drone System’ that will be installed later this year in several strategic locations.</span></span></span></span></span></li> <li><span style="font-size:10pt"><span style="font-family:"Liberation Mono""><span style="font-size:11.0pt"><span style="font-family:"Calibri","sans-serif""><span style="color:#3e3e3e">The system is capable of detecting and jamming drones in a 3 km radius. It later uses laser weapon to fire at drones that are 1- 2.5 km away from the location.</span></span></span></span></span></li> <li><span style="font-size:11.0pt"><span style="font-family:"Arial","sans-serif""><span style="color:#3e3e3e"><span style="font-size:11.0pt"><span style="font-family:"Calibri","sans-serif""><span style="color:#3e3e3e">Private entity, Adani Defence Systems and Technologies has developed an anti-drone system that has been currently demonstrated to defence officials.</span></span></span></span></span></span></li> </ul> ', 'created_date' => object(Cake\I18n\FrozenDate) {}, 'posturl' => 'preventing-drone-attack', 'image' => 'https://www.mediafire.com/file/2jxtlwg8fvr73uk/2.jpg', 'fbimage' => 'https://www.mediafire.com/file/2jxtlwg8fvr73uk/2.jpg', 'metatitle' => 'Preventing drone attack', 'metakeyword' => 'Preventing drone attack | Anti-drone systems | Domestic system', 'metadescription' => 'This is not the first time that drone has been involved in terrorist activities. A few months back, drones had attacked Saudi Arabia’s largest oil facility.', 'author' => null, 'downlaodpdf' => 'https://www.mediafire.com/file/o4v5dp7cxcpedhh/2._Preventing_drone_attack.pdf/file', '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'currentaffairs' }, (int) 10 => object(Cake\ORM\Entity) { 'tag' => 'Security Threats', 'keyword' => 'security-treats', 'id' => (int) 9756, 'title' => 'Strategic importance of bridge on Pangong Tso', 'description' => '<p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,"sans-serif""><strong>Issue</strong></span></span></p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,"sans-serif"">China has been indulged in construction of a bridge across the contentious Pangong Tso lake in eastern Ladakh.</span></span></p> <p style="margin-right:0cm"> </p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,"sans-serif""><strong>Background</strong></span></span></p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,"sans-serif"">India and China were involved in a standoff on the shores of the lake. Currently, the faceoff is taking place between armies of the two countries.</span></span></p> <p style="margin-right:0cm"> </p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,"sans-serif""><strong>Details</strong></span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,"sans-serif"">The bridge is about 400 m long and 8 m wide and is near the friction points of north banks and the Chushul sub-sector on the south bank of the lake.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,"sans-serif"">The bridge lies east of the finger 8 on the lake bank. India claims finger 8 as the LAC and the proposed lake lies within its perceived territory, but currently controlled by China since 1958.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,"sans-serif"">The site is nearby Khurnak Fort, which China considers part of its Rutong County. China maintains a frontier defence company at Khurnak Fort.</span></span></p> </li> </ul> <p style="margin-right:0cm"> </p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,"sans-serif""><strong>Importance of area</strong></span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,"sans-serif"">The lake banks were among the most sensitive friction points, especially finger 4. Both the countries had assembled troops and tanks.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,"sans-serif"">India outmaneuvered China to occupy heights of Kailash range, especially Magar hill and Gurung hill, which allowed it to monitor Spanggur gap.</span></span></p> </li> </ul> <p style="margin-right:0cm"> </p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,"sans-serif""><strong>Importance of bridge</strong></span></span></p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,"sans-serif"">It will allow greater mobilization of troops on both sides of the lake bank. The troops will be saved the time to traverse the treacherous routes along the lake.</span></span></p> <p style="margin-right:0cm"> </p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,"sans-serif""><strong>India’s response</strong></span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,"sans-serif"">India has been rapidly building roads and bridges to connect forward areas. This will allow faster movement of troops and equipments.