Disqus for Cyber Fort

Showing posts with label e news. Show all posts
Showing posts with label e news. Show all posts

Friday 15 November 2013

World's Top 10 Intelligence Agency

Be The First To Comment
An Intelligence Agency is an effective instrument of a national power. Aggressive intelligence is its primary weapon to destabilize the target. Indeed, no one knows what the intelligence agencies actually do so figuring out who the best intelligence service is can be difficult. The very nature of intelligence often means that the successes will not be public knowledge for years, whereas failures or controversial operations will be taken to the press. It’s a thankless situation. Still, from what little has emerged, one can have an idea of some of the better intelligence services out there, with the understanding that this is based on incomplete data.

1) Research and Analysis Wing (RAW), India

RAW India
image credit:- www.zeenews.com

Formed                                    21 September 1968
Headquarters                          New Delhi
IndiaAgency executive           K. C. Verma
Secretary (R)Parent agency   Prime Minister’s Office, GoI

Founded in 1968, the Research and Analysis Wing (RAW), initially, focused its activities in India’s immediate neighbour hood but with the changing profile of New Delhi’s geo-political interests, it has spread its wings to other regions across the world. The agency is headquartered in New Delhi. Its chief directly reports to the Prime Minister and its operations do not come under the purview of Parliament. Often termed as an effective instrument of India’s national power, the RAW is believed to employ more than eight thousand field agents spread across the world.


2) Inter Service Intelligence (ISI), Pakistan

ISI pAKISTAN

Formed

 1948
Jurisdiction Government of Pakistan
Headquarters Islamabad, Pakistan
Agency executive Lieutenant General Ahmad Shuja Pasha, PA Director General

The Inter Service Intelligence (ISI) is said to be the top most organization with most advanced sources of information and secret agents working around the world today. Although said to be receiving the least funding as compared to other agencies stated here, but still boasts of ten thousand agents operating across the world. Although the supposedly failure in handling the Osama Bin Laden case did reduce its credit, but for a very less time until it proved its worthiness sooner with other issues prevailing in the present day It is above All laws in its host country Pakistan ‘A State, with in a State’. Its policies are made ‘outside’ of all other institutions with the exception of The Army. Its personnel have never been caught on camera. Its is believed to have the highest number of agents worldwide, close to 10,000. The most striking thing is that its one of the least funded Intelligence agency out of the top 10.

3) Military Intelligence Section 6 (MI6), United Kingdom

MI6 United kingdom

Formed

1909 as the Secret Service Bureau
JurisdictionGovernment of the United Kingdom
HeadquartersVauxhall Cross, London
Minister responsibleThe Rt Hon. William Hague MP, Foreign Secretary
Agency executiveSir John Sawers KCMG, Director General
Parent agencyForeign and Commonwealth Office
The British have had a long public perception of an effective intelligence agency (due to the success of the unrealistic, yet entertaining, James Bond movies). This perception matches reality. MI6, the British equivalent to the CIA, has had two big advantages in staying effective: The British Official Secrets Act and D notices can often prevent leaks (which have been the bane of the CIA’s existence). Some stories have emerged. In the Cold War, MI6 recruited Oleg Penkovsky, who played a key part in the favorable resolution of the Cuban Missile Crisis, and Oleg Gordievski, who operated for a decade before MI6 extracted him via Finland. The British were even aware of Norwood’s activities, but made the decision not to tip their hand. MI6 also is rumored to have sabotaged the Tu-144 supersonic airliner program by altering documents and making sure they fell into the hands of the KGB.
4) Central Intelligence Agency (CIA), USA
               CIA,USA logo

