Thursday, December 15, 2016

How the Graffiti Boys ignited the Syrian Revolution

How the Graffiti Boys ignited the Syrian Revolution

 
803
SHARES
 

“Ashaab yureed isqat annidham.” This phrase is ringing in the ears of tyrants and despots around the Arab world and means quite simply that the people want to bring down the regime. It is the enduring chant of the Arab Spring, so it’s hardly surprising that these are probably the first words children learn in their cradles as they are rocked to sleep to the beat of this rousing street anthem.

When a group of 11-year-old Syrian boys made their way home from school one day and started larking around, as boys of that age do, it was almost inevitable that among the graffiti they scratched on a partially-collapsed wall would be these iconic words. By revolutionary standards it was an unremarkable act, hardly worthy of mention because the same graffiti can be found on walls in most Arab countries. However, just as hard-up Tunisian fruit seller Mohammed Bouazizi is credited with igniting the Arab Spring with his self-immolation, this long forgotten, single act of childish vandalism lit the touch paper of the Syrian Revolution.


 It was a seminal moment in time that the Arab world’s Leftists would rather you forget; in their frenzied bid to rewrite the history of the Arab Spring they want you to believe that crazed Islamists are hijacking the peoples’ revolution. The Left in Syria, you see, isn’t as cuddly as the splintered socialist groups in Britain. These are hard-line fundamentalist, religion-hating secularists who have no room, not even a square inch, for religion in their world; not for themselves and not for anyone else.

While the people in Tunisia and Egypt fought for freedom from tyranny they also wanted the freedom to re-engage with their faith. Hence, to the shock and horror of the Arab Left, the people voted for trusted groups like the Muslim Brotherhood. It was something that the Left had never considered; they dismissed the Muslim vote as a figment of the imagination; never once did they ever imagine that Muslim groups would form political parties or even want to engage in democracy. And in Libya, although some of the more fundamentalist Islamic groups failed to secure the popular vote other Islamic flavoured parties were swept in to power.

So Syria, you see, is probably the Arab Left’s last chance at having a revolution free from religion. This is most likely the reason for their opposition to the revolution from the very outset because they knew for sure that it would carry a strong religious flavour. Well, sorry to disappoint them. I crossed the length and breadth of Syria shortly before the revolution and saw most communities, Christian and Muslim alike, holding tight to their faith. Whatever shape their revolution will take, the future will be dominated by believers.

But let me return to the 18 boys at the beginning of this story because it is vitally important that we all remember exactly how the revolution in Syria began. It did not begin with CIA interference, nor an influx of foreign fighters, Al-Qaida, rebranded weapons from the West, NATO or a global call across the Muslim world for jihad.This was a reluctant revolution, a revolution forced on the people by the acts of an evil, malevolent regime.

In fact, though, while the 18 boys may have loaded the revolutionary gun way back in February 2011, the trigger was pulled by a man called Atif Najeeb, a cousin of Syrian President Bashar Al-Assad. Within two hours of the schoolboy prank, Atif instigated raids on every single one of the boys’ homes: armed police, the military and the ubiquitous security officials stormed every home at precisely the same time, demanding that the children be handed over. Amid the drama there was hand-wringing, cries from mothers, pleas from fathers to take the place of their sons and general confusion and chaos.

Distraught as news swept Dar’a, in the south-west of Syria less than six miles from the Jordanian border, the parents and their relatives gathered outside his office, but Atif Najeeb along with Faisal Kalthoum the governor of Dar’a, refused to meet any one of them.

For four days the families waited but not a single scrap of news came out about the fate of their sons. Eventually, a delegation made up of family members, local imams, the local headteacher and other dignitaries assembled and once again demanded to see Najeeb or the governor. After three hours they were herded into a room to meet the governor who remained seated while deliberately keeping the delegation on their feet. Culturally, this is a huge insult in the Arab world. At this point no one had even an inkling of what the boys had done to deserve their fate. The parents’ pleas to have their children returned were ignored and the governor advised them to forget about them.

He allegedly said: “My advice to you is that you forget you ever had these children. Go back home and sleep with your wives and bring other children into the world and if you can not do that, then bring your wives to us and we will do the job for you.”

By this time families in towns and villages across the region were shocked and outraged by what had happened and began to demonstrate and rally to show their support for the boys, their families and the town of Dar’a. They included local people from Dayr Al-Zawr, Idlib and Homs. While some did suggest that it was time for a revolution, the families kept to only two demands: the return of their children and the sacking of the governor for his crude and inflammatory remarks.

As the pressure mounted on Kalthoum, a helicopter full of military thugs was flown in to Dar’a to quell the unrest and during clashes with local citizens several people from Dar’a were killed. They went to their graves not knowing what the children had done to incur the wrath of the governor.

Eighteen days later, when it was clear that the parents and families would not be appeased until their children were returned, the boys were released. Their condition was pitiful and shocking; all were traumatised beyond recognition. All had had their fingernails torn off. One had lost an eye while several had fractured skulls and all had at least one broken limb. Today, those boys still bear the whip marks and scars on their bodies which bear testimony to the brutal nature of their detention and torture. Several of them still have nightmares recalling the screeches and screams of their fellow inmates.

Far from calming the situation, the physical evidence that the boys had been tortured enraged the people of Dar’a who made their own two demands: the dismissal of the governor and justice delivered to those who had done such wicked things to the boys including Atif Najeeb and his torture squad.

The relatively low level demands carried on for the next six months and those making them resisted calls for a full-blown revolution and offers of outside intervention; there were many in the Arab world who wanted to take up arms in support of their brothers and sisters in Dar’a and the dozens of Syrian cities and towns now in full revolutionary mode. Moreover, while insisting that their reasonable demands be met, some of the families pleaded for calm and even argued that Assad could not possibly have known or allowed this atrocity to happen. Surely, a London-graduated doctor and Ophthalmologist could not have consented to this barbarism, they argued.

By August the death toll across Syria had reached 1,000 and then the foreign fighters arrived, not to help the people of Dar’a but to destroy their spirit and morale. The fighters were mercenaries from numerous neighbouring and distant countries including former Soviet satellite states who, in the pay of the Assad regime, embarked on a killing and raping spree.

The plan was to subdue the spreading uprising and instill fear in the lives of the Syrian people, those who dared protest and those who were considering joining the growing crowds on the streets. Instead, the gates of Hell were opened and talks of compromise and low level demands gave way to screams of “Ashaab yureed isqat annidham”.

As news of the atrocities in Dar’a and other Syrian cities reached Damascus some senior officers in the military could no longer stomach what was being done in their name. They defected from the regime and formed what is now known as the Free Syrian Army. It’s not an army of outsiders; it was founded by Syrian officers and grew in popularity and prominence with the media because of its name.

Speculation is rife about the emergence of Al-Qaida, foreign jihadists, support from Arab countries, subversive tactics by Arab countries, infiltration by the CIA and Mossad, just about everyone, in fact, bar the Free Wales Army. Some of the speculation is true, some is not, but don’t allow anyone to rewrite the history of the start of the Syrian Revolution.

One day peace will come to Syria and when it does the Graffiti Boys should be remembered and their names should go up on another wall in Dar’a – a wall where their names can be carved with pride.

