DI BERI PERINGATAN & NASIHAT 

Kita mudah memutuskan (menghukum) sesuatu perlakuan atau perbuatan seseorang dengan menggunakan mata sebagai hakim. Apatah lagi jika perlakuan atau perbuatan mereka membuatkan kita merasa sakit hati.

Mengapa berkelakuan sedemikian? Perlukah kita terus sahaja membenci atau seharusnya memikirkan terlebih dahulu baik atau buruk perbuatan itu. Dan mungkin juga seharusnya dinilai terlebih dahulu kewajaran atau tidak wajar sesuatu perbuatan berkenaan sebelum membiarkan kemarahan dan kebencian meruap dan mengaburi norma akal.

Penilaian akal sahaja amatlah berbeza dengan penilaian akal bersama hati (iman). 

Masih ingatkah akan kisah pengembaraan Nabi Musa a.s dengan Nabi Khidir a.s? 

Bagaimana sekiranya jika perbuatan seseorang itu terhadap kita merupakan tanda pertolongan serta kasih sayang mereka terhadap diri kita, yang mungkin tidak mampu untuk memahaminya. Ketahuilah bahawa tidak semestinya seseorang itu perlu melaungkan niat serta hasrat baiknya dalam melaksanakan sesuatu perbuatan. 

Kita amat membencinya akibat perbuatan mereka yang melibatkan kepentingan kita. Namun, berkemungkinan orang itu melakukannya atas pengetahuan serta tanggungjawab berlandaskan Al Quran dan Sunnah. Yang mana, jika dibiarkan dan tidak dilakukan akan menjerumuskan kita lebih jauh dalam perbuatan yang menzalimi diri sendiri serta keluarga. 

Setiap kita berhak menyayangi serta mencintai. Namun, jangan biarkan perasaan sayang dan cinta itu berkompromi dengan nafsu sehingga hak-hak keadilan serta tuntutan syariat ditinggalkan. Sebagai muslim mari fikirkan, adakah cara kita menyayangi serta mengasihi sesuatu itu berlandaskan syariat? Bagaimana dikatakan menyayangi serta mengasihi ciptaan Allah SWT dengan tanpa menunaikan hakNya?

Oleh itu, belajarlah untuk berlapang dada serta berfikir dengan sewajarnya. Renungilah kisah Nabi Musa a.s dengan Nabi Khidir a.s kerana pengajaran daripadanya amat bernilai. Usahakanlah untuk diri kita dengan menghayati perintah serta larangan Allah SWT dengan ilmu bermanfaat serta amal yang benar seperti yang dituntut syariat.

Diriwayatkan bahawa Imam Hasan Al-Basri rahimahullah (wafat 110 H) berkata; 

” Kehidupan di dunia ini ibarat 3 hari, semalam telah pun berlalu termasuk apa yang ada di dalamnya. Adapun esok mungkin kau tidak akan menemuinya. Maka hari ini adalah bagimu untuk engkau beramal di dalamnya”

​Allah SWT berfirman:

“(Al-Quran) ini disampaikan kepada manusia supaya mereka diberi ingat dan diberi nasihat dengannya; dan supaya mereka mengetahui (dengan hujjah-hujjah yang tersebut di dalamnya) bahawa sesungguhnya Allah ialah Tuhan Yang Maha Esa; dan supaya orang-orang yang mempunyai fikiran, beringat dan insaf.” 

(Ibrahim: Ayat 52)

Allah SWT berfirman:

“Sesungguhnya Allah menyuruh berlaku adil, dan berbuat kebaikan, serta memberi bantuan kepada kaum kerabat; dan melarang daripada melakukan perbuatan-perbuatan yang keji dan mungkar serta kezaliman. Ia mengajar kamu (dengan suruhan dan laranganNya ini), supaya kamu mengambil peringatan mematuhiNya.”

