Monday, 10 October 2016

Surgical strike

Surgical strike

surgical strike is called military attack which results in, was intended to result in, or is claimed to have resulted in only damage to the intended legitimate military target, and no or minimal collateral damage to surrounding structures, vehicles, buildings, or the general public infrastructure and utilities.
A swift and targeted attack with the aim of minimum collateral damage to the nearby areas and civilians is a surgical strike. Neutralization of targets with surgical strikes also prevents escalation to a full blown war. Surgical strike attacks can be carried out via air strike, airdropping special ops teams or a swift ground operation or by sending special troops
Precision bombing is another example of a surgical strike carried out by aircraft – it can be contrasted against carpet bombing, the latter which results in high collateral damage and a wide range of destruction over an affected area which may or may not include high civilian casualties. The bombing of Baghdad during the initial stages of the 2003 Iraq War by US forces, known as Shock and Awe is an example of a coordinated surgical strike, where government buildings and military targets were systematically attacked by US aircraft in an attempt to cripple the Ba'athist controlled Iraqi government under Saddam Hussein.
Recent example is of the Surgical strike operation carried out by Indian Army in September 2016 on terror launch pads in Pakistan Occupied Kashmir after crossing Line of Control.
On 29 September, a military confrontation between India and Pakistan began. India claimed that it had conducted "surgical strikes" against militant launch pads across the Line of Control in Pakistani-administered Azad Kashmir, and inflicted "significant casualties". Indian media reported the casualty figures variously, from 35 to 50.
Pakistan rejected the claim, stating that Indian troops had not crossed the Line of Control but had only engaged in border skirmishing with Pakistani troops, resulting in the deaths of two Pakistani soldiers and wounding nine. Pakistan rejected India's reports of any other casualties. The Pakistani military also said it killed up to 8 Indian soldiers in the exchange, and captured one. India confirmed that one of its soldiers was in Pakistani custody, but denied that it was linked to the incident or that any of its soldiers had been killed.[15] Pakistan said India was hiding its casualties.
It was noted that the details regarding the "attack" were still unclear. The claimed raid came after four militants attacked the Indian army at Uri in the Indian-administered state of Jammu and Kashmir, on September 18, and killed 19 soldiers. India's announcement of the claimed raid also marked the first time India had publicly acknowledged crossing the Line of Control, amidst skepticism and disputing accounts. In the succeeding days, India and Pakistan continued to exchange fire along the border in Kashmir.

Background

From July 2016, there had been large-scale protests in the Indian state of Jammu and Kashmir against the Indian government, during which more than 80 civilians were killed by Indian forces. Pakistan criticised India's use of forceagainst Kashmiris, while India accused Pakistan of stirring up tensions.
On 18 September, 17 Indian Army soldiers were killed when unknown militants attacked an army base near the town of Uri, in Jammu and Kashmir. Two more soldiers later succumbed to their wounds. India accused Jaish-e-Muhammad, though no group claimed responsibility. The following day, the Indian army said that it had displayed considerable restraint in the wake of the attacks but it reserved the right to respond "at the time and place of our own choosing.”.
However, analysts said that Indian patience had run out due to Pakistan's inaction in curbing the activities of terrorist organisations such as Lashkar-e-Taiba and Jaish-e-Mohammad. On 21 September, India summoned the Pakistan High Commission Abdul Bassit and gave a protest letter detailing the involvement of a terrorist group based in Pakistan. Pakistan said India had provided no evidence that the Uri attack was launched from Pakistan. Pakistan's defence minister even suggested that India itself carried out the Uri attack to deflect attention from the popular protests inJammu and Kashmir.According to Indian sources, this was the "inflection point", after which India decided to respond militarily.
Indian officials said that the cross-border infiltration across the Line of Control had surged since the unrest began in Kashmir, and that those crossing the border showed evidence of military training.According to a government source close to Home Minister Rajnath Singh, a meeting of the Cabinet Committee on Security was held on 24 September, at which "broad details of targeting terrorists" were discussed.

