Page 1


Mai Mai Halal Rice for Sale for only P850 (Wholesale) per 25 kilo bag



CALL 0995-5202358

CALL 0995-5202358 0995-5202358

Call broker: 0995-5202358 Zamboanga City

Zamboanga City

Founded 2006


CALL 0995-5202358


CALL 0995-5202358

FOR ADVERTISEMENTS, PLEASE CALL (062) 9925480 or (082) 2960658

Eastern Mindanao

Western Mindanao



Mar. 13-19, 2017



The Mindanao Examiner

Mar. 13-19, 2017

CIA Hacking Tools Revealed

WIKILEAKS begins its new ser ies of leaks on the U.S. C enseries Centr al IIntelligence ntelligence Agency ode-named "V ault 7" b y tral Agency.. C Code-named "Vault by WikiLeaks gest ev er publication of confidenikiLeaks,, it is the lar largest ever tial documents on the agency agency.. The first full part of the dated powers and the probseries, "Year Zero", com- lem of public oversight of the prises 8,761 documents and agency. The source wishes to files from an isolated, high- initiate a public debate about security network situated the security, creation, use, inside the CIA's Center for proliferation and democratic Cyber Intelligence in Lan- control of cyberweapons. gley, Virgina. It follows an Once a single cyber introductory disclosure last 'weapon' is 'loose' it can month of CIA targeting spread around the world in French political parties and seconds, to be used by rival candidates in the lead up to states, cyber mafia and teenthe 2012 presidential elec- age hackers alike. tion. Julian Assange, Recently, the CIA lost WikiLeaks editor said: control of the majority of its "There is an extreme prolifhacking arsenal including eration risk in the malware, viruses, trojans, development of cyber weaponized "zero day" ex- 'weapons'. Comparisons ploits, malware remote can be drawn between the control systems and associ- uncontrolled proliferation ated documentation. This of such 'weapons', which reextraordinary collection, sults from the inability to which amounts to more than contain them combined several hundred million lines with their high market value, of code, gives its possessor and the global arms trade. the entire hacking capacity But the significance of "Year of the CIA. The archive ap- Zero" goes well beyond the pears to have been circulated choice between cyberwar among former U.S. govern- and cyberpeace. The discloment hackers and sure is also exceptional from contractors in an unautho- a political, legal and forenrized manner, one of whom sic perspective." has provided WikiLeaks with Wikileaks has carefully portions of the archive. reviewed the "Year Zero" "Year Zero" introduces disclosure and published the scope and direction of substantive CIA documenthe CIA's global covert hack- tation while avoiding the ing program, its malware distribution of 'armed' arsenal and dozens of "zero cyberweapons until a conday" weaponized exploits sensus emerges on the against a wide range of U.S. technical and political naand European company ture of the CIA's program products, include Apple's and how such 'weapons' iPhone, Google's Android should analyzed, disarmed and Microsoft's Windows and published. and even Samsung TVs, Wikileaks has also dewhich are turned into covert cided to redact and microphones. anonymise some identifyContinue on page 2 ing information in "Year Continued fr om page 1 from Zero" for in depth analysis. Since 2001 the CIA has These redactions include gained political and budget- tens of thousands of CIA tarary preeminence over the gets and attack machines U.S. National Security throughout Latin America, Agency (NSA). The CIA Europe and the United found itself building not just States. While we are aware of its now infamous drone fleet, the imperfect results of any but a very different type of approach chosen, we recovert, globe-spanning force main committed to our — its own substantial fleet of publishing model and note hackers. The agency's hack- that the quantity of pubing division freed it from lished pages in "Vault 7" part having to disclose its often one (“Year Zero”) already controversial operations to eclipses the total number of the NSA (its primary bureau- pages published over the cratic rival) in order to draw first three years of the Edon the NSA's hacking capaci- ward Snowden NSA leaks. Analysis ties. CIA malwar e tar gets By the end of 2016, the malware targets hone oid, smar CIA's hacking division, iP iPhone hone,, Andr Android, smartt which formally falls under TVs: CIA malware and hackthe agency's Center for Cyber ing tools are built by EDG Intelligence (CCI), had over (Engineering Development 5000 registered users and Group), a software develophad produced more than a ment group within CCI thousand hacking systems, (Center for Cyber Intellitrojans, viruses, and other gence), a department "weaponized" malware. belonging to the CIA's DDI Such is the scale of the CIA's (Directorate for Digital Inundertaking that by 2016, its novation). The DDI is one of hackers had utilized more the five major directorates of code than that used to run the CIA. Facebook. The CIA had creThe EDG is responsible ated, in effect, its "own NSA" for the development, testing with even less accountability and operational support of and without publicly an- all backdoors, exploits, maswering the question as to licious payloads, trojans, whether such a massive bud- viruses and any other kind getary spend on duplicating of malware used by the CIA the capacities of a rival in its covert operations agency could be justified. world-wide. The increasing In a statement to sophistication of surveilWikiLeaks, the source details lance techniques has drawn policy questions that they comparisons with George say urgently need to be de- Orwell's 1984, but "Weeping bated in public, including Angel", developed by the whether the CIA's hacking CIA's Embedded Devices capabilities exceed its man- Branch (EDB), which infests