Formed

September 18, 1947
Employees20,000
Agency executiveLeon Panetta, Director
Parent agencyCentral Intelligence Group
CIA is the largest of the intelligence agencies and is responsible for gathering data from other countries that could impact U.S. policy. It is a civilian intelligence agency of the United States government responsible for providing national security intelligence to senior United States policymakers. The CIA also engages in covert activities at the request of the President of the United States of America. The CIA’s primary function is to collect information about foreign governments, corporations, and individuals, and to advise public policymakers. The agency conducts covert operations and paramilitary actions, and exerts foreign political influence through its Special Activities Division. It has failed to control terrorism activities including 9/11, Not even a single top level Al-Queda leader captured own its own in the past 9 years – ‘they missed 1 Million’ Soviet troops marching into Afghanistan’. Iraq’s Weapons of Mass Destruction, Have the found them yet? -Number of defectors/ double agents numbers close to a thousand. On 50th anniversary of CIA, President Clinton said ”By necessity, the American people will never know the full story of your courage. Indeed, no one knows that what CIA really does”. Highly funded and technologically most advanced Intelligence set-up in the world.
5) Ministry of State Security (MSS), China
MSS China
JurisdictionPeople’s Republic of China
HeadquartersBeijing
Agency executiveGeng Huichang, Minister of State Security
Parent agencyState Council 
 Known to be the most active and the largest agency operating under the Government of the People’s Republic of China the agency plays an active role in handling domestic issues as well. It is also said that the Ministry of State Security Agency works closely with other international intelligence Agencies such as ISI from Pakistan.Article 4 of the Criminal Procedure Law gives the MSS the same authority to arrest or detain people as regular police for crimes involving state security with identical supervision by the procuratorates and the courts. It is headquartered near the Ministry of Public Security of the People’s Republic of China in Beijing. According to Liu Fuzhi, Secretary-General of the Commission for Politics and Law under the Central Committee of the Communist Party of China and Minister of Public Security, the mission of the MSS is to ensure “the security of the state through effective measures against enemy agents, spies, and counter-revolutionary activities designed to sabotage or overthrow China’s socialist system.”  

6) The Institute for Intelligence and Special Operations (Mossad), Israel

Mossad Israel

FormedDecember 13, 1949 as the Central Institute for Coordination
Employees1,200 (est)
Agency executiveMeir Dagan, Director
Parent agencyOffice of the Prime Minister
The Mossad is responsible for intelligence collection and covert operations including paramilitary activities. It is one of the main entities in the Israeli Intelligence Community, along with Aman (military intelligence) and Shin Bet (internal security), but its director reports directly to the Prime Minister. The list of its successes is long. this agency has other success to its name, including the acquisition of a MiG-21 prior to the Six-Day war of 1967 and the theft of the plans for the Mirage 5 after the deal with France went sour. Mossad also assisted the United States in supporting Solidarity in Poland during the 1980s.

7) Direction Generale De La Securite Exterieure (DGSE), France
dgse
FormedApril 2, 1982
Preceding agencyExternal Documentation and Counter-Espionage Service
Minister responsibleHervé Morin, Minister of Defence
Agency executiveErard Corbin de Mangoux, Director
The Agency specializes in gathering and disseminating information related to external intelligence. The Agency operates under the directions and supervision of Ministry of Defence. The Agency also operates parallel with the Central Directorate of Interior Intelligence, whilst focusing on internal and external intelligence concerning national security.

8) Bundesnachrichtendienst (BND) – Germany
bnd germany

Formed

1 April 1956
Employees6,050
Agency executiveGehlen Organization
Parent agencyCentral Intelligence Group
The Bundesnachrichtendienst is the foreign intelligence agency of the German government, under the control of the Chancellor’s Office. The BND acts as an early warning system to alert the German government to threats to German interests from abroad. It depends heavily on wiretapping and electronic surveillance of international communications. It collects and evaluates information on a variety of areas such as international terrorism, WMD proliferation and illegal transfer of technology, organized crime, weapons and drug trafficking, money laundering, illegal migration and information warfare. As Germany’s only overseas intelligence service, the BND gathers both military and civil intelligence.
9) Federal Security Services (FSB), Russia
fsb russia
Formed3 April, 1995
Employees350,000
HeadquartersLubyanka Square
Preceding agencyKGB