Some of them may not survive the war but some will finally enjoy the taste of freedom. Today I salute them and remember each one by name and urge you to remember them too, so that when Syria’s history is written in full they will not be forgotten: 1) Muawiya Faisal Sayasneh 2) Yusuf Adnan Sweidan 3) Samer Ali Sayasneh 4) Ahmed Jihad Abazeid 5) Isa Hasan Abulqayyas 6) Ala Mansour Irsheidat Abazeid 7) Mustafa Anwar Abazeid 8) Nidhal Anwar Abazeid 9) Akram Anwar Abazeid 10) Nayef Muwaffaq Abazeid 11) Basheer Farooq Abazeid 12) Ahmed Thani Irshiedat Abazeid 13) Ahmed Shukri Al-Akram 14) Abdulrahman Nayef Al-Reshedat 15) Mohammed Ayman Munwer Al-Karrad 16) Ahmed Nayef Al-Resheidat Abazeid 17) Nabeel Imad Al-Resheidat Abazeid 18) Mohammed Ameen Yasin Al-Resheidat Abazeid.

Wednesday, November 02, 2016

Bhopal Fake Encounter

After several incriminating videos of the so-called ‘encounter’ (a classic Indian euphemism for cold-blooded, execution-style murder by cops), now come some damning stills!

Surely, it is just a coincidence that the killer and the killed are wearing the same sports shoes, same make and colour. Not fishy at all, no?

But the big question is: Since jails don’t allow belts/shoes/watches, how/where did #SIMI men find these? While walking to the jungle? In the shoe closet at the three heavily-guarded gates they crossed? Or the shoe rack on top of the jail’s watch tower? Or did they first walk from the jail to the ATS squad office, raid their sports shoes supplies, then quietly marched to the jungle, huddled together atop a hill, waiting to be killed?

Let’s not even ask the other questions! Between the 8 of them, two allegedly had desi, crude pistols – how did they manage to get these? Or for that matter the knives? From some corrupt prison staff? Or found them lying on the road they walked on? Or through an accomplice, waiting for them outside? In which case, why was the accomplice stupid enough not to get an SUV or a van to drive them a couple of hundred miles away at night, maybe even take them outside the state and/or drop them to a railway station, for them to vanish on separate long-distance trains?

Police reports say the escapees fired 2 rounds at them while they fired 47 rounds. So, the escapees got 2 desi guns with only one bullet each? How stupid of them!

A video shows a cop ‘recovering’ a knife from an escapee’s waistband. A shiny broad-blade and 5-6 inches long. How did this escapee manage to walk with this knife tucked inside his (new) jeans, without slicing his groin or cutting open his thigh? Warning: don’t try this at home, but without walking, just try & tuck in a kitchen knife Into your waistband!

The jailbreak itself is the stuff of legend. Like Jai-Veeru in Sholay with the angrezon ke zamaaney ke jailer.

Let’s accept scene 1 of the MP cops’ screenplay. That the escapees attacked a warden. Then stole the keys from him to open other cells to free their friends. But they forgot to free their own leader Abu Faisal alias Doctor from a nearby cell? How clumsy and stupid, but let’s say they were in too much of a hurry!

But how did they manage from there? The staffer inside the cell doesn’t carry keys to the entire jail and all its entry/ main & intervening security gates, but only for his block. Any movie-goer knows that!

So, how did the escapees cross gate 1, 2 and 3? Did these gates have no security or armed guards? The cops’ screenplay suggests they had made keys from wood and metal spoons. When? That night itself? Or well in advance? Either way, the jail staff on duty and armed guards just looked on as these escapees stood around gate 1 for hours, filing and chiseling the spoon, fitting & trying it and finally making a duplicate key? And then, they repeated the process at gates 2 and 3?

The screenplay now suggests that they climbed (multiple sets of?) 30 foot high walls by making a “ladder out of bedsheets”. Imagine 1 man climbing the rope-knotted-bedsheets and reaching the top of the first wall. Then what – he jumps down thirty feet, landing perfectly on his brand-new sports shoes? Or climbs down another bedsheet-rope that he has carried to the top? Now it is the turn of escapees 2,3,4,5,6,7,8 to repeat this mountaineering feat.

No police or jail staff spots them during the long time it took them to do this? No one from the watch tower? No armed guards see them? And – no CCTV camera capture this remarkable Olympian achievement?

If this were a Bollywood movie, we would’ve walked out saying “kya bakwaas script hai”! Even Bollywood veterans like Ajay Devgn, Raveena Tandon, Anupam Kher and Paresh Rawal would agree. But this screenplay carries on.

The escapees come out of the ISO-certified Bhopal Central jail. What do they do next? They go for a leisurely walk, covering less than 1.5 km/ hour for 7-8 hours. Not in any hurry. No sense of urgency to escape. And they decide to stick together, all 8 of them. Not split into 2 teams of 4 each or 4 teams of 2 each and go off in different directions, making their own capture difficult. DI’d they never watch TV or any films – and were they just too stupid to take these basic, elementary steps? In that case, they seem to be too foolish to be “dreaded terrorists” or any sort of “masterminds”!

The script now says that apart from 2 desi guns, the escapees get some knives – for what? Hand-to-hand combat with the heavily-armed ATS men? An IGP on camera suggests that his men have sustained injuries, but not from the only 2 bullets supposedly fired at them. So, knife injuries? How? Maybe once the escapees had been shot dead and the ATS chaps went nearer to check, the corpses’ hands twitched and jerked involuntarily but inflicted precise non life threatening injuries. Even in death, they were considerate enough to not slice open an artery or a vein – such kind-hearted terrorist?!

Triumphant IGP and valiant cops speak of the ‘encounter’ proudly on camera, telling us how bravely they tackled these men. Gushing TV anchors, wearing flack jackets and in combat mode themselves, inform us that 8 terrorists have been “neutralised” – never mind that these were undertrials, yet to be convicted for any offence, let alone for terrorism, by any court.

A Madhya Pradesh minister slips up and admits that the ‘terrorists’ had no gun, only some kitchen utensils they’d sharpened into makeshift knives. He blows apart the whole brave-cops-under-enemy-fire-reluctantly-retaliate-and kill, without sustaining any injuries themselves. The IGP also contradicts himself.

And then the worst happens – a video apparently shot by the local sarpanch shows us a plainclothes cop ‘recovering’ a knife-machete, another brave one aiming at a figure lying on the ground and firing in cold blood while off-screen voices shower some abuse and even acknowledge that someone is shooting it all on video.

And then comes a second video.
And a third video.
And a fourth video.
All of them are on YouTube for anyone to browse.

Showing us 5 men atop a hillock, no guns or weapons in sight. An independent eyewitness journalist writes to CM Chouhan – they had no way to escape – on the other side was a sheer drop of a couple of hundred feet. They were surrounded. Killed in cold blood.

Finally – Dear Madhya Pradesh Government, ATS & Police, you need to hire better scriptwriters; this is such a terrible story full of large, gaping holes! Learn from the #GujaratModel. 20-30 “encounters”, clearer plotlines & savvier ‘spin’ management! Despite that, they made history by having the largest number of IPS officers & cops arrested & jailed in independent India! And – never have your Home Minister ‘monitor’ the encounters directly – it may land him in jail too!

As a film-maker, let me tell you that cinema works on the basis of “willing suspension of disbelief”. But even in that context, your story, script, screenplay & dialogues are terrible! And people in real life don’t embrace disbelief readily, unless they’re your cadres or blind Bhakts.

The citizens will ask questions, challenge your narratives, criticize you, keep you in check as is mandated in the Indian Constitution under the chapter titled Fundamental Duties!