smart TVs, transforming them into covert microphones, is surely its most emblematic realization. The attack against Samsung smart TVs was developed in cooperation with the United Kingdom's MI5/ BTSS. After infestation, Weeping Angel places the target TV in a 'Fake-Off' mode, so that the owner falsely believes the TV is off when it is on. In 'Fake-Off' mode the TV operates as a bug, recording conversations in the room and sending them over the Internet to a covert CIA server. As of October 2014, the CIA was also looking at infecting the vehicle control systems used by modern cars and trucks. The purpose of such control is not specified, but it would permit the CIA to engage in nearly undetectable assassinations. The CIA's Mobile Devices Branch (MDB) developed numerous attacks to remotely hack and control popular smart phones. Infected phones can be instructed to send the CIA the user's geolocation, audio and text communications as well as covertly activate the phone's camera and microphone. Despite iPhone's minority share (14.5%) of the global smart phone market in 2016, a specialized unit in the CIA's Mobile Development Branch produces malware to infest, control and exfiltrate data from iPhones and other Apple products running iOS, such as iPads. CIA's arsenal includes numerous local and remote "zero days" developed by CIA or obtained from GCHQ, NSA, FBI or purchased from cyber arms contractors such as Baitshop. The disproportionate focus on iOS may be explained by the popularity of the iPhone among social, political, diplomatic and business elites. A similar unit targets Google's Android which is used to run the majority of the world's smart phones (~85%) including Samsung, HTC and Sony. Some 1.15 billion Android powered phones were sold last year. "Year Zero" shows that as of 2016 the CIA had 24 "weaponized" Android "zero days" which it has developed itself and obtained from GCHQ, NSA and cyber arms contractors. These techniques permit the CIA to bypass the encryption of WhatsApp, Signal, Telegram, Wiebo, Confide and Cloackman by hacking the "smart" phones that they run on and collecting audio and message traffic before encryption is applied. CIA malwar e tar gets malware targets W indo ws indows ws,, OSx, Linux, routers: The CIA also runs a very substantial effort to infect and control Microsoft Windows users with its malware. This includes multiple local and remote weaponized "zero days", air gap jumping viruses such as "Hammer Drill" which infects software distributed on CD/DVDs, infectors for re-

movable media such as USBs, systems to hide data in images or in covert disk areas ("Brutal Kangaroo") and to keep its malware infestations going. Many of these infection efforts are pulled together by the CIA's Automated Implant Branch (AIB), which has developed several attack systems for automated infestation and control of CIA malware, such as "Assassin" and "Medusa". Attacks against Internet infrastructure and webservers are developed by the CIA's Network Devices Branch (NDB). The CIA has developed automated multi-platform malware attack and control systems covering Windows, Mac OS X, Solaris, Linux and more, such as EDB's "HIVE" and the related "Cutthroat" and "Swindle" tools, which are described in the examples section below. CIA 'hoar ded' vulner 'hoarded' vulner-abilities ("z er o days"): In ("zer ero the wake of Edward Snowden's leaks about the NSA, the U.S. technology industry secured a commitment from the Obama administration that the Executive would disclose on an ongoing basis — rather than hoard — serious vulnerabilities, exploits, bugs or "zero days" to Apple, Google, Microsoft, and other US-based manufacturers. Serious vulnerabilities not disclosed to the manufacturers places huge swathes of the population and critical infrastructure at risk to foreign intelligence or cyber criminals who independently discover or hear rumors of the vulnerability. If the CIA can discover such vulnerabilities so can others. The U.S. government's commitment to the Vulnerabilities Equities Process came after significant lobbying by U.S. technology companies, who risk losing their share of the global market over real and perceived hidden vulnerabilities. The government stated that it would disclose all pervasive vulnerabilities discovered after 2010 on an ongoing basis. "Year Zero" documents show that the CIA breached the Obama administration's commitments. Many of the vulnerabilities used in the CIA's cyber arsenal are pervasive and some may already have been found by rival intelligence agencies or cyber criminals. As an example, specific CIA malware revealed in "Year Zero" is able to penetrate, infest and control both the Android phone and iPhone software that runs or has run presidential Twitter accounts. The CIA attacks this software by using undisclosed security vulnerabilities ("zero days") possessed by the CIA but if the CIA can hack these phones then so can everyone else who has obtained or discovered the vulnerability. As long as the CIA keeps these vulnerabilities concealed from Apple and Google (who make the phones) they will not be fixed, and the phones will

remain hackable. The same vulnerabilities exist for the population at large, including the U.S. Cabinet, Congress, top CEOs, system administrators, security officers and engineers. By hiding these security flaws from manufacturers like Apple and Google the CIA ensures that it can hack everyone &mdsh; at the expense of leaving everyone hackable. 'C yber war' pr ogr ams 'Cyber yberwar' progr ograms ar e a ser ious pr olifer ation are serious prolifer oliferation risk: Cyber 'weapons' are not possible to keep under effective control. While nuclear proliferation has been restrained by the enormous costs and visible infrastructure involved in assembling enough fissile material to produce a critical nuclear mass, cyber 'weapons', once developed, are very hard to retain. Cyber 'weapons' are in fact just computer programs which can be pirated like any other. Since they are entirely comprised of information they can be copied quickly with no marginal cost. Securing such 'weapons' is particularly difficult since the same people who develop and use them have the skills to exfiltrate copies without leaving traces — sometimes by using the very same 'weapons' against the organizations that contain them. There are substantial price incentives for government hackers and consultants to obtain copies since there is a global "vulnerability market" that will pay hundreds of thousands to millions of dollars for copies of such 'weapons'. Similarly, contractors and companies who obtain such 'weapons' sometimes use them for their own purposes, obtaining advantage over their competitors in selling 'hacking' services. Over the last three years, the United States intelligence sector, which consists of government agencies such as the CIA and NSA and their contractors, such as Booz Allan Hamilton, has been subject to unprecedented series of data exfiltrations by its own workers. A number of intelligence community members not yet publicly named have been arrested or subject to federal criminal investigations in separate incidents. Most visibly, on February 8, 2017, a U.S. federal grand jury indicted Harold T. Martin III with 20 counts of mishandling classified information. The Department of Justice alleged that it seized some 50,000 gigabytes of information from Harold T. Martin III that he had obtained from classified programs at NSA and CIA, including the source code for numerous hacking tools. Once a single cyber 'weapon' is 'loose' it can spread around the world in seconds, to be used by peer states, cyber mafia and teenage hackers alike. U.S. C onsulate in Consulate Frankfur ver ankfurtt is a co cov ertt CIA hacker base: In addition to its operations in Langley, Virginia the CIA also uses the U.S. consulate in Frankfurt