Federal Security Services is the top most domestic security organization of the Russian Federation and is also known to be the successor agency of the KGB. The Agency is among the best in countering terrorism, cross border security and surveillance. Headquartered in Lubyanka Square, downtown Moscow, the agency is also believed to work with RAW (India) and other ex-soviet agencies in russia.
10) Australian Secret Intelligence Service (ASIS), Australia

asis australia

Formed13 May 1952HeadquartersCanberra, Australian Capital Territory, AustraliaAnnual budget$162.5m AUD (2007)Minister responsibleThe Hon. Stephen Smith MP, Minister for Foreign AffairsAgency executiveNick Warner, Director-General
Australian Secret Intelligence Service is the Australian government intelligence agency responsible for collecting foreign intelligence, undertaking counter-intelligence activities and cooperation with other intelligence agencies overseas. For more than twenty years, the existence of the agency was a secret even from its own government. Its primary responsibility is gathering intelligence from mainly Asian and Pacific interests using agents stationed in a wide variety of areas. Its main purpose, as with most agencies, is to protect the country’s political and economic interests while ensuring safety for the people of Australia against national threats.
hope u like this information if any mistaken have u found then pls comment and don't forget to share this information...
Read More

Monday 4 November 2013

How to Use Google for Hacking and also its Prevention

Be The First To Comment
google hacks


Google is a very very very powerful tool! If you know how the Internet worksand you know how Google works, you can find out some “very secret information” from the dark corners of the Internet.
You see, Google tries to “index” everything that is on the Internet. What does “index” mean? Basically, “index” means, read and remember!You see, Google is reading websites on the Internet 24 hours a day. It is looking at new websites and new web pages. It looks at each web page and finds out what the web page is about. It decides how good the web page is and also decides many other things about the web page…
Google does all this so that when you search for something using Google, it can give you the most relevant results from among the web pages it has visited. This is what we mean when we say that Google tries to index everything on the Internet.


Hackers use botnet to scrape Google for vulnerable sites


Some 35,000 sites that use vBulletin, a popular website forum package, were hacked recently by taking advantage of the presence of files left over from the program's installation process, according to security researcher Brian Krebs.
The hack by itself is fairly standard, but the way in which it was carried out shows how search engines like Google can unwittingly become a party to such hacking.
Krebs' findings were unearthed in conjunction with work done by security research firm Imperva, members of which believe the hacks are being executed by way of a botnet. The botnet not only injects the malicious code into the target sites, but also scrapes Google in a massively parallel fashion looking for vBulletin-powered sites that might make good targets.
Why scrape Google in parallel? As a workaround for Google's defense mechanisms against automated searches.
Such defenses work well against a single user scraping Google, since after a certain number of such searches from a single host, the user is presented with a CAPTCHA. This typically stops most bot-driven scrapes. But if a great many such searches are performed in parallel, it doesn't matter if each one of them eventually runs afoul of a CAPTCHA. Together, in parallel, they can still scrape far more than any one system alone can. (Krebs did not describe the size of the botnet used, however.)
The hacks themselves, of which Krebs has identified two, are fortunately rather easy to detect. One involves adding surreptitious admin accounts to the vulnerable vBulletin installations. The other hack, "apparently used in a mass website defacement campaign," adds an admin account named "Th3H4ck".
Now the good news: The very thing that made it possible to find those vulnerable vBulletin sites -- a properly crafted Google search -- can also be used to identify any existing hacked vBulletin installs. If you see a site you know on that list, tell the administrator. There's a good chance he doesn't know he's been hacked.
Scanning for vulnerabilities with Google isn't by itself new; Bruce Schneier pointed out in 2008 how this process was not only possible but could be automated. But deploying such Google scanning via a botnet for the sake of seeking out vulnerable sites in a massive parallel operation is a relatively new wrinkle -- at least until Google finds a way to block such things en masse without impacting regular search services.
Krebs points out it's difficult to place the blame exclusively on vBulletin. The makers of the software point out that its installation instructions ask that users remove the "/install" and "/core/install" directories after setting up the program.
In that sense, this issue is akin to the ways ColdFusion projects have been plagued by break-ins -- in part because many outfits are running older, unpatched versions of the software, but mainly because many firms don't follow Adobe's own instructions for hardening ColdFusion setups.
The oft-targeted WordPress has the same issue: It's easy to set up, but securing it requires that the end-user take a number of steps that often aren't followed.
How can you prevent Google hacking ?



