Don't wanna be here? Send us removal request.
Text
(KORR-Bericht) Innehalten am Ausgangspunkt der Spur der Vernichtung durch Europa Von Ulrich Steinkohl, dpa (Foto - aktuell)
Etwa sechs Millionen Tote zählte allein Polen im Zweiten Weltkrieg. Hier nahm der Vernichtungsfeldzug Hitler-Deutschlands seinen Lauf. Und genau dorthin fährt der Bundespräsident 80 Jahre später. Er weiß, dass die seitdem erreichte Versöhnung ein hohes Gut ist.
Wielun (dpa) - Die losheulenden Alarmsirenen gehen durch Mark und Bein. Es ist 4.40 Uhr am Sonntagmorgen und noch nächtlich dunkel in Wielun. Eine Ehrengarde ist aufmarschiert und steht stramm. Hunderte Menschen haben sich trotz der frühen Stunde auf dem Marktplatz der polnischen Kleinstadt versammelt, manche mit Kerzen in der Hand.
Auch auf den Tag genau vor 80 Jahren um eben diese Stunde erfüllte ein Heulen die zwischen Lodz und Breslau (Wroclaw) gelegene Kleinstadt in Polen. Es war das Heulen deutscher Sturzkampfbomber. Sie jagten aus dem Himmel auf die Stadt hinunter und lösten ihre todbringende Bombenlast aus. Wielun und nicht - wie lange Zeit von deutscher wie polnischer Seite offiziell erklärt - die Danziger Westerplatte war das erste Ziel des deutschen Überfalls auf Polen und der Beginn des Zweiten Weltkriegs am 1. September 1939. Der Angriff auf die wehrlose Bevölkerung der militärisch nicht gesicherten Stadt war auch das erste schwere Kriegsverbrechen der Wehrmacht.
80 Jahre später wird das grausame Geschehen wieder lebendig. In einer Video-Animation auf einer Hauswand am Marktplatz fliegen nochmals die Sturzkampfbomber, fallen die Bomben, fliehen die Menschen. Bundespräsident Frank-Walter Steinmeier steht hier zusammen mit Polens Präsident Andrzej Duda. Hier, wo «die Spur der Gewalt und Vernichtung ihren Anfang nahm, die sich sechs Jahre lang durch Polen und ganz Europa ziehen sollte», wie Steinmeier dann sagt. Ihm sei bewusst, «dass es ganz und gar nicht selbstverständlich ist, dass ein deutscher Bundespräsident heute hier vor Ihnen stehen darf».
Doch Duda dankt Steinmeier ausdrücklich dafür, dass er gekommen ist, «dass Sie sich der Verantwortung stellen». Und: «Wenn ich mit Ihnen spreche, sehe ich einen Menschen, der mit geneigtem Haupte hier ist und mit Demut der Opfer gedenken will.»
Erst Italien, nun Polen: Es ist bereits der zweite Sonntag in Folge, an dem sich Steinmeier zu dem unermessliche Leid bekennt, das Deutsche über ihre europäischen Nachbarn gebracht haben.
Erst Fivizzano, nun Wielun: Beide Orte haben gemeinsam, dass die dort von deutschen Soldaten begangenen Verbrechen in Deutschland kaum bekannt sind. «Viel zu wenige Deutsche kennen heute diesen Ort. Viel zu wenige wissen um diese Taten», sagt Steinmeier. «Wielun muss in unseren Köpfen und in unseren Herzen sein.» Um eben das zu erreichen, besucht er bewusst diese «weiße Flecken des Gedenkens», von denen man im Präsidialamt spricht.
Und er kommt, um Überlebende und Nachfahren der Opfer um Verzeihung für etwas zu bitten, für das es nur schwer ein Verzeihen geben kann: etwa 1200 Tote in Wielun, an die 6 Millionen Tote insgesamt in Polen. «Ich verneige mich vor den Opfern des Überfalls auf Wielun. Ich verneige mich vor den polnischen Opfern der deutschen Gewaltherrschaft. Und ich bitte um Vergebung.» Diese zentralen Sätze seiner Rede spricht Steinmeier auch auf Polnisch. Und bekommt Beifall dafür. Dudas Antwort: «Dass Sie hier sind, ist eine Form der moralischen Wiedergutmachung.»
Steinmeier hatte sich mit Duda bei seinem Besuch im Juni vergangenen Jahres in Polen darauf verständigt, zum Jahrestag des Kriegsbeginns gemeinsam nach Wielun zu fahren. Erst später wurde bekannt, dass es direkt anschließend in Warschau noch eine viel größere Veranstaltung mit zahlreichen Staats- und Regierungschefs geben soll - inklusive US-Präsident Donald Trump, der auch reden wollte.
In Berlin kam die Befürchtung auf, dass dies das eigentliche Gedenken in den Hintergrund drängen könnte. Dass der US-Präsident wegen des Hurrikans «Dorian» kurzfristig absagte und seinen Vice Mike Pence nach Warschau schickte, kam daher nicht ungelegen.
Donald Trump, Mike Pence - in Wielun spielen sie keine Rolle. Wohl aber Zofia Burchacinska und Jozef Stepien. Die beiden Überlebenden des deutschen Terrorangriffs treffen Steinmeier im örtlichen Museum in der Ausstellung «Zeitzeugen sprechen... Wielun am 1. September 1939». Die Erinnerung an explodierende Bomben, zerfetzte Menschen, berstende Häuser hat sich für immer in ihr Gedächtnis gebrannt.
Sie wünsche sich eine Entschuldigung des Bundespräsidenten für die Zerstörung ihrer Heimatstadt, hatte Burchacinska vor dem Besuch erklärt. Nun, da sie seine Rede gehört hat, sagt sie: «Er hat um Vergebung gebeten und wir vergeben.»
# Notizblock
## Internet - [Website Polens Präsident Duda (englisch)](http://dpaq.de/jFRz8) - [Programm Polen-Reise Steinmeier](http://dpaq.de/TdcXL) - [Stadt Wielun zum Luftangriff](http://dpaq.de/0AOyo) - [Rede von Steinmeier in Wielun](http://dpaq.de/Izrkt)
## Orte - [Wielun](98-300 Wielun, Polen)
## Service - Ein Zeitzeugen-Video finden Sie auf http://www.dpa-news.de und im Videoportal der dpa-Gruppe (http://www.dpa-video.com). Fragen zum Inhalt oder zum Bezug unserer Videos beantworten Ihnen die Kollegen unter 030/2852-31351 bzw. -31357.
This article was from dpa Europadienst and was legally licensed through the NewsCred publisher network. Please direct all licensing questions to [email protected].