– Rakesh Sharma

Image may contain: one or more people

Wednesday, October 05, 2016

How to Crash Systemd in a 50 character command

How to Crash Systemd in One Tweet

The following command, when run as any user, will crash systemd:

NOTIFY_SOCKET=/run/systemd/notify systemd-notify ""

After running this command, PID 1 is hung in the pause system call. You can no longer start and stop daemons. inetd-style services no longer accept connections. You cannot cleanly reboot the system. The system feels generally unstable (e.g. ssh and su hang for 30 seconds since systemd is now integrated with the login system). All of this can be caused by a command that’s short enough to fit in a Tweet.

Edit (2016-09-28 21:34): Some people can only reproduce if they wrap the command in a while true loop. Yay non-determinism!

The bug is remarkably banal. The above systemd-notify command sends a zero-length message to the world-accessible UNIX domain socket located at /run/systemd/notify. PID 1 receives the message and fails an assertion that the message length is greater than zero. Despite the banality, the bug is serious, as it allows any local user to trivially perform a denial-of-service attack against a critical system component.

The immediate question raised by this bug is what kind of quality assurance process would allow such a simple bug to exist for over two years (it was introduced in systemd 209). Isn’t the empty string an obvious test case? One would hope that PID 1, the most important userspace process, would have better quality assurance than this. Unfortunately, it seems that crashes of PID 1 are not unusual, as a quick glance through the systemd commit log reveals commit messages such as:

Systemd’s problems run far deeper than this one bug. Systemd is defective by design. Writing bug-free software is extremely difficult. Even good programmers would inevitably introduce bugs into a project of the scale and complexity of systemd. However, good programmers recognize the difficulty of writing bug-free software and understand the importance of designing software in a way that minimizes the likelihood of bugs or at least reduces their impact. The systemd developers understand none of this, opting to cram an enormous amount of unnecessary complexity into PID 1, which runs as root and is written in a memory-unsafe language.

Some degree of complexity is to be expected, as systemd provides a number of useful and compelling features (although they did not invent them; they were just the first to aggressively market them). Whether or not systemd has made the right trade-off between features and complexity is a matter of debate. What is not debatable is that systemd’s complexity does not belong in PID 1. As Rich Felker explained, the only job of PID 1 is to execute the real init system and reap zombies. Furthermore, the real init system, even when running as a non-PID 1 process, should be structured in a modular way such that a failure in one of the riskier components does not bring down the more critical components. For instance, a failure in the daemon management code should not prevent the system from being cleanly rebooted.

In particular, any code that accepts messages from untrustworthy sources like systemd-notify should run in a dedicated process as a unprivileged user. The unprivileged process parses and validates messages before passing them along to the privileged process. This is called privilege separation and has been a best practice in security-aware software for over a decade. Systemd, by contrast, does text parsing on messages from untrusted sources, in C, running as root in PID 1. If you think systemd doesn’t need privilege separation because it only parses messages from local users, keep in mind that in the Internet era, local attacks tend to acquire remote vectors. Consider Shellshock, or the presentation at this year’s systemd conference which is titled “Talking to systemd from a Web Browser.”

Systemd’s “we don’t make mistakes” attitude towards security can be seen in other places, such as this code from the main() function of PID 1:

/* Disable the umask logic */
if (getpid() == 1)
        umask(0);

Setting a umask of 0 means that, by default, any file created by systemd will be world-readable and -writable. Systemd defines a macro called RUN_WITH_UMASK which is used to temporarily set a more restrictive umask when systemd needs to create a file with different permissions. This is backwards. The default umask should be restrictive, so forgetting to change the umask when creating a file would result in a file that obviously doesn’t work. This is called fail-safe design. Instead systemd is fail-open, so forgetting to change the umask (which has already happened twice) creates a file that works but is a potential security vulnerability.

The Linux ecosystem has fallen behind other operating systems in writing secure and robust software. While Microsoft was hardening Windows and Apple was developing iOS, open source software became complacent. However, I see improvement on the horizon. Heartbleed and Shellshock were wake-up calls that have led to increased scrutiny of open source software. Go and Rust are compelling, safe languages for writing the type of systems software that has traditionally been written in C. Systemd is dangerous not only because it is introducing hundreds of thousands of lines of complex C code without any regard to longstanding security practices like privilege separation or fail-safe design, but because it is setting itself up to be irreplaceable. Systemd is far more than an init system: it is becoming a secondary operating system kernel, providing a log server, a device manager, a container manager, a login manager, a DHCP client, a DNS resolver, and an NTP client. These services are largely interdependent and provide non-standard interfaces for other applications to use. This makes any one component of systemd hard to replace, which will prevent more secure alternatives from gaining adoption in the future.

Consider systemd’s DNS resolver. DNS is a complicated, security-sensitive protocol. In August 2014, Lennart Poettering declared that “systemd-resolved is now a pretty complete caching DNS and LLMNR stub resolver.” In reality, systemd-resolved failed to implement any of the documented best practices to protect against DNS cache poisoning. It was vulnerable to Dan Kaminsky’s cache poisoning attack which was fixed in every other DNS server during a massive coordinated response in 2008 (and which had been fixed in djbdns in 1999). Although systemd doesn’t force you to use systemd-resolved, it exposes a non-standard interface over DBUS which theyencourage applications to use instead of the standard DNS protocol over port 53. If applications follow this recommendation, it will become impossible to replace systemd-resolved with a more secure DNS resolver, unless that DNS resolver opts to emulate systemd’s non-standard DBUS API.

It is not too late to stop this. Although almost every Linux distribution now uses systemd for their init system, init was a soft target for systemd because the systems they replaced were so bad. That’s not true for the other services which systemd is trying to replace such as network management, DNS, and NTP. Systemd offers very few compelling features over existing implementations, but does carry a large amount of risk. If you’re a system administrator, resist the replacement of existing services and hold out for replacements that are more secure. If you’re an application developer, do not use systemd’s non-standard interfaces. There will be better alternatives in the future that are more secure than what we have now. But adopting them will only be possible if systemd has not destroyed the modularity and standards-compliance that make innovation possible.

Hi, I’m Andrew. I’m the founder of SSLMate, a service which automates your SSL certificate deployment. I also develop open source projects like git-crypt and titus.

I blog here about a variety of technology topics, including security, devops, IPv6, and reliable programming. If you liked this post, check out my other posts or subscribe to my Atom feed.

My email address is andrew@agwa.name. I’m AGWA at GitHub and @__agwa on Twitter.

Saturday, October 01, 2016

Clinton Email: We Must Destroy Syria For Israel

Posted on June 18, 2016 by Sean Adl-Tabatabai in News, US // Comments ()
Leaked Clinton email reveals that Clinton ordered war against Syria to benefit Israel

A leaked Hillary Clinton email confirms that the Obama administration, with Hillary at the helm, orchestrated a civil war in Syria to benefit Israel.

The new Wikileaks release shows the then Secretary of State ordering a war in Syria in order to overthrow the government and oust President Assad, claiming it was the “best way to help Israel”.

Newobserveronline.com reports:

The document was one of many unclassified by the US Department of State under case number F-2014-20439, Doc No. C05794498, following the uproar over Clinton’s private email server kept at her house while she served as Secretary of State from 2009 to 2013.