Make sure you are comfortable with sharing everything in your public Web folder with the whole world, because Google will share it, whether you like it or not. Also, in order to prevent attackers from easily figuring out what server software you are running, change the default error messages and other identifiers. Often, when a "404 Not Found" error is detected, servers will return a page like that says something like:
 Not Found
The requested URL /cgi-bin/xxxxxx was not found on this server.
Apache/1.3.27 Server at your web site Port 80
The only information that the legitimate user really needs is a message that says "Page Not found." Restricting the other information will prevent your page from turning up in an attacker's search for a specific flavor of server.
Google periodically purges it's cache, but until then your sensitive files are still being offered to the public. If you realize that the search engine has cached files that you want to be unavailable to be viewed you can go to ( http://www.google.com/remove.html ) and follow the instructions on how to remove your page, or parts of your page, from their database.
Read More

Thursday 31 October 2013

Top 10 Proxy WebSites To Unblock Any Site

1 Comment
If you have a slow connection to a certain website, or can’t access it at all because of the restriction of your ISP, workplace or school, or simply desired to protect yourself online by hiding your private information, then an online proxy website will help you.
With the assistance of an online proxy service, you do not access your target website( e.g. Facebook ) directly, you make a request, the web proxy fetch the web page( and encrypt its content, remove scripts and advertisements ), and send it back to your browser. This makes it possible to unblock any banned site, or surf any site anonymously without leaving your footprint.
image credit www.techroadies.com
While surfing online, sometimes we come across websites which can’t be accessed due to our location or IP restrictions. Have you ever noticed this type of problem while browsing websites? This happens usually because the owner of website restricts access of website to only specific IP addresses. Sometimes they also block IP ranges of whole country so that no one from that country can access their website or content.  The other reason can be that your internet connection provider restricts access to specific websites.Similarly  most of the USA based websites are not available in other countries.
In order to access blocked websites, you will need a proxy server that automatically randomize your IP address and will assign a different IP address of another country to you. So, if your IP address is of USA, then you will be able to access websites that are blocked in your country and their access is only limited to US users. For example, YouTube is blocked in Pakistan and now only option for opening YouTube in Pakistan is with proxy. There are also some Google chrome extensions that can help you open YouTube and other blocked websites with the help of proxy. Most of the time in colleges, universities and offices etc. internet access is restricted to only specific websites. So, in order to unblock other websites, you can use proxy websites or softwares.
If you do not want to go through installation of Proxy softwares then anonymous browsing with proxy websites is the best option for you. So, in this article I am sharing a list of 5 best free Proxy websites of 2013 that will let you surf internet anonymously and securely.

1. 000FreeProxy

2. kkProxy

3. MyAddr

4. RX Proxy


5. AnonyMouse


6. Zend2


7. NewIPNow


8. KProxy


9. Mega Proxy


10. AD Free Proxy


all the image credit http://myappmag.com







Read More

Saturday 26 October 2013

The NSA’s Website (NSA.gov) Is Down

Be The First To Comment
The National Security Agency’s website has been down for at least 30 minutes. Officials have acknowledged the outage, but won’t say if it was hacked. At least a few Twitter accounts that sound like the elite hacktivist contingent, Anonymous, are taking credit.
Official Anonymous channels are just making fun of the outage:
To be sure, The NSA’s website has been hacked before. But, we won’t speculate, for fear of perpetuating the kinds of rumors implied by this delightful XKCD comic:














