Rand Paul: Welshing On No Aid To Israel?

If I were a young libertarian who’d emptied my wallet into Rand Paul’s campaign, I’d  be painting his face on the basement wall and throwing darts at it, especially after the recent revelation at Liberty Fight about Rand Paul’s apparent silence on the $9 billion dollars in aid guarantees to Israel.

That’s after Rand spent the whole of 2011 (just google) swearing he’d cut aid to Israel. It’s not 100 percent clear what happened with the vote, some are making excuses and giving plausible explanations,  but at this stage of the game,  it doesn’t look good.

Also, one thing that seems to have missed comment is that the Senate summary of the bill specifies support for Israel as a “Jewish state,” not just once, either. Delete Israel and substitute, say, “Malaysia as a Muslim state,” and then you’ll get how just preposterous business-as-usual in DC is.

Not only is this vast sum of tax-payer money going to a foreign government (that’s all aid is anyway), it’s going to a form of government that runs counter to something the Constitution stands for – the US is against a state establishment of religion.

Meanwhile, the same people who applaud “Israel as a Jewish state” every day of the week will foam at the mouth and bark like rabid dogs if someone suggests that the US is a Christian state or that India is a Hindu state.

The h*** with Rand.

Mitt Romney’s Foreign Policy Team

Joseph Sarkissian analyzes the foreign policy team to which Rand Paul, heir-apparent to his father’s flock, delivered the libertarian faithful (they-who-do-not-question-but-yet-know-all-the-answers) when, this summer, he endorsed Mr. Wall Street Mitt Romney.

1. Eliot Cohen – Special adviser, author of Romney’s foreign policy white paper.

At least Eliot Cohen doesn’t pull any punches. He has overtly called for the removal of the Iranian regime by all means necessary, sans force. Good to know, but how do we pull that off? Cohen believes soft power would do the trick, but how long before that soft power necessitates hard power once the Iranian regime begins ramping up attacks against U.S. and Israeli assets? No regime like Iran’s will stand by idly as it is picked apart from the outside, and once the retaliatory bombings, assassination attempts, and other counter-intelligence measure are begun by Iran, the U.S. and Israel won’t be able to stand by either.

2. Dov Zakheim – Special adviser

Aside from also being hawkish on Iran and Iraq, Zakheim has a proven track record of sketchy behavior. Aside from the highly controversial disappearance of a massive amount of money while comptroller of the Pentagon, he runs Foreign Policy’s “Shadow Government” blog where he argues for even more aggressive drone strikes and rails against Obama’s foreign policy. Zakheim is a staunch supporter of the American Israeli Public Affairs Committee (AIPAC), a lobbying group that pushes hard for intervention in Iran and was adamant about the push for war in Iraq.

3. John Bolton – Trusted personal policy adviser, potential cabinet appointee

Mitt Romney once said of John Bolton that, “John’s wisdom, clarity and courage are qualities that should typify our foreign policy.” If this is true, be very afraid. Bolton could be the most hawkish of Romney’s advisers. He is a signatory to numerous letters to presidents past and present, including one to Bill Clinton in 1998 from the defunct Neocon think tank, “Project for a New American Century (PNAC)” urging Clinton to get rid of Saddam. In a March letter to President Obama from Romney’s foreign policy team, Bolton signed off on statements saying the president is too soft on Iran, not supportive enough of Israel’s interests, should have left troops in Iraq, and has potentially crippled the U.S. military with budget cuts.

4. Robert Kagan, Special adviser

Who’s ready for some good old-fashioned regime change? If Robert Kagan gets his way, that’s what you can expect. Aside from wanting to oust Iranian leadership and cause massive conflict, Kagan is on the board of directors for the Foreign Policy Initiative, or as I like to call it, PNAC 2.0, where he served as a project director. A quintessential Neocon, Kagan has time and time again steadfastly supported the war in Iraq, saying that the war was a good idea, that Iraq was getting more secure in 2004, and that the Arab Spring can be attributed to U.S. efforts in Iraq. It’s hard to find someone more disillusioned in the policy community.

While some could chalk up all of Romney’s rhetoric to early election cycle hogwash, his advisers haven’t changed their tunes. Given that Mitt is about as informed as a table lamp on foreign policy, I shudder to think of the consequences of his team having carte blanche. Whether they suffer from groupthink – since many of them have worked and continue to work in the same place –or just a lack of ability to see the errors of their predictions, something has to balance them out. Hopefully that something is a loss at the polls in November.”

PsyWar: COINTELPRO Infiltration Of Dissidents

From the War at Home Archive:

“False Media Stories: COINTELPRO documents expose frequent collusion between news media personnel and the FBI to publish false and distorted material at the Bureau’s behest. The FBI routinely leaked derogatory information to its collaborators in the news media. It also created newspaper and magazine articles and television “documentaries” which the media knowingly or unknowingly carried as their own. Copies were sent anonymously or under bogus letterhead to activists’ financial backers, employers, business associates, families, neighbors, church officials, school administrators, landlords, and whomever else might cause them trouble.