Timeline

28-29 September

India claimed to have made "surgical strikes" against militant bases in Pakistani-held territory on September 29, claiming to have killed 9 Pakistani soldiers and up to 50 militants. Pakistan said no such strikes occurred, only that Indian soldiers fired upon Pakistani soldiers, who then fired back. Pakistan claimed two of its soldiers were killed, and that it had killed 8-14 Indian soldiers and captured one. India said one soldier had been injured, though none had been killed, and acknowledged one soldier captured by Pakistan, though not during its "surgical strikes."

Indian version

Indian officials said the strike targeted areas close to the Line of Control, where it believes militants congregate for their final briefings before sneaking across the LoC. An Indian security source said the operation began with Indian forces firing artillery across the frontier to provide cover for three to four teams of 70-80 commandos from 4 and 9 Para (Special Forces) to cross the LoC over at several separate points shortly after midnight IST on 29 September (1830 hours UTC 28 Sep). Teams from 4 Para SF crossed the LoC in the Nowgam sector of Kupwara district, with teams from 9 Para SF simultaneously crossing the LoC in Poonch district. By 2 a.m. IST, according to army sources, the special forces teams had travelled 1–3 km on foot, and had begun destroying the terrorist bases with hand-held grenade and 84 mm rocket launchers. The teams then swiftly returned to the Indian side of the Line of Control, suffering only one casualty, a soldier wounded after tripping a land mine.
Indian army said the strike was a pre-emptive attack on militants bases, claiming that it had received intelligence that the militants were planning "terrorist strikes" against India. India said that, in destroying "terrorist infrastructure" it also attacked "those who are trying to support them", indicating it attacked Pakistani soldiers too. India later briefed opposition parties and foreign envoys, but did not disclose operational details.
Some Indian media claimed that the Indian army infiltrated 2–3 km into Pakistani territory, but the Indian army did not say whether its troops crossed the border or had simply fired across it. India said that none of its soldiers were killed, though one was injured. India said that one of its soldiers, from 37 Rashtriya Rifles, was captured by Pakistan after he "inadvertently crossed over to the Pakistan side", though not during its "surgical strikes.
Initially, Indian media claimed that the army used helicopters during the skirmish. On September 30, an Indian minister denied that there were any helicopters used, stating the operation was conducted "on the ground".

Pakistani version

Pakistan denied that any surgical strikes occurred. Pakistan's Foreign Office rejected the claim as "baseless" and said India was "deliberately" escalating conflict. The Pakistan Army said that there had only been "cross border firing".Pakistan warned that it would respond militarily should any surgical strike actually occur. The two soldiers killed were identified as Naik Imtiaz and Havildar Jumma Khan.
Pakistani sources reported that up to fourteen Indian soldiers were killed in retaliatory firing and one was captured, Chandu Bablulal Chohan. Pakistan said India was concealing its casualty figures from the cross-border firing.

30 September–4 October

India and Pakistan increased their exchanges of small arms and mortar fire across the Line of Control.
On 1 October, Pakistan said its soldiers had come under fire in Bhimber and they responded to the attack. Indian media stated that Pakistan had started the firing. On 4 October, the Indian Border Security Force said it witnessed Pakistani-operated unmanned aerial vehicles (UAVs) flying close to the border, presumably to survey Indian positions.

"Surgical strike" claim

The Indian army said that its Pakistani counterpart had been informed of the surgical strike. The Pakistani military said the DGMO communications only discussed the cross-border firing, which was part of the existing rules of engagement.
Pakistan rejected any claims of casualties or other damage inflicted as a direct result of the surgical strikes. General Ranbir Singh, the Indian Army DGMO, only stated during his press conference on 29 September that the number of casualties inflicted had been "significant. Most accounts in the Indian media varied as to the number of militants killed, with most publications giving estimates of 35 to 50 killed, and India Live Today giving an estimate of 50-70 militants killed. The Indian Express conducted covert interviews with eyewitnesses across the Line of Control; based on their accounts, it said 3-4 militants had been killed near Khairati Bagh in the Leepa Valley, while "five, perhaps six bodies" had been swiftly removed from the hamlet of Dudhnial (located 4km from the LoC, in Pakistan-administered Kashmir) the morning after the raids. Government sources later informed the Express that based on intercepted Pakistani radio messages, at least 10 Lashkar-e-Taiba militants had been killed at bases located at Kel and Dudhnial, while a further nine militants had been killed at Balnoi, across the Line of Control from Poonch district.
UN Secretary General Ban Ki-Moon said that the UN Observer Group in Pakistani Kashmir did not directly observe any "firing across the Line of Control" relating to the incident.[34][35] The Indian envoy at UN Syed Akbaruddin dismissed this statement, saying "facts on the ground do not change whether somebody acknowledges or not.