Although the Wikileaks transcript dates the email as December 31, 2000, this is an error on their part, as the contents of the email (in particular the reference to May 2012 talks between Iran and the west over its nuclear program in Istanbul) show that the email was in fact sent on December 31, 2012.
Arjun Kapoor Lost 25 Kg’s In 4 Weeks For…
Garcinia Forte

Business News You Can Use
Bloomberg Quint

The Latest Share Market And…
Bloomberg Quint

1 Proven Way To Make Rs. 8200/Day
CareerTimes

Revealed: See How Kollam Girl Got 5…
Fit Mom Daily

He Makes Over Rs. 6 000 Per Day!
CareerTimes

This Indian Dating Site Is Turning The…
Top Dating Sites India

Skin Gets 200% Whiter…
Indian Beauty Tips

When Plastic Surgery Goes Wrong
Safe or Dangerous

Indian Seniors: You Have To Visit This…
Senior Dating India

Ads by Revcontent

The email makes it clear that it has been US policy from the very beginning to violently overthrow the Syrian government—and specifically to do this because it is in Israel’s interests.

clinton-email-syria-israel
“The best way to help Israel deal with Iran’s growing nuclear capability is to help the people of Syria overthrow the regime of Bashar Assad,” Clinton forthrightly starts off by saying.

Even though all US intelligence reports had long dismissed Iran’s “atom bomb” program as a hoax (a conclusion supported by the International Atomic Energy Agency), Clinton continues to use these lies to “justify” destroying Syria in the name of Israel.

She specifically links Iran’s mythical atom bomb program to Syria because, she says, Iran’s “atom bomb” program threatens Israel’s “monopoly” on nuclear weapons in the Middle East.

If Iran were to acquire a nuclear weapon, Clinton asserts, this would allow Syria (and other “adversaries of Israel” such as Saudi Arabia and Egypt) to “go nuclear as well,” all of which would threaten Israel’s interests.

Therefore, Clinton, says, Syria has to be destroyed.

Iran’s nuclear program and Syria’s civil war may seem unconnected, but they are. What Israeli military leaders really worry about — but cannot talk about — is losing their nuclear monopoly.

An Iranian nuclear weapons capability would not only end that nuclear monopoly but could also prompt other adversaries, like Saudi Arabia and Egypt, to go nuclear as well. The result would be a precarious nuclear balance in which Israel could not respond to provocations with conventional military strikes on Syria and Lebanon, as it can today.

If Iran were to reach the threshold of a nuclear weapons state, Tehran would find it much easier to call on its allies in Syria and Hezbollah to strike Israel, knowing that its nuclear weapons would serve as a deterrent to Israel responding against Iran itself.

It is, Clinton continues, the “strategic relationship between Iran and the regime of Bashar Assad in Syria” that makes it possible for Iran to undermine Israel’s security.

This would not come about through a “direct attack,” Clinton admits, because “in the thirty years of hostility between Iran and Israel” this has never occurred, but through its alleged “proxies.”

The end of the Assad regime would end this dangerous alliance. Israel’s leadership understands well why defeating Assad is now in its interests.

Bringing down Assad would not only be a massive boon to Israel’s security, it would also ease Israel’s understandable fear of losing its nuclear monopoly.

Then, Israel and the United States might be able to develop a common view of when the Iranian program is so dangerous that military action could be warranted.

Clinton goes on to asset that directly threatening Bashar Assad “and his family” with violence is the “right thing” to do:

In short, the White House can ease the tension that has developed with Israel over Iran by doing the right thing in Syria.

With his life and his family at risk, only the threat or use of force will change the Syrian dictator Bashar Assad’s mind.

The email proves—as if any more proof was needed—that the US government has been the main sponsor of the growth of terrorism in the Middle East, and all in order to “protect” Israel.

It is also a sobering thought to consider that the “refugee” crisis which currently threatens to destroy Europe, was directly sparked off by this US government action as well, insofar as there are any genuine refugees fleeing the civil war in Syria.

In addition, over 250,000 people have been killed in the Syrian conflict, which has spread to Iraq—all thanks to Clinton and the Obama administration backing the “rebels” and stoking the fires of war in Syria.

The real and disturbing possibility that a psychopath like Clinton—whose policy has inflicted death and misery upon millions of people—could become the next president of America is the most deeply shocking thought of all.

Clinton’s public assertion that, if elected president, she would “take the relationship with Israel to the next level,” would definitively mark her, and Israel, as the enemy of not just some Arab states in the Middle East, but of all peace-loving people on earth.

About Latest Posts
Sean Adl-Tabatabai
Follow me
Sean Adl-Tabatabai
Editor-in-chief at Your News Wire

Friday, September 30, 2016

Israeli Online Attack Service ‘vDOS’ Earned $600,000 in Two Years


SEP 16

Israeli Online Attack Service ‘vDOS’ Earned $600,000 in Two Years

vDOS  a “booter” service that has earned in excess of $600,000 over the past two years helping customers coordinate more than 150,000 so-called distributed denial-of-service (DDoS) attacks designed to knock Web sites offline — has been massively hacked, spilling secrets about tens of thousands of paying customers and their targets.

The vDOS database, obtained by KrebsOnSecurity.com at the end of July 2016, points to two young men in Israel as the principal owners and masterminds of the attack service, with support services coming from several young hackers in the United States.

The vDos home page.

The vDos home page.

To say that vDOS has been responsible for a majority of the DDoS attacks clogging up the Internet over the past few years would be an understatement. The various subscription packages to the service are sold based in part on how many seconds the denial-of-service attack will last. And in just four months between April and July 2016, vDOS was responsible for launching more than 277 million seconds of attack time, or approximately 8.81 years worth of attack traffic.

Let the enormity of that number sink in for a moment: That’s nearly nine of what I call “DDoS years” crammed into just four months. That kind of time compression is possible because vDOS handles hundreds — if not thousands — of concurrent attacks on any given day.

Although I can’t prove it yet, it seems likely that vDOS is responsible for several decades worth of DDoS years. That’s because the data leaked in the hack of vDOS suggest that the proprietors erased all digital records of attacks that customers launched between Sept. 2012 (when the service first came online) and the end of March 2016.

HOW vDOS GOT HACKED

The hack of vDOS came about after a source was investigating a vulnerability he discovered on a similar attack-for-hire service called PoodleStresser. The vulnerability allowed my source to download the configuration data for PoodleStresser’s attack servers, which pointed back to api.vdos-s[dot]com. PoodleStresser, as well as a large number of other booter services, appears to rely exclusively on firepower generated by vDOS.

From there, the source was able to exploit a more serious security hole in vDOS that allowed him to dump all of the service’s databases and configuration files, and to discover the true Internet address of four rented servers in Bulgaria (at Verdina.net) that are apparently being used to launch the attacks sold by vDOS. The DDoS-for-hire service is hidden behind DDoS protection firm Cloudflare, but its actual Internet address is 82.118.233.144.

vDOS had a reputation on cybercrime forums for prompt and helpful customer service, and the leaked vDOS databases offer a fascinating glimpse into the logistical challenges associated with running a criminal attack service online that supports tens of thousands of paying customers — a significant portion of whom are all trying to use the service simultaneously.