One FBI media fabrication claimed that Jean Seberg, a white film star active in anti-racist causes, was pregnant by a prominent Black leader. The Bureau leaked the story anonymously to columnist Joyce Haber and also had it passed to her by a “friendly” source in the Los Angeles Times editorial staff. The item appeared without attribution in Haber’s nationally syndicated column of May 19, 1970. Seberg’s husband has sued the FBI as responsible for her resulting stillbirth, nervous breakdown, and suicide.

Bogus Leaflets, Pamphlets, and Other Publications: COINTELPRO documents show that the FBI routinely put out phony leaflets, posters, pamphlets, newspapers, and other publications in the name of movement groups. The purpose was to discredit the groups and turn them against one another.

FBI cartoon leaflets were used to divide and disrupt the main national anti-war coalition of the late 1960s. Similar fliers were circulated in 1968 and 1969 in the name of the Black Panthers and the United Slaves (US), a rival Black nationalist group based in Southern California. The phony Panther/US leaflets, together with other covert operations, were credited with subverting a fragile truce between the two groups and igniting an explosion of internecine violence that left four Panthers dead, many more wounded, and a once-flourishing regional Black movement decimated.

Another major COINTELPRO operation involved a children’s coloring book which the Black Panther Party had rejected as anti-white and gratuitously violent. The FBI revised the coloring book to make it even more offensive. Its field offices then distributed thousands of copies anonymously or under phony organizational letterheads. Many backers of the Party’s program of free breakfasts for children withdrew their support after the FBI conned them into believing that the bogus coloring book was being used in the program.

Forged Correspondence: Former employees have confirmed that the FBI has the capacity to produce state-of-the-art forgery. This capacity was used under COINTELPRO to create snitch jackets and bogus communications that exacerbated differences among activists and disrupted their work.

One such forgery intimidated civil rights worker Muhammed Kenyatta (Donald Jackson), causing him to abandon promising projects in Jackson, Mississippi. Kenyatta had foundation grants to form Black economic cooperatives and open a “Black and Proud School” for dropouts. He was also a student organizer at nearby Tougaloo College. In the winter of 1969, after an extended campaign of FBI and police harassment, Kenyatta received a letter, purportedly from the Tougaloo College Defense Committee, which “directed” that he cease his political activities immediately. If he did not “heed our diplomatic and well-thought-out warning,” the committee would consider taking measures “which would have a more direct effect and which would not be as cordial as this note.” Kenyatta and his wife left. Only years later did they learn it was not Tougaloo students, but FBI covert operators who had driven them out.

Later in 1969, FBI agents fabricated a letter to the mainly white organizers of a proposed Washington, D.C. anti-war rally demanding that they pay the local Black community a $20,000 “security bond.” This attempted extortion was composed in the name of the local Black United Front (BUF) and signed with the forged signature of its leader. FBI informers inside the BUF then tried to get the group to back such a demand, and Bureau contacts in the media made sure the story received wide publicity.

The Senate Intelligence Committee uncovered a series of FBI letters sent to top Panther leaders throughout 1970 in the name of Connie Mathews, an intermediary between the Black Panther Party’s national office and Panther leader Eldridge Cleaver, in exile in Algeria. These exquisite forgeries were prepared on pilfered stationery in Panther vernacular expertly simulated by the FBI’s Washington, D.C. laboratory. Each was forwarded to an FBI Legal Attache at a U.S. Embassy in a foreign country that Mathews was due to travel through and then posted at just the right time “in such a manner that it cannot be traced to the Bureau.” The FBI enhanced the eerie authenticity of these fabrications by lacing them with esoteric personal tidbits culled from electronic surveillance of Panther homes and offices. Combined with other forgeries, anonymous letters and phone calls, and the covert intervention of FBI and police infiltrators, the Mathews correspondence succeeded in inflaming intra-party mistrust and rivalry until it erupted into the bitter public split that shattered the organization in the winter of 1971.

Anonymous Letters and Telephone Calls: During the 1960s, activists received a steady flow of anonymous letters and phone calls which turn out to have been from the FBI. Some were unsigned, while others bore bogus names or purported to come from unidentified activists in phony or actual organizations.

Many of these bogus communications promoted racial divisions and fears, often by exploiting and exacerbating tensions between Jewish and Black activists. One such FBI-concocted letter went to SDS members who had joined Black students protesting New York University’s discharge of a Black teacher in 1969. The supposed author, an unnamed “SDS member,” urged whites to break ranks and abandon the Black students because of alleged anti-Semitic slurs by the fired teacher and his supporters.

Other anonymous letters and phone calls falsely accused movement leaders of collaboration with the authorities, corruption, or sexual affairs with other activists’ mates. The letter on the next page was used to provoke “a lasting distrust” between a Black civil rights leader and his wife. Its FBI authors hoped that his “concern over what to do about it” would “detract from his time spent in the plots and plans of his organization.” As in the Seberg incident, inter-racial sex was a persistent theme. The husband of one white woman active in civil rights and anti-war work filed for divorce soon after receiving the FBI-authored letter reproduced on page 50.