(An-Nahl: Ayat 90)

APA YANG DI CARI PADA UMUR BEGINI

Apa yg dicari pd saat umur begini

Apakah kekayaan yg menjadi mimpi

Tidak ku mampu mengejarnya berlari

Dek sifatnya mengganggu akal dan hati

Ku berjalan pagi dan malam silih berganti

Merenungi umur ku yang sentiasa melewati

Ah..sudah hampirnya waktu untuk ku pergi

Apakah bekalan ku nanti sudah mencukupi

Apa yg dicari pd saat umur begini

Apakah kemewahan yg menjadi mimpi

Aku tinggalkan keduanya dengan menyendiri

Bersembunyi memahami tuntutan Ilahi

Kerana hati mulai memahami

Semuanya ujian daripada Ilahi

Aku bersembunyi membaca dan mengaji

Perlahan merangkak kemudian berdiri

Masih juga resah di hati

Takut nanti tidak diredhai

Bersyukur aku dengan cara bersembunyi

Takut diintai nafsu dan dengki

Ya Ilahi lindungilah hati dan sembunyikan diri

Agar tetap ku dijalan yang ini

Biar dibenci manusia di bumi

Asalkan disukai di langit yang pasti

Semoga dipermudahkan perjalanan ku nanti

Kerana hati mulai memahami

Lemah aku berdiri sendiri

Tanpa nikmat darinya Ilahi

Apa yg cukup saat umur ku begini

Untuk ku harungi kegelapan nanti 

Bekalan yg utama bukan duniawi

Melainkan perintah dan suruhan dari Ilahi

Wallahua’lam.

Skandal Rasuah Jabatan Air Negeri Sabah 

​Memetik sebuah laporan berunsur fitnah daripada portal media sosial oh!media & milosuam.

Untuk makluman, Kes tersebut telah pun dituduh di mahkamah pada bulan Disember 2016 lalu. YDS telah pun dituduh di bawah Akta Suruhanjaya Pencegahan Rasuah Malaysia (ASPRM) & Anti-Money Laundering, Anti-Terrorism Financing and Proceeds of Unlawful Activities Act (AMLATFAPUAA). YDS juga telah gagal untuk membayar wang ikat jamin sebanyak RM10 juta & kini berada di penjara sementara menunggu perbicaraan yang akan bersambung semula pada bulan Mac 2017

http://www.astroawani.com/berita-malaysia/bekas-pengarah-jans-sabah-isteri-dan-seorang-lagi-dituduh-seleweng-rm61-48-juta-127271

https://www.sayangsabah.com/rasuah-bekas-pengarah-jans-dan-dua-individu-dihadapkan-ke-mahkamah-sesyen/

http://www.hmetro.com.my/node/192538

http://www.bernama.com/bernama/v8/bm/newsindex.php?id=1315300

http://www.medialantang.com/2016/12/29/tiga-termasuk-bekas-pengarah-jans-didakwa-seleweng-rm3-3b/

http://www.mstar.com.my/berita/berita-mahkamah/2016/12/29/wang-jaminan-12-juta/
Sebagai sebuah negara berdaulat dan merdeka, kita mempunyai hak dan tanggungjawab yang cukup besar dalam mencorak dan menentukan acuan yang paling sesuai untuk rakyat dan negara kita. Pengendali-pengendali media sosial perlu sedar bahawa setiap penulisan, pandangan dan laporan yang diterbitkan oleh mereka mampu mencorak pemikiran rakyat Malaysia. Hampir 99% rakyat Malaysia lebih gemar mendapatkan berita daripada media sosial berbanding berita daripada media mainstream

Sehubungan itu, adalah amat penting setiap laporan dan penerbitan oleh pengendali-pengendali media sosial ini dibuat secara berhemah, dengan penuh rasa kebertanggungjawaban dan bukannya hanya mementingkan rating like, share dan komen yang tinggi sahaja.
Pengendali-pengendali media sosial juga harus sentiasa berwaspada dan mengelakkan daripada menerbitkan sebarang tulisan yang mempunyai kecenderungan menghasut yang boleh menggugat keharmonian yang dinikmati. INGATLAH BAHAWA ANDA JUGA BOLEH DIKENAKAN TINDAKAN MENGIKUT AKTA FITNAH 1957.

Akhir kata, ingin saya kongsikan Hadis 34- Merubah Kemungkaran.

Dari Abu Sa’id Al Khudri radiallahuanhu berkata : Saya mendengar Rasulullah shallallahu`alaihi wa sallam bersabda: “Siapa yang melihat kemungkaran maka rubahlah dengan tangannya, jika tidak mampu maka rubahlah dengan lisannya, jika tidak mampu maka (tolaklah) dengan hatinya dan hal tersebut adalah selemah-lemahnya iman.”

