Discount Offers

Personal Self Defence Spray UK's No1 Spray Legal Pepper Spray Clone UK Sale Only

£22.99
End Date: Monday Dec-18-2017 9:46:38 GMT
Buy It Now for only: £22.99
Buy It Now | Add to watch list

SIA Licensed Security Tie Pin Badge K4S® Exclusive Design

£5.75
End Date: Wednesday Jan-10-2018 19:04:15 GMT
Buy It Now for only: £5.75
Buy It Now | Add to watch list

Security bouncer door supervisor bomber jacket coat Medium

£51.83
End Date: Wednesday Dec-20-2017 16:06:16 GMT
Buy It Now for only: £51.83
Buy It Now | Add to watch list

Combat Trousers Security Bouncer Police Security Door Supervisor

£19.19
End Date: Wednesday Dec-20-2017 16:47:09 GMT
Buy It Now for only: £19.19
Buy It Now | Add to watch list
0024437
Visit Today : 1
Visit Yesterday : 1
This Month : 14
This Year : 348
Total Visit : 24437
Hits Today : 3058
Total Hits : 3847501
Who's Online : 1

interior

Egypt announces reshuffle in top security ranks

CAIRO (Reuters) – Egyptian President Abdel Fattah al-Sisi appointed a new armed forces chief of staff on Saturday, and the interior ministry dismissed several high-ranking officials in an apparent reorganisation of the country s security command.

Egyptian President Abdel Fattah al-Sisi attends a news conference at the Elysee Palace in Paris, France, October 24, 2017 . REUTERS/Philippe Wojazer

No reason was given for the reshuffle, but the interior ministry decision came a week after a deadly attack on a police operation in a western desert area of Giza Province, in which the ministry said 16 police were killed after coming under heavy fire.

Egyptian forces have been fighting several armed Islamist groups, mostly in the northern part of the Sinai peninsula, since Sisi helped lead the military overthrow of President Mohamed Mursi of the Muslim Brotherhood in 2013.

Hundreds of members of the security forces have been killed in attacks by militants in recent years . A local Islamic State affiliate has been the main foe of the security forces in the north Sinai.

A statement from the presidency said Gen .

Mohamed Farid Hegazy would replace Gen . Mahmoud Hegazy, who has been made the president s adviser for strategic planning and crisis management.

In a separate statement, the interior ministry announced that it had replaced several high-ranking officials, including the head of homeland security, assistant to the minister for security in Giza province, the director of Giza s security and director of operations for central security.

It gave no further details on the shakeup . No militant group has yet claimed responsibility for last week s attack on the police in a remote desert area of Giza, about 130 km (80 miles) southwest of the capital Cairo.

Thirteen militants were killed in a raid on a farm hideout in the region on Friday . State news agency MENA quoted a security official as saying it was revenge for the blood of the men who were martyred last week in the oasis .

The vast western desert region has always been a security headache with arms flowing across the frontier with Libya, where militant groups have found shelter since the country fell into chaos after the 2011 end of Muammar Gaddafi s rule.

Sisi is a former military commander elected by a landslide in 2014 and presents himself as a bulwark against Islamist militancy . He is widely expected to run for re-election next year.

Reporting by Mostafa Hashem; Writing by Arwa Gaballa; Editing by Patrick Markey and Andrew Roche

Saudi security suspects give themselves up

DUBAI (Reuters) – Three Saudi men on a list of 23 people wanted by the authorities over security offences have turned themselves in, the interior ministry said on Monday.

The report, carried by state news agency SPA, came as Saudi security forces pushed ahead with an operation in the eastern part of the kingdom to try to flush out armed men, including those on the list announced in January 2012 . The area is home to many of the country’s minority Shi’ite Muslims.

The interior ministry identified the three as Mohammed Isa al-Lubbad, Ramzi Mohammed Jamal and Ali Hassan al-Zayed, and said their “initiative (to surrender voluntarily) will be taken into consideration”.

Many of those on the list have been either killed or captured in recent years . The Saudi Gazette newspaper said that only three of those on the original list remained at large, while eight have surrendered .

The rest were killed during clashes with the security forces, it said.

Saudi security forces have been trying for more than two months to defeat gunmen behind attacks on police in Awamiya, a Shi’ite town of around 30,000 in the eastern region that has been the centre of protests against the Sunni government.

Fighting has intensified over the past two weeks, when elite forces entered the town . In May the authorities began a campaign to tear down the old quarter to prevent gunmen using the narrow streets to evade capture.

Residents estimate that up to 20,000 people have fled to towns and villages nearby . Up to 12 people have been killed in the past week: three policemen and nine civilians, residents say.

The area, in oil-producing Qatif province, has seen unrest and occasional armed attacks on security forces since 2011 “Arab Spring”-style protests .

Residents complain of unfair treatment by the government, something Riyadh denies.

Reporting by Sami Aboudi; Editing by Andrew Bolton

Germany’s cyber security chief on hacking, Russia and problems hiring experts

German Government Commissioner for Information Technology Klaus Vitt | German Federal Ministry of the Interior

Klaus Vitt discusses his role protecting Germany from cyber attacks.

