Dec 2, 2012
Western intelligence officers were seeing new signs of activity at Syrian chemical weapons sites, they told the New York Times Sunday, Dec. 2. “It’s in some ways similar to what they’ve done before,” a senior U.S. intelligence official said. “But they’re doing some things that suggest they intend to use the weapons. It’s not just moving stuff around. These are different kind of activities.”
DEBKAfile’s Middle East sources add rumors were flying around the region Saturday night and Sunday morning that President Bashar Assad had been killed or fled Syria. Neither is confirmed. However, the rebels have in recent days made major strategic gains and begun to turn the tide of war against’s Assad forces.
The new rumors tie in with the suggestive movements of chemical weapons detected by Western intelligence without any indication of their likely target.
Since the Syrian uprising erupted against his regime last year, Assad has often declared he would fight his enemies to the end and threatened that if his back was against the wall and life and regime were in jeopardy, he would rather set the entire Middle East on fire than surrender.
Israel has asked Jordan twice in the last two months for a green light to attack chemical weapons facilities in Syria, according to a report by journalist Jeffrey Goldberg of The Atlantic.
Syrian forces on Monday used fighter jets and rockets to pound rebel-held suburbs around Damascus International Airport, while rebels claim they have cut electricity in the facility.
Syrian television reported that troops struck hard at “terrorist bases” near the airport and the battle “to protect Damascus” continues.
The violence comes as Russian President Vladimir Putin is due to visit Turkey on Monday for a one-day trip, which will focus on the situation and the differences between the two countries over Syria.
Activists inside Damascus told DPA that the group of army “special forces” were seen deploying near the airport road and its outskirts.
“Our fighters are scoring advances near Damascus airport. Despite the heavy shelling, we managed to reach an area which supplies the airport with electricity and cut it off on the facility,” rebel commander Abu Nidal told DPA from Ghotta region, east of Damascus.
Tension prevailed on Monday after a clash erupted overnight between Lebanese troops and members of the Free Syrian Army as they were trying to infiltrate Syrian territories from Lebanon.
Airport officials were not available to comment on the claim, which comes as Egypt Air resumed its flights from Cairo to Damascus after a four-day halt.
In the northern province of Aleppo, a car bomb exploded near a military checkpoint, killing two soldiers and wounding 10 others.
Activists said rebels now control the main military checkpoint in Az-zoz, located on a highway that links Aleppo with Damascus.
Since the beginning of the Syrian revolt in March 2011, there have been frequent border violations, both by Syrian government forces and rebels fighting to overthrow President Bashar al-Assad.
Russia has been a main backer of the Syrian regime, while Turkey has supported the opposition.
Clinton: Syrian chemical weapons action is a red line
DEBKAfileDecember 3, 2012, 1:10 PM (GMT+02:00)
US. Secretary of State Hillary Rodham Clinton says Syrian action on chemical weapons remains a “red line” for the Obama administration and would prompt action from the United States.
Speaking in Prague Monday, Clinton didn’t address news reports of fresh activity at Syrian chemical weapons depots. But she stressed that Washington would address any threat that arises.
By Tony Cartalucci
December 1, 2012
December 1, 2012 (LD) – It’s not that Syria’s government didn’t prepare for war. They perhaps, simply prepared for the wrong kind of war.
This week when sweeping outages in Syria’s communication networks were reported, the Western media immediately accused the Syrian government of being behind the move.
However, it should be noted that NATO-backed terrorists operating inside of Syria have been openly given advanced communication equipment (also here and here) by Western nations, including the United States, allowing militants to create their own, independent communication networks.
The reason a communications blackout in Syria would not effect NATO’s primary proxy forces is because any node or bottleneck in Syria controlled by the government has already long since been circumvented, either through independent networks, or satellite links.
The New York Times in their article, “U.S. Underwrites Internet Detour Around Censors,” stated in June, 2011 that:
The Obama administration is leading a global effort to deploy “shadow” Internet and mobile phone systems that dissidents can use to undermine repressive governments that seek to silence them by censoring or shutting down telecommunications networks.
The effort includes secretive projects to create independent cellphone networks inside foreign countries, as well as one operation out of a spy novel in a fifth-floor shop on L Street in Washington, where a group of young entrepreneurs who look as if they could be in a garage band are fitting deceptively innocent-looking hardware into a prototype “Internet in a suitcase.”
Therefore, the Syrian government would gain very little by shutting off the Internet to neutralize networks working entirely independent of infrastructure within state control.
Conversely, if NATO has shut the Internet off at nodes leading into Syria, as appears to be the case, NATO and their proxies operating inside of Syria can begin spreading false information, uncontested, via radio, SMS, and even ad hoc WiFi networks.
With NATO’s proxies possessing their own communication networks, their own ability to co-opt and control signals in and near their areas of operation, in particular along the borders where NATO forces themselves are directly involved in disrupting and controlling communications, according to Reuters, a disruption in Syria’s communication networks would only serve to blind, hinder, and disrupt the government and the vast majority of Syria’s civilians.
