The NSA Leak Is Real, Snowden Documents Confirm
Sam Biddle
Aug. 19 2016, 5:00 a.m.
Leia em português ⟶
On Monday, a hacking group calling itself the “ShadowBrokers” announced an auction for what it claimed were “cyber weapons” made by the NSA. Based on never-before-published documents provided by the whistleblower Edward Snowden, The Intercept can confirm that the arsenal contains authentic NSA software, part of a powerful constellation of tools used to covertly infect computers worldwide.
The provenance of the code has been a matter of heated debate this week among cybersecurity experts, and while it remains unclear how the software leaked, one thing is now beyond speculation: The malware is covered with the NSA’s virtual fingerprints and clearly originates from the agency.
The evidence that ties the ShadowBrokers dump to the NSA comes in an agency manual for implanting malware, classified top secret, provided by Snowden, and not previously available to the public. The draft manual instructs NSA operators to track their use of one malware program using a specific 16-character string, “ace02468bdf13579.” That exact same string appears throughout the ShadowBrokers leak in code associated with the same program, SECONDDATE.
SECONDDATE plays a specialized role inside a complex global system built by the U.S. government to infect and monitor what one document estimated to be millions of computers around the world. Its release by ShadowBrokers, alongside dozens of other malicious tools, marks the first time any full copies of the NSA’s offensive software have been available to the public, providing a glimpse at how an elaborate system outlined in the Snowden documents looks when deployed in the real world, as well as concrete evidence that NSA hackers don’t always have the last word when it comes to computer exploitation.
But malicious software of this sophistication doesn’t just pose a threat to foreign governments, Johns Hopkins University cryptographer Matthew Green told The Intercept:
SECONDDATE is a tool designed to intercept web requests and redirect browsers on target computers to an NSA web server. That server, in turn, is designed to infect them with malware. SECONDDATE’s existence was first reported by The Intercept in 2014, as part of a look at a global computer exploitation effort code-named TURBINE. The malware server, known as FOXACID, has also been described in previously released Snowden documents.
Other documents released by The Intercept today not only tie SECONDDATE to the ShadowBrokers leak but also provide new detail on how it fits into the NSA’s broader surveillance and infection network. They also show how SECONDDATE has been used, including to spy on Pakistan and a computer system in Lebanon.
The top-secret manual that authenticates the SECONDDATE found in the wild as the same one used within the NSA is a 31-page document titled “FOXACID SOP for Operational Management” and marked as a draft. It dates to no earlier than 2010. A section within the manual describes administrative tools for tracking how victims are funneled into FOXACID, including a set of tags used to catalogue servers. When such a tag is created in relation to a SECONDDATE-related infection, the document says, a certain distinctive identifier must be used:
The same SECONDDATE MSGID string appears in 14 different files throughout the ShadowBrokers leak, including in a file titled SecondDate-3021.exe. Viewed through a code-editing program (screenshot below), the NSA’s secret number can be found hiding in plain sight:
All told, throughout many of the folders contained in the ShadowBrokers’ package (screenshot below), there are 47 files with SECONDDATE-related names, including different versions of the raw code required to execute a SECONDDATE attack, instructions for how to use it, and other related files.
.
After viewing the code, Green told The Intercept the MSGID string’s occurrence in both an NSA training document and this week’s leak is “unlikely to be a coincidence.” Computer security researcher Matt Suiche, founder of UAE-based cybersecurity startup Comae Technologies, who has been particularly vocal in his analysis of the ShadowBrokers this week, told The Intercept “there is no way” the MSGID string’s appearance in both places is a coincidence.
According to one December 2010 PowerPoint presentation titled “Introduction to BADDECISION,” that tool is also designed to send users of a wireless network, sometimes referred to as an 802.11 network, to FOXACID malware servers. Or, as the presentation puts it, BADDECISION is an “802.11 CNE [computer network exploitation] tool that uses a true man-in-the-middle attack and a frame injection technique to redirect a target client to a FOXACID server.” As another top-secret slide puts it, the attack homes in on “the greatest vulnerability to your computer: your web browser.”
