Opinion: Mao disappoints with grandeur…

DP Mao

Well, 20-17 just starts and with a bang, the former honourable Norbert Mao of the Democratic Party doesn’t care anymore about nepotism and autocratic regime, which if President Museveni gives away executive power to his wife Janet or Maj. Gen. Muhoozi that it doesn’t matter!

The Democratic Party President Norbert Mao says Ugandans are so desperate for change that they no longer care to whom President Museveni hands over power peacefully. According to Mr Mao, just like many Ugandans especially those born after Museveni captured power in 1986; he does not care whether the president hands over peacefully to his son Muhoozi Keinerugaba or wife Janet Kataha Museveni” (Daily Monitor, 2017).

Well, it is understatement that I am confused about the peaceful transition it seems to be only that the business stays in the family. If Mao thinks that the Mafia, the elitism and the gravy eating regime going to drastically change with the wife or son of Museveni, he is sadly wrong. That is by the mere fact of the history in other countries where family members take-over as in Equatorial Guinea, Cuba, Syria and North Korea isn’t actually splendid evidence of totalitarian regimes handing over or coup d’état from family members to become the Executives.

That Norbert Mao wants to give way for another unelected family member to the throne is a mere demonstration of the meagre effort of opposition to the Movement. That he accepts the draconian and all eating Museveni and let his family go forward before the Republic. It’s an insult to all Ugandans. That only the Clan of Museveni is fit to rule the Republic. There we’re a Republic before Museveni and be one after his time. Still, now it seems that Mao is so tired and has so little faith in the Ugandan people, that he gives way to the Museveni clan.

He should care as he should be voice for the ones really wanting change and a peaceful change from the government and regime that only cares about Museveni. So Mao shouldn’t lose faith. Mao should fight with fellow comrades and want a substantial change for the Republic, that doesn’t owe anything to the Museveni clan. Peace.

Reference:

Daily Monitor – ‘I don’t care whether Museveni hands over to son or wife – Mao’ (01.01.2017) link: http://www.monitor.co.ug/News/National/Museveni-hands-son-wife-Mao/688334-3503756-format-xhtml-13ewxl2/index.html

SPLM-IO: On the Allegations of detention of Tanzanian Citizen (02.01.2017)

splm-io-02-02-2017

SOS-Torture/Burundi: “Au moins 17 personnes ont été arrêtées au cours de la semaine dans différentes localités” (31.12.2016)

sos-burundi-pr-2016-p10sos-burundi-pr-2016-p11sos-burundi-pr-2016-p12sos-burundi-pr-2016-p13sos-burundi-pr-2016-p1sos-burundi-pr-2016-p2sos-burundi-pr-2016-p3sos-burundi-pr-2016-p4sos-burundi-pr-2016-p5sos-burundi-pr-2016-p6sos-burundi-pr-2016-p7

Monusco: “Le Representant special du Secretaire General des Nation Unies en RDC se felicite de l’accord politique signe entre les acteures politiques en RDC” (01.01.2017)

monusco-01-01-2017

The Joint Security Report shows how the hacking of Clinton campaign and Democratic Party happen, as the leaks hurts her campaign and interfered with US Presidential Election of 2016!

wikileaks-assange-promises-leaks-on-us-election-google

We all knew that the Democratic Party where under siege during the Election 2016. That can be known by the DC Leaks, WikiLeaks and Guccifer2.0. Then you have FancyBears who dropped knowledge on athletes who we’re allowed to use questionable substances while still being allowed to be competing in world cups and at the Olympics.

President Obama Executive Order of 29.12.2016:

“Section 1. (a) All property and interests in property that are in the United States, that hereafter come within the United States, or that are or hereafter come within the possession or control of any United States person of the following persons are blocked and may not be transferred, paid, exported, withdrawn, or otherwise dealt in: (i) the persons listed in the Annex to this order; (ii) any person determined by the Secretary of the Treasury, in consultation with the Attorney General and the Secretary of State, to be responsible for or complicit in, or to have engaged in, directly or indirectly, cyber-enabled activities originating from, or directed by persons located, in whole or in substantial part, outside the United States that are reasonably likely to result in, or have materially contributed to, a significant threat to the national security, foreign policy, or economic health or financial stability of the United States and that have the purpose or effect of: (A) harming, or otherwise significantly compromising the provision of services by, a computer or network of computers that support one or more entities in a critical infrastructure sector” (Obama, 2016).