as a covert base for its hackers covering Europe, the Middle East and Africa. CIA hackers operating out of the Frankfurt consulate ("Center for Cyber Intelligence Europe" or CCIE) are given diplomatic ("black") passports and State Department cover. The instructions for incoming CIA hackers make Germany's counter-intelligence efforts appear inconsequential: "Breeze through German Customs because you have your cover-for-action story down pat, and all they did was stamp your passport" Your Cover Story (for this trip) Q: Why are you here? A: Supporting technical consultations at the Consulate. Two earlier WikiLeaks publications give further detail on CIA approaches to customs and secondary screening procedures. Once in Frankfurt, CIA hackers can travel without further border checks to the 25 European countries that are part of the Shengen open border area — including France, Italy and Switzerland. A number of the CIA's electronic attack methods are designed for physical proximity. These attack methods are able to penetrate high security networks that are disconnected from the internet, such as police record database. In these cases, a CIA officer, agent or allied intelligence officer acting under instructions, physically infiltrates the targeted workplace. The attacker is provided with a USB containing malware developed for the CIA for this purpose, which is inserted into the targeted computer. The attacker then infects and exfiltrates data to removable media. For example, the CIA attack system Fine Dining, provides 24 decoy applications for CIA spies to use. To witnesses, the spy appears to be running a program showing videos (e.g VLC), presenting slides (Prezi), playing a computer game (Breakout2, 2048) or even running a fake virus scanner (Kaspersky, McAfee, Sophos). But while the decoy application is on the screen, the underlaying system is automatically infected and ransacked. How the CIA dr amatidramatically incr eased increased pr olifer ation rrisks: isks: In what prolifer oliferation is surely one of the most astounding intelligence own goals in living memory, the CIA structured its classification regime such that for the most market valuable part of "Vault 7" — the CIA's weaponized malware (implants + zero days), Listening Posts (LP), and Command and Control (C2) systems — the agency has little legal recourse. The CIA made these systems unclassified. Why the CIA chose to make its cyberarsenal unclassified reveals how concepts developed for military use do not easily crossover to the 'battlefield' of cyber 'war'. Continue on page 7

Mar. 13-19, 2017

The Mindanao Examiner



Villa Teresa Subdivision at Mercedes, Zamboanga City Peaceful and Clean High-end Subdivision 300 sq. meters corner lot Tiled floors 4 Bedrooms with 2 air con units 1 Master Bedroom with air con unit 3 comfort rooms

For more information, call broker

Kitchen with built-in cabinets, Dirty Kitchen Garage and Mini Garden - all for P3.8 million only. Please follow link to watch video: 1225170104172968/



The Mindanao Examiner

Mar. 13-19, 2017

First seeds of hope in Sulu by Joey Concepcion SULU – an island province of lush greens, bountiful waters, and great potential. Yet it is also beset by conflict and poverty. Such is the irony that exists there. Last Feb. 23, the Go Negosyo team led by Ginggay Hontiveros and representatives of our Big Kapatids visited the island of Sulu to witness the first seeds of promise being planted. This is in fulfillment of the pledges made last Dec. 19, 2016 in the presence of our beloved President Duterte, DA Secretar y Manny Piñol, DTI Secretar y Ramon Lopez and Sulu Rep. Datu Shah Sakur Tan in Malacañang Palace. The team as welcomed by Gov. Toto Tan in his office together with several mayors. Datu Sakur Tan also joined, and they emphasized the value of what our Kapatids are doing to help the people on the island. It was the first meeting of Sulu officials with Federation of Filipino-Chinese Chambers of Commerce & Industry Inc. (FFCCCI), Harbest, SM Foundation, Metrobank Foundation, and Metro Pacific Hospital Holdings Inc. Their first stop was the launch of SM Foundation’s Kabalikat sa Kabuhayan (KSK) program, in partnership with Harbest and DA Sulu. KSK is an intensive 12 week agri-training program for the benefit of 200 farmers from various municipalities to help provide them with new skills and knowledge

which would give them a better chance at life by learning how to plant and harvest high value crops such as vegetables. The team then went to visit the HBSAT site in Jolo City. Renamed in 1963 through RA3707, the Sulu trade school was changed to “Hadji Butu School of Arts and Trade,” or HBSAT. It is one of projects being considered by Metrobank Foundation in its efforts to support Sulu. The school is one of the oldest institutions in the province, with multiple buildings in var ying states of dilapidation. The façade of these structures tell the stor y of HSBAT’s rich history and the struggles that students of the school face day by day. One such student, Shaina Musa, a 9th grade senior high school student, spoke to the team. They spoke just outside of her handicraft’s class. At 14 years old, she displayed maturity beyond her years. In a room that could fit 30 students, less than 20 were in attendance. Our team observed that most – if not all – of them had folded arms, looking as if they would rather be someplace else. “Labas po sila (mga kaklase) ng classroom, (They (classmates) keep going in-and-out of the classroom)” she said, and when asked for the reason why, her answer was heartbreaking; “Kasi wala silang gusto. Wala silang pangarap. (Because they don’t have anything.