(Riwayat Muslim)

Marilah kita bersama-sama mengambil prisip hadis 34 ini dalam usaha memerangi gejala rasuah, katakan BENCI RASUAH, TOLAK RASUAH & PERANGI RASUAH.

-credit to jB

7 HABITS OF SMART THREAT INTELLIGENCE ANALYST 

analysts, threat intelligence

[Posted in Cyber Threat Intelligence]

A day in the life of a threat intelligence analyst is often hectic and ever-changing.

Threats and related data abound, and an analyst must look at all angles and scenarios before making recommendations.

As information security, in general, garners more interest throughout the enterprise, an analyst’s time is more in demand and he or she might be required to provide frequent updates or participate in meetings to which they’ve never previously been invited.

Collaboration with IT, incident response, SOC (security operations center), and architecture teams is increasingly important, too. And then there’s the constant need to keep abreast of new tactics, techniques, and procedures (TTPs) of adversaries and geopolitical events that could impact the threat landscape.
How can a threat analyst keep up?

With so much to do each and every day, smart threat intelligence analysts practice habits that make them more effective and efficient. Below we’ve outlined seven of those habits so you can provide your organization even more value.

Turn Off to Tune In

One of the hardest things for most people is temporarily ignoring emails, instant messages, social media, and other digital communications while we work on projects and assignments throughout the day. It isn’t that we all have attention deficit disorder; we’re trying to be responsive and communicative, which are prized attributes of any co-worker, partner, vendor, or boss.

This “always-on” communication style, however, can be detrimental to the quality of our work. If there’s one thing smart intelligence analysts don’t want to do, it’s lose sight of the potential threats to our strategic assets because of trivial distractions.

Allotting dedicated research time allows threat analysts to focus on the task at hand without becoming distracted by external chatter. Sure, some chatter might be relevant to a project scope, but for the most part, emails can wait and social media posts will still be there at the end of the day. If an emergency arises, that antiquated technology called “the telephone” can be an alternate form of communication.

Smart threat intelligence analysts are in the habit of setting boundaries and letting co-workers know there will be certain times throughout the day that they’ll focus on threat research without distraction: Open, read, and respond to email, internal chat (instant messages, Skype, water cooler talk), and social media no more than twice a day. I promise they’ll still be there awaiting your reply at lunch and at 5 o’clock.

Keep Yourself in Check

Have you ever had a day when you finally look up at the clock and think, “Wow! It’s 3:00 PM already,” yet you can’t account for that time?

Of course; we all have. 

Another habit of savvy threat analysts is keeping track of his or her time and accomplishments throughout the day.

Per the suggested habit above, it’s incredibly easy to spend the bulk of one’s time lost in email chains or social media discussions, which brings us to the second habit of highly productive analysts: Keep a detailed time management journal to understand where the bulk of your time and effort is spent. 

Most threat analysts are surprised at the results after only a few weeks of logging their time. Just as it’s recommended for people trying to lose weight to keep a food journal, a time-management journal will keep a threat analyst on track and identify the places where “cheating” occurs.

Sometimes a threat analyst will find that he or she isn’t wasting time at all. And the opposite may be true; the analyst is taking on too many responsibilities and cannot focus as precisely as the job requires. A time management journal will not only help keep your actions in check, but it will help the department understand how much effort is already spent identifying threats and indicators of compromise.

Broaden Your Horizons

For many threat analysts, their number one problem is finding the time during the day to accomplish everything (see points one and two above). Even with laser-focused task management, the sheer amount of data that needs to be identified, correlated, and analyzed is overwhelming, so the idea of dedicating time to something other than threat research is laughable … on the surface only.

Successful analysts understand that threat analysis doesn’t exist in a vacuum. An analyst needs to have an idea of how threat actors think (behavioral analysis), grasp new technologies and techniques actors might be using (technical skills), and have a sense of what’s going on in the world (situational awareness) that might impact threats to the organization.

The third habit of smart intelligence analysts is that they dedicate 30 minutes each day to education outside their core competency. Spend a bit of time every morning before embarking on regular projects to learn a new coding or spoken language or watch a webinar on how to use a new tool.