By 1

3/20/17, 7:54 PM CET

Updated 3/20/17, 8:10 PM CET

This article is also available in: German2

Read more: Hacked information bomb under Germany s election3

BERLIN Meet the man in charge of protecting Europe s largest country against the ever-changing threat of hacking: the German government s IT commissioner, Klaus Vitt. During an interview with POLITICO at the German Interior Ministry, Vitt described the country s current cyber threat level as increasingly critical, announced plans to cooperate with private companies and explained why his analysts believe most professional hacking attacks on Germany come from Russia or China.

In September, Germany elects a new parliament . Could the vote be manipulated by cyber attacks?

We have analyzed all processes during election day . Wherever we found weak spots, we have introduced measures and taken precautions. In Germany, there are no electronic voting machines or automation .

The vote, therefore, is not that big of a target . However, there s never a security of 100 percent.

You re talking about potential attacks on the IT network on election night . Another issue is cyber attacks that could happen in the run-up to the election . People are concerned that stolen material from hacks could be used to compromise candidates . Do they have a reason to be afraid?

The danger is real . This is why our Federal Office for Information Security (BSI) advises parliamentarians and their groups in the parliament how to protect themselves . It starts with using virus protection software on your private computer but certainly doesn t end there.

Have cyber attacks increased during the last couple of years?

Yes, the threat situation is becoming increasingly critical . We still observe many security breaches in software and hardware, as analyzed in the BSI s annual report on the state of IT security . This in itself is critical . At the same time, however, our society, economy and state are increasingly becoming more digitalized, which also makes them more vulnerable . On top of that, attackers are becoming more professional, and they are using more intelligent malware.

In 2015, a broad-scale cyber attack on the Bundestag, the lower house of the German parliament, made headlines . What consequences did the government draw from the incident?

The Bundestag is in charge of its own IT security . However, there have been numerous consultations on how the parliament should make its network more secure, and the government took part in them . These recommendations were put into action very consistently . The network and its security components were completely rebuilt from scratch.

Could foreign intelligence services be involved in attacks like the one in 2015?

We are dealing with very professional attackers, that s why only in rare cases can you identify them indisputably . We analyze serious attacks very thoroughly to find out from where they originate . In order to do that, we take patterns from comparable attacks in the past as a reference . Based on such analogies, one can say with a certain probability where those attacks originate from and those analogies suggest that a majority of attacks comes from Russia or China, at least geographically.

How can Germany protect itself?

Attackers want to produce the largest effect possible . That s why they target their attacks primarily against critical infrastructure.

With Germany s IT security law introduced in 2015, we have created legislation that focuses on such infrastructures . On the one hand, it introduces minimum standards for IT security: how operators need to protect themselves against cyber attacks . There are regular checks to make sure they still follow those standards . On the other hand, they are obliged to inform authorities about any critical IT security incidents . If operators are affected, they need to alert the BSI about it, which in turn can analyze it, assess the threat and inform other operators as fast as possible so that they can protect themselves in time. I would like to apply a similar model to other companies which are not operating critical infrastructure and the public administration.

In November 2016, Germany introduced a cyber security strategy: a plan for the country on how to protect itself and how to best react to cyber attacks. What about attacks that have already happened and data that may have been taken?

A cyber attack can have different goals . One aim can be to extract information . If you have no possibility to prevent this, you need to cut off access to the internet . This was one of the measures taken during the cyber attack on the Bundestag . From this moment on, no more information can be extracted. However, in the aftermath, it s difficult to detect where malware could possibly have had access to and which data has been extracted.

What measures are you taking?

To guarantee an appropriate IT security level, we will consolidate the data centers and the networks of the national government and its institutions. Today, we have around 1,000 rooms with servers: large ones, medium-sized ones, small ones . We will centralize them at three or four highly-protected, locations . The same thing will be done with the networks . This is how we will protect the administration with a high standard of IT security.

Another measure is expanding our Cyber Defense Center opened in 2011 . The goal is to always have a clear description of what s happening in cyber space . To do that, we will analyze and assess cyber incidents, with all national security agencies exchanging technical information about the incidents with each other . Needless to say, cyber space is not limited to just Germany. And there s another plan we are pursuing: In Germany, we have large international companies with their own cyber security units, who observe cyber attacks, similarly to what our Cyber Defense Center does .

Four DAX companies have joined forces in the so-called German Cybersecurity Organization (DCSO) cooperation . Our idea is to work with them through exchanging technical information . However, we need a contractual basis for that . This is about highly sensitive data.

When in 2015, a Bundestag subcommittee met to discuss the hacking attack, a BSI official told the MPs that only around 15 employees inside his office had the expertise to analyze and deal with such an attack . This doesn t sound like a lot of people?

The BSI is only one unit in our Cyber Defense Center . We have more experts in the Federal Criminal Police, in the Armed Forces, and in both our domestic and the foreign intelligence agencies.

Talking about personnel: Part of the cyber security strategy is hiring more cyber security experts . How easy or difficult is it to find candidates with the necessary expertise?

There is a great demand for IT security experts . The BSI has hired several people recently . It wasn t easy to fill those positions placing an ad in some newspaper wouldn t be enough .

All those positions could be filled; in the meantime, however, we have new open positions.

How attractive a job is, however, is not only defined by its salary but also by how exciting or dynamic its environment is and by its compatibility with having a family.

The interview has been edited and condensed for clarity.

Related stories on these topics:

References

  1. ^ (www.politico.eu)
  2. ^ German (www.politico.eu)
  3. ^ Hacked information bomb under Germany s election (www.politico.eu)