Go Negosyo Project. They don’t have dreams.)” Perhaps one of the biggest factors would be the state of their classrooms: wooden chairs that look like they came from recycled wood, ceilings with no insulation that look like it would collapse during a storm, and shadows that cover their faces because they don’t have electricity. It’s a miracle the young girl could still dream. Shaina still dreams big. She wants to study computer science in Mindanao State University and

Go Negosyo Project

Earn Mor e, Be an Ad ver tising Ag enc y! More Adv ertising Agenc ency! Do you want to earn more? Be an ADVERTISING AGENCY for the Mindanao Examiner Regional Newspaper and earn hefty commissions. Apply now. This offer covers Mindanao, Visayas and Luzon. ZAMBOANGA CITY OFFICE: Unit 15, 3rd Floor, Fairland Building, Mayor Vitaliano Agan Avenue Phone: 062-9925480 Mobile: 0995-5202358

DAVAO CITY OFFICE: Unit 3B, 3/F Ledesma Building, 26 Juna Avenue, Juna Subdivision, Matina Phone: 082-2960658 Mobile: 0947-4823453

URL: E-mail:

dreams one day of becoming a teacher. Perhaps with the newly donated classrooms, our Kapatids can bring her closer to her dream. The second site the team visited was the Kapatid Village in Barangay Kajatian, Indanan, Sulu, where donations from Manny Osmeña, Natividad Cheng, Manny Pangilinan, William Belo, the Federation of Indian Chambers of Commerce, and other Big Kapatids will fund homes for the beneficiaries. Gov. Tan headed the showcase of the model house to the beneficiaries. Another heartbreaking scene met them when they arrived at Sultan Jamalul Kiram School in Kulasi, Maimbung. There was a large open field where Gov. Tan and Enrique Chua, representative of FFCCCI, surrounded by the school officials, broke ground for the site of new school buildings. FFCCCI donated 30 classrooms in total. Following the advice of Gov. Tan to spread out new buildings to different barangays, eight

buildings each with two classrooms will be built. The deepest gratitude could be felt from the school officials, especially from the teachers. One teacher approached the team. She brought them to the rooms and showed them the state of their classrooms – peeling walls, incomplete shutters, and drooping ceilings. We are building more classrooms so that more children could have a better future. It’s truly a labor of love for them to continue teaching despite the current conditions. The classrooms will help elevate the quality of learning their students get. Finally, the last stop of the day was in Patikul. Known for rebel incursions over the past months, Patikul is near the mountains, and the Kapatid Village rests just along the road which leads to Barangay Anuling. Military personnel surrounded the area, but the delegation of Kapatids were welcomed by the barangay captain Ging Hayudini. People watched from afar. It felt

like a desolate place but hope remains that rehabilitation of the area will bring peace to the town. The trip to Sulu was successful overall. For now, we’re starting with Negosyo thru the KSK Program, two Kapatid Villages and 32 Kapatid classrooms in Patikul, Maimbung, Indanan, and Jolo. More will follow in the coming months. The project brings forth another unique example on how progress can be achieved with the combined effort of the public and the private sector. We, the private sector, must support programs like this in places like Sulu where our help is needed the most. This is where we will start bringing peace through business and entrepreneurship that will elevate the whole countr y towards an age of prosperity. (The author is RFM Corporation President and CEO; and Philippine Center for Entrepreneurship – Go Negosyo Founder. He is currently the Presidential Consultant for Entrepreneurship. First published on the Philippine Star)

The Mindanao Examiner

Mar. 13-19, 2017


ProWorx EVP seeking Teachers and Medical Technologists for USA ProWorx in USA is seeking Certified Teachers, Teacher Assistants, and Certified Medical Technologists who meet criteria for the Exchange Visitor Program (EVP) on a J-1 visa. Our MOST needed positions are Math, Science and Special Education Certified Teachers, but we accept applications for all subjects and grade levels; and Medical Technologists with ASCP or AMT certification.

His excellency Zhao Jianhua, Ambassador Extraordinary and Plenipotentiary of the people's Republic of China to the Philippines. With Sulu Governor Toto Tan, former Sulu Governor Dr (Datu Shabandar) Sakur Tan, Undersecretary Nabil Tan.

‘ARMM 2017 Palaro’ sucessful in Maguindanao MAGUINDANAO – The week-long 2017 Palarong Autonomous Region in Muslim Mindanao Athletic Association (ARMMAA) games was successful following its launch in the town of Upi in Maguindanao province, More than 4,000 student-athletes and officials from the region’s nine school divisions attended the sports activity with the t h e m e” Un i f i e d Bangsamoro: One Voice, One Dream, One Aspiration.” Regional and local officials delivered their messages during the program. ARMM Executive Secretary Atty. Laisa Alamia, who opened the regional competition, said: “Bear in mind that the Palarong ARMMAA is not just about competing for gold medals and for that coveted place on the podium. Hindi lang po ito tungkol sa mga medalya,” Sec. Alamia said. “It gives

you an exciting experience, the opportunity to gain new friends and to display sportsmanship that is worthy of emulation,” she explained. The region-wide games closed on March 11 with athletes both from elementary and secondary schools competed in the following sports: arnis, athletics, badminton, baseball, basketball, chess, football, gymnastics, sepak takraw, softball, swimming, table tennis, taekwondo, tennis, volleyball, and boxing. Sec. Alamia emphasized that with the Palarong ARMMAA, the region’s athletes showed their excellence in sports. “I am confident that your experience in the sports event will help you make better students, better athletes, and better persons,” she said. The delegates came from the ARMM’s schools divisions, specifically

Maguindanao 1 and 2, Lanao Sur 1 and 2, Marawi City, Lamitan City, Basilan, Sulu, and Tawi-Tawi. Citing historical accounts of ancient Olympics in Greece, ARMM Secretary of Education Dr. John Magno said sports have evolved into unifying events that bind all peoples in the world. “In this athletic convergence, we learn the true meaning of becoming a winner,” Sec. Magno added. The champions in the Palarong ARMMAA will represent the region in the 2017 Palarong Pambansa scheduled from April 23 to 29 in Antique with the aim of winning more medals. “This annual convergence seeks to select the fastest, the highest and the strongest,” Sec. Magno said. (Bureau of Public Information)

