Friday, July 06, 2012


Egypt's Committee for the Promotion of Virtue and the Prevention of Vice 

One day after Mohamed Morsi became Egypt's president, Egyptian Islamists stabbed a student to death for 'walking next to his fiancee'.

Egyptian women are now being harassed for not wearing the veil.

And, in Egypt, drivers of minibuses are now being told to segregate male and female passengers.

 And, in Egypt, women's hairdressing salons are now being told to get rid of male employees or close.

Egyptian women

"From Egypt to Tunisia, Yemen to Libya, shockingly high crime rates, economies in free-fall and decimated tourism industries are the terrifying new realities Arabs must now confront.

"And in each of those countries, radical Islamists have moved quickly to fill the social and political vacuum."

More brutally oppressive regimes, the Arab Spring has become a sick joke

'A lot of minibuses now play Quranic recitations on their radios instead of loud popular music as it is custom,' said Ali Higris, a student from Cairo.

The day after Morsi became president, two musicians were murdered as they were traveling home after performing at a wedding. Some Islamists consider music "haram" - prohibited.

"Some activists believe that the Brotherhood is at least quietly condoning nonviolent activity designed to bring the country more in alignment with Islam's teachings." - a founding goal of the 84-year-old fundamentalist movement.

‘They may not be involved but they are turning a blind eye to what their low and middle rank members do on the streets,’ said Nehad Abul-Omsan of the Egyptian Center for Women's Rights.


Noor al Haqiqa said...

A dear Muslim friend of mine who lives in Cairo tells me that the aim is to take Egypt to Saudi status in terms of religion and state.

Egyptian women are in for a tough time. "Talibanization" so to speak. This is NOT ISLAM, it is Wahabbism.

Remember that the brotherhood works hand in hand with the CIA and its allies (Mossad). (Look at their work in Syria) All the better for stoking the fires of "the clash between civilizations' between east and west.

P2P said...

Computer scientists call it it “Fog Computing” — a play on today’s cloud computing craze. And in a recent paper for Darpa, the Pentagon’s premiere research arm, researchers say they’ve built “a prototype for automatically generating and distributing believable misinformation … and then tracking access and attempted misuse of it. We call this ‘disinformation technology.’”

Anonymous said...

a friend of mine from cairo told of saudis being caught wearing fake beards, terrorizing the locals. shipments of fake beards have been caught.

Anonymous said...

I live in Egypt and although some of what you've mentioned is true, like the murder of the two musicians, that was perpetrated by Salafists, who oppose Morsi. Like the previous commenter said MB is a CIA asset. But I disagree that there's a 'Talibanization' occuring here. You make it sound ubiquitous. Mini-busses have ALWAYS played Qu'ran, especially during prayer times - it's nothing new here. I take mini-buses and generally women and men aren't segregated. Some people segregate themselves! Maybe it's just where I live. Egypt is a big country and it would be nice to know where all this segregation and forcing women to veil themselves is happening, because it's not happening in Ismailia where I live. Cairo is cosmopolitan, lots of foreigners, Christians and many muslims who don't wear hijab. You'll probably find this in Salafist dominated areas, in villages.

Anonymous said...

I just wanted to say that 'Egypt's Presidency for the Promotion of Virtue and the Prevention of Vice' has existed for a very long time. It's not something that's just been invented since Morsi took office.

What Egypt desperately needs is tourism and this kind of news is just the thing to scare the tourists away. Egypt is far safer than most countries I know.

Google Hypocrisy said...

Google alerts users to suspected state-sponsored attacks

Look at the comments:
Arron Ferguson said...

Google: "If you see this warning it does not necessarily mean that your account has been hijacked. It just means that we believe you may be a target, of phishing or malware for example, and that you should take immediate steps to secure your account."

I had this happen a few months ago. I got a rather worthless message after the fact (I did have a secondary email registered for such reasons) stating that my account had been compromised and I was alerted that there were current sessions open (in the Eastern block of Europe - I'm in Canada).