We couldn’t know who all dropped knowledge and documents about Hillary Clinton and the Democratic National Party. Even if there we’re indications we couldn’t’ directly know who was behind the documents. That were on the pages that I have mentioned. Me myself has downloaded the hacked document and read through a bunch of e-mails released on WikiLeaks. It had to come from somewhere and somebody else had to hack or to do some whistleblowing this information. So that the public and me could collect and analyse the intelligence that the DNC themselves wanted to keep inside their own chambers.

We could now see how a major American party did their practices of fundraising and party works in general towards an election. Like we have never seen how a campaign manager has worked and travelled, how they have gotten fundraising for a bigger political foundation as the Clinton Foundation as now. That is because of the release of e-mails and documents on a scale we haven’t seen. Before those documents has landed in one pile at one journalist or one paper and they have released piece by piece or a cover story. The WikiLeaks drop of the DNC E-Mails of Podesta was not only interesting, but revealing how the internal works of the Democratic Party works.

Therefore the release of FBI, NCCIC and Department of Homeland Security documents shows how they did this and what technic they used to get into the DNC party or WADA to take out the documents that we’re released during the 2016. This shows the power in going into other people’s and organizations computers and computer systems to gain intelligence… That cannot be spared in the conversation as the knowledge of the DNC and other organization that has intelligence that the public could have interest of knowing.

Clinton Campaign TV

Let’s take a brief look at what the State Security Organizations said now in December and before that in October on the matter!

State Actors:

Most capable, active, and dangerous cyber adversaries

Advanced tradecraft and technical expertise

Indigenously developed exploitation tools

Well resourced

Social engineering (spear phishing), extensive research and target profiling, DDoSattacks” (U.S. Department of Homeland Security, P: 3, 2016).

“This document provides technical details regarding the tools and infrastructure used by the Russian civilian and military intelligence Services (RIS) to compromise and exploit networks and endpoints associated with the U.S. election, as well as a range of U.S. Government, political, and private sector entities. The U.S. Government is referring to this malicious cyber activity by RIS as GRIZZLY STEPPE” (…) “This activity by RIS is part of an ongoing campaign of cyber-enabled operations directed at the U.S. government and its citizens. These cyber operations have included spearphishing campaigns targeting government organizations, critical infrastructure entities, think tanks, universities, political organizations, and corporations leading to the theft of information. In foreign countries, RIS actors conducted damaging and/or disruptive cyber-attacks, including attacks on critical infrastructure networks. In some cases, RIS actors masqueraded as third parties, hiding behind false online personas designed to cause the victim to misattribute the source of the attack. This JAR provides technical indicators related to many of these operations, recommended mitigations, suggested actions to take in response to the indicators provided, and information on how to report such incidents to the U.S. Government” (TLP White, P: 1, 2016).

Spearfishing a Political Party:

“Once APT28 and APT29 have access to victims, both groups exfiltrate and analyze information to gain intelligence value. These groups use this information to craft highly targeted spearphishing campaigns. These actors set up operational infrastructure to obfuscate their source infrastructure, host domains and malware for targeting organizations, establish command and control nodes, and harvest credentials and other valuable information from their targets. In summer 2015, an APT29 spearphishing campaign directed emails containing a malicious link to over 1,000 recipients, including multiple U.S. Government victims. APT29 used legitimate domains, to include domains associated with U.S. organizations and educational institutions, to host malware and send spearphishing emails. In the course of that campaign, APT29 successfully compromised a U.S. political party. At least one targeted individual activated links to malware hosted on operational infrastructure of opened attachments containing malware. APT29 delivered malware to the political party’s systems, established persistence, escalated privileges, enumerated active directory accounts, and exfiltrated email from several accounts through encrypted connections back through operational infrastructure” (TLP White, P: 2-3, 2016).

“Phishing and Spearphishing

  • Implement a Sender Policy Framework (SPF) record for your organization’s Domain Name System (DNS) zone file to minimize risks relating to the receipt of spoofed messages.
  • Educate users to be suspicious of unsolicited phone calls, social media interactions, or email messages from individuals asking about employees or other internal information. If an unknown individual claims to be from a legitimate organization, try to verify his or her identity directly with the company.
  • Do not provide personal information or information about your organization, including its structure or networks, unless you are certain of a person’s authority to have the information.
  • Do not reveal personal or financial information in social media or email, and do not respond to solicitations for this information. This includes following links sent in email.
  • Pay attention to the URL of a website. Malicious websites may look identical to a legitimate site, but the URL often includes a variation in spelling or a different domain than the valid website (e.g., .com vs. .net).
  • If you are unsure whether an email request is legitimate, try to verify it by contacting the company directly. Do not use contact information provided on a website connected to the request; instead, check previous statements for contact information. Information about known phishing attacks is also available online from groups such as the Anti-Phishing Working Group (http://www.antiphishing.org).
  • Take advantage of anti-phishing features offered by your email client and web browser.
  • Patch all systems for critical vulnerabilities, prioritizing timely patching of software that processes Internet data, such as web browsers, browser plugins, and document readers” (TLP White, P: 13, 2016).