In order to be considered by ProWorx for the Teacher EVP you must: • Meet the qualifications for a teaching license in primary or secondary schools in your country of nationality or last legal residence; • Have a minimum of 3 years of teaching experience or related professional experience; • Have outstanding references and reputation as a teacher and as an individual; • Satisfy the teaching standards of the U.S. state in which you will teach; (ProWorx can assist with that determination); • Be seeking to enter the United States for the purpose of teaching full time at a primary or secondary accredited educational institution for up to three years, and; • Possess sufficient proficiency in English language In order to be considered by ProWorx for the Medical Technologist EVP you must: • Have ASCP or AMT certification • Have a minimum of 2 years of experience in a hospital setting and/or private laboratory setting • Be seeking to enter the United States for the purpose of working full time as a Medical Technologist for up to three years, and; • Possess sufficient proficiency in English language. In order to be considered by ProWorx for the Teacher Assistant EVP you must: • Meet the qualifications for a teaching license in primary or secondary education in your country, • Have only 1 – 2 years of experience • Have outstanding references and reputation as a teacher and as an individual; • Be seeking to enter the United States for the purpose of working full time at a primary or secondary accredited educational institution for 12 – 18 months, and; • Possess sufficient proficiency in English language For additional information and/or to apply for consideration, please go to our website at and carefully follow our application process. If you have questions or concerns, please contact us at or call Liza at (718) 425-4399.

Publication Notice R.A. 10172 REPUBLIC OF THE PHILIPPINES Autonomous Region in Muslim Mindanao Municipality of Jolo Province of Sulu



In compliance with the publication requirements and in pursuant to OCRG Memorandum Circular No. 2013-1 Dated January 16, 2013 Guidelines in the Implementation of the Administrative Order No. 1 Series of 2012 (IRR on R.A. 10172), Notice is hereby served to the public that Name of Document Owner has filed with this Office, a petition for correction of entry in sex from “MALE” to “FEMALE” in the Certificate of Live Birth of SITTI A-EIZA R. PANGAMBAYAN at Jolo, SULU and whose parents are SITTI BONYAN J. RIPAIE and IBNOSALIM T. PANGAMBAYAN.


Any person adversely affected by said petition may file his written opposition with this Office not later than last date of this publication.

ZENAIDA F. JALANI Municipal Civil Registrar

Issue 2, March 13-19, 2017

Listen to

RADYO MINDANAO 2-3 p.m. daily on RPN-dxXX Zamboanga 1008 kHz

ZAMBOANGA CITY OFFICE: DAVAO CITY OFFICE: Unit 3B, 3/F Ledesma Building, 26 Juna Unit 15, 3rd Floor, Fairland Building, Avenue, Juna Subdivision, Matina Mayor Vitaliano Agan Avenue Phone: 082-2960658 Phone: 062-9925480 Mobile: 0947-4823453 Mobile: 0995-5202358 URL: E-mail:


The Mindanao Examiner

Mar. 13-19, 2017

Acr oss: cross: 1. Vane dir. 4. Donkey 7. Pie portion 12. ___ moment's notice (2 wds.) 13. Not me 14. Photocopier liquid 15. Camper's lamp 17. Modify 18. Dogwood or palm 19. Safe to eat 21. Televised again 23. Snitch 26. Beatle Ringo ___ 29. Improve 32. Courageous 34. Flavorful seed 35. Beseech 37. Comic Tim ___ 38. Had a bite 39. Exchange 41. MOscow's country 44. Discharge 48. Biblical pronoun 50. Get ready 52. Napped leather 53. High's opposite 54. Spoil 55. Mexican coins 56. Compass point (abbr.) 57. Columnist ___ Landers Do wn: Down:

Answ er to last w eek osswor d: Answer week eek’’s cr crosswor ossword:

1. Popcorn seasoning 2. "A ___ Is Born" 3. Dwindle 4. Sailor s yes 5. MOre angry 6. Ice-cream treat 7. Pierce 8. Recline lazily 9. ___ medicine 10. So-so grade 11. Goof 16. Fright 20. Small hotels 22. Ohio lake 24. Zenith 25. Youth 26. Met's old stadium 27. Camping need 28. Blood vessels 30. Noggin

31. Snoozing 33. Felines 36. Three-base hit 40. Slugger Hank ___ 42. Take apart 43. Observes 45. Papa's partner 46. Modern Persia 47. Shore bird 48. Recipe measure (abbr.) 49. Color 51. Ram;s mate

The Mindanao Examiner

Newspaper, Film and Television Productions Maritess Fernandez (On Leave) Publisher/Executive Producer Al Jacinto Editor-in-Chief/Producer (OIC) Carl Deala Graphics/Video Editor Mindanao Examiner Productions Web Master

Weekly S udoku: Sudoku:

Answ er to last w eek: Answer week:

REGIONAL PARTNERS Mindanao Daily Business Week Mindanao Star NEWS/ADVERTISING OFFICES Mark Navales Central Mindanao Ely Dumaboc Zamboanga Peninsula

Marilou Cablinda Davao Region - Eastern Mindanao

CONTRIBUTING EDITOR: Ely Dumaboc / Jun Feliciano

The Mindanao Examiner Regional Newspaper is published weekly in Mindanao, Philippines. ZAMBOANGA CITY OFFICE: Unit 15, 3/F, Fairland Building, Mayor Vitaliano Agan Avenue Phone & fax: 062-9925480 Mobile: 0995-5202358

House & Lot F or S ale For Sale Zamboanga City Area

Z ambo Chocolate M arshmallo w Lollipops arshmallow

The B ig H ouse D av ao Big House Dav avao A Heritage Home

Call us 0917-7001023

Call us 0928-9752091

Call us 0925-8824601

Mindanao D aily Daily Newspaper A dv er tising Adv dver ertising Call us (062) 992-5480 (082) 296-0658

Yaki Herbal Labor ator y Laborator atory

Zamboanga City Air con Cleaners Aircon

etr oH otel LM M Metr etro Hotel Zamboanga

Zambo SSpecial pecial C upcakes Cupcakes For all occasions

Call us 992-5480

Call us (062) 955-3834

Call us 0928-9752091

FOR SALE Jansport Bags


L.A. Z amboanga Times Zamboanga A non-profit publication

Zamboanga City T-shir esigns Prrinting D Designs -shirtt P

Call us 0915-8135450

Call us 0927-7215494

Call us (062) 992-5480

Lispher IInn nn 13 Juna Ave., Davao City

Metr itness C enter etroo Lifestyle FFitness Center

The Values School

F. Torres Street, Davao City

8 Juna Ave., Matina, Davao City

Gar den Or chids H otel arden Orchids Hotel Zamboanga City

Call us (082)299-1610

Call us (082)299-6180

Call us (082)227-2049

Call us (062) 991-0032


DAVAO CITY OFFICE: Unit 3B, 3/F Ledesma Building, 26 Juna Avenue, Juna Subdivision, Matina Phone: 082-2960658 Mobile: 0947-4823453 URL: E-mail:

We are moving to film and television productions!