One slide points out that the attack works on users with an encrypted wireless connection to the internet.
That trick, it seems, often involves BADDECISION and SECONDDATE, with the latter described as a “component” for the former. A series of diagrams in the “Introduction to BADDECISION” presentation show how an NSA operator “uses SECONDDATE to inject a redirection payload at [a] Target Client,” invisibly hijacking a user’s web browser as the user attempts to visit a benign website (in the example given, it’s CNN.com). Executed correctly, the file explains, a “Target Client continues normal webpage browsing, completely unaware,” lands on a malware-filled NSA server, and becomes infected with as much of that malware as possible — or as the presentation puts it, the user will be left “WHACKED!” In the other top-secret presentations, it’s put plainly: “How do we redirect the target to the FOXACID server without being noticed”? Simple: “Use NIGHTSTAND or BADDECISION.”
The sheer number of interlocking tools available to crack a computer is dizzying. In the FOXACID manual, government hackers are told an NSA hacker ought to be familiar with using SECONDDATE along with similar man-in-the-middle wi-fi attacks code-named MAGIC SQUIRREL and MAGICBEAN. A top-secret presentation on FOXACID lists further ways to redirect targets to the malware server system.
To position themselves within range of a vulnerable wireless network, NSA operators can use a mobile antenna system running software code-named BLINDDATE, depicted in the field in what appears to be Kabul. The software can even be attached to a drone. BLINDDATE in turn can run BADDECISION, which allows for a SECONDDATE attack:
Elsewhere in these files, there are at least two documented cases of SECONDDATE being used to successfully infect computers overseas: An April 2013 presentation boasts of successful attacks against computer systems in both Pakistan and Lebanon. In the first, NSA hackers used SECONDDATE to breach “targets in Pakistan’s National Telecommunications Corporation’s (NTC) VIP Division,” which contained documents pertaining to “the backbone of Pakistan’s Green Line communications network” used by “civilian and military leadership.”
In the latter, the NSA used SECONDDATE to pull off a man-in-the-middle attack in Lebanon “for the first time ever,” infecting a Lebanese ISP to extract “100+ MB of Hizballah Unit 1800 data,” a special subset of the terrorist group dedicated to aiding Palestinian militants.
SECONDDATE is just one method that the NSA uses to get its target’s browser pointed at a FOXACID server. Other methods include sending spam that attempts to exploit bugs in popular web-based email providers or entices targets to click on malicious links that lead to a FOXACID server. One document, a newsletter for the NSA’s Special Source Operations division, describes how NSA software other than SECONDDATE was used to repeatedly direct targets in Pakistan to FOXACID malware web servers, eventually infecting the targets’ computers.
NSA: Expeditionary Access Operations: NSA’s Close Access Network Exploitation Program (“CNO Course – EAO”)
NSA Remote Operations Center: FOXACID Overall Briefing
NSA SIGINT Development (SIGDEV): SIGINT Development Support II Program Management Review, 24 April 2013 (select slides)
http://www.einnews.com/article/340892211/MYt-As9biPDdF_xo
Sam Biddle
Aug. 19 2016, 5:00 a.m.
Leia em português ⟶
On Monday, a hacking group calling itself the “ShadowBrokers” announced an auction for what it claimed were “cyber weapons” made by the NSA. Based on never-before-published documents provided by the whistleblower Edward Snowden, The Intercept can confirm that the arsenal contains authentic NSA software, part of a powerful constellation of tools used to covertly infect computers worldwide.
The provenance of the code has been a matter of heated debate this week among cybersecurity experts, and while it remains unclear how the software leaked, one thing is now beyond speculation: The malware is covered with the NSA’s virtual fingerprints and clearly originates from the agency.
The evidence that ties the ShadowBrokers dump to the NSA comes in an agency manual for implanting malware, classified top secret, provided by Snowden, and not previously available to the public. The draft manual instructs NSA operators to track their use of one malware program using a specific 16-character string, “ace02468bdf13579.” That exact same string appears throughout the ShadowBrokers leak in code associated with the same program, SECONDDATE.