Media reports

Initially, Indian media reported that helicopters were used to conduct "surgical strikes". On September 30, Indian Minister of State for Information and Broadcasting, Rajyavardhan Singh Rathore, said that the Indian military did not use any helicopters. The Express Tribune said the retraction "cast doubts on the Indian narrative".
On October 1, the Pakistani army gave international media outlets including BBCCNNVOAReutersAPAFP and Newsweek a tour of the sites which India claimed to have hit on 29 September. The Pakistan army claimed that had there been a "surgical strike", there would have been more damage. The journalists confirmed that the "area seemed intact", adding that they only saw what the Pakistani army showed them.
On 5 October, The Indian Express stated it had managed to conduct covert interviews with eyewitnesses living across the Line of Control (LoC). The Express claimed that eyewitnesses corroborated the Indian account by describing fire engagements with militants and the destruction of some makeshift buildings that housed militants; but that there was little damage to infrastructure. However, the Express said that according to eyewitness accounts, and classified documents, the number of militants killed was lower than the 38-50 number reported by Indian officials; there were reports that "five, perhaps six" bodies had been trucked out the morning after the raids from Dudhnial (4km from the LoC), while three or four militants were killed near Khairati Bagh. The Express said that the militants, many of whom belonged to Lashkar-e-Taiba, were caught by surprise. Other accounts reported "fire and explosions" from the east bank of the Neelum River in Athmuqam Zee News reported the same.
On 5 October, India's CNN-News18 claimed that it conducted a "sting operation" where their news correspondent posing as an Inspector General of Police made a phone call to a Superintendent of Police (SP) Ghulam Akbar in Mirpur. In an audio conversation aired on the news channel, a voice claiming to be Akbar reveals details about the military action of 29 September including the places of strikes and the number of Pakistani casualties, quoted as 12 people including 5 military personnel. The voice says that the bodies were said to have been carried away in coffins and buried in the villages, and that an unknown amount of militants ("jihadis") had also died. On 6 October, Pakistan'sForeign Office said that the voice in the audio conversation did not belong to Ghulam Akbar, and that Akbar had denied the alleged phone conversation. The ministry called the story a fabrication, and hoped that CNN International would take action against its Indian affiliate.
Shawn Snow in The Diplomat questioned the capability of Indian forces to conduct a sophisticated and coordinated attack of such nature. He noted that a cross-border raid was "exceedingly difficult" as Pakistan had highly equipped air defence systems installed along the Indian border, including surface to air missiles.
On 21 September 2016, the Indian publication The Quint published an unconfirmed report that elite soldiers of the Indian Army had crossed the LoC and conducted a raid earlier that day. However, the claim was dismissed as a "disinformation campaign" circulating as part of war rhetoric on social media, and the Indian army rejected the report. The Quint supports its claim by pointing out that PIA had cancelled flights scheduled to land in Gilgit, Skardu and Chitral on 21 September, and claims that Pakistan had also declared a no-fly zone over Pakistan-administered Kashmir.