ALL RIGHTS FOR SALE Mindanao Examiner Regional Newspaper Mindanao Examiner Television ZAMBOANGA CITY OFFICE: Unit 15, 3/F Fairland Building, Mayor Vitaliano Agan Avenue Phone & fax: 062-9925480 Mobile: 0917-7103642

DAVAO CITY OFFICE: Unit 3B, 3/F Ledesma Building, 26 Juna Avenue, Juna Subdivision, Matina Phone: 082-2960658 Mobile: 0918-9180895

CIA Hacking Tools Revealed Continued fr om page 2 from To attack its targets, the CIA usually requires that its implants communicate with their control programs over the internet. If CIA implants, Command & Control and Listening Post software were classified, then CIA officers could be prosecuted or dismissed for violating rules that prohibit placing classified information onto the Internet. Consequently the CIA has secretly made most of its cyber spying/war code unclassified. The U.S. government is not able to assert copyright either, due to restrictions in the U.S. Constitution. This means that cyber 'arms' manufactures and computer hackers can freely "pirate" these 'weapons' if they are obtained. The CIA has primarily had to rely on obfuscation to protect its malware secrets. Conventional weapons such as missiles may be fired at the enemy (i.e into an unsecured area). Proximity to or impact with the target detonates the ordnance including its classified parts. Hence military personnel do not violate classification rules by firing ordnance with classified parts. Ordnance will likely explode. If it does not, that is not the operator's intent. Over the last decade U.S. hacking operations have been increasingly dressed up in military jargon to tap into Department of Defense funding streams. For instance, attempted "malware injections" (commercial jargon) or "implant drops" (NSA jargon) are being called "fires" as if a weapon was being fired. However the analogy is questionable. Unlike bullets, bombs or missiles, most CIA malware is designed to live for days or even years after it has reached its 'target'. CIA malware does not "explode on impact" but rather permanently infests its target. In order to infect target's device, copies of the malware must be placed on the target's devices, giving physical possession of the malware to the target. To exfiltrate data back to the CIA or to await further instructions the malware must communicate with CIA Command & Control (C2) systems placed on internet connected servers. But such servers are typically not approved to hold classified information, so CIA command and control systems are also made unclassified. A successful 'attack' on a target's computer system is more like a series of complex stock maneuvers in a hostile take-over bid or the careful planting of rumors in order to gain control over an organization's leadership rather than the firing of a weapons system. If there is a military analogy to be made, the infestation of a target is perhaps akin to the execution of a whole series of military maneuvers against the target's territory including observation, infiltration, occupation and exploitation. Evading for ensics and forensics anti-vir us: A series of stananti-virus:


The Mindanao Examiner

Mar. 13-19, 2017

dards lay out CIA malware infestation patterns which are likely to assist forensic crime scene investigators as well as Apple, Microsoft, Google, Samsung, Nokia, Blackberry, Siemens and anti-virus companies attribute and defend against attacks. "Tradecraft DO's and DON'Ts" contains CIA rules on how its malware should be written to avoid fingerprints implicating the "CIA, US government, or its witting partner companies" in "forensic review". Similar secret standards cover the use of encryption to hide CIA hacker and malware communication, describing targets & exfiltrated data as well as executing payloads and persisting in the target's machines over time. CIA hackers developed successful attacks against most well-known anti-virus programs. These are documented in AV defeats, Personal Security Products, Detecting and defeating PSPs and PSP/Debugger/ RE Avoidance. For example, Comodo was defeated by CIA malware placing itself in the Window's "Recycle Bin". While Comodo 6.x has a "Gaping Hole of DOOM". CIA hackers discussed what the NSA's "Equation Group" hackers did wrong and how the CIA's malware makers could avoid similar exposure. Examples: The CIA's Engineering Development Group (EDG) management system contains around 500 different projects (only some of which are documented by "Year Zero") each with their own sub-projects, malware and hacker tools. The majority of these projects relate to tools that are used for penetration, infestation ("implanting"), control, and exfiltration. Another branch of development focuses on the development and operation of Listening Posts (LP) and Command and Control (C2) systems used to communicate with and control CIA implants; special projects are used to target specific hardware from routers to smart TVs. Some example projects are described below, but see the table of contents for the full list of projects described by WikiLeaks' "Year Zero". UMBRA GE: The CIA's UMBRAGE: hand crafted hacking techniques pose a problem for the agency. Each technique it has created forms a "fingerprint" that can be used by forensic investigators to attribute multiple different attacks to the same entity. This is analogous to finding the same distinctive knife wound on multiple separate murder victims. The unique wounding style creates suspicion that a single murderer is responsible. As soon one murder in the set is solved then the other murders also find likely attribution. The CIA's Remote Devices Branch's UMBRAGE group collects and maintains a substantial library of attack techniques 'stolen' from malware produced in other states including the Russian Federation. With UMBRAGE and