What boggles my mind is that Google's "crack security team" here had really nothing to offer other than "close the sessions" and change the password.

What Google and you are telling the entire world is that Google's security team is lazy; rather than just detect and log the incident, how about block/ignore/redirect brute force requests/logins?

Seriously, you guys want us to trust you with something like Google+ and this is what you have to offer for security? Fail!

eroei2012 said...

Since New York Times recently reported that Stuxnet is a US State Sponsored Cyber virus - which if you recall was accidentally released into the wild and affected and attacked innocent end-user machines as collateral damage, and with the ongoing US-Israeli state sponsored cyber warfare weapons of mass destruction (operation Olympic Games) including the more recent Duqu and Flame virus.... can Google clarify if through its detailed analysis as well as victim reports if Google will apply the same standards and warn end-users of these domestic state sponsored attacks as well? Or are exceptions of convenience made in these cases due to the close and special ties that Google has with the US intelligence agencies and the confirmed but secret and classified collaboration that the Google has with the CIA and NSA in regards to GMail and Google Accounts?

Unknown said...

Except when it comes to USGov intrusion, which is where Google makes half its money.

robinm said...

Surely this is state-sponsored propaganda?

ArthurX said...

I think it's good to warn users of suspicious activities, but my guess is that there also are activities like US surveillance that will not be announced, because of local court orders. Google is in no way independent.

makaseh said...

how about companies that intrude privacy, steal information from data stored and use it for profit.

AvelWorldCreator said...

Given that you provide a similar service for detecting improper email access, I'd be concerned. I've seen a quite definite fail of that service with my mother's GMail account. Apparently someone was remote accessing her account using an email program (not a browser) to comb her contacts and send spam. We are in the Central U.S.A. Her account IP log showed the two hits from someone in Mexico, yet the service did not detect, or flag, this irregular IP address.

Ellie K said...

Indeed, there was multiple access from 2 different IP's in Iran via IMAP or POP, and 3 from Arizona, via browser. All were within a 24-hour interval. I have never accessed Gmail from anywhere other than Arizona, so it was a good catch by Gmail.

I tracked the latter to Amazon dot com's legal department. I never found out why they (or someone using EC2 or AWS perhaps?) would be reading my email. Nor did Google flag this as unusual activity.

brian said...

ironic, that the western media attended the 'arab spring' rallies like a wedding, which has really turned into a medievel nightmare.

They have helped miwife what is the sort of islamism EU has been clamping down on in europe, where bands of koran wielding salafists rome, like the street gangs bludgening lovers in egypt

Anonymous said...

Hi P2P,

Thanks for the link on Fog Computing.

This sort of technology is in fact nothing new. Intelligence and surveillance agencies like MI6, GCHQ, DIA, NSA, etc have used simpler techniques to detect leaks.

For example, they will make a slightly different version of a document available to different people, thus enabling the source of the leak to be pinpointed. In the UK, it's called "Barium Meal", in the US it's called "Canary Trap". (They're slightly different however.)

Of course, you need to ensure the recipients of the documents a) aren't too bright, and b) don't share documents with each other, in which case they can simply compare them, or compare cryptographic signatures.

Intel agencies have all these wonderful techniques: Multilevel Security architectures, Role-Based Access Controls, cryptographic exchange protocols, and what have you.


These techniques are only as good as the honesty and competence of the people implementing and using them.

Fog Computing is just a joke. There's more than enough disinformation in the public domain to care about a bit extra created by some 9-to-5ers from a government agency using overpriced, barely-useful government contract software.

These techniques are always used against small fry. If you're Victor Rothschild or Kim Philby, you needn't worry too much.

Also in Information Security appearance is more important than substance.

People who really understand Information Security are few and far between. They tend to get sacked for doing their job well, for not sending enough lucrative contracts to commercial IT security vendors, and for not accepting their kickbacks.

"I'd like to introduce Mr Beeks of Lindhurst Security."

Site Meter