0 notes
Text
Snowden awarded by Germans for 'courage and conscience'
Edward Snowden speaks via video link at a news conference for the launch of a campaign calling for President Obama to pardon him on September 14, 2016 in New York City. (Photo by AFP)
The German city of Kassel has awarded American whistle-blower Edward Snowden for the "courage and conscience" that he showed in spilling US secrets.
Snowden "with courage, competence and reason has taken a conscience decision and put his past life and safety at stake for a bigger thing,” the organizers said, awarding him the Glass of Reason, worth 10,000 euros.
The former National Security Agency (NSA) contractor, wanted in the US for spilling state secrets, currently lives in Russia under asylum granted by President Vladimir Putin .
During his tenure at NSA, Snowden downloaded tens of thousands of classified top secret US documents and then published them. The documents exposed the huge extent of US spying across the world, on friends and foes alike.
The publication of the documents dealt a heavy blow to the US government, causing it an international scandal.
(L-R) FBI Director James Comey, CIA Director John Brennan, NSA Director Admiral Michael Rogers, and directors of US spying agencies speak at a panel at the 2016 Intelligence and National Security Summit in Washington, DC, September 8, 2016. (Photo by AFP)
Snowden is wanted by the US government for treason and faces up to 30 years in prison. Many people around the world, however, consider him a hero who did what was morally correct that benefited the public.
In 2013, Snowden fled to Russia and was granted temporary asylum there. "I'm comfortable with the decisions I made….I don’t want to live in a world where there’s no privacy,” he has said.
Copyright © 2016 Press TV. All rights reserved. Provided by SyndiGate Media Inc. (Syndigate.info).
This article was from Press TV and was legally licensed through the NewsCred publisher network.
0 notes
Text
BBC Teams Up With Viber, WhatsApp to Distribute Content
In an effort to reach a younger and more elusive audiences, the BBC has struck new agreements to distribute its content through the messaging apps Viber and WhatsApp.
The BBC will bring content from its "Our World" program to people over Viber, posting content about kidnapping in Mexico over the course of six days prior to the TV airing of "Our World: Kidnapped in Mexico."
And BBC Africa will be using WhatsApp to "tell the story of young people in the Democratic Republic of Congo (DRC) who are using new online ways to get their voices heard and bring change to their country," the BBC said in a statement.
Clips from its documentary "Young, Angry and Connected" will be posted over the course of five days.
There will be no ads around or during the content.
The BBC has already worked with messaging services including WeChat, Line, Snapchat and YikYak, according to the company.
BBC is taking to messaging apps in part because people in some developing countries are coming online for the first time through mobile. The projects "mark a significant step forward for the BBC's use of instant messaging platforms," the company said. "The broadcaster has been experimenting with chat apps in countries where mobile use outstrips desktop and to reach those people who would not necessarily access its journalism via traditional means."
BBC tested engagement on messaging apps during the 2014 Indian Elections and during the Ebola crisis, "which saw thousands of people across West Africa signed up to receive the latest news and lifesaving information." But, BBC said, "the use of the platforms to share documentaries breaks new ground, helping to extend the life and reach of TV content."
Messaging apps are expected to dramatically increase in use and relevance in the coming years, and though they have users in the U.S., they are far more popular overseas. For its part, Viber in November launched its first U.S. marketing campaign to draw in more users as popularity of messaging apps grows stateside.
Viber has said it has 600 million unique users, but it's not clear how many of those are active users, or in what regions they reside.
In the U.S., Facebook Messenger, which was broken out into its own app in 2014, ranks at the top, in terms of percent of U.S. smartphone owners who access an app at least once a month, according to Forrester. Google Hangouts ranks No. 2, Snapchat is No. 3 and WhatsApp, which was acquired by Facebook for $19 billion in 2014, ranks No. 4.
From AdAge.com, 03-02-2016, copyright Crain Communications Inc. 2013
This article was written by [email protected] (Maureen Morrison) from Ad Age and was legally licensed through the NewsCred publisher network.
0 notes
Photo
Patch Tuesday November 2015: Microsoft releases 12 fixes, 4 rated critical. http://bit.ly/1RN8d42
0 notes
Photo