related projects the CIA cannot only increase its total number of attack types but also misdirect attribution by leaving behind the "fingerprints" of the groups that the attack techniques were stolen from. UMBRAGE components cover keyloggers, password collection, webcam capture, data destruction, persistence, privilege escalation, stealth, anti-virus (PSP) avoidance and survey techniques. Fine D ining: Fine DinDining: ing comes with a standardized questionnaire i.e menu that CIA case officers fill out. The questionnaire is used by the agency's OSB (Operational Support Branch) to transform the requests of case officers into technical requirements for hacking attacks (typically "exfiltrating" information from computer systems) for specific operations. The questionnaire allows the OSB to identify how to adapt existing tools for the operation, and communicate this to CIA malware configuration staff. The OSB functions as the interface between CIA operational staff and the relevant technical support staff. Among the list of possible targets of the collection are 'Asset', 'Liason Asset', 'System Administrator', 'Foreign Information Operations', 'Foreign Intelligence Agencies' and 'Foreign Government Entities'. Notably absent is any reference to extremists or transnational criminals. The 'Case Officer' is also asked to specify the environment of the target like the type of computer, operating system used, Internet connectivity and installed anti-virus utilities (PSPs) as well as a list of file types to be exfiltrated like Office documents, audio, video, images or custom file types. The 'menu' also asks for information if recurring access to the target is possible and how long unobserved access to the computer can be maintained. This information is used by the CIA's 'JQJIMPROVISE' software to configure a set of CIA malware suited to the specific needs of an operation. I m p r o v i s e ( JQJIMPR OVISE): 'ImproJQJIMPRO vise' is a toolset for configuration, post-processing, payload setup and execution vector selection for survey/exfiltration tools supporting all major operating systems like Windows (Bartender), MacOS ( JukeBox) and Linux (DanceFloor). Its configuration utilities like Margarita allows the NOC (Network Operation Center) to customize tools based on requirements from 'Fine Dining' questionairies. HIVE: HIVE is a multiplatform CIA malware suite and its associated control software. The project provides customizable implants for Windows, Solaris, MikroTik (used in internet routers) and Linux platforms and a Listening Post (LP)/Command and Control (C2) infrastructure to communicate with these implants. The implants are configured to communicate via

HEALTH: Mataas Ang Cholesterol Payo ni Dr. Willie T. Ong NAPAKARAMING pasyenteng mahihirap ang nareresetahan ng mamahaling gamot sa cholesterol. Ang tawag dito ay Statins at nagkakahalaga ito ng P20–P60 bawat tableta. Ang mga kilalang Statins ay ang Simvastatin, Atorvastatin, at iba pa. Kailan puwedeng HINDI muna uminom ng Statins? Ayon sa National Cholesterol Education Program ng America, binibigay ang Statins kapag ang cholesterol ay lampas 240 mg/dl at wala namang diabetes o sakit sa puso ang pasyente. Tandaan ang numerong 240. Kapag ang cholesterol test mo ay hindi pa umabot sa 240, puwedeng i-diyeta muna natin iyan. Ang problema kasi, may iilang doktor na kahit na 210 lamang ang cholesterol ay nagrereseta na ng Statin. Ok lang sana kung mayaman ang pasyente. Paano naman kapag lampas sa 240 ang cholesterol? Sa ganitong pagkakataon puwedeng mag-diyeta muna ng 2 buwan. Iwas

Dr. Willie T. Ong taba, karne, cakes at icing muna. Pagkaraan ng 2 buwan, ipa-test uli ang cholesterol at kapag lampas ulit sa 240 mg/dl, doon tayo magsisimula ng Statins. Ngunit may isa pang importanteng detalye: Ang mga BABAE na hindi pa menopause ay hindi gaanong matutulungan ng Statins. Ito’y dahil may estrogen pa sila sa katawan na nagproprotekta sa kanilang puso. Dahil dito, puwede munang hindi uminom ng Statins ang mga babaing hindi pa menopause. Kailan DAPAT uminom ng Statins? Kung ika’y nagkaroon na ng atake sa puso, istrok, at napakataas ang iyong

cholesterol (lampas 240 mg/dl), kailangan mo nang uminom ng Statins. Kung may diabetes ka, may tulong din ang Statins. Pero unahin mo muna bilhin ang gamot sa diabetes dahil mas mahalaga ito. Ang mura at epektibong statin ay ang Simvastatin. May mga brands na P10 hanggang P30 bawat tableta. Mahal pa rin di ba? Paano kung kulang ako sa pera? Kung wala tayong pera, may tinatawag na “poor man’s statin.” Ano ito? Ito ay ang Aspirin 80 mg tablet na piso lang ang halaga. Makatutulong iyan sa sakit sa puso at mataas na cholesterol. Sana po ay nakatulong ang ar tikulong ito para malinawagan ang ating mambabasa kung kailangan ba talaga uminom ng Statins. DISCLAIMER: “The health advice in this forum is only for general knowledge. For your specific questions, kindly consult your personal physician. Thank you.”

RECIPE: Seafood Bicol Express


– 1 lb. mussels, cleaned – 6 ounces medium sized squid, cleaned – ½ lb. shrimp shell and head on – 2 cups coconut milk – 2 tablespoons shrimp paste (bagoong alamang)

– 2 thumbs ginger, minced – 3 cloves minced garlic – 1 medium yellow onion, chopped – 6 to 10 pieces Thai chili pepper – ¼ teaspoon ground black pepper – 3 tablespoons cooking oil

INSTR UCTIONS: INSTRUCTIONS: 1) Heat oil in a cooking pot. 2) Once the gets hot, saute garlic, onion and ginger. 3) Pour the coconut milk into the pot. Let boil. 4) Add chili pepper and shrimp paste. Stir. Cover and cook for 3 minutes. 5) Add the squid, mussels, and shrimp.Stir until all the seafood gets coated with coconut milk. Continue to cook for 3 to 5 minutes while occasionally stirring. 6) Add ground black pepper. Stir. 7) Transfer to a serving plate. Serve. 8) Share and enjoy! ( HTTPS with the webserver of a cover domain; each operation utilizing these implants has a separate cover domain and the infrastructure can handle any number of cover domains. Each cover domain resolves to an IP address that is located at a commercial VPS (Virtual Private Server) provider. The public-facing server forwards all incoming traffic via a VPN to a 'Blot' server that handles actual

connection requests from clients. It is setup for optional SSL client authentication: if a client sends a valid client certificate (only implants can do that), the connection is forwarded to the 'Honeycomb' toolserver that communicates with the implant; if a valid certificate is missing (which is the case if someone tries to open the cover domain website by accident), the traffic is forwarded to a cover server

that delivers an unsuspicious looking website. The Honeycomb toolserver receives exfiltrated information from the implant; an operator can also task the implant to execute jobs on the target computer, so the toolserver acts as a C2 (command and control) server for the implant. Similar functionality (though limited to Windows) is provided by the RickBobby project. (