Aftermath

Indian intelligence sources claimed that, immediately after the raid, the Pakistan military had buried the corpses of the slain terrorists to erase any evidence and to maintain Pakistan's version of a "skirmish" along the Line of Control. However, Pakistan rejected that any such casualties occurred, questioning: "Where did all the dead bodies go? Where were the funerals? Why haven't the Indians produced any dead bodies if they took them back?". Pakistan's military also pointed to the lack of damage or losses in the site, and welcomed UN observers and journalists to conduct an independent inquiry. Increased firing along the Line of Control was reported the following day.
A senior Indian Home Ministry official subsequently claimed that in the wake of the raid, at least 12 training camps belonging to Lashkar-e-TaibaHizbul Mujahideen and Jaish-e-Mohammad had been swiftly moved from their locations at Pir Chanasi, Aksha Maskar and Tabuk near Muzaffarabad in Pakistan-administered Kashmir. Based on satellite images, inputs from foreign intelligence agencies and unnamed "sources in Pakistan," according to the official, the training camps had been relocated "near crowded towns deep inside Pakistan," in the provinces of Khyber Pakhtunkhwa and Punjab, to "minimise casualties to their assets." According to the Indian official, the camps had housed around 500 militants, 300 of whom belonged to Lashkar-e-Taiba alone.
An eyewitness living across the LoC was one of five contacted through intermediaries for covert interviews with the Indian Express. He reported that on 30 September, a day after the surgical strikes, several members of Lashkar-e-Taiba had met for Friday prayers at a Lashkar-affiliated mosque in Chalhana. "The Lashkar men gathered there were blaming the Pak Army for failing to defend the border”, he said, “and [were] saying they would soon give India an answer it would never forget.Several days after the raids, a leading Indian security official who had been closely involved in their planning said that Pakistan's continued denial that any surgical strikes took place was a "stance that suits us.The surprise element in such an operation is key to its success and there will be no predictable repetition. If provoked yet again, we will amend our operational tactics.
Both Indian Defence Minister Parrikar and National Security Advisor Doval were shown original, unedited footage from the military raids on 1 October. After viewing it, Parrikar informed Prime Minister Modi that he was satisfied with what he had seen, and that there was no need to publicly release any footage. In response to calls from members of opposition parties to release the footage, a senior government official stated, "The Opposition should understand the difference between a covert and overt strike. And it is not incumbent on the Indian Army to release video footage every time they do their duty.On 5 October, two senior ministers in the Indian government said the Indian Army had submitted the footage to the government, but that the government, with the concurrence of the army, felt there was no need to release it to the public.

Analysis

Defence analysts in Pakistan said it was not possible for Indian forces to breach the heavily armed and fenced LoC border undetected, perform operations at multiple sites over several hours, and return without casualties and military resistance. According to one source, the Indian narrative matched a "fantastic movie script" created for public consumption. Ejaz Awan dismissed Indian claims of paratrooper involvement, stating: "For pulling out these troops, you need helicopters on the ground.
Bruce Riedel stated that while India's "surgical military response" was "limited and calibrated," it would send a sharp signal to the Pakistani establishment. He added that India could legitimately cite a right to self-defence in taking such strong action, following the example of United States operations in Pakistan against Osama bin Laden and MullahAkhtar Mansour. Riedel observed, however, that regardless of outside support for India's position, its situation in Kashmir would only worsen unless Prime Minister Modi addressed "the legitimate demands of Kashmiris." This, according to Riedel, would require Modi to adopt a policy on Kashmir "independent of how he deals with Pakistan," though his "strong popularity gives him much room to act.

Reactions

India

Across India, the military raid was widely praised. Opposition leader Rahul Gandhi said Prime Minister Modi had, for the first time in his tenure, "taken an action that is worthy of the status of a Prime Minister." Aam Aadmi Party leader Arvind Kejriwal also praised the raid.
Following the military raid, in anticipation of cross-border shelling from Pakistan, Indian authorities evacuated 10,000 residents of villages located within ten kilometres of the border, in the states of Punjab and Jammu and Kashmir. Military surveillance was also stepped up along the Line of Control

Pakistan

Pakistan rejected the claim of a surgical strike, stating that Indian troops had only engaged in firing upon Pakistani soldiers, killing two Pakistani soldiers and wounding nine.Journalists surveyed the area where the 'surgical strikes' are said to have taken place, and spoke to locals who explained: “They are lying...they never crossed the L.O.C.The spokesperson for the Pakistani Army asked: “Where is the damage?”, referring to the lack of any evidence of any surgical strikes.[11] ISPR spokesman Asim Bajwa termed the "surgical strike" claim an "illusion being deliberately generated by India to create false effects" and a "fabrication of the truth.
Prime Minister Nawaz Sharif convened an all-parties conference and an emergency cabinet meeting. He stated Pakistan would take any steps necessary to safeguard its territorial integrity. "We will defend our homeland against any aggression. The entire nation is standing shoulder to shoulder with our armed forces. He condemned the "unprovoked and naked aggression of Indian forces", which he said resulted in the death of two Pakistani soldiers.