</span></span></p> </li> <li> <p><span style="font-size:11.0pt"><span style="font-family:"Calibri","sans-serif"">India is making efforts to improve surveillance along the border, along with building new airstrips and landing areas.</span></span></p> </li> </ul> ', 'created_date' => object(Cake\I18n\FrozenDate) {}, 'posturl' => 'strategic-importance-bridge-pangong', 'image' => 'https://www.mediafire.com/file/0kheeh4w7z2r0n0/4_%25281%2529.jpg', 'fbimage' => 'https://www.mediafire.com/file/0kheeh4w7z2r0n0/4_%25281%2529.jpg', 'metatitle' => 'Strategic importance of bridge on Pangong Tso', 'metakeyword' => 'Strategic importance of bridge on Pangong Tso', 'metadescription' => 'India and China were involved in a standoff on the shores of the lake. Currently, the faceoff is taking place between armies of the two countries.', 'author' => null, 'downlaodpdf' => 'https://www.mediafire.com/file/a9kssh9bdoaxdv5/4._Strategic_importance_of_bridge_on_Pangong_Tso.pdf/file', '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'currentaffairs' }, (int) 11 => object(Cake\ORM\Entity) { 'tag' => 'Security Threats', 'keyword' => 'security-treats', 'id' => (int) 9764, 'title' => 'Australia’s online safety bill', 'description' => '<p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,"sans-serif""><strong>Issue</strong></span></span></p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,"sans-serif"">Australia’s Online Safety Act has come into effect. The law was passed in July 2021 and allows adults to report cases of online bullying in the country.</span></span></p> <p style="margin-right:0cm"> </p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,"sans-serif""><strong>Details</strong></span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,"sans-serif"">The eSafety commissioner has powers to order social media websites to take down content related to bullying against Australian adults within 24 hours.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,"sans-serif"">Failure of conforming to the order can lead to heavy fines up to $555,000. The issue of is bullying is more detailed than current cyber laws in the country. </span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,"sans-serif"">The removal of bullying content from online site has been shortened to 24 hours from the present 48 hours. The law is especially made for adults.</span></span></p> </li> </ul> <p style="margin-right:0cm"> </p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,"sans-serif""><strong>The act</strong></span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,"sans-serif"">The eSafety commissioner will be responsible for implementing the act to promote the online safety of Australians.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,"sans-serif"">The commissioner will be required to supervise the complaints and objections regarding sharing intimate images without consent.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,"sans-serif"">After a complaint is registered, a removal notice would also be sent to the hosting service provider or the person who had posted the cyber-bullying content.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,"sans-serif"">A similar process will be followed for non-consensual posting of intimate pictures. They will be liable for penalty if not adhered.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,"sans-serif"">The commissioner can send a link-deletion notice to search engines to stop providing links to certain material.</span></span></p> </li> </ul> <p style="margin-right:0cm"> </p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,"sans-serif""><strong>Process</strong></span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,"sans-serif"">Firstly, individuals have to report on the social media app they are being bullied or abused. Next, a complaint with the police should be filed.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,"sans-serif"">The issue can be reported to the eSafety commissioner if the content is not removed. They will provide notice for removing the content.</span></span></p> </li> </ul> <p style="margin-right:0cm"> </p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,"sans-serif""><strong>The online trolling bill</strong></span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,"sans-serif"">The proposed bill would allow the government to hold social media companies responsible for the trolling comments and content posted on their website.