Teens spend nearly nine hours every day consuming media. http://bit.ly/1P7749m
0 notes
Photo

Instagram debuts curated video feed in time for Halloween. http://bit.ly/1P75WCD
0 notes
Text
Attacking SCADA Systems of Critical Infrastructure
wide range of Supervisory Control and Data Acquisition (SCADA) systems are deployed to control critical infrastructure. Among these are electric power generation and distribution, oil and gas exploration and transporting along pipelines, water distribution, etc. In the past, these systems were designed primarily for high safety and reliability, and cyber security was not listed as a requirement. Security vulnerability is a weakness contributed by incorrect system architecture, poor policies and software bugs. It reduces the system’s resiliency and allows execution of cyber attacks.
Vulnerability management refers to identifying users, classifying, remediating and mitigating vulnerabilities in Information Technology (IT) networks. When a new vulnerability is announced, it is called “zero-day vulnerability”, as on that day there is no time to introduce a new defense and the related systems remain unprotected until a new antivirus version becomes available. Dealing with cyber security for SCADA systems is different from dealing with IT networks. Among the main differences are: Legacy equipment cannot be updated with new software, they operate 24/7/365, and the obvious concern is that every change of a code may result in safety or reliability risks.
Traditionally the cyber defense was achieved by segregating the SCADA system from the corporate IT network by physical disconnection (air-gap) or by placing a firewall between these networks. The security strength depends on the type and resiliency of the firewall or the dual-firewall based Demilitarized Zone (DMZ). Compromising the IT network is made possible, because internet communication utilizes routable protocols, which carry the payload from source IP address to destination IP address. Prior compromising the segregating device, the attacker must have knowledge of the network, or go through a lengthy learning.
If the control process allows, it is possibly deploying a Unidirectional Security gateway (Diode) which permits only one way data flow, usually outbound from the SCADA to the corporate network. It prevents attacking the SCADA through the corporate IT network.
Compromising a SCADA system
Figure 1 shows a hypothetical SCADA system. It is marked with 8 intrusion paths for cyber-attack on a SCADA system, all which start with injecting a malware. In some of these examples, the malware itself may perform the attack and the damage, while in others the malware may communicate with the attacker sitting outside the protected area and receive further “instructions” on new attack procedures based on the collected data.
Depending on the purpose of the attack, the malware is designed to proceed into the SCADA network. Some advanced malware codes are capable of changing their attack procedure and their behavior while the attack is progressing.
Access to the SCADA Computer: Entering a USB stick directly into the SCADA computer can be done by a disgruntled employee, by a maintenance person authorized to enter the site, by a curious employee who found the stick in the parking lot, or by an intruder who managed bypassing the physical security.
Initially the attacker may deploy a self-executable malware, which operates without instructions from the attacker. In the next phase the malware successfully compromises the firewall between the SCADA and the corporate IT networks, and then it may communicate with the attacker to receive new tasks for damaging the system.
The malware cannot communicate with the attacker if the SCADA network is disconnected by an air-gap. If the connection is via a unidirectional gateway (diode), then the malware may only send out information but will not receive fresh instructions.
From the SCADA computer the attack may proceed to field controllers like; Remote Terminal Unit (RTU) or Programmable Logic Controller (PLC) or an Intelligent Electronic Device (IED). If the attacker has details on the targeted controllers, and has a properly structured malware, that malware can instantly cause outage and damage. A smart attacker may structure a malware causing manipulated data sent to the control center, which indicates on normal operation while the attack already caused severe damage (Stuxnet 2010).