Multiple vDOS tech support tickets were filed by customers who complained that they were unable to order attacks on Web sites in Israel. Responses from the tech support staff show that the proprietors of vDOS are indeed living in Israel and in fact set the service up so that it was unable to attack any Web sites in that country — presumably so as to not attract unwanted attention to their service from Israeli authorities. Here are a few of those responses:

(‘4130′,’Hello `d0rk`,\r\nAll Israeli IP ranges have been blacklisted due to security reasons.\r\n\r\nBest regards,\r\nP1st.’,’03-01-2015 08:39),

(‘15462′,’Hello `g4ng`,\r\nMh, neither. I\’m actually from Israel, and decided to blacklist all of them. It\’s my home country, and don\’t want something to happen to them :)\r\n\r\nBest regards,\r\nDrop.’,’11-03-2015 15:35),

(‘15462′,’Hello `roibm123`,\r\nBecause I have an Israeli IP that is dynamic.. can\’t risk getting hit/updating the blacklist 24/7.\r\n\r\nBest regards,\r\nLandon.’,’06-04-2015 23:04),

(‘4202′,’Hello `zavi156`,\r\nThose IPs are in israel, and we have all of Israel on our blacklist. Sorry for any inconvinience.\r\n\r\nBest regards,\r\nJeremy.’,’20-05-2015 10:14),

(‘4202′,’Hello `zavi156`,\r\nBecause the owner is in Israel, and he doesn\’t want his entire region being hit offline.\r\n\r\nBest regards,\r\nJeremy.’,’20-05-2015 11:12),

(‘9057′,’There is a option to buy with Paypal? I will pay more than $2.5 worth.\r\nThis is not the first time I am buying booter from you.\r\nIf no, Could you please ask AplleJack? I know him from Israel.\r\nThanks.’,’21-05-2015 12:51),

(‘4120′,’Hello `takedown`,\r\nEvery single IP that\’s hosted in israel is blacklisted for safety reason. \r\n\r\nBest regards,\r\nAppleJ4ck.’,’02-09-2015 08:57),

WHO RUNS vDOS?

As we can see from the above responses from vDOS’s tech support, the owners and operators of vDOS are young Israeli hackers who go by the names P1st a.k.a. P1st0, and AppleJ4ck. The two men market their service mainly on the site hackforums[dot]net, selling monthly subscriptions using multiple pricing tiers ranging from $20 to $200 per month. AppleJ4ck hides behind the same nickname on Hackforums, while P1st goes by the alias “M30w” on the forum.

Some of P1st/M30W's posts on Hackforums regarding his service vDOS.

Some of P1st/M30W’s posts on Hackforums regarding his service vDOS.

vDOS appears to be the longest-running booter service advertised on Hackforums, and it is by far and away the most profitable such business. Records leaked from vDOS indicate that since July 2014, tens of thousands of paying customers spent a total of more than $618,000 at the service using Bitcoin and PayPal.

Incredibly, for brief periods the site even accepted credit cards in exchange for online attacks, although it’s unclear how much the site might have made in credit card payments because the information is not in the leaked databases.

The Web server hosting vDOS also houses several other sites, including huri[dot]biz,ustress[dot]io, and vstress[dot]net. Virtually all of the administrators at vDOS have an email account that ends in v-email[dot]org, a domain that also is registered to an Itay Huri with a phone number that traces back to Israel.

The proprietors of vDOS set their service up so that anytime a customer asked for technical assistance the site would blast a text message to six different mobile numbers tied to administrators of the service, using an SMS service called Nexmo.com. Two of those mobile numbers go to phones in Israel. One of them is the same number listed for Itay Huri in the Web site registration records for v-email[dot]org; the other belongs to an Israeli citizen named Yarden Bidani. Neither individual responded to requests for comment.

The leaked database and files indicate that vDOS uses Mailgun for email management, and the secret keys needed to manage that Mailgun service were among the files stolen by my source. The data shows that vDOS support emails go to itay@huri[dot]biz, itayhuri8@gmail.com and raziel.b7@gmail.com.

LAUNDERING THE PROCEEDS FROM DDOS ATTACKS

The $618,000 in earnings documented in the vDOS leaked logs is almost certainly a conservative income figure. That’s because the vDOS service actually dates back to Sept 2012, yet the payment records are not available for purchases prior to 2014. As a result, it’s likely that this service has made its proprietors more than $1 million.

vDOS does not currently accept PayPal payments. But for several years until recently it did, and records show the proprietors of the attack service worked assiduously to launder payments for the service through a round-robin chain of PayPal accounts.

They did this because at the time PayPal was working with a team of academic researchers to identify, seize and shutter PayPal accounts that were found to be accepting funds on behalf of booter services like vDOS. Anyone interested in reading more on their success in making life harder for these booter service owners should check out my August 2015 story, Stress-Testing the Booter Services, Financially.

People running dodgy online services that violate PayPal’s terms of service generally turn to several methods to mask the true location of their PayPal Instant Payment Notification systems. Here is an interesting analysis of how popular booter services are doing so using shell corporations, link shortening services and other tricks.

Turns out, AppleJ4ck and p1st routinely recruited other forum members on Hackforums to help them launder significant sums of PayPal payments for vDOS each week.

“The paypals that the money are sent from are not verified,” AppleJ4ck says in one recruitment thread. “Most of the payments will be 200$-300$ each and I’ll do around 2-3 payments per day.”

vDos co-owner AppleJ4ck recruiting Hackforums members to help launder PayPal payments for his booter service.

vDos co-owner AppleJ4ck recruiting Hackforums members to help launder PayPal payments for his booter service.

It is apparent from the leaked vDOS logs that in July 2016 the service’s owners implemented an additional security measure for Bitcoin payments, which they accept through Coinbase. The data shows that they now use an intermediary server (45.55.55.193) to handle Coinbase traffic. When a Bitcoin payment is received, Coinbase notifies this intermediary server, not the actual vDOS servers in Bulgaria.

A server situated in the middle and hosted at a U.S.-based address from Digital Oceanthen updates the database in Bulgaria, perhaps because the vDOS proprietors believed payments from the USA would attract less interest from Coinbase than huge sums traversing through Bulgaria each day.

ANALYSIS

The extent to which the proprietors of vDOS went to launder profits from the service and to obfuscate their activities clearly indicate they knew that the majority of their users were using the service to knock others offline.

Defenders of booter and stresser services argue the services are legal because they can be used to help Web site owners stress-test their own sites and to build better defenses against such attacks. While it’s impossible to tell what percentage of vDOS users actually were using the service to stress-test their own sites, the leaked vDOS logs show that a huge percentage of the attack targets are online businesses.

In reality, the methods that vDOS uses to sustain its business are practically indistinguishable from those employed by organized cybercrime gangs, said Damon McCoy, an assistant professor of computer science at New York University.

In reality, the methods that vDOS uses to sustain its business are practically indistinguishable from those employed by organized cybercrime gangs, said Damon McCoy, an assistant professor of computer science at New York University.

“These guys are definitely taking a page out of the playbook of the Russian cybercriminals,” said McCoy, the researcher principally responsible for pushing vDOS and other booter services off of PayPal (see the aforementioned story Stress-Testing the Booter Services, Financially for more on this).

“A lot of the Russian botnet operators who routinely paid people to infect Windows computers with malware used to say they wouldn’t buy malware installs from Russia or CIS countries,” McCoy said. “The main reason was they didn’t want to make trouble in their local jurisdiction in the hopes that no one in their country would be a victim and have standing to bring a case against them.”

The service advertises attacks at up to 50 gigabits of data per second (Gbps). That’s roughly the equivalent of trying to cram two, high-definition Netflix movies down a target’s network pipe all at the same moment.

But Allison Nixon, director of security research at business risk intelligence firmFlashpoint, said her tests of vDOS’s service generated attacks that were quite a bit smaller than that — 14 Gbps and 6 Gbps. Nevertheless, she noted, even an attack that generates just 6 Gbps is well more than enough to cripple most sites which are not already protected by anti-DDoS services.