Strategy of Reliance Jio

Strategy of Reliance Jio in 3 points


The Sim slots of nearly 25 million cellphones have been acquired by Reliance Jio even before its commercial launch! Reliance Jio is making headlines with its easy on pocket data packs and lifetime free calling. Never in the history of telecom has anybody witnessed a player seize the market in a weeks’ time by distributing Sim cards laden with unlimited free internet. While the jaws of many telecom companies are dropped; analysts wonder if the strategy adopted by Reliance Jio is sustainable. Here’s my take on Reliance Jio’s strategy:
1) Quality Subscribers: Analysts doubt the strategy of Reliance by citing that that with its schemes Jio will attract low quality, treacherous customers who will jump to other networks once the freebies end. But Reliance doesn’t believe so. It is offering free 4G data which means it’ll occupy the primary sim slot in the smart phones 4G phones. Also customers will switch to Jio from their broadband or the Wi-Fi services and possibly will stick to it even after the promotion period ends. In addition to that it is offering free calling, so it is aware people will be using the number for calling purposes for the next three months. Three months is a sufficient time span for people to experience the super fast speed and the quality services and permanently transfer to the network. Now assume that Jio reaches 75% of its planned subscriber base of 100 million. So by the end of the year, Reliance ends up with 75 million subscriber base. India’s total 4G user number is believed to touch the mark of 143 million by this year end. So within 3 months of its official launch, Jio would have acquired more than 50% of the market share. Even if many subscribers leave the association with Reliance, still Reliance would be left with significant market share. What an Idea, Reliance!
2) 100 million mark: Mr. Ambani has expressed his ambitious plans of to reach 90% of India’s population. The company plans to acquire 100 million subscribers in the first year of its launch. By luring the population with free data and calls for the initial few months, many doubt if this could result in financial gains for the company. But by doing this it is stretching its operational and strategic bandwidth. Reliance Jiyo has pumped total 1.5 lakh crore for 4G.  Reliance Jio’s 4G network will cover 18000 cities and town and over 2 lakh villagers. Now assume 50% of the users opting for 149 Rs plan and the remaining for higher price plans, Reliance can easily make 400 Rs per customer. If Jio manages to acquire a subscriber base of 100 million customers, it’ll recover the cost within 5 years and start reaping huge profits after that (only if the existing technology doesn’t obsolete!) Mukesh Ambani is betting on one single thing: User base.
3) Oligopolistic market: The market for service providers is oligopolistic where the participants fight for market share and profits on the basis of prices and differentiated products. Reliance jio has both. It has differentiated its product by setting up a huge bandwidth to handle the traffic of enormous data. And the plans they are offering is at amazingly cheap rate. Masses are overwhelmed by the announcement of unlimited free calling. Jio has an IP network hence all the calls will be routed through internet just like whatsapp calls and skype calls. And once the huge optical fibre network infrastructure is built, there isn’t any marginal cost for the company for providing call service. In an oligopolistic market if some player creates such kind of ripple it forces other players to slash the prices. The strategy of other player’s in the market is solely dependent on Relaince Jiyo. Well played Jio!
The approach of Reliance Jiyo is benefiting the customers as they are getting twice the value for money while the Reliance is confident that this will garner hefty profits in the coming future. It is a bold move by Reliance and only time will decide its impact. Till then enjoy the free 4G internet.