SECONDDATE plays a specialized role inside a complex global system built by the U.S. government to infect and monitor what one document estimated to be millions of computers around the world. Its release by ShadowBrokers, alongside dozens of other malicious tools, marks the first time any full copies of the NSA’s offensive software have been available to the public, providing a glimpse at how an elaborate system outlined in the Snowden documents looks when deployed in the real world, as well as concrete evidence that NSA hackers don’t always have the last word when it comes to computer exploitation.
But malicious software of this sophistication doesn’t just pose a threat to foreign governments, Johns Hopkins University cryptographer Matthew Green told The Intercept:
The NSA did not respond to questions concerning ShadowBrokers, the Snowden documents, or its malware.The danger of these exploits is that they can be used to target anyone who is using a vulnerable router. This is the equivalent of leaving lockpicking tools lying around a high school cafeteria. It’s worse, in fact, because many of these exploits are not available through any other means, so they’re just now coming to the attention of the firewall and router manufacturers that need to fix them, as well as the customers that are vulnerable.
So the risk is twofold: first, that the person or persons who stole this information might have used them against us. If this is indeed Russia, then one assumes that they probably have their own exploits, but there’s no need to give them any more. And now that the exploits have been released, we run the risk that ordinary criminals will use them against corporate targets.
A Memorable SECONDDATE
The offensive tools released by ShadowBrokers are organized under a litany of code names such as POLARSNEEZE and ELIGIBLE BOMBSHELL, and their exact purpose is still being assessed. But we do know more about one of the weapons: SECONDDATE.SECONDDATE is a tool designed to intercept web requests and redirect browsers on target computers to an NSA web server. That server, in turn, is designed to infect them with malware. SECONDDATE’s existence was first reported by The Intercept in 2014, as part of a look at a global computer exploitation effort code-named TURBINE. The malware server, known as FOXACID, has also been described in previously released Snowden documents.
Other documents released by The Intercept today not only tie SECONDDATE to the ShadowBrokers leak but also provide new detail on how it fits into the NSA’s broader surveillance and infection network. They also show how SECONDDATE has been used, including to spy on Pakistan and a computer system in Lebanon.
The top-secret manual that authenticates the SECONDDATE found in the wild as the same one used within the NSA is a 31-page document titled “FOXACID SOP for Operational Management” and marked as a draft. It dates to no earlier than 2010. A section within the manual describes administrative tools for tracking how victims are funneled into FOXACID, including a set of tags used to catalogue servers. When such a tag is created in relation to a SECONDDATE-related infection, the document says, a certain distinctive identifier must be used:
The same SECONDDATE MSGID string appears in 14 different files throughout the ShadowBrokers leak, including in a file titled SecondDate-3021.exe. Viewed through a code-editing program (screenshot below), the NSA’s secret number can be found hiding in plain sight:
All told, throughout many of the folders contained in the ShadowBrokers’ package (screenshot below), there are 47 files with SECONDDATE-related names, including different versions of the raw code required to execute a SECONDDATE attack, instructions for how to use it, and other related files.
.
After viewing the code, Green told The Intercept the MSGID string’s occurrence in both an NSA training document and this week’s leak is “unlikely to be a coincidence.” Computer security researcher Matt Suiche, founder of UAE-based cybersecurity startup Comae Technologies, who has been particularly vocal in his analysis of the ShadowBrokers this week, told The Intercept “there is no way” the MSGID string’s appearance in both places is a coincidence.
Where SECONDDATE Fits In
This overview jibes with previously unpublished classified files provided by Snowden that illustrate how SECONDDATE is a component of BADDECISION, a broader NSA infiltration tool. SECONDDATE helps the NSA pull off a “man in the middle” attack against users on a wireless network, tricking them into thinking they’re talking to a safe website when in reality they’ve been sent a malicious payload from an NSA server.According to one December 2010 PowerPoint presentation titled “Introduction to BADDECISION,” that tool is also designed to send users of a wireless network, sometimes referred to as an 802.11 network, to FOXACID malware servers. Or, as the presentation puts it, BADDECISION is an “802.11 CNE [computer network exploitation] tool that uses a true man-in-the-middle attack and a frame injection technique to redirect a target client to a FOXACID server.” As another top-secret slide puts it, the attack homes in on “the greatest vulnerability to your computer: your web browser.”