And herein lies the rub with services like vDOS: They put high-powered, point-and-click cyber weapons in the hands of people — mostly young men in their teens — who otherwise wouldn’t begin to know how to launch such attacks. Worse still, they force even the smallest of businesses to pay for DDoS protection services or else risk being taken offline by anyone with a grudge or agenda.

“The problem is that this kind of firepower is available to literally anyone willing to pay $30 a month,” Nixon said. “Basically what this means is that you must have DDoS protection to participate on the Internet. Otherwise, any angry young teenager is going to be able to take you offline in a heartbeat. It’s sad, but these attack services mean that DDoS protection has become the price of admission for running a Web site these days.”

Stay tuned for the next piece in this series on the hack of vDOS, which will examine some of the more interesting victims of this service.

Sunday, May 29, 2016

Savarkar justified the idea of rape as a political tool

Was Veer Savarkar really all that brave?

Now a chewing gum that treats Islamophobia

Now a chewing gum that treats Islamophobia
A satirical video that challenges discrimination against Muslims
TNM Staff| Friday, May 27, 2016 – 14:10
 
 

 

In an attempt to challenge rising Islamophobia in the United States, the Council on American Islamic Relations (CAIR) has released a mock commercial. The one-minute satirical video, released on Facebook, raises awareness about the kind of discrimination  Muslims in the US face in their everyday lives – including being labelled a terrorist.  The commercial is for “Islamophobin” a chewing gum that promises to cure people of bigotry and intolerance “within five minutes”. There’s no better way to “spread love” than using humour. 

Watch the video: 

 

Friday, April 08, 2016

Links for 2016-04-01 [https://t.co/WkaffQeyal] https://t.co/3NKHgceXDX http://ift.tt/1qxCegq https://t.co/KMjzfoUWbu

Links for 2016-04-01 [https://t.co/WkaffQeyal] https://t.co/3NKHgceXDX http://ift.tt/1qxCegq https://t.co/KMjzfoUWbu
by Mohamed Iqbal Pallipurath

April 08, 2016 at 02:28PM
from Facebook
via IFTTTfrom Facebook
via IFTTT

Links for 2016-04-04 [https://t.co/WkaffQeyal] https://t.co/SQ7yFyZ9jR http://ift.tt/1PY5hhD https://t.co/LZrKzOlN83

Links for 2016-04-04 [https://t.co/WkaffQeyal] https://t.co/SQ7yFyZ9jR http://ift.tt/1PY5hhD https://t.co/LZrKzOlN83
by Mohamed Iqbal Pallipurath

April 08, 2016 at 02:28PM
from Facebook
via IFTTTfrom Facebook
via IFTTT

Links for 2016-04-06 [https://t.co/WkaffQeyal] https://t.co/mAOZ7Dinj2 http://ift.tt/1RGl8rN https://t.co/4teFFCMAcd

Links for 2016-04-06 [https://t.co/WkaffQeyal] https://t.co/mAOZ7Dinj2 http://ift.tt/1RGl8rN https://t.co/4teFFCMAcd
by Mohamed Iqbal Pallipurath

April 08, 2016 at 02:28PM
from Facebook
via IFTTTfrom Facebook
via IFTTT

Links for 2016-04-01 [https://t.co/WkaffQeyal] https://t.co/3NKHgceXDX http://ift.tt/1NcWHvM https://t.co/rc61KCKoka

Links for 2016-04-01 [https://t.co/WkaffQeyal] https://t.co/3NKHgceXDX http://ift.tt/1NcWHvM https://t.co/rc61KCKoka
by Mohamed Iqbal Pallipurath

April 08, 2016 at 01:10PM
from Facebook
via IFTTTfrom Facebook
via IFTTT

Links for 2016-04-06 [https://t.co/WkaffQeyal] https://t.co/mAOZ7Dinj2 http://ift.tt/20lCX0E https://t.co/6oN7TZZYvc

Links for 2016-04-06 [https://t.co/WkaffQeyal] https://t.co/mAOZ7Dinj2 http://ift.tt/20lCX0E https://t.co/6oN7TZZYvc
by Mohamed Iqbal Pallipurath

April 08, 2016 at 01:10PM
from Facebook
via IFTTTfrom Facebook
via IFTTT

Links for 2016-04-04 [https://t.co/WkaffQeyal] https://t.co/SQ7yFyZ9jR http://ift.tt/1NcWHf9 https://t.co/kfYZRC69du

Links for 2016-04-04 [https://t.co/WkaffQeyal] https://t.co/SQ7yFyZ9jR http://ift.tt/1NcWHf9 https://t.co/kfYZRC69du
by Mohamed Iqbal Pallipurath

April 08, 2016 at 01:10PM
from Facebook
via IFTTTfrom Facebook
via IFTTT

Links for 2016-04-01 [https://t.co/WkaffQeyal] https://t.co/3NKHgceXDX http://ift.tt/1RHZHpg https://t.co/lTcFv6ZlTB

Links for 2016-04-01 [https://t.co/WkaffQeyal] https://t.co/3NKHgceXDX http://ift.tt/1RHZHpg https://t.co/lTcFv6ZlTB
by Mohamed Iqbal Pallipurath

April 08, 2016 at 12:14PM
from Facebook
via IFTTTfrom Facebook
via IFTTT

Links for 2016-04-06 [https://t.co/WkaffQeyal] https://t.co/mAOZ7Dinj2 http://ift.tt/1QrKl7W https://t.co/A2OXvHqmh7

Links for 2016-04-06 [https://t.co/WkaffQeyal] https://t.co/mAOZ7Dinj2 http://ift.tt/1QrKl7W https://t.co/A2OXvHqmh7
by Mohamed Iqbal Pallipurath

April 08, 2016 at 12:13PM
from Facebook
via IFTTTfrom Facebook
via IFTTT

Links for 2016-04-04 [https://t.co/WkaffQeyal] https://t.co/SQ7yFyZ9jR http://ift.tt/1RHZH8M https://t.co/kBni0DI6Cj

Links for 2016-04-04 [https://t.co/WkaffQeyal] https://t.co/SQ7yFyZ9jR http://ift.tt/1RHZH8M https://t.co/kBni0DI6Cj
by Mohamed Iqbal Pallipurath

April 08, 2016 at 12:13PM
from Facebook
via IFTTTfrom Facebook
via IFTTT

Links for 2016-04-06 [https://t.co/WkaffQeyal] https://t.co/mAOZ7Dinj2 http://ift.tt/1QlAVsV https://t.co/PyfHpNeDB0

Links for 2016-04-06 [https://t.co/WkaffQeyal] https://t.co/mAOZ7Dinj2 http://ift.tt/1QlAVsV https://t.co/PyfHpNeDB0
by Mohamed Iqbal Pallipurath

April 08, 2016 at 11:28AM
from Facebook
via IFTTTfrom Facebook
via IFTTT

Links for 2016-04-04 [https://t.co/WkaffQeyal] https://t.co/SQ7yFyZ9jR http://ift.tt/1RTYS9x https://t.co/UXt23iBNlP

Links for 2016-04-04 [https://t.co/WkaffQeyal] https://t.co/SQ7yFyZ9jR http://ift.tt/1RTYS9x https://t.co/UXt23iBNlP
by Mohamed Iqbal Pallipurath