While we’re all waiting to figure out what went wrong, feel free to add your own Healthcare.gov jokes in the comments.
Update: LOLZ

Read More

Friday 18 October 2013

"LeaseWeb" Hacked by KDMS Team

Be The First To Comment
World's Largest Web Hosting company "LeaseWeb" Hacked by KDMS Team




LeaseWeb is one of the World's largest hosting provider has been defaced by Palestinian hackers, named as KDMS Team. LeaseWeb was also hosting provider for one of the biggest file-sharing website Megaupload in the past. Later Megaupload Founder, Kim Dotcom claimed that Leaseweb had deleted all Megaupload user data from 690 servers without warning.

The hacker group replaced the Homepage of the website for just a few hours with an Anonymous Palestine, homepage titled "You Got Pwned" and the defacement message says:

     Hello Lease
     Web Who Are You ?
     Who is but the form following the function of what
     and what are you is a hosting company with no security
     KDMS Team : Well ,, We Can See That :P

We noticed that Attacker has just changed the DNS server to point the Domain to another server at 67.23.254.6, owned by the attacker. At the time of writing, Leaseweb team resolved the issue and get their Domain back to the original server.

But because the hack was done just a few hours back, Google DNS cache still pointing to domain to the attacker's server. Change your their DNS server to 8.8.8.8 and access LeaseWeb site again, you will be able to see the defaced page, as shown above.

The hacker also posted on the homepage,"Do You Know What That Means ? We Owned All Of Your Hosted Sites Index On Your Site Is The Prove ;)".

It seems a DNS hijacking only, But Hackers told The Hacker News, "We owned Leaseweb  Servers and kept some of their servers for us. But we only changed the DNS Server for now, because we faced some problems with the company website. Here, all what we need .. is to add our signature on their homepage to prove that there is not Completely Secure. If we can pwn them, we can hack other big providers too.,"

The hackers didn't claim that they get hold on customers' information or Credit card numbers. Stay tuned with us for further updates on this hack Story.

Update (9:35 PM Saturday, October 5, 2013 GMT): We contacted and ask LeaseWeb to provide an official statement over the Hack and claims by Hacker.

Update (5:51 AM Sunday, October 6, 2013 GMT): LeaseWeb confirmed the hack and tweeted, "Website should be back to normal in a few hours. No customer data compromised. We continue to investigate."

Hackers exploited a Zero-day SQL Injection flaw in Web Hosting software WHMCS used by LeaseWeb also.
 
Read More

Sunday 13 October 2013

Top 10 Most Hacking Countries

Be The First To Comment


1. China


The Chinese may not always guilty, but have a share of 41% of hacker attacks. Just one year before the Republic of China was responsible for only 13% of cyber attacks according to Akamai, and share in the third quarter was 33%.

2. U.S.A

Every tenth hacker attacks worldwide originated in the United States.

3. Turkey

Bronze medal for Turkey, accounting for 4.7% of global cybercrime.

4. Russia

Russia is considered to defuse the situation from 6.8% to 4.3% October-December 2012.

5. Тaiwan

Taiwanese are responsible for 3.7% of computer crimes at the end of 2012

6. Brazil

Brazil registered a decline of hacking attacks - from 4.4% at the end of 2011 to 3.8% in the third quarter of 2012 and 3.3% - in the fourth.

7. Romania

The seventh is Romania with a share of 2.8%.

8. India

India is responsible for 2.4% of hacking attacks worldwide.

9.Italy

Italy's share falling to 1.6%.

10. Hungary

Hungary is responsible for 1.4% of cyber attacks in late 2012.