</span></span></p> </li> <li> <p><span style="font-size:11.0pt"><span style="font-family:"Calibri","sans-serif"">Social media organization would be asked to unveil the identity of the trolls, failing of which would attract penalty.</span></span></p> </li> </ul> ', 'created_date' => object(Cake\I18n\FrozenDate) {}, 'posturl' => 'australias-online-safety-bill', 'image' => 'https://www.mediafire.com/file/8t16rt9vpkmgttr/3.jpg', 'fbimage' => 'https://www.mediafire.com/file/8t16rt9vpkmgttr/3.jpg', 'metatitle' => 'Australia’s online safety bill and The online trolling bill', 'metakeyword' => 'Australia’s online safety bill and The online trolling bill', 'metadescription' => 'Australia’s Online Safety Act has come into effect. The law was passed in July 2021 and allows adults to report cases of online bullying in the country.', 'author' => null, 'downlaodpdf' => 'https://www.mediafire.com/file/6hgmcbhinuhgs3s/3._Australia%25E2%2580%2599s_online_safety_bill.pdf/file', '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'currentaffairs' } ] $tagname = 'Security Threats' $metadescription = 'Defence security Current Affairs, Security burning issues, latest news and more details get here with depth analysis of Defence security Current Affairs' $metakeyword = 'Defence security Current Affairs, Security burning issues, latest news ' $title = 'Security Threats | Defence security Current Affairs Gk News' $sbanners = [ (int) 0 => object(Cake\ORM\Entity) { 'id' => (int) 61, 'bannername' => 'http://www.mediafire.com/convkey/5f54/lodkrbkhwk5lg1q6g.jpg', 'bannerlink' => 'https://www.studyiq.com/course-detail/ssc-bank-combo', 'isright' => (int) 0, 'status' => (int) 1, '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'sitebanners' }, (int) 1 => object(Cake\ORM\Entity) { 'id' => (int) 62, 'bannername' => 'http://www.mediafire.com/convkey/0552/k9b1o467l8edtbc6g.jpg', 'bannerlink' => 'https://studyiq.com/courses/state-exams', 'isright' => (int) 0, 'status' => (int) 1, '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'sitebanners' }, (int) 2 => object(Cake\ORM\Entity) { 'id' => (int) 63, 'bannername' => 'http://www.mediafire.com/convkey/154a/6y1qvv7v118759h6g.jpg', 'bannerlink' => 'https://www.studyiq.com/course-detail/upsc-ias-pre-mains', 'isright' => (int) 0, 'status' => (int) 1, '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'sitebanners' }, (int) 3 => object(Cake\ORM\Entity) { 'id' => (int) 64, 'bannername' => 'http://www.mediafire.com/convkey/563c/o65x6jso51flz886g.jpg', 'bannerlink' => 'https://studyiq.com/courses/upsc/optional-subjects', 'isright' => (int) 0, 'status' => (int) 1, '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'sitebanners' } ] $params = [ (int) 0 => 'security-treats' ] $b = [ 'name' => 'Security Threats', 'link' => 'https://currentaffairs.studyiq.com/tags/security-treats' ] $currentaffair = object(Cake\ORM\Entity) { 'tag' => 'Security Threats', 'keyword' => 'security-treats', 'id' => (int) 9764, 'title' => 'Australia’s online safety bill', 'description' => '<p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,"sans-serif""><strong>Issue</strong></span></span></p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,"sans-serif"">Australia’s Online Safety Act has come into effect. The law was passed in July 2021 and allows adults to report cases of online bullying in the country.</span></span></p> <p style="margin-right:0cm"> </p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,"sans-serif""><strong>Details</strong></span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,"sans-serif"">The eSafety commissioner has powers to order social media websites to take down content related to bullying against Australian adults within 24 hours.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,"sans-serif"">Failure of conforming to the order can lead to heavy fines up to $555,000. The issue of is bullying is more detailed than current cyber laws in the country. </span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,"sans-serif"">The removal of bullying content from online site has been shortened to 24 hours from the present 48 hours. The law is especially made for adults.</span></span></p> </li> </ul> <p style="margin-right:0cm"> </p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,"sans-serif""><strong>The act</strong></span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,"sans-serif"">The eSafety commissioner will be responsible for implementing the act to promote the online safety of Australians.