The control of information, the ability to communicate and coordinate one’s forces, whether they are forces of a military or economic nature, is essential to the survival and prosperity of any nation.
The neglect of improving and protecting the means of communication and the control of information within one’s borders is the modern equivalent of letting a castle’s walls crumble, its moat dry up, and to leave its towers without archers.
Syria is not entirely unprepared, however, and its ally Iran is actively building a model that could serve as an example for other nations to follow in securing their information and communication networks.
Additionally, the measures used by NATO to subvert sovereign nations in their pursuit of corporate-financier motivated regime change across the planet, can just as easily boomerang back at these very corporations and financial institutions, slaying them with their own sword.
Countermeasures and Defensive Initiatives.
One of the many considerations and motivations behind the very creation of the Internet was its decentralized nature, and its ability to survive catastrophic attacks and still function.
A subject of study by the RAND Corporation, the distributed nature of the Internet was seen as being superior to that of conventional, centralized communication architectures. However, the utility of such a network is still determined by who controls the flow of information at nodes and bottlenecks within the system.
Iran has been working on the creation of a nationwide intranet, independent of the Internet, in a bid to break the monopoly the West has been increasingly building over the years.
By developing an indigenous network, Iran has the ability to isolate the country from attempts to use the Internet to undermine the nation politically and economically and control the nodes and bottlenecks within its borders.
While the Western media portrays Iran’s move as unreasonable, Western tech-firms are confirmed to be openly collaborating with Western governments in their bid to manipulate, undermine, and overthrow targeted nations, especially Iran.
When we consider the disingenuous reasons behind the West’s confrontation with Iran, best articulated in Washington’s own policy think-tank, the Brookings Institution and their “Which Path to Persia?” report, the danger Iran truly faces becomes all the more obvious.
Image: Movement.org’s 2011 sponsor page. Since then, Google and the US State Department have since removed mention of their involvement, but Movement’s own annual reports (2008, 2009, 2010) still retain mention their sponsorship and role over the years.
Internet giant Google, for instance, has been openly working with the US State Department in their corporate-financier motivated interventions around the world, from Egypt to Tunisia, from Libya to Syria.
It was revealed that as early as 2008, Google, along with AT&T, Howcast, and Facebook were collaborating with the US State Department via Movements.org to train, equip, and organize protesters ahead of the “Arab Spring” in 2011.
The West’s governments and media would feign ignorance and surprise when widespread unrest finally swept the Arab World, when in reality it had been meticulously planned for years.
Image: The US State Department has used Google Ads to spread propaganda. This ad featured (in Farsi) the Twitter account @USAdarFarsi of the “Virtual Embassy of the United States” and reads, “Obama to the Iranian youth: I want you to know that I’m with you.” (click image to enlarge)
The US State Department regularly uses Google Ads to target Farsi speaking readers with messages to undermine the Iranian government – the modern equivalent of US Army Psychological Operations broadcasting propaganda over loudspeakers in a US theater of war, or the US State Department’s Voice of America for decades broadcasting propaganda via radio.
Additionally, Israel has openly admitted to waging “consistent and relentless” cyber warfare, just days after accusations were leveled against it regarding attacks on Iran’s infrastructure, both physical and digital.
Iran’s move, seen in this context, is not only reasonable, but would indicate negligence on the Iranian government’s part had it not begun taking more drastic measures to secure, defend, and isolate networks under constant, verifiable attack.
While Iran works to build technical solutions to adapt and overcome Western efforts to use the Internet as a weapon against them, Syria appears to be fighting with a much more hastily assembled defense, the Syrian Electric Army, to counteract torrents of propaganda emanating from similar organizations put together by the Pentagon, the Israeli IDF, as well as Saudi and Qatari propaganda machines.
The true story behind the Internet blackout in Syria may never be known, but simply countering propaganda online may not be enough to combat the full-spectrum warfare waged by NATO upon Syria, including cyber warfare. And surely such measures will not win the wars of the future.
Iran’s approach, involving infrastructure as well as countering Western propaganda with their own professional, international news agency PressTV, provides nation-states with a model for confronting foreign hegemonic ambitions on and within their borders.
US State Department’s “Suitcase Internet” – a Double Edged Sword.
It is difficult to say what sort of people were actually behind the US State Department’s “Suitcase Internet.” There is Sascha Meinrath of the corporate-financier foundation-funded New America Foundation, who despite his affiliations and his role in facilitating American hegemonic ambitions across the Arab World, claims to promote “community wireless networks.”
In this case, his deeds and the company he keeps, certainly don’t match his alleged desires. (read Meinrath’s US State Department RFERL interview here)
It is clear by now, with the so-called revolutions in Libya, Egypt, and Syria turning out to be textbook cases of “color revolutions” premeditated and carried out by and exclusively for a myriad of Western organizations, corporations, and institutions for the sole purpose of installing more obedient (not more democratic nor more humane) client regimes, that all those involved, along with their good intentions, were simply exploited.