cnn-election-hack

With this all in mind, we can see that the Russians allegedly interfered with one specific technic to gain intelligence from their American counterparts in this perspective the U.S. Democratic National Party. The DNC and their Presidential Candidate Hillary Clinton; so their effort to install and get a more Russian friendly candidate could be effective with release of certain details of her conducts and her history… that no other candidate has ever gotten more scrutiny as Clinton ever done.

We can surely remember the massive overload of e-mails, documents and also internal memo’s that could boggle political interested minds while Trump where harsh critic and also a right-wing migration biased uprising who couldn’t care less about his own moral defects, while addressing Clinton like the worst politician ever. That can be shown in history. These hacks and release of documents we’re surely important when considering how voters could be swayed away from voting the Democratic Party and their Candidate.

They did in the report site very many different hackers who even I know them and know about their works, without knowing their sources or methods of work. I only know of their pages where they drop the documentation and E-Mails, which showed internal facts I could only wish to see in the past. That I couldn’t have made articles and quick-journalism like pieces without! These hackers and these drops of intelligence we’re vital for me to know more about the DNC and Hillary Clinton. Trump told all his lies and deception in public. Clinton kept it cool, while the droppings of documents, memos and e-mails put it all online. She couldn’t hide the facts or the ways of her party since it was all out there!

I have never seen something similar and if it was done by the method told in the report, than the men or woman behind the hack is sophisticated and also smart. They knew how to get the users to lure their Intel and get it into their own servers. This by any means is a quick theft of sensitive information, which weakens the DNC and Clinton in the public eye. The Public Eye and public perception is vital to ever win an election. Peace.

Reference:

U.S. Department of Homeland Security – ‘Cyber Threats to the Homeland’ (October 2016)

NCCIC & FBI ‘TLP White’ – ‘GRIZZLY STEPPE – Russian Malicious Cyber Activity’ (29.12.2016)

Obama, Barrack – Executive Order – ‘TAKING ADDITIONAL STEPS TO ADDRESS THE NATIONAL EMERGENCY WITH RESPECT TO SIGNIFICANT MALICIOUS CYBER-ENABLED ACTIVITIES’ (29.12.2016)

Opinion: The next steps for Besigye and continued defiance against the Movement!

OPM Press Release 05052016

It’s not easy to give words of advice to the men and woman who are in the line of fire. But we cannot let the Movement and their spin-control run the mill. They are stealing and thieving with massive speed and impunity. They are trying to avoid the weakness of the economy, trying to find new ways of revamping the economy without too much state debt and without loving donor direct aid. They still have the military and equipment served from loyal allies in the United States, if that will happen under Trump and it has happen under Bush/Obama is not easy to know; certainly U.S. will still let other brigades do the dirt they don’t want to do themselves.

The ones who toll with the problems are Dr. Kizza Besigye and his Forum for Democratic Change (FDC), they work for a peaceful transition in Uganda from the militarized politics of the President Museveni’s Movement. So with this in mind, after a year of issues, a year of tribulations, arrests, detained and charges of treason against the government; the political change is still in the wind. Besigye had deserved a better start and a fresher place as he is still monitored and still has Police following all movement done by the man. The same with his party who cannot hold meetings and public consultations without police taking stereo equipment, arrests or intimidation of citizens who shows up or just happen to be around.

Besigye had started the Campaign of Defiance under the Election Road Map for the General Election of 2016. So in 2015 it was started and has been put under fire from the Resistance Movement, an ironic problem for a draconian and tyrant regime who cannot really be democratic as they tries to silence or get rid of the worst opponents. Besigye is only kept because of known place and international scrutiny of they try to attack him too much.

FDC Besigye 05.04.2016

First Step – Defy with actions:

Besigye should continue and with more force, use more than just words and get the FDC to actually take a stronger stand against the ones that supports the regime. The Mafia regime or junta government, which he has described the Movement so many times. If FDC wants to be fair and wants to defy the Movement, they should suspend themselves first from Parliament. It is risky, but would be a grandeur position to take away the Shadow Government and the legitimacy of the current government.