Founded 2006

CALL 0995-5202358

CALL 0995-5202358

CALL 0995-5202358

FOR ADVERTISEMENTS, PLEASE CALL (062) 9925480 or (082) 2960658


Mar. 13-19, 2017

DENR seeks special prosecutors to handle environmental cases CEBU CITY - The Department of Environment and Natural Resources in Central Visayas (DENR-7) asked the Department of Justice (DOJ) for the appointment of special prosecutors in the region to specifically handle environmental cases. Steve Vincent Larona, legal assistant of the DENR-7, said the request was already sent to the DOJ and they are waiting for its approval. Larona bared this during the recent forum of the Association of Government Information Officers - Philippine Information Agency in Central Visayas (AGIO-PIA 7) that tackled commercial illegal fishing within the Tañon Strait. He also cited the importance of having special prosecutors to handle the environmental cases that they are filing against illegal commercial fishers. He noted the presence of specially appointed prosecutors

who would help the agency push for the prosecution of these violators. In 2016, Larona reported they have filed five cases against commercial fishing vessels that were conducting illegal fishing within the Tañon Strait. Larona emphasized that commercial fishing activities inside the Tañon Strait are prohibited since it is a protected seascape and a critical marine habitat and important migratory path for 14 of the 27 species of whales and dolphins in the Philippines. In an effort to increase the monitoring and enforcement activities within the protected area, Protected Area Superintendent Am Prospero Lendio said they have partnered with the Cebu Anti-Illegal Fishing Task Force to help them. There is an ongoing training for individuals from 15 local government units in the provinces of Cebu, Negros Oriental and Negros Occidental on

“Bantay Dagat”. Those who will complete the training will be distributed to the different site management units scattered in the respective provinces. The DENR-7 warned those who plan to do commercial fishing activities within Tañon Strait not to push through with it. “We are already a multi-sectoral organization. We have the NBI, Office of the Presidential Assistant for the Visayas, Army, Navy, and the Maritime Police on board. Do not do [commercial] fishing activities inside the Tañon Strait,” Larona said. Tañon Strait is a rich fishing ground for artisanal or municipal fishers who live along the coastal areas within the 42 cities and municipalities in the provinces of Cebu, Negros Oriental, and Negros Occidental. It houses at least 90 species of fish, 20 species of crustaceans, 26 species of mangroves, and 18,830 hectares of coral reef. (Carmel Loise Matus)

Advertise on Mindanao Examiner Radio - also broadcast daily from 2 p.m. to 3 p.m. on RPN-dxXX 1008 kHz covering Western Mindanao, Basilan, Sulu and Tawi-Tawi, and Central Mindanao. For radio advertisements and sponsorship, please call 0629925480 or 082-2960658 or text 0995-5202358 and 0947-4823453. For more details, please visit http://


Eastern Mindanao

Bring and promote your business in Mindanao, ADVERTISE in our newspaper and website and get fast results! ZAMBOANGA CITY OFFICE: Unit 15, 3rd Floor, Fairland Building, Mayor Vitaliano Agan Avenue Phone: 062-9925480 Mobile: 0995-5202358 URL:

DAVAO CITY OFFICE: Unit 3B, 3/F Ledesma Building, 26 Juna Avenue, Juna Subdivision, Matina Phone: 082-2960658 Mobile: 0947-4823453 E-mail:

Remit PhilHealth premiums on time

CEBU CITY - The Philippine Health Insurance Corporation urged employers in the region from the government and the private sectors- to observe a punctual remittance of the monthly premium contributions of their employees. PhilHealth made this call following the reimposition of the 2% penalty on delinquent employers. Laarni Joy Allanic, chief social insurance officer of PhilHealth in Region 7, said it is the responsibility of the employer to comply with their obligation to pay for the monthly premium contributions. Employers automatically deduct these monthly premium contributions from the monthly basic salaries of its employees. Under the revised Implementing Rules and

Western Mindanao

Regulations of the National Health Insurance Act of 1995 (Republic Act 7875), monthly premium contributions of employed members shall be remitted by the employer. However, contribution payments remitted beyond the deadline will be charged automatically with a two-percent monthly interest. Since early 2000, there was already an implementation of this penalty but it was abolished and later reimposed in 2013 in order to enhance the collection of premium contributions. Allanic also reminded the employers to regularly update the member data record (MDR) of their employees so as not to encounter any problem during in times of hospitalization involving their family members. M e a n w h i l e , PhilHealth has given out


about 500 emergency kits to hospitals in Metro Cebu area. These hospitals are Vicente Sotto Memorial Medical Center, Cebu City Medical Center, Perpetual Succour Hospital and Visayas Community Medical Center in Cebu City and Eversley Child’s Sanitarium and General Hospital in Mandaue City. Each emergency kit contains a face towel, sanitizer, flyers and brochures of PhilHealth which contains information on its programs and advocacy. The distribution of these kits is part of PhilHealth’s 22nd Anniversary. PhilHealth-7 reported that as of December 2016, it has already 6,076,376 members in Central Visayas. (Carmel Loise Matus)


Mindanao Examiner Regional Newspaper Mar. 13-19, 2017  

Mar. 13-19, 2017

Read more
Read more
Similar to
Popular now
Just for you