Most likely, this technology will be outlawed or regulated into extinction across the West, even as it is used to overrun nations across the rest of the world.
Image: A visual depiction of Project Byzantium’s ad-hoc wireless mesh network. More information can be found on their website here. Such networks have been used by corporate-financier interests, acting through the US State Department and couching their intentions behind “democracy” and “freedom” to execute the so-called “Arab Spring.” By doing so, they have managed to co-opt the talent and intentions of people to accomplish the very opposite of their stated goal. Instead of freeing nations, they’ve only been burdened with worse oppressors with infinitely stronger backers – Wall Street and London.
Software similar to what is described as being used for the “Internet Suitcase,” also known as an ad-hoc wireless mesh network, can be found at Project Byzantium, and was produced by Washington D.C.-based hackerspace, HacDC. It is described as being made specifically with “activists” in mind.
While hackerspaces and local innovation stand the greatest chance at leveling the playing field, reducing both disparity and the exploitation it invites, it appears that in this case, special interests have leveraged this phenomenon to its advantage.
But the concept of mesh networks themselves, along with the work of HacDC are like any tool or weapon – everything depends on whose hands it is in, and how it is used.
Across the Arab World, these mesh networks have allowed proxies of US corporate-financier interests (wittingly and unwittingly) to undermine and overthrow the governments of sovereign nation-states and have lead to the ascent of tyrannies not only many magnitudes worse, but their true nature concealed by a complicit Western media and diplomatic corps.
But what if these mesh networks (combined with locally implemented broadband lines to guard against threats like these) were used to set up permanent networks in local communities, with permanent links between communities – and other locally produced and maintained solutions for connecting groups of communities in one country, with those in another?
The potential for upsetting telecommunications monopolies with open source, local networks, independent of both corporate and government control, rules and regulations is precisely how this sword cuts the other way.
Local telephone networks, like those created and deployed by the US State Department against targeted and occupied nations could also likewise be deployed against the very corporate-financier interests using these tools today to achieve their geopolitical objectives.
Localizing these networks, and connecting them as local initiatives would not only supplant large, centralized corporate-financier interests, but in the process of supplanting them, would distribute the vast amounts of unwarranted wealth and influence they’ve accumulated, across thousands, perhaps millions of local entrepreneurs – in other words, wealth redistribution through innovation and local entrepreneurship – the eradication of monopolizing special-interests by globally boycotting them, and locally replacing them.
Syria and 4th Generation Warfare.
In Syria’s case, and any sovereign nation-state wishing to stave off the threats wars of the future will bring, a careful study of today’s technology and how it can be implemented as weapons tomorrow should form the driving force behind the formation of defense strategies – not just past successes and today’s current threats.
Having both electronic armies and professional international media agencies communicating a nation’s interests to the world, as well as developing and deploying indigenous communications, manufacturing, and defense infrastructure are, and will continue to be, the keys to successfully defending a nation against 4th generation warfare.
Conventional armies and nuclear forces both still serve a valuable role as deterrents, but large contingents of counter-terrorism/counterinsurgency special forces in combination with serious telecommunication and information warfare strategies are essential.
The forces of Wall Street-London corporate-financier capital have made it clear they favor 4th generation warfare to build their modern empire. Those that are being targeted must then prepare to fight 4th generation wars.
December 1, 2012
The Internet was working in Syria’s capital of Damascus on Saturday, residents said, after a two-day blackout that experts said was highly likely to have been caused by authorities.
Syrian President Bashar Assad’s government has been accused before of cutting Internet and telephone connections to block opposition activists and rebel communications during the 20-month revolt.
Authorities had attributed the latest outage to a “terrorist” attack or a technical fault.
Antivirus software is software made to detect, prevent, and eliminate malwares. The main goal of an anti-spyware method is to discover, analyze, and fix infections. As a result, they could be highly valuable tools with regards to computer users. Each computer is equipped with the software that creates the different virus meanings. These are the...
Malware safeguard, also known as anti-virus software, is important for safeguarding yourself out of computer viruses that are sometimes designed to steal your money. Or spyware is usually short for “malicious software” – applications or courses that can invasion your computer immediately and often trigger significant decrease of data or maybe even computer harm. The...
A mobile application, also known as a cellular app or perhaps an app, is an application designed for make use of on a smart phone, mobile tablet, or wristwatch. These applications are often used by users to reach applications and content material on the internet. It has being able to connect to an online server...
Fireball slot machine game system matches free of charge on-line, absolutely free video slot machine piece of equipment adventures modest to begin with down payment needed. Poker table pastime and also the accommodations certainly not approved by means of the very first re-opening state; nevertheless, area betting possibilities, by using best community distancing, may turned...
Here you’ll find our rankings of the top US-friendly online casinos of 2020. With mobile real money casinos , you can use your device to access the same benefits and bonuses. Online casino sites tend to support a wide range of payment methods. Our reviewers examine ease-of-navigation and software speed in determining which sites offer...