TDA Kizza Besigye 261015

Second Step – Defy with dialogue with other opposition:

Secondly the FDC should be in talks with Democratic Party and other smaller parties that are not involved directly in the Movement regime, as they can try to weaken and strengthen the other voices. As Besigye have already done with his friendship with Lord Mayor Erias Lukwago and Gen. David Sejusa. FDC needs to be connected with people of stature like Norbert Mao and others, who are real opposition to Museveni. Not talk to Jimmy Akena or others who just uses their parties as fronts of beacon of democracy, instead of actually challenging the Movement.

Kale Kayihura Choose Peace

Third Step – Defy the Courts like IGP Kayihura:

Just as IGP Kale Kayihura defied his own court-orders, the same should Besigye himself start to do in 2017, to show that he doesn’t respect the unlawful character of the regime; as the peaceful acts of showing up for treason charge that continue running into oblivion. Time to just say it is a kangaroo court and is only doing it to silence his voice. Therefore not showing up and instead continue to travel around the country to meet and greet party officials and locals to prove the value of building institution over being a sole candidate in Museveni and the NRM.

Times is a wasting, it’s hard to do stuff when you’re behind bars or at court, it’s hard to always move when the Police Force and other Security Organizations follow your every step.

NRM to Daily Monitor 09.02.2016

Fourth Step – Hurt the pocket of the Government:

Certainly the Defiance needs to be hurting the regime. Try to stop the foreign exchange rates, the taxation and the revenue of the Uganda Revenue Authority (URA), even the business that is inter-connected with the Movement. As much as it should stop the state owned businesses that is being used by the Movement. Museveni would hate that he couldn’t misuse the profits of needed businesses, the ones that are owned by investors who are supplying him funds to pay Special Force Command and other militarized outfits that keeps him as the Executive.

If the Besigye and his folks stood behind and hurt the pocket and legitimacy, not in words only, but also actions that could move the regime and also create a vacuum that Museveni and his movement couldn’t control. The ripple effect and the true hurt would be shown. Especially with the knowledge, that the Election already hurt the economy with massive effect. So if they continue pounding on it took out the cash out of the Museveni owned banks and stopped profits to companies that the Museveni clan partly own. Than the Movement and family would feel the pinch.

Defying the state institutions and the government procedures, stop respecting the Police and Courts, stop listening to the draconian laws and also stop the funding of taxes and funds to directly keep the Movement alive. Something that would really hurt Museveni and his elite; this would really make it hard for the Movement to continue to use Police Force and use the state to gain wealth.

Besigye can continue to talk peaceful transition and I respect that. This sort of acts is not easy. They are hard and costly. Many will be arrested, many more detained, more torture and more innocent dying, but there been so much over 30 years that the defiance campaign has to take it to the next level. Show disrespect, let the government lose its value and show the world that the ones behind Besigye don’t see Museveni as their President. Museveni is just a citizen, not an Executive, as he wasn’t really elected to be so; he coup d’état again when he got sworn-in on the 12th May of 2016.

Time for acts, not talk, time for really defying the government and use the power of the people. Time to use the popularity and risk being harassed, as if you don’t than the Police will continue as they do; business as usual and also target the FDC as much as possible without it costing much for the illegitimate government it is. The illegal detained and the illegal arrests cannot be sustained, as much as the house arrests and unlawful behaviour of the Police towards the FDC is unbearable. This is not militant; it is fighting for a just cause. The real freedom and liberty, not to talk about a real legitimate government who represent the citizens of Uganda! Not a government representing Museveni and only his vision. Peace.

CNDD-FDD: “Quelle Coincidence! 228 policiers onusiens contre le Burundi alors que Romeo Dallaire ainsi que Louise Arbour rodent dans les parages” (16.08.2016)

cndd-fdd-fdp-2016cndd-fdd-fdp-2016-p2cndd-fdd-fdp-2016-p3cndd-fdd-fdp-2016-p4

Letter: “Re: Tresspass on Golf Course land in Masaka Muncipality” (28.12.2016)

golf-masaka-28-12-2016-p1golf-masaka-28-12-2016-p2

RDC: UNAFEC Lubumbashi invite la population à la resistance active après levée parlementaire de Kyungu wa kumwanza (28.12.2016)

rdc-katanga-28-12-2016p1rdc-katanga-28-12-2016p2

RDC: Lettre ouverte aux députés provinciaux du Haut Katanga à propos levée Immunités parlementaires de Kyungu wa Kumwanza (28.12.2016)

rdc-katanga-28-12-2016-p1rdc-katanga-28-12-2016-p2