Read More

Saturday 12 October 2013

Google Prevails in Legal Dispute Over Browser Tracking

Be The First To Comment


A legal dispute over Google's practice of tracking users to create targeted advertisements ended Wednesday as a federal judge ruled in the company's favor.
A class action lawsuit, titled Google Inc. Cookie Placement Consumer Privacy Litigation, was brought by web browser users who alleged that Google avoided browser security settings, using cookies to track usage on computers and mobile devices. The plaintiffs alleged that the company wrongfully maneuvered its way through browser security. They further claimed that this tracking information informed Google's use of targeted ads.
The lawsuit, which also named online advertisers Vibrant Media and Media Innovation Group, was thrown out by a federal judge in Delaware on Wednesday. Judge Sue Robinson acknowledged the fact that the companies in question avoided browser security, tracking the users, but said the plaintiffs did not prove they suffered damage from this action.
In an official document reproduced by CNET, the judge explained the reasons for the decision. Chief among these is the argument that "the transfer of inputted information (which would have occurred regardless of Google's placement of cookies) does not rise to the level of a serious invasion of privacy or an egregious breach of social norms."
What do you think of the ruling? Tell us your opinion in the comments below.
[via Wall Street Journal, CNET]
Image: Flickr, Victor1558

Read More

Friday 11 October 2013

Some Unwanted Computer Security Threats

1 Comment
Computer security threats are relentlessly inventive. Masters of disguise and manipulation, these threats constantly evolve to find new ways to annoy, steal and harm. Arm yourself with information and resources to safeguard against complex and growing computer security threats and stay safe online.

image credit - www.schoolcounselor.com  


                          
Computer Virus Threats

Perhaps the most well known computer security threat, a computer virus is a program written to alter the way a computer operates, without the permission or knowledge of the user. A virus replicates and executes itself, usually doing damage to your computer in the process. Learn how to combat computer virus threats and stay safe online.

Spyware Threats

A serious computer security threat, spyware is any program that monitors your online activities or installs programs without your consent for profit or to capture personal information. We’ve amassed a wealth of knowledge that will help you combat spyware threats and stay safe online.

Hackers & Predators

People, not computers, create computer security threats and malware. Hackers and predators are programmers who victimize others for their own gain by breaking into computer systems to steal, change or destroy information as a form of cyber-terrorism. What scams are they using lately? Learn how to combat dangerous malware and stay safe online.

Phishing Threats

Masquerading as a trustworthy person or business, phishers attempt to steal sensitive financial or personal information through fraudulent email or instant messages. How can you tell the difference between a legitimate message and a phishing scam? Educate yourself on the latest tricks and scams.

Read More

Saturday 5 October 2013

Biggtest Cyber Attack In History Slows Down The Global Internet

Be The First To Comment
biggtest cyber attack in history slows down the global internet on march 29, 2013


attack on WWW

The internet around the globe has been slowed down in what security experts are describing as the biggest cyber-attack of its kind in history.

“Based on the reported scale of the attack, which was evaluated at 300 Gigabits per second, we can confirm that this is one of the largest DDoS operations to date,” online security firm Kaspersky Lab said in a statement, “There may be further disruptions on a larger scale as the attack escalates.”

 It is having an impact on popular services like Netflix – and experts worry it could escalate to affect banking and email systems.

Spamhaus, a group based in both London and Geneva, is a non-profit organisation that aims to help email providers filter out spam and other unwanted content.

To do this, the group maintains a number of blocklists – a database of servers known to be being used for malicious purposes.

Recently, Spamhaus blocked servers maintained by Cyberbunker, a Dutch web host that states it will host anything with the exception of child pornography or terrorism-related material.

Spamhaus said it was able to cope as it has highly distributed infrastructure and technology in a number of countries.