Access with laptop via “Wireless backdoor”: Maintenance people sometimes connect a wireless modem directly to SCADA network, in order allow “convenient” access through a cellular or a Wi-Fi network for resolving urgent problems. This type of “wireless backdoor” connection generates a high risk, as sophisticated attackers may take advantage of such an access point for starting their attack.
Furthermore, the remotely connecting laptop PC may be infected and pass the malware directly to the SCADA network.
Access to the test-lab computer: We often see SCADA systems connected to a lab-test computer for testing software patches and antivirus updates. It is connected via a switch or a basic firewall, as it must be fully coordinated with the SCADA system. After plugging an infected USB stick to this computer malware may easily proceed to the SCADA system.
MitM attack through unauthorized wireless access: Man in the Middle (MitM) attackers are constantly seeking for new intrusion paths to the victim’s network for purpose of stealing information, record commands which they can retransmit or if possible modify it prior transmitting it as valid data. A smart MitM attacker may initiate sending manipulated data to controllers and to the SCADA center, to indicate on normal operation while the attack already caused a damage.
Access to the Field controller: Directly attacking a controller with a USB stick is unusual as most legacy units do not have such port. Most of the modern RTUs / PLCs communicates over serial or Ethernet ports and/or Internet protocol (IP) based radios. Furthermore, these units may use a proprietary operating system, which may not communicate with an external program. On the other hand, these devices are often deployed in a less protected field sites, having weak or not existing physical security, and attacking these devices might lead to instant outage and damage.
Deployment of a segregating firewall between controllers or blocking unnecessary data traffic between them may minimize the effect of such attack. Use of Virtual private Network (VPN) communication combining data encryption may minimize the risk of receiving manipulated data or commands.
Access to the IT computer: Compromising the corporate network computer (IT) can be done by a USB stick loaded with an infected code. The goal of this attack is stealing business information from the corporate network, but once this network is compromised, the attacker may collect information also on the SCADA system (subject to availability in the corporate network) which is needed for compromising the SCADA network.
Access to the SCADA network from Vendor’s support center: Vendors of complex and expensive machinery, often require continuous 24/7/365 connection between the SCADA network and their Expert Center. Examples for such requirements can be seen from suppliers of gas turbines for power generation, nuclear plants, gas compressors and others. This type of connection through the corporate IT network is often called “cloud control” as the vendor’s Expert Center can be simultaneously connected to large number of SCADA systems worldwide.
One may expect that some of these sites are strongly secured, but in some countries they lack both physical and cyber security. Consequently, the computer network of the Expert Center may be infected with a malware, and it may infect many other sites worldwide.
Compromising the IT corporate network through internet access: The corporate IT network must be connected to the internet for linking to vendor’s Expert Center, obtaining email and for internet surfing. The MitM attacker may intrude to the corporate network through the internet and initiate a cyber-attack after compromising the firewall between the corporate IT network and the internet connection.
We are learning every day on new Advanced Persistence Threats (APT) and new variants of malware, which are capable bypassing traditional security defenses. According to published information, the number and severity of attacks are growing because today’s attackers are financed by hostile countries, crime organizations or commercial entities, which are interested stealing business information, causing outage and damage. Operators of critical infrastructure must be aware of that serious threat to their business, and they should act with greater determination and wisdom to be one step ahead of the attackers.
Daniel Ehrenreich, BSc., is a consultant, who had acquired over 25 years of experience related control systems for critical infrastructure.
© All rights reserved, content and design by Arrowmedia Israel Ltd. Provided by SyndiGate Media Inc. (Syndigate.info).
This article was written by Daniel Ehrenreich from IsraelDefense and was legally licensed through the NewsCred publisher network.
0 notes
Photo