Sunday, 25 September 2016

bug bounty program

Bug Bounty Program


A bug bounty program, also called a vulnerability rewards program (VRP), is a crowdsourcinginitiative that rewards individuals for discovering and reporting software bugs. Bug bounty programs are often initiated to supplement internal code audits and penetration tests as part of an organization's vulnerability management strategy.
Many software vendors and websites run bug bounty programs, paying out cash rewards to software security researchers and white hat hackers who report software vulnerabilities that have the potential to be exploited. Bug reports must document enough information for for the organization offering the bounty to be able to reproduce the vulnerability. Typically, payment amounts are commensurate with the size of the organization, the difficulty in hacking the system and how much impact on users a bug might have.
Mozilla paid out a $3,000 flat rate bounty for bugs that fit its criteria, while Facebook has given out as much as $20,000 for a single bug report. Google paid Chrome operating system bug reporters a combined $700,000 in 2012 and Microsoft paid UK researcher James Forshaw $100,000 for an attack vulnerability in Windows 8.1.  In 2016, Apple announced rewards that max out at $200,000 for a flaw in the iOS secure boot firmware components and up to $50,000 for execution of arbitrary code with kernel privileges or unauthorizediCloud access.
While the use of ethical hackers to find bugs can be very effective, such programs can also be controversial. To limit potential risk, some organizations are offering closed bug bounty programs that require an invitation. Apple, for example, has limited bug bounty participation to few dozen researchers.

Net Neutrality

Net Neutrality

What happened?

In May 2014, FCC Chairman Tom Wheeler released a plan that would have allowed companies like AT&T, Comcast and Verizon to discriminate online and create pay-to-play fast lanes.
Millions of you spoke out — and fought back.
Thanks to the huge public and political outcry, Wheeler shelved his original proposal, and on Feb. 4, 2015, he announced that he would base new Net Neutrality rules on Title II of the Communications Act, giving Internet users the strongest protections possible.
The FCC approved Wheeler’s proposal on Feb. 26, 2015. This is a watershed victory for activists who have fought for a decade to protect the open Internet.
However, now that the FCC’s Net Neutrality rules are out in the world, opponents are doing everything they can to undermine the open Internet.

What is Net Neutrality?

Net Neutrality is the Internet’s guiding principle: It preserves our right to communicate freely online. This is the definition of an open Internet.
 
Net Neutrality means an Internet that enables and protects free speech. It means that Internet service providers should provide us with open networks — and should not block or discriminate against any applications or content that ride over those networks. Just as your phone company shouldn't decide who you can call and what you say on that call, your ISP shouldn't be concerned with the content you view or post online.
 
Without Net Neutrality, cable and phone companies could carve the Internet into fast and slow lanes. An ISP could slow down its competitors' content or block political opinions it disagreed with. ISPs could charge extra fees to the few content companies that could afford to pay for preferential treatment — relegating everyone else to a slower tier of service. This would destroy the open Internet.

Who's attacking Net Neutrality?

Net Neutrality opponents are working everywhere from Congress to the courts to dismantle or undermine the FCC’s Title II classification. In the wake of the February ruling, 10 lawsuits designed to gut Net Neutrality have been filed (Free Press has jumped in to defend the rules) and legislators haveintroduced numerous deceptive bills that would demolish these protections.  Most recently, the attack in Congress has come from the appropriations committees. Both the House and Senate committees have passed bills containing riders that would sabotage the Net Neutrality rules.

What does ‘reclassify’ mean? 

When Congress enacted the 1996 Telecommunications Act, it didn’t want the FCC to treat websites and other Internet services the same way it treats the local access networks that enable people to get online. Congress understood that the owners of the access networks have tremendous gatekeeper power, and so it required the FCC to treat these network owners as “common carriers,” meaning they couldn’t block or discriminate against the content that flows across their networks to/from your computer.
 
However, in a series of politically motivated decisions first by FCC Chairman Michael Powell (now the cable industry’s top lobbyist) and then by FCC Chairman Kevin Martin, the FCC decided to classify broadband Internet access service as an “information service,” meaning that the law sees it as no different from a website like freepress.net or an online service like LexisNexis. These decisions removed the FCC’s ability to prohibit ISPs from blocking or discriminating against online content (it also removed the FCC’s ability to ensure that ISPs protect your privacy). 
 