Still other anonymous FBI communications were designed to intimidate dissidents, disrupt coalitions, and provoke violence. Calls to Stokely Carmichael’s mother warning of a fictitious Black Panther murder plot drove him to leave the country in September 1968. Similar anonymous FBI telephone threats to SNCC leader James Forman were instrumental in thwarting efforts to bring the two groups together.

The Chicago FBI made effective use of anonymous letters to sabotage the Panthers efforts to build alliances with previously apolitical Black street gangs. The most extensive of these operations involved the Black P. Stone Nation, or “Blackstone Rangers,” a powerful confederation of several thousand local Black youth. Early in 1969, as FBI and police infiltrators in the Rangers spread rumors of an impending Panther attack, the Bureau sent Ranger chief Jeff Fort an incendiary note signed “a black brother you don’t know.” Fort’s supposed friend warned that “The brothers that run the Panthers blame you for blocking their thing and there’s supposed to be a hit out for you.” Another FBI-concocted anonymous “black man” then informed Chicago Panther leader Fred Hampton of a Ranger plot “to get you out of the way.” These fabrications squelched promising talks between the two groups and enabled Chicago Panther security chief William O’Neal, an FBI-paid provocateur, to instigate a series of armed confrontations from which the Panthers barely managed to escape without serious casualties.

Pressure Through Employers, Landlords, and Others: FBI records reveal repeated maneuvers to generate pressure on dissidents from their parents, children, spouses, landlords, employers, college administrators, church superiors, welfare agencies, credit bureaus, and the like. Anonymous letters and telephone calls were often used to this end. Confidential official communications were effective in bringing to bear the Bureau’s immense power and authority.

Agents’ reports indicate that such FBI intervention denied Martin Luther King, Jr., and other 1960s activists any number of foundation grants and public speaking engagements. It also deprived alternative newspapers of their printers, suppliers, and distributors and cost them crucial advertising revenues when major record companies were persuaded to take their business elsewhere. Similar government manipulation may underlie steps recently taken by some insurance companies to cancel policies held by churches giving sanctuary to refugees from El Salvador and Guatemala.

Tampering With Mail and Telephone Service: The FBI and CIA routinely used mail covers (the recording of names and addresses) and electronic surveillance in order to spy on 1960s movements. The CIA alone admitted to photographing the outside of 2.7 million pieces of first-class mail during the 1960s and to opening almost 215,000. Government agencies also tampered with mail, altering, delaying, or “disappearing” it. Activists were quick to blame one another, and infiltrators easily exploited the situation to exacerbate their tensions.

Dissidents’ telephone communications often were similarly obstructed. The SDS Regional Office in Washington, D.C., for instance, mysteriously lost its phone service the week preceding virtually every national anti-war demonstration in the late 1960s.

Disinformation to Prevent or Disrupt Movement Meetings and Activities: A favorite COINTELPRO tactic uncovered by Senate investigators was to advertise a non-existent political event, or to misinform people of the time and place of an actual one. They reported a variety of disruptive FBI “dirty tricks” designed to cast blame on the organizers of movement events.”

Comment

Some of my experiences of internet harassment over the past five years sound a lot like this stuff. But in my case, I’m pretty sure that the people involved were private individuals, who maybe used some of their government connections or authority. At some point, one ex-CIA official [ a guy who had a history of out-of-control behavior and had had run-ins with the law] was actually writing nasty stuff on this blog, and may have been behind a few other things.

But the rest was private. Which suggests that between corporations (correction: criminal corporations) and  government (correction: unconstitutional governments), there’s not much to choose.

Anyway, this kind of history of government infiltration of activist groups  should make people very wary about their communications. The email in your inbox can be forged and your own name could be tacked onto things you never wrote.  With all the powers at their disposal, if the government decided to frame someone, they would be able to get or create all kinds of incriminating stuff.

That’s why I don’t buy the Gupta verdict at all. With five years of investigation by two different outfits, with thousands of wire-taps, they only got him talking to Raj once? And even then, there was nothing illegal in that conversation….

Eaten By The Japanese: The Memoir Of An Unknown Indian Soldier

In “Eaten by the Japanese”  Richard Crasta has collaborated with his 86 year old father John Baptist Crasta to give us an amazing account of his experiences as an Indian soldier in the Allied army, who became a Japanese POW,  experiences completely ignored by the majority of academic historians and writers.

Atrocities committed in Asia have never received  more than marginal attention until now, even though the death rate of Indians who were Japanese POWs was higher than the rate for victims of the Nazis.

Excerpts from Pragati:

“From “The Second Voyage of the Torture Ship”:
Dysentery broke out on the ship. The few latrines were being used by both unfit and fit men. In our own party of one hundred and fifty, three or four deaths occurred daily. The corpses were wrapped in a worn-out blanket and lowered into the deep ocean, unwept for and unsung. I could see hardy men prostrate with dysentery, unable to move, without any clothes. The Japanese did not pay any heed to what was going on. Dysentery spread to other holds of the ship, killing seven to eight daily. But the ship was not stopped, nor was an attempt made to evacuate the victims.

Insanitation and squalor increased. There had been cases of men dying from dysentery within a day of getting sick. Except for separate accommodation being allowed, no treatment was given to the men, and the disease spread