One slide points out that the attack works on users with an encrypted wireless connection to the internet.
That trick, it seems, often involves BADDECISION and SECONDDATE, with the latter described as a “component” for the former. A series of diagrams in the “Introduction to BADDECISION” presentation show how an NSA operator “uses SECONDDATE to inject a redirection payload at [a] Target Client,” invisibly hijacking a user’s web browser as the user attempts to visit a benign website (in the example given, it’s CNN.com). Executed correctly, the file explains, a “Target Client continues normal webpage browsing, completely unaware,” lands on a malware-filled NSA server, and becomes infected with as much of that malware as possible — or as the presentation puts it, the user will be left “WHACKED!” In the other top-secret presentations, it’s put plainly: “How do we redirect the target to the FOXACID server without being noticed”? Simple: “Use NIGHTSTAND or BADDECISION.”
The sheer number of interlocking tools available to crack a computer is dizzying. In the FOXACID manual, government hackers are told an NSA hacker ought to be familiar with using SECONDDATE along with similar man-in-the-middle wi-fi attacks code-named MAGIC SQUIRREL and MAGICBEAN. A top-secret presentation on FOXACID lists further ways to redirect targets to the malware server system.
To position themselves within range of a vulnerable wireless network, NSA operators can use a mobile antenna system running software code-named BLINDDATE, depicted in the field in what appears to be Kabul. The software can even be attached to a drone. BLINDDATE in turn can run BADDECISION, which allows for a SECONDDATE attack:
Elsewhere in these files, there are at least two documented cases of SECONDDATE being used to successfully infect computers overseas: An April 2013 presentation boasts of successful attacks against computer systems in both Pakistan and Lebanon. In the first, NSA hackers used SECONDDATE to breach “targets in Pakistan’s National Telecommunications Corporation’s (NTC) VIP Division,” which contained documents pertaining to “the backbone of Pakistan’s Green Line communications network” used by “civilian and military leadership.”
In the latter, the NSA used SECONDDATE to pull off a man-in-the-middle attack in Lebanon “for the first time ever,” infecting a Lebanese ISP to extract “100+ MB of Hizballah Unit 1800 data,” a special subset of the terrorist group dedicated to aiding Palestinian militants.
SECONDDATE is just one method that the NSA uses to get its target’s browser pointed at a FOXACID server. Other methods include sending spam that attempts to exploit bugs in popular web-based email providers or entices targets to click on malicious links that lead to a FOXACID server. One document, a newsletter for the NSA’s Special Source Operations division, describes how NSA software other than SECONDDATE was used to repeatedly direct targets in Pakistan to FOXACID malware web servers, eventually infecting the targets’ computers.