April 08, 2016 at 11:28AM
from Facebook
via IFTTTfrom Facebook
via IFTTT

Links for 2016-04-01 [https://t.co/WkaffQeyal] https://t.co/3NKHgceXDX http://ift.tt/1WgRzOv https://t.co/VLXpuGTRzx

Links for 2016-04-01 [https://t.co/WkaffQeyal] https://t.co/3NKHgceXDX http://ift.tt/1WgRzOv https://t.co/VLXpuGTRzx
by Mohamed Iqbal Pallipurath

April 08, 2016 at 11:28AM
from Facebook
via IFTTTfrom Facebook
via IFTTT

Links for 2016-04-04 [https://t.co/WkaffQeyal] https://t.co/SQ7yFyZ9jR http://ift.tt/25OBWSA https://t.co/2EjMWUYSQK

Links for 2016-04-04 [https://t.co/WkaffQeyal] https://t.co/SQ7yFyZ9jR http://ift.tt/25OBWSA https://t.co/2EjMWUYSQK
by Mohamed Iqbal Pallipurath

April 08, 2016 at 10:02AM
from Facebook
via IFTTTfrom Facebook
via IFTTT

Links for 2016-04-01 [https://t.co/WkaffQeyal] https://t.co/3NKHgceXDX http://ift.tt/1PXLnDA https://t.co/mzaGA2FffU

Links for 2016-04-01 [https://t.co/WkaffQeyal] https://t.co/3NKHgceXDX http://ift.tt/1PXLnDA https://t.co/mzaGA2FffU
by Mohamed Iqbal Pallipurath

April 08, 2016 at 10:02AM
from Facebook
via IFTTTfrom Facebook
via IFTTT

Links for 2016-04-06 [https://t.co/WkaffQeyal] https://t.co/mAOZ7Dinj2 http://ift.tt/1NsyKzh https://t.co/B1pzuLtekU

Links for 2016-04-06 [https://t.co/WkaffQeyal] https://t.co/mAOZ7Dinj2 http://ift.tt/1NsyKzh https://t.co/B1pzuLtekU
by Mohamed Iqbal Pallipurath

April 08, 2016 at 10:02AM
from Facebook
via IFTTTfrom Facebook
via IFTTT

Links for 2016-04-01 [https://t.co/WkaffQeyal] https://t.co/3NKHgceXDX http://ift.tt/1oHxoM6 https://t.co/KWsUjuXd7m

Links for 2016-04-01 [https://t.co/WkaffQeyal] https://t.co/3NKHgceXDX http://ift.tt/1oHxoM6 https://t.co/KWsUjuXd7m
by Mohamed Iqbal Pallipurath

April 08, 2016 at 09:29AM
from Facebook
via IFTTTfrom Facebook
via IFTTT

Links for 2016-04-04 [https://t.co/WkaffQeyal] https://t.co/SQ7yFyZ9jR http://ift.tt/1qxfA7W https://t.co/mEK41gwijt

Links for 2016-04-04 [https://t.co/WkaffQeyal] https://t.co/SQ7yFyZ9jR http://ift.tt/1qxfA7W https://t.co/mEK41gwijt
by Mohamed Iqbal Pallipurath

April 08, 2016 at 09:29AM
from Facebook
via IFTTTfrom Facebook
via IFTTT

Links for 2016-04-06 [https://t.co/WkaffQeyal] https://t.co/mAOZ7Dinj2 http://ift.tt/1SbXbXS https://t.co/ubxex0SI1Y

Links for 2016-04-06 [https://t.co/WkaffQeyal] https://t.co/mAOZ7Dinj2 http://ift.tt/1SbXbXS https://t.co/ubxex0SI1Y
by Mohamed Iqbal Pallipurath

April 08, 2016 at 09:29AM
from Facebook
via IFTTTfrom Facebook
via IFTTT

Links for 2016-04-01 [https://t.co/WkaffQeyal] https://t.co/3NKHgceXDX http://ift.tt/1S6Befz https://t.co/bJuw8T19xk

Links for 2016-04-01 [https://t.co/WkaffQeyal] https://t.co/3NKHgceXDX http://ift.tt/1S6Befz https://t.co/bJuw8T19xk
by Mohamed Iqbal Pallipurath

April 08, 2016 at 08:01AM
from Facebook
via IFTTTfrom Facebook
via IFTTT

Links for 2016-04-06 [https://t.co/WkaffQeyal] https://t.co/mAOZ7Dinj2 http://ift.tt/1OOVGL0 https://t.co/Fmt7hjlTLk

Links for 2016-04-06 [https://t.co/WkaffQeyal] https://t.co/mAOZ7Dinj2 http://ift.tt/1OOVGL0 https://t.co/Fmt7hjlTLk
by Mohamed Iqbal Pallipurath

April 08, 2016 at 08:01AM
from Facebook
via IFTTTfrom Facebook
via IFTTT

Links for 2016-04-04 [https://t.co/WkaffQeyal] https://t.co/SQ7yFyZ9jR http://ift.tt/1S6BbjS https://t.co/GZ5VXUSyfV

Links for 2016-04-04 [https://t.co/WkaffQeyal] https://t.co/SQ7yFyZ9jR http://ift.tt/1S6BbjS https://t.co/GZ5VXUSyfV
by Mohamed Iqbal Pallipurath

April 08, 2016 at 08:00AM
from Facebook
via IFTTTfrom Facebook
via IFTTT

Links for 2016-04-01 [https://t.co/WkaffQeyal] https://t.co/3NKHgceXDX http://ift.tt/1MiNPdh https://t.co/BN4meSFVtP

Links for 2016-04-01 [https://t.co/WkaffQeyal] https://t.co/3NKHgceXDX http://ift.tt/1MiNPdh https://t.co/BN4meSFVtP
by Mohamed Iqbal Pallipurath

April 08, 2016 at 07:28AM
from Facebook
via IFTTTfrom Facebook
via IFTTT

Links for 2016-04-04 [https://t.co/WkaffQeyal] https://t.co/SQ7yFyZ9jR http://ift.tt/22gEW5B https://t.co/3P5HXcdbyE

Links for 2016-04-04 [https://t.co/WkaffQeyal] https://t.co/SQ7yFyZ9jR http://ift.tt/22gEW5B https://t.co/3P5HXcdbyE
by Mohamed Iqbal Pallipurath

April 08, 2016 at 07:28AM
from Facebook
via IFTTTfrom Facebook
via IFTTT

Links for 2016-04-06 [https://t.co/WkaffQeyal] https://t.co/mAOZ7Dinj2 http://ift.tt/1S2dYhS https://t.co/VkXCrKnTXT

Links for 2016-04-06 [https://t.co/WkaffQeyal] https://t.co/mAOZ7Dinj2 http://ift.tt/1S2dYhS https://t.co/VkXCrKnTXT
by Mohamed Iqbal Pallipurath

April 08, 2016 at 07:28AM
from Facebook
via IFTTTfrom Facebook
via IFTTT

Links for 2016-04-06 [https://t.co/WkaffQeyal] https://t.co/mAOZ7Dinj2 http://ift.tt/1OORdYH https://t.co/zjC3hpEiQB

Links for 2016-04-06 [https://t.co/WkaffQeyal] https://t.co/mAOZ7Dinj2 http://ift.tt/1OORdYH https://t.co/zjC3hpEiQB
by Mohamed Iqbal Pallipurath