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,"sans-serif"">The commissioner will be required to supervise the complaints and objections regarding sharing intimate images without consent.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,"sans-serif"">After a complaint is registered, a removal notice would also be sent to the hosting service provider or the person who had posted the cyber-bullying content.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,"sans-serif"">A similar process will be followed for non-consensual posting of intimate pictures. They will be liable for penalty if not adhered.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,"sans-serif"">The commissioner can send a link-deletion notice to search engines to stop providing links to certain material.</span></span></p> </li> </ul> <p style="margin-right:0cm"> </p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,"sans-serif""><strong>Process</strong></span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,"sans-serif"">Firstly, individuals have to report on the social media app they are being bullied or abused. Next, a complaint with the police should be filed.</span></span></p> </li> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,"sans-serif"">The issue can be reported to the eSafety commissioner if the content is not removed. They will provide notice for removing the content.</span></span></p> </li> </ul> <p style="margin-right:0cm"> </p> <p style="margin-right:0cm"><span style="font-size:11pt"><span style="font-family:Calibri,"sans-serif""><strong>The online trolling bill</strong></span></span></p> <ul> <li> <p><span style="font-size:11pt"><span style="font-family:Calibri,"sans-serif"">The proposed bill would allow the government to hold social media companies responsible for the trolling comments and content posted on their website.</span></span></p> </li> <li> <p><span style="font-size:11.0pt"><span style="font-family:"Calibri","sans-serif"">Social media organization would be asked to unveil the identity of the trolls, failing of which would attract penalty.</span></span></p> </li> </ul> ', 'created_date' => object(Cake\I18n\FrozenDate) {}, 'posturl' => 'australias-online-safety-bill', 'image' => 'https://www.mediafire.com/file/8t16rt9vpkmgttr/3.jpg', 'fbimage' => 'https://www.mediafire.com/file/8t16rt9vpkmgttr/3.jpg', 'metatitle' => 'Australia’s online safety bill and The online trolling bill', 'metakeyword' => 'Australia’s online safety bill and The online trolling bill', 'metadescription' => 'Australia’s Online Safety Act has come into effect. The law was passed in July 2021 and allows adults to report cases of online bullying in the country.', 'author' => null, 'downlaodpdf' => 'https://www.mediafire.com/file/6hgmcbhinuhgs3s/3._Australia%25E2%2580%2599s_online_safety_bill.pdf/file', '[new]' => false, '[accessible]' => [ '*' => true ], '[dirty]' => [], '[original]' => [], '[virtual]' => [], '[errors]' => [], '[invalid]' => [], '[repository]' => 'currentaffairs' } $tags = '<a href="https://currentaffairs.studyiq.com/tags/security-treats">Security Threats</a>'include - ROOT/plugins/Studyiq/src/Template/Pages/tags.ctp, line 65 Cake\View\View::_evaluate() - CORE/src/View/View.php, line 1196 Cake\View\View::_render() - CORE/src/View/View.php, line 1157 Cake\View\View::render() - CORE/src/View/View.php, line 765 Cake\Controller\Controller::render() - CORE/src/Controller/Controller.php, line 623 Cake\Http\ActionDispatcher::_invoke() - CORE/src/Http/ActionDispatcher.php, line 125 Cake\Http\ActionDispatcher::dispatch() - CORE/src/Http/ActionDispatcher.php, line 93 Cake\Http\BaseApplication::__invoke() - CORE/src/Http/BaseApplication.php, line 108 Cake\Http\Runner::__invoke() - CORE/src/Http/Runner.php, line 65 Cake\Routing\Middleware\RoutingMiddleware::__invoke() - CORE/src/Routing/Middleware/RoutingMiddleware.php, line 104 Cake\Http\Runner::__invoke() - CORE/src/Http/Runner.php, line 65 Cake\Routing\Middleware\AssetMiddleware::__invoke() - CORE/src/Routing/Middleware/AssetMiddleware.php, line 88 Cake\Http\Runner::__invoke() - CORE/src/Http/Runner.php, line 65 Cake\Error\Middleware\ErrorHandlerMiddleware::__invoke() - CORE/src/Error/Middleware/ErrorHandlerMiddleware.php, line 98 Cake\Http\Runner::__invoke() - CORE/src/Http/Runner.php, line 65 Cake\Http\Runner::run() - CORE/src/Http/Runner.php, line 51 Cake\Http\Server::run() - CORE/src/Http/Server.php, line 81