A Potentially Mundane Hack
Snowden, who worked for NSA contractors Dell and Booz Allen Hamilton, has offered some context and a relatively mundane possible explanation for the leak: that the NSA headquarters was not hacked, but rather one of the computers the agency uses to plan and execute attacks was compromised. In a series of tweets, he pointed out that the NSA often lurks on systems that are supposed to be controlled by others, and it’s possible someone at the agency took control of a server and failed to clean up after themselves. A regime, hacker group, or intelligence agency could have seized the files and the opportunity to embarrass the agency.Documents
Documents published with this story:- NSA Central Security Service: FOXACID SOP for Operational Management of FOXACID Infrastructure (Draft)
- Wireless LAN / CNE Tool Training Course and Evaluation
- Course introduction
- Introduction to WLAN / 802.11 Active CNE Operations
- Introduction to BADDECISION
http://www.einnews.com/article/340892211/MYt-As9biPDdF_xo
Yesterday at 10:04 am by Rocky
» Al-Alaq: The monetary situation in Iraq is excellent and our reserves support the stability of the e
Yesterday at 8:29 am by Rocky
» utube 11/23/24 MM&C Reporting-Expectations are High-IMF-Flexible Exchange Rate Regime-Pr
Yesterday at 6:33 am by Rocky
» utube 11/25/24 MM&C MM&C Iraq News-CBI Building Final Touches-Oil Exports-Development Road-Turkey-B
Yesterday at 6:33 am by Rocky
» Parliamentary movement to include the salary scale in the next session
Yesterday at 5:11 am by Rocky
» Parliamentary Finance Committee reveals the budget paragraphs included in the amendment
Yesterday at 5:10 am by Rocky
» Al-Maliki calls on the Bar Association to hold accountable members who violate professional conduct
Yesterday at 5:08 am by Rocky
» Politician: The security agreement with America has many aspects
Yesterday at 5:07 am by Rocky
» Kurdistan Planning: More than 6 million people live in the region, the oldest of them is 126 years o
Yesterday at 5:05 am by Rocky
» Al-Alaq: Arab consensus on the role of central bank programs in addressing challenges
Yesterday at 5:03 am by Rocky
» Economics saves from political drowning
Yesterday at 5:02 am by Rocky
» Agriculture calls for strict ban on import of "industrial fats" and warns of health risks
Yesterday at 5:01 am by Rocky
» Iraq is the fourth largest oil exporter to China
Yesterday at 5:00 am by Rocky
» Railways continue to maintain a number of its lines to ensure the smooth running of trains
Yesterday at 4:59 am by Rocky
» Parliament resumes its sessions tomorrow.. and these are the most important amendments in the budget
Yesterday at 4:58 am by Rocky
» Bitcoin Fails to Continue Rising as It Approaches $100,000
Yesterday at 4:57 am by Rocky
» Minister of Planning: There will be accurate figures for the population of each governorate
Yesterday at 4:56 am by Rocky
» Popular Mobilization Law is ready for voting
Yesterday at 4:54 am by Rocky
» Mechanisms for accepting people with disabilities into postgraduate studies
Yesterday at 4:52 am by Rocky
» Government coordination to create five thousand jobs
Yesterday at 4:51 am by Rocky
» Transport: Next month, a meeting with the international organization to resolve the European ban
Yesterday at 4:50 am by Rocky
» Census is a path to digital government
Yesterday at 4:49 am by Rocky
» Calls to facilitate loans and reduce interest rates for the private sector
Yesterday at 4:47 am by Rocky
» The launch of the third and final phase of the "population census"
Yesterday at 4:46 am by Rocky
» Al-Sudani: We have accomplished a step that is the most prominent in the framework of planning, deve
Yesterday at 4:44 am by Rocky
» Justice discusses modern mechanisms to develop investment in real estate and minors’ money
Yesterday at 4:43 am by Rocky
» Dubai to host Arabplast exhibition next month
Yesterday at 4:41 am by Rocky
» Al-Tamimi: Integrity plays a major role in establishing the foundations of laws that will uphold jus
Yesterday at 4:39 am by Rocky
» Reaching the most important people involved in the "theft of the century" in Diyala
Yesterday at 4:38 am by Rocky
» Transportation: Completion of excavation works and connection of the immersed tunnel manufacturing b
Yesterday at 4:36 am by Rocky
» Between internal and regional challenges... Formation of the Kurdistan government on a "slow fire" a
Yesterday at 4:35 am by Rocky
» Kurdistan Region Presidency: We will issue a regional order to determine the first session of parlia
Yesterday at 4:34 am by Rocky
» The Minister of Foreign Affairs announces the convening of the Ambassadors Conference tomorrow, Mond
Yesterday at 4:33 am by Rocky
» Al-Sudani: Iraq must always be at the forefront
Yesterday at 4:32 am by Rocky
» Al-Mashhadani: We support the Foreign Ministry in confronting any external interference that affects
Yesterday at 4:31 am by Rocky
» Al-Sudani chairs meeting with Oliver Wyman delegation
Yesterday at 4:29 am by Rocky
» Half a million beggars in Iraq.. 90% of them receive welfare salaries
Yesterday at 4:27 am by Rocky
» Sudanese announces preliminary results of the general population and housing census in detail
Yesterday at 4:26 am by Rocky
» The centenary of the Iraqi Ministry of Foreign Affairs.. A journey of challenges and achievements
Yesterday at 4:25 am by Rocky
» Prime Minister's Advisor Announces Assignment of Two International Companies to Study Iraqi Banking
Yesterday at 4:23 am by Rocky
» Agriculture: Integrated Support Project Provides 1,333 Job Opportunities
Yesterday at 4:22 am by Rocky
» The Media and Education Commission discuss introducing advanced curricula related to artificial inte
Yesterday at 4:20 am by Rocky
» Al-Mashhadani’s First Test: Discussing Israeli Threats and Avoiding Controversial Laws
Yesterday at 4:20 am by Rocky
» By name.. A parliamentary bloc reveals that five ministers will be questioned at the end of the legi
Yesterday at 4:19 am by Rocky
» The financial budget is subject to political and economic amendments in the next parliamentary sessi
Yesterday at 4:18 am by Rocky
» Will the government's efforts succeed in ending the electricity crisis in Iraq?