Taking time to do these things will increase your skill set and make you a better, more well-rounded threat analyst. There’s a fallacy in information security that technical skills are the only ones that matter. Not true; the best security, risk, and threat professionals are those that understand context and see beyond the bits and bytes to proactively put protective measures in place. Make ongoing learning a habit and you’ll see dividends pay off in spades.

Slow Down, You Move Too Fast

Remember this Simon and Garfunkel song? It turns out that, while written in 1966, right at the start of the hippie movement, the songwriters were onto something. They probably could not have foreseen the go-go-go culture security professionals live in today, but the fact is that there’s so much data everywhere and we’re all so connected all of the time that we often don’t slow down and pay enough attention to some of the things that really matter.

Effective threat analysts are intentional about slowing down and focusing on critical reading. Take the time to think about what you’re reading: what does this mean? Is it relevant to your organization? If it’s a general risk, could it become a targeted threat? How?

Smart threat analysts know that not all direct threats come wrapped in a package with a note that reads: “I’m here!” Honing in on the context of critical reading will allow you to find the subtleties that others might miss while they’re “multitasking.”

Getting to Know You

Technology is a fantastic tool and enabler, and cyber threats leverage technology for malicious purposes. The problem, however, is human behavior, not code.

The adversaries behind the tools and techniques are the ones writing the malware that infects corporate systems and steals the data. Someone has to program the bots, and it’s only through the understanding of human behavior and what motivates specific types of people that a threat analyst will be effective. Sharp threat analysts take time to understand the person or people perpetrating cyber crimes. Make it a habit to continually ask:

Who’s an adversary?

What are some common traits?

What motivates them?

What are their TTPs?

Who’s a temporary threat actor, and are the TTPs they use dramatically different?

Why?

The psychology behind threat actor motivations is not an easy task, and threat analysts can’t be expected to also be psychologists. However, learning to identify certain types of characteristics and habits of threat actors will help threat analysts follow a more logical path. Learn about adversary motivations and TTPs — and always keep learning — and you’ll be one step closer to identifying the threats launched against your company.

Prioritize Based on Available Information

Because there are so many potential threats and so much data that could support any given threat, analysts are challenged by information overload and knowing when to put a stake in the ground. And while strategic threat intelligence is becoming more commonplace, it’s still the norm to chase threats.

What this means is that, while we still have a plethora of data at hand, and projects could live on indefinitely, another habit of smart threat analysts is to prioritize information and reporting based on available information and use that to estimate the time it will take to deliver finished intelligence.

Reporting is a key component of successful threat intelligence, and executives and the board will expect updates. By examining information at hand and using that to calculate how long any given project will take, threat analysts can focus on meeting timelines.

Incidentally, a timeline doesn’t mean that an intelligence project is complete; it only means that there are logical points throughout the process when others in the organization can expect to receive intelligence updates and plan workflows around them.

For example, the architecture team might need to tune controls based on the current threat status. While the status might change, it’s important to reflect the level of controls needed for the situation at the moment. While timelines are helpful — they set a goal — the timeline should be adjusted once the threat analyst knows what information s/he is working with and has, at least, a high-level understanding of what can reasonably be delivered.

Know Your Audience

Smart intelligence analysts make it a habit to focus on the people most likely to impact the business.

In other words, key business leaders with the ability to influence organizational operations are the primary people for which threat analysts should tailor their work. If the director of IT, for instance, is the one holding the purse strings when it comes to implementing new technologies or dedicating resources to a project, focus on delivering timely and actionable information to the director of IT. If the CEO calls the shots on all strategic projects, make sure she receives and understands the work you deliver.

The goal of threat analysis is to provide the intelligence that allows the organization to ward off threats before they impact the business and allow the business to run seamlessly and efficiently so profits and market share increase. To accomplish this, know your business decision makers and influencers and produce a product that helps them do their job more effectively. In doing so, you’ll increase the value of threat intelligence and become an even more valued team player.

Conclusion

By practicing these seven habits you’ll learn to work smarter and improve the quality of your threat intelligence product.