In Verizon vs. FCC, the court stated that the FCC lacks authority because of “the Commission’s still-binding decision to classify broadband providers not as providers of ‘telecommunications services’ but instead as providers of ‘information services.’” 
 
On Feb. 26, the FCC voted to define broadband as what we all know it is — a connection to the outside world that is merely faster than the phone lines we used to use for dial-up access, phone calls and faxes.
 
Doing so gave the agency the strongest possible foundation for rules prohibiting discriminatory practices.
 

What did the FCC vote on?

The new rules, rooted in Title II of the Communications Act, ban throttling, blocking and paid prioritization.
 

Why is Net Neutrality important for businesses?

Net Neutrality is crucial for small business owners, startups and entrepreneurs, who rely on the open Internet to launch their businesses, create a market, advertise their products and services, and distribute products to customers. We need the open Internet to foster job growth, competition and innovation.
Net Neutrality lowers the barriers of entry for entrepreneurs, startups and small businesses by ensuring the Web is a fair and level playing field. It’s because of Net Neutrality that small businesses and entrepreneurs have been able to thrive on the Internet. They use the Internet to reach new customers and showcase their goods, applications and services.
No company should be able to interfere with this open marketplace. ISPs are by definition the gatekeepers to the Internet, and without Net Neutrality, they would seize every possible opportunity to profit from that gatekeeper control.
Without Net Neutrality, the next Google would never get off the ground.

Why is Net Neutrality important for communities of color?

The open Internet allows communities of color to tell their own stories and to organize for racial and social justice.
The mainstream media have failed to allow people of color to speak for themselves. And thanks to economic inequality and runaway media consolidation, people of color own just a handful of broadcast stations. The lack of diverse ownership is a primary reason why the media have gotten away with portraying communities of color stereotypically.
The open Internet gives marginalized voices opportunities to be heard. But without Net Neutrality, ISPs could block unpopular speech and prevent dissident voices from speaking freely online. Without Net Neutrality, people of color would lose a vital platform.
And without Net Neutrality, millions of small businesses owned by people of color wouldn't be able to compete against larger corporations online, which would further deepen the economic inequality in our nation’s most vulnerable communities.

What is the history of Net Neutrality at the FCC?

The FCC’s 2010 order was intended to prevent broadband Internet service providers from blocking or interfering with traffic on the Web. The Open Internet Order was generally designed to ensure the Internet remained a level playing field for all — that's the principle we call Net Neutrality (we say “generally,” since the FCC’s rules prohibited wired ISPs from blocking and discriminating against content, while allowing wireless ISPs to discriminate against but not block websites).
 
In its January 2014 ruling, the court said that the FCC used a questionable legal framework to craft the Open Internet Order and lacked the authority to implement and enforce those rules.
The court didn't comment on the merits of the rules. Instead, it ruled against the FCC's ability to enforce Net Neutrality under the shaky legal foundation it established for those rules. The court specifically stated that its “task as a reviewing court is not to assess the wisdom of the Open Internet Order regulations, but rather to determine whether the Commission has demonstrated that the regulations fall within the scope of its statutory grant of authority.”
When the FCC made its 2010 open Internet rule, it relied on two decisions the Bush-era FCC made, rulings that weakened the FCC’s authority over broadband Internet access providers. Nothing in the January 2014 court decision prohibited the FCC from reversing those misguided decisions and reclassifying ISPs as common carriers.
 
In fact, both this decision and a prior Supreme Court decision showed that reclassification would provide the best means of protecting the open Internet.
 

So what can we do now?

The cable and phone companies — and their allies in Congress — willl do everything they can to dismantle the big win at the FCC in February 2015.

Creating a Dictionary / Wordlist with Crunch

Creating a Dictionary / Wordlist with Crunch 


Creating a Dictionary Wordlist with Crunch

Crunch is a useful program for creating and outputting wordlist or dictionaries to be used with brute force attacks. Crunch can send a wordlist to the screen, file, or another program.
Here is how to create a dictionary with Crunch.