Yesterday at 4:17 am by Rocky
» Baghdad Airport Customs Increased to 400% After Implementing Automation
Yesterday at 4:16 am by Rocky
» EU: Integrated Support Project in Iraq Creates Jobs in Agriculture and Youth
Yesterday at 4:15 am by Rocky
» Al-Sudani attends the centenary ceremony of the establishment of the Ministry of Foreign Affairs
Yesterday at 4:13 am by Rocky
» Al-Mashhadani: We seek to keep foreign policy away from alignments that harm Iraq’s unity and sovere
Yesterday at 4:12 am by Rocky
» The Iraqi government is working to develop a competitive banking system and support the private sect
Yesterday at 4:10 am by Rocky
» Al-Alaq: Arab consensus on the role of central bank programs in addressing challenges
Yesterday at 4:09 am by Rocky
» Regional markets rise in first session of the week
Yesterday at 4:08 am by Rocky
» Kurdistan Region Presidency: We will issue an order to set the first session of the regional parliam
Yesterday at 4:06 am by Rocky
» Political differences hinder oil and gas law legislation
Yesterday at 4:05 am by Rocky
» Government coordination to create new job grades for graduates
Yesterday at 4:04 am by Rocky
» The financial budget is subject to amendments in the next parliamentary session
Yesterday at 4:03 am by Rocky
» Alsumaria Newsletter: Iraq reaches the final stages of the census and Parliament resumes its session
Yesterday at 4:01 am by Rocky
» After the elites and workers... Iranian factories "migrate" to Iraq
Yesterday at 3:58 am by Rocky
» Beggars in Iraq "refuse" welfare salaries.. Their profits are 10 times the salary!
Yesterday at 3:57 am by Rocky
» Amending the Election Law... A Means to Restore the Dilapidated Legitimacy
Yesterday at 3:56 am by Rocky
» Prime Minister announces population census results, Iraq reaches 45 million mark
Yesterday at 3:54 am by Rocky
» Find out the dollar exchange rates in the Iraqi markets
Yesterday at 3:53 am by Rocky
» Kurdistan Interior Ministry: General amnesty does not include those accused of killing women
Yesterday at 3:52 am by Rocky
» utube 11/21/24 MM&C MM&C News Reporting-Global Trade-Best Route in World-Purchase Power-Justice-Cen
Sun 24 Nov 2024, 6:58 am by Rocky
» Al-Sudani discusses with the Secretary-General of the Digital Cooperation Organization enhancing dig
Sun 24 Nov 2024, 6:56 am by Rocky
» President of the Republic: Partnership with the United States is essential to achieve regional stabi
Sun 24 Nov 2024, 6:54 am by Rocky
» Mazhar Saleh reveals details of the 2023 budget and the 2024 budget horizon
Sun 24 Nov 2024, 5:18 am by Rocky
» Absent control and rising corruption.. Sudan faces a harsh political winter
Sun 24 Nov 2024, 5:16 am by Rocky
» A representative shows the laws prepared for voting during the upcoming sessions.