April 08, 2016 at 06:35AM
from Facebook
via IFTTTfrom Facebook
via IFTTT

Links for 2016-04-01 [https://t.co/WkaffQeyal] https://t.co/3NKHgceXDX http://ift.tt/1STKArM https://t.co/m5VtgitMPL

Links for 2016-04-01 [https://t.co/WkaffQeyal] https://t.co/3NKHgceXDX http://ift.tt/1STKArM https://t.co/m5VtgitMPL
by Mohamed Iqbal Pallipurath

April 08, 2016 at 06:35AM
from Facebook
via IFTTTfrom Facebook
via IFTTT

Links for 2016-04-04 [https://t.co/WkaffQeyal] https://t.co/SQ7yFyZ9jR http://ift.tt/1MiHL4q https://t.co/CVlsEVQFmn

Links for 2016-04-04 [https://t.co/WkaffQeyal] https://t.co/SQ7yFyZ9jR http://ift.tt/1MiHL4q https://t.co/CVlsEVQFmn
by Mohamed Iqbal Pallipurath

April 08, 2016 at 06:35AM
from Facebook
via IFTTTfrom Facebook
via IFTTT

Links for 2016-04-04 [https://t.co/WkaffQeyal] https://t.co/SQ7yFyZ9jR http://ift.tt/1RHvuqy https://t.co/DVsbxvee1v

Links for 2016-04-04 [https://t.co/WkaffQeyal] https://t.co/SQ7yFyZ9jR http://ift.tt/1RHvuqy https://t.co/DVsbxvee1v
by Mohamed Iqbal Pallipurath

April 08, 2016 at 05:09AM
from Facebook
via IFTTTfrom Facebook
via IFTTT

Links for 2016-04-01 [https://t.co/WkaffQeyal] https://t.co/3NKHgceXDX http://ift.tt/20co54s https://t.co/eMyYvzaGrI

Links for 2016-04-01 [https://t.co/WkaffQeyal] https://t.co/3NKHgceXDX http://ift.tt/20co54s https://t.co/eMyYvzaGrI
by Mohamed Iqbal Pallipurath

April 08, 2016 at 05:09AM
from Facebook
via IFTTTfrom Facebook
via IFTTT

Links for 2016-04-06 [https://t.co/WkaffQeyal] https://t.co/mAOZ7Dinj2 http://ift.tt/1OOR6fK https://t.co/Cey8HjAaCq

Links for 2016-04-06 [https://t.co/WkaffQeyal] https://t.co/mAOZ7Dinj2 http://ift.tt/1OOR6fK https://t.co/Cey8HjAaCq
by Mohamed Iqbal Pallipurath

April 08, 2016 at 05:09AM
from Facebook
via IFTTTfrom Facebook
via IFTTT

Links for 2016-04-06 [https://t.co/WkaffQeyal] https://t.co/mAOZ7Dinj2 http://ift.tt/23kXvJp https://t.co/h5NKhzux5Q

Links for 2016-04-06 [https://t.co/WkaffQeyal] https://t.co/mAOZ7Dinj2 http://ift.tt/23kXvJp https://t.co/h5NKhzux5Q
by Mohamed Iqbal Pallipurath

April 07, 2016 at 08:36PM
from Facebook
via IFTTTfrom Facebook
via IFTTT

Links for 2016-04-01 [https://t.co/WkaffQeyal] https://t.co/3NKHgceXDX http://ift.tt/1RHqphO https://t.co/kbndGt3NTt

Links for 2016-04-01 [https://t.co/WkaffQeyal] https://t.co/3NKHgceXDX http://ift.tt/1RHqphO https://t.co/kbndGt3NTt
by Mohamed Iqbal Pallipurath

April 07, 2016 at 08:34PM
from Facebook
via IFTTTfrom Facebook
via IFTTT

Links for 2016-04-04 [https://t.co/WkaffQeyal] https://t.co/SQ7yFyZ9jR http://ift.tt/1STfdgZ https://t.co/4FEpWkIi67

Links for 2016-04-04 [https://t.co/WkaffQeyal] https://t.co/SQ7yFyZ9jR http://ift.tt/1STfdgZ https://t.co/4FEpWkIi67
by Mohamed Iqbal Pallipurath

April 07, 2016 at 08:33PM
from Facebook
via IFTTTfrom Facebook
via IFTTT

Thursday, April 07, 2016

Links for 2016-04-01 [https://t.co/WkaffQeyal] https://t.co/3NKHgceXDX http://ift.tt/1Vbu0Hg https://t.co/STwPJmLM8k

Links for 2016-04-01 [https://t.co/WkaffQeyal] https://t.co/3NKHgceXDX http://ift.tt/1Vbu0Hg https://t.co/STwPJmLM8k
by Mohamed Iqbal Pallipurath

April 07, 2016 at 07:25PM
from Facebook
via IFTTTfrom Facebook
via IFTTT

Links for 2016-04-06 [https://t.co/WkaffQeyal] https://t.co/mAOZ7Dinj2 http://ift.tt/1SEyYuV https://t.co/7qqncL1aVz

Links for 2016-04-06 [https://t.co/WkaffQeyal] https://t.co/mAOZ7Dinj2 http://ift.tt/1SEyYuV https://t.co/7qqncL1aVz
by Mohamed Iqbal Pallipurath

April 07, 2016 at 07:25PM
from Facebook
via IFTTTfrom Facebook
via IFTTT

Links for 2016-04-04 [https://t.co/WkaffQeyal] https://t.co/SQ7yFyZ9jR http://ift.tt/22ffqh2 https://t.co/5QLxOcbErP

Links for 2016-04-04 [https://t.co/WkaffQeyal] https://t.co/SQ7yFyZ9jR http://ift.tt/22ffqh2 https://t.co/5QLxOcbErP
by Mohamed Iqbal Pallipurath

April 07, 2016 at 07:25PM
from Facebook
via IFTTTfrom Facebook
via IFTTT

Links for 2016-04-06 [https://t.co/WkaffQeyal] https://t.co/PC0M18jpwd http://ift.tt/1SEyYuV https://t.co/AA12C7a7Vg

Links for 2016-04-06 [https://t.co/WkaffQeyal] https://t.co/PC0M18jpwd http://ift.tt/1SEyYuV https://t.co/AA12C7a7Vg
by Mohamed Iqbal Pallipurath

April 07, 2016 at 07:24PM
from Facebook
via IFTTTfrom Facebook
via IFTTT

Links for 2016-04-06 [https://t.co/WkaffQeyal] https://t.co/PC0M18jpwd http://ift.tt/1OOGVb5 https://t.co/hCy0wUVmwE

Links for 2016-04-06 [https://t.co/WkaffQeyal] https://t.co/PC0M18jpwd http://ift.tt/1OOGVb5 https://t.co/hCy0wUVmwE
by Mohamed Iqbal Pallipurath

April 07, 2016 at 06:11PM
from Facebook
via IFTTTfrom Facebook
via IFTTT

Links for 2016-04-01 [https://t.co/WkaffQeyal] https://t.co/3NKHgceXDX http://ift.tt/1VbnQa0 https://t.co/o0SlcWcCO0

Links for 2016-04-01 [https://t.co/WkaffQeyal] https://t.co/3NKHgceXDX http://ift.tt/1VbnQa0 https://t.co/o0SlcWcCO0
by Mohamed Iqbal Pallipurath

April 07, 2016 at 06:11PM
from Facebook
via IFTTTfrom Facebook
via IFTTT