Connect with us

News

Plateau Peace Building holds Conflict prevention & peacebuilding conference for Women

info

Published

on

Plateau Peace Building

In tandem with its mandate of engaging stakeholders’ to entrench the ideals of sustainable Peace and Peaceful co-existence amongst the diverse ethno religious groups in Plateau State, The Plateau State Peace Building Agency organized a 2Day conference on enhancing women’s potential in conflict prevention, peacebuilding and decision-making process.

The conference supported by GIZ held at Crest Hotel, Jos on the 21st and 22nd of April 2022 had the participants drawn from various women organizations, community women leaders and advocate groups.

In his welcome address, Director General, Plateau Peace Building Agency, Mr Joseph Langmang represented by Gayi Timothy Gayi said the conference was about mainstreaming women in all peacebuilding activities, issues of peace and security, empowering women in terms of capacity to be able to contribute meaningfully into the peacebuilding process as well as seeking ways whereby women, in general, can be empowered, economically and socially and politically.

He stated that women are needed in every aspect of society as such if they are well informed and have a level of economic power or political activity then women will be able to contribute even better in peace-building activities.

The DG noted that this was also in tandem with United Nations Resolution 1325, which was adopted unanimously by the UN Security Council on 31 October 2000. The resolution reaffirms the important role of women in the prevention and resolution of conflicts, peace negotiations, peace-building, peacekeeping, humanitarian response and in post-conflict reconstruction and stresses the importance of their equal participation and full involvement in all efforts for the maintenance and promotion of peace and security.

The conference saw discussions held on the Conflict Stage and handling styles in the grassroots, the role of women in conflict prevention, effective communication in conflict, involvement of women in peacebuilding process, exploring the role of grassroots women in early warning and early response, leadership in peacebuilding and experience sharing sessions.

The Plateau Peace Building Agency (PPBA) is an institutional framework established by the Simon Bako Lalong, led Government in response to the challenges of peace and security in the state. Their mandate is to promote the culture of peace and harmonious coexistence, among the various ethnoreligious divides on the Plateau.

Continue Reading
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

News

Nuclear startup X-energy raises $1B in data center-driven IPO

info

Published

on

By

GettyImages 129268875.jpg

Nuclear startup X-energy raised $1 billion in its initial public offering yesterday, selling 44.3 million shares for $23 each, a hefty premium above the $16 to $19 per share it was seeking. Initially, the company had hoped to raise around $800 million.

The stock is expected to begin trading on Friday on the Nasdaq Exchange under the ticker XE.

X-energy is building small modular reactors capable of generating electricity or delivering heat to industrial processes. The company has a deal with Dow to provide heat and power to a chemical plant in Texas and another with Amazon to sell as much as 5 gigawatts of nuclear power by 2039. Amazon’s Climate Pledge Fund led X-energy’s Series C-1 round.

Nuclear startups like X-energy have been buoyed by surging demand for electricity from data centers and other parts of the economy that have been electrifying.

The company says its reactors will generate 80 megawatts of electricity. Each Xe-100 reactor is cooled by helium gas, which flows over billiard ball-sized “pebbles” that are packed with BB-sized TRISO fuel pellets. TRISO fuel, which contains a kernel of uranium wrapped in carbon and silicon, was developed years ago to be safer than existing fuel designs, though it hasn’t been widely used. X-energy says its fuel can withstand higher temperatures, helping to keep the fuel contained and reduce the potential of a meltdown.

Continue Reading

News

Another spyware maker caught distributing fake Android snooping apps

info

Published

on

By

Android spyware malloc.jpg

Yet another government spyware maker has been caught after its customers used fake Android apps to install its surveillance software on targets, according to a new report.

On Thursday, Osservatorio Nessuno, an Italian digital rights organization that researches spyware, published a report on a new malware it calls Morpheus. The spyware, which masquerades as a phone updating app, is capable of stealing a broad range of data from an intended target’s device. 

The researchers’ findings show that the demand for spyware by law enforcement and intelligence agencies is so high that there are a large number of companies providing this technology, some of whom operate outside of the public spotlight.

In this case, Osservatorio Nessuno concluded that the spyware is made by IPS, an Italian company that has been operating for more than 30 years providing traditional so-called lawful interception technology, meaning tools used by governments to capture a person’s real-time communications that flow through the networks of phone and internet providers. 

According to IPS’ website, the company operates in more than 20 countries, though that likely does not refer to its spyware product, which until today was a secret. The company lists several Italian police forces among its customers. 

IPS did not respond to TechCrunch’s request for comment about the report.  

The researchers called Morpheus “low cost” spyware because it relies on the rudimentary infection mechanism of tricking the targets into installing the spyware on their own. 

More advanced government spyware makers, such as NSO Group and Paragon Solutions, allow their government customers to infect their targets with invisible techniques, known as zero-click attacks, which install the malware in a completely stealthy and invisible way by exploiting expensive and difficult-to-find vulnerabilities that break through a device’s security defenses.

In this case, the researchers said the authorities had help from the target’s cellphone provider, which began deliberately blocking the target’s mobile data. At that point, the telecom provider sent the target an SMS, prompting them to install an app that was supposed to help them update the phone, and regain cellular data access. This is a strategy that has been well documented in other cases involving other Italian spyware makers.

Image Credits:Osservatorio Nessuno

Once the spyware was installed, it abused Android’s in-built accessibility features, which allows the spyware to read the data on the victim’s screen and interact with other apps. The malware was designed to access all kinds of information on the device, according to the researchers. 

The spyware then prompted a fake update, showed the target a reboot screen, and finally spoofed the WhatsApp app asking the target to provide their biometrics to prove that it’s them. Unbeknownst to the target, the biometric tap granted the spyware full access to their WhatsApp account by adding a device to the account. This is a known strategy used by government hackers in Ukraine, as well as in a recent spy campaign in Italy.

An old company with a new spyware

Osservatorio Nessuno’s researchers, who asked to be referred only with their first names, Davide and Giulio, concluded that the spyware belongs to IPS based on the spyware’s infrastructure. 

In particular, one of the IP addresses used in the campaign was registered to “IPS Intelligence Public Security.” 

The two also found several fragments of code that contained Italian phrases — something that has seemingly become tradition among the Italian spyware industry. The malware code included words in Italian, including references to Gomorra, the famous book and TV show about the Neapolitan mob, and “spaghetti.” 

Davide and Giulio told TechCrunch that they can’t provide specifics about who the target was, but they said they believe the attack is “related to political activism” in Italy, a world where “this type of targeted attacks are very common nowadays.” 

A researcher at a cybersecurity firm told TechCrunch that their company has been tracking this specific malware. After reviewing the Osservatorio Nessuno report, the researcher said that the malware is definitely developed by an Italian surveillance tech maker.

IPS is the latest in a long list of Italian spyware makers that have filled the void left by the long-defunct Italian company Hacking Team, one of the first spyware makers in the world. The company controlled a large share of the local market apart from selling abroad before it was hacked, and later sold and rebranded. In recent years, researchers have publicly exposed several Italian spyware makers, including CY4GATE, GR Sistemi, Movia, Negg, Raxir, RCS Lab, and most recently SIO

Earlier this month WhatsApp notified around 200 users who installed a fake version of the app, which was actually spyware made by SIO. In 2021, Italian prosecutors suspended their use of CY4GATE and SIO spyware due to serious malfunctions.

When you purchase through links in our articles, we may earn a small commission. This doesn’t affect our editorial independence.

Continue Reading

Trending