From wearables to apparel, MasterCard wants to transform every consumer gadget into a payment device - Automaker General Motors, wearable technology innovator Nymi, smart jewelry company Ringly, and Bluetooth locator TrackR are among the prominent co. http://bit.ly/1Q55i80
0 notes
Photo

China tried to hack U.S. firms even after cyber pact: CrowdStrike. http://bit.ly/1GlvyZw
0 notes
Photo

Adobe teams with Dropbox as part of Document Cloud upgrades http://bit.ly/1LHhJRg
0 notes
Photo

Breaking into tech: How coding bootcamps lead to today’s most coveted jobs (webinar). http://bit.ly/1ZxB8yo
0 notes
Photo

Tesla's first SUV, the Model X, is finally hitting the road. http://bit.ly/1VqQKie
0 notes
Photo

Carly Fiorina Responds to Criticism of Hewlett-Packard Sales in Iran. http://bit.ly/1V5czUv
0 notes
Text
Damned Whores, 40 years on: women still stereotyped, says Penny Wong
Women have made big strides towards equality in the past 40 years, but they are still treated in a sexist way in Australian politics, says Labor frontbencher Senator Penny Wong.
Wong said at a conference to mark the 40th anniversary of the publication of the landmark feminist book, Damned Whores and God’s Police, that remarks about women in parliament were too often belittling and stereotyped.
“When we look at politics, sometimes I feel we haven’t come far at all,” she said. “Eric Abetz has gone and been replaced by George Brandis and that’s not much better.” In prime minister Malcolm Turnbull’s ministerial reshuffle this week, Brandis replaced Abetz as government leader in the Senate.
Related: Malcolm Turnbull names new ministry, promoting women and supporters
Attorney-General Brandis has described Wong as “shrill and hysterical. I’m well known for that,” she said. Former Greens’ leader Christine Milne has been berated for “throwing a tantrum”.
“They’re so blind to it, so accustomed to belittling women it’s just par for the course,” Wong said. “There’s a long way to go in terms of how people talk to each other.”
Turnbull has distinguished himself from the Abbott government by appointing five women to his cabinet – the same number as former prime minister Julia Gillard appointed. Abbott chose just one woman for his first cabinet, foreign minister Julie Bishop.
Wong said she was once dismissive of the importance of critical mass, but saw that it had made a difference in Gillard’s cabinet.
“It did change the dialogue, the dynamic, it changed how we interacted,” said Wong, who was finance minister under Gillard. “It meant it was easier to speak and that matters.”
The Sydney conference is discussing the impact and legacy of the book, written by prominent feminist Anne Summers.
Summers told the conference that Julie Bishop, who was Abbott’s deputy before shifting support to Turnbull last week, had been described as Lady Macbeth by some critics, the same insult hurled at Gillard when she toppled Kevin Rudd as prime minister.
“Malcolm Turnbull, no problem,” she said. “Women can’t wield a knife, but men can.”
Summers believed it was a “major thing” having women foreign and defence ministers in the new cabinet. “We have a prime minister finally who is at least modern, who understands that women are equal and are entitled to equality.”
In her keynote address, Summers told the audience that while much had changed for the better since she wrote the book in 1974, women remained constrained by their family-centred roles.
The book’s key argument is that two rigid stereotypes of women deny them their own identity and real choice. They are either bad girls – such as prostitutes and prisoners – or good girls, mothers assumed to be ethically and morally superior to men.
Today, women’s choices have expanded exponentially, but their role as mothers remained a fundamental question that needed confronting, Summers said.
“We have not said: women might be the ones who bear the children, but their entire lives should not be defined by that one capability. We’ve changed a lot but we haven’t changed this.
“Many, if not most, women still accept, deep down, that it is their role to be God’s police.
“We have not disavowed that motherhood is still the central, preferable and most admired option for women.”
• Damned Whores and God’s Police 40 years on. Its impact. Its legacy. Our Future. 21-23 September, University of Technology Sydney
This article originally appeared on guardian.co.uk
This article was written by Gay Alcorn from The Guardian and was legally licensed through the NewsCred publisher network.
0 notes
Photo

Google hires Truecar's Krafcik to head its driverless car unit
0 notes