Read More

Wednesday 25 September 2013

Finally, YouTube Upgrades Its Comments

1 Comment










As we know that the Youtube is the World's no 1 video sharing paltfrom in which there are Lots of things to do. where we can generate money too...except uploading video and buffering video's.
The comments under YouTube videos are not exactly renowned as a location for rigorous intellectual debate, and chances are they never will be. But the Google-owned video service is now taking steps to bring more important and useful comments to the fore — and to let the channel owner automatically delete comments with certain words.
"There's a lot of room for improvement," said Nundu Janakiram, YouTube product manager, when asked about the current state of comments. "So comments will soon become conversations that matter to you." (Here's his official blog post on the changes.)
YouTube already offers a "top comments" section for the most upvoted comments, but they can still often be irrelevant to the video in question. Starting this week on channel pages, and rolling out slowly to video pages by the end of the year, reverse chronological comments will fall away entirely.
You'll start to see a new set of comments rise to the top: those by the video's creator, "popular personalities" (i.e., YouTube celebrities), "engaged discussions" with a long thread, and people you know and interact with — both on YouTube and Google+.
So no two users' YouTube comments section will look quite the same, and Google will be offering another reason for you to use its still-not-quite-popular social network. (You'll be able to post YouTube comments to Google+ automatically, along with the video, by checking a box.)
The Google+ integration also allows you to post a comment that will only appear within a given social circle. And if you're not keen on circles, you can select specific users who will be the only ones to see the comment. In other words, you and your friends can have your very own YouTube comments section, and make it as dumbed-down or intellectual as you like.
Finally, channel owners will get the ability to create a blacklist of certain words that they don't want to see appearing in the comments under those videos. Comments containing those words will be sent to purgatory, pending moderation.
Will this help improve the tenor of YouTube's community? Let us know what you think — in our comments section, of course.
Read More

Tuesday 24 September 2013

Scientists discover ‘black holes’ at sea

1 Comment

Washington: Some of the largest ocean eddies on Earth are mathematically equivalent to the mysterious black holes of space, scientists say.
These eddies are so tightly shielded by circular water paths that nothing caught up in them escapes.

George Haller, Professor of Nonlinear Dynamics at ETH Zurich, and Francisco Beron-Vera, Research Professor of Oceanography at the University of Miami, have developed a new mathematical technique to find water-transporting eddies with coherent boundaries.
The challenge in finding such eddies is to pinpoint coherent water islands in a turbulent ocean. The rotating and drifting fluid motion appears chaotic to the observer both inside and outside an eddy.

Haller and Beron-Vera were able to restore order in this chaos by isolating coherent water islands from a sequence of satellite observations. To their surprise, such coherent eddies turned out to be mathematically equivalent to black holes.
Black holes are objects in space with a mass so great that they attract everything that comes within a certain distance of them. Nothing that comes too close can escape, not even light.

But at a critical distance, a light beam no longer spirals into the black hole. Rather, it dramatically bends and comes back to its original position, forming a circular orbit.
Haller and Beron-Vera discovered similar closed barriers around select ocean eddies. In these barriers, fluid particles move around in closed loops similar to the path of light in a photon sphere. And as in a black hole, nothing can escape from the inside of these loops, not even water.

It is these barriers that help to identify coherent ocean eddies in the vast amount of observational data available. The very fact that such coherent water orbits exist amidst complex ocean currents is surprising, researchers said.
Because black-hole-type ocean eddies are stable, they function in the same way as a transportation vehicle - not only for micro-organisms such as plankton or foreign bodies like plastic waste or oil, but also for water with a heat and salt content that can differ from the surrounding water.

Haller and Beron-Vera have verified this observation for the Agulhas Rings, a group of ocean eddies that emerge regularly in the Southern Ocean off the southern tip of Africa and transport warm, salty water northwest.
The researchers identified seven Agulhas Rings of the black-hole type, which transported the same body of water without leaking for almost a year.

Haller points out that similar coherent vortices exist in other complex flows outside of the ocean. In this sense, many whirlwinds are likely to be similar to black holes as well.
The study was published in the Journal of Fluid Mechanics.
Read More