Sun 24 Nov 2024, 5:14 am by Rocky
» Corrupt people in it.. Independent MP criticizes the performance of Al-Sudani's government
Sun 24 Nov 2024, 5:13 am by Rocky
» Parliamentary Oil Committee reveals government move to end electricity crisis
Sun 24 Nov 2024, 5:11 am by Rocky
» The Administrative Court postpones consideration of the lawsuit on the legitimacy of the Kirkuk gove
Sun 24 Nov 2024, 5:10 am by Rocky
» MP: The ministerial reshuffle depends on consensus within the state administration
Sun 24 Nov 2024, 5:09 am by Rocky
» Politicians put question marks on Al-Sudani: corruption, espionage and serving foreign interests
Sun 24 Nov 2024, 5:08 am by Rocky
» The International Union of Arab Bankers honors the Chairman of the Private Banks Association: A prom
Sun 24 Nov 2024, 5:03 am by Rocky
» Industry: Contracts to supply state ministries with food products
Sun 24 Nov 2024, 5:02 am by Rocky
» After Shell Withdrawal, American Company Heads to Implement Al-Nibras Project in Iraq
Sun 24 Nov 2024, 5:01 am by Rocky
» Revealing the fate of the Chinese deal in Iraq.. It was disrupted by this party
Sun 24 Nov 2024, 5:00 am by Rocky
» The Central Bank of Iraq 77 years of challenges and reforms
Sun 24 Nov 2024, 4:57 am by Rocky
» "Unprecedented numbers"... American "CNN" talks about tourism in Iraq
Sun 24 Nov 2024, 4:56 am by Rocky
» After implementing automation, Baghdad Airport Customs jumps 400 percent
Sun 24 Nov 2024, 4:55 am by Rocky
» Iraq participates in sustainable development activities
Sun 24 Nov 2024, 4:53 am by Rocky
» Al-Sudani opens 790 model schools
Sun 24 Nov 2024, 4:52 am by Rocky
» Parliamentary Culture: The Right to Information Law will satisfy all parties
Sun 24 Nov 2024, 4:51 am by Rocky
» Al-Mashhadani to {Sabah}: Tomorrow we will discuss the Zionist threats
Sun 24 Nov 2024, 4:50 am by Rocky
» Industry to {Sabah}: Contracts to supply state ministries with food products
Sun 24 Nov 2024, 4:49 am by Rocky
» Trade cooperation between Najaf and Isfahan
Sun 24 Nov 2024, 4:48 am by Rocky
» {New building} and {electronic systems} to develop forensic medicine
Sun 24 Nov 2024, 4:47 am by Rocky
» A specialized center for monitoring the environmental situation in the capital
Sun 24 Nov 2024, 4:46 am by Rocky
» International and parliamentary praise for the success of the "population census" process
Sun 24 Nov 2024, 4:45 am by Rocky
» The European Union organizes a workshop in Basra on central administration and the wealth distributi
Sun 24 Nov 2024, 4:42 am by Rocky
» The Media Authority and the Ministry of Education discuss the importance of enhancing and introducin
Sun 24 Nov 2024, 4:41 am by Rocky
» Iraq's oil exports to America rose last week
Sun 24 Nov 2024, 4:40 am by Rocky
» Electricity announces loss of 5,500 megawatts due to complete halt of Iranian gas supplies
Sun 24 Nov 2024, 4:39 am by Rocky
» Tomorrow.. The Arab League is looking to unify its position against Israeli intentions to strike Ira
Sun 24 Nov 2024, 4:37 am by Rocky
» The Central Bank moves its secret vaults to its new building.. Clarification of the truth of the cla
Sun 24 Nov 2024, 4:35 am by Rocky
» Network reveals the fate of the Chinese deal.. It was disrupted by "Iraqi officials"
Sun 24 Nov 2024, 4:34 am by Rocky
» From the White House to the "Leaders of Iraq"... A Message Regarding the Targeting of Baghdad
Sun 24 Nov 2024, 4:33 am by Rocky