Old habits are hard to change. As the late, great David Bowie sang, “Turn and face the strange.” While these habits might not seem comfortable at first, with these guidelines and a little effort, incremental changes will exponentially increase your accuracy with and efficiency of your threat predictions and recommendations.

– Recorded Future 

​PIRATES ATTACKING BIGGER SHIP FOR RANSOM MONEY

Asian pirates are focusing more of their attacks on larger merchant ships near the Philippines, hoping for bigger ransom payments from kidnapping their crew, the head of a regional anti-piracy body said today.
The region’s pirates have changed tactics since October, to target some of the biggest ships travelling through the Sulu and Celebes Seas, and paying less attention to small tugs and fishing boats.

The growing problem has prompted Indonesia, Malaysia and the Philippines to step up air and sea patrols in the waters, through which about US$40 billion worth of cargo passes each year.

“Big ships belong to bigger owners, so maybe they think bigger owners can pay more money as a ransom,” said Masafumi Kuroki, executive director of the Regional Cooperation Agreement on Combating Piracy and Armed Robbery against Ships in Asia (ReCAAP).

The group, which has 20 member states, helps coordinate information about maritime piracy incidents.

Maritime experts recommend that vessels in the area adopt measures similar to those taken against pirates off Somalia and the Indian Ocean, including evasive action such as zig-zagging, speeding up and shining powerful lights on the attackers.

“Our advice is that the area should be avoided if at all possible,” said Gerry Northwood, chief operating officer at armed guard company, Maritime Asset Security and Training (MAST).

Some 48 crew have been abducted in 16 attacks in the Sulu-Celebes Seas since March, of which 15 remain captive, according to ReCAAP.

In November, four large merchant vessels, including the 179,191-deadweight-tonne (DWT) capesize iron ore carrier Kumiai Shagang, were chased by armed pirates in speed boats during separate attempted attacks in the Sulu and Celebes Seas.

Abu Sayyaf militants have claimed responsibility for many of the attacks in the area. Land-based operations by the Philippine military against the group have led militants to focus more on soft targets at sea, Kuroki said.

Despite this rise in abductions, the number of overall pirate attacks in Asia dropped to its lowest level since ReCAAP was launched in 2006 to 86 incidents in 2016, down from 203 in 2015, partly due to better co-ordination by littoral states and adoption of anti-piracy measures by shippers.

– Reuters

KENDERAAN DIPANDU PRAMUGARI TERBALIK

13 Januari 2017 

Sepang: Pramugari berdepan detik mencemaskan apabila kereta dinaiki terbalik di Jalan Perkeliling arah klia2 berhampiran stesen minyak, di sini, 8 pagi tadi.

Difahamkan, kereta Proton Saga dipandu lelaki berusia 39 tahun itu melanggar belakang kereta Perodua Myvi sebelum terbalik

Sumber polis ketika dihubungi berkata, Perodua Myvi itu dipercayai dalam perjalanan dari arah Banting, Selangor ke klia2 dan apabila tiba di tempat kejadian, pemandunya memandu di lorong tengah.

“Bagaimanapun, secara tiba-tiba kereta Proton Saga yang dari arah belakang terus melanggar bahagian belakang kereta itu dan terbalik,” katanya.

Menurutnya, pemandu Perodua Myvi berusia 32 tahun dan pemandu Proton Saga tidak cedera. Penumpang Proton Saga juga tidak cedera.

“Hasil siasatan mendapati, pemandu Proton Saga itu belum membuat laporan polis,” katanya.

Katanya, kes disiasat mengikut Peraturan 10 Kaedah-Kaedah Lalu Lintas, Akta Pengangkutan Jalan 166/59.Á

– source: Twitter 

TURKEY HOPES FOR TRUMP

 13 JANUARY 2017 @ 8:05 AM BY REUTERS 

ANKARA: Turkey hopes the incoming US administration under President-elect Donald Trump will “correct the mistake” of allying with the Syrian Kurdish YPG militia in the fight against Islamic State, Defence Minister Fikri Isik said on Thursday. 

Turkey views the YPG as an extension of the PKK militant group, which has waged a three-decade insurgency in Turkey and is considered a terrorist organisation by Ankara, the United States and the European Union. Isik was speaking at a conference of Turkish ambassadors in the capital Ankara.

 — Reuters