The syntax will be:
crunch (min)(max)(charset) -t (pattern) – o (filename.lst)

min = minimum characters that you want to add in your dictionary
max = maximum characters that you want to add in your dictionary
Charset = Which characters you want to add in your wordlist such as abcd or 123456
Pattern = Some characters can be static or dynamic meaning you can specify letters to change or not change.

For example, if I want to create a minimum 7 digits, maximum 7 digits, qwer987 with pattern qwe@@@@ and to save the file in the desktop folder.

The command would be:
crunch 7 7 qwer987 -t qwr@@@@ -o /root/Desktop/ dictionary.txt

Cracking a WPA Capture with the GPU using HashCat

Cracking a WPA Capture with the GPU using HashCat 


After a WPA/WPA 2 Handshake Capture has been saved to a drive cracking it with current computers can be challenging. To speed this process up the GPU in some video cards can be utilized.

This can speed things up drastically when doing a brute force crack on a WPA data capture.

You will need to know the video card you are currently using and Google it to see if it is compatible.

In the instructions before this aircrack-ng was used to show how to crack a WPA capture with a dictionary.

 In this example a tool called oclHashCat will be used in order to utilize a video cards GPU.

dictionary file and the data capture are still needed only we will be using the video cards GPU to speed up the process. Always check to see if your card is compatible and the correct drivers are loaded.

Nvidia and AMD/ATI Video cards use two separate hashcat names.

The two main versions of HashCat are:
oclHashCat for AMD/ATI graphics cards
cudaHashCat for Nvidia graphics cards

You can download both from here http://hashcat.net/files/oclHashcat-plus-0.14.7z

Extract it with 7z x oclHashcat-plus-0.14.7z (Don’t use 7x e as it will not preserve the directory structure.)

To use hashcat the .cap file needs to be converted to ahccap file to do this use air-crack-ng.

aircrack-ng (out.cap) -J (out.hccap)

Run hashcat against your new capture file using the correct version.

cudaHashcat-plus32.bin -m 2500 (filename).hccap (wordlist)

Using Aircrack and a Dictionary to Crack a WPA Data Capture


Using Aircrack and a Dictionary to Crack a WPA Data Capture 

 
If you have a WPA handshake capture and cannot crack it yourself then there are services online that for a price will crack it for you.
 
To get started you should already have a WPA handshake file and Kali Linux running.
 
Getting a good dictionary can be hard but finding good ones, or creating them yourself with Crunch, is necessary to try and use this method. I have setup adownload section HERE with a WPA wordlist/Dictionaries that can be used if needed.
 
Keep in mind the dictionary file is only a simple text file that can be edited with any text editing program, such as notepad. Don’t use Microsoft Word or Open Office as they make changes that render a wordlist unusable.
 
If you know a person well enough you can try and type as many guesses as you can think of in a text file then use that as your dictionary.
Using Aircrack and a Dictionary to Crack a WPA Data Capture
 
The default storage for a WPA handshake is under /root and will be there under the name it was given when captured. Open a terminal window and type the command “ls” the data capture should be there. The file type we want to use is the .CAP file
 
The dictionary that we will use for this example is called dict.txt.
word list brute force attack Kali Linux
 
We will be using Aircrack to do the cracking and the command to do this is:
 
aircrack-ng (file name) -w (dictionary location)
 
Where the file name is the handshake file that was captured and the dictionary location is the path to the dictionary. The location of where these two files are and their names will be up to you.
 
The usual default location of the handshake file is under /root and is whatever name it was called when captured. We will be using a dictionary called dict.txt for this example that I copied to /root.
 
So the command for me to do this would be:
 
“aircrack-ng dlink.cap -w dict.txt”
tutorial Aircrack and a Dictionary to Crack a WPA Data Capture
 
If done right Aircrack should start and begin to try to crack the WPA handshake capture with the dictionary.
using a dictionary wordlist to crack wpa or wpa 2 wifi wireless
If the dictionary finds it, it will show as above with the “KEY FOUND” if not, then another dictionary will need to be used. For this example, I edited the text dictionary file and put the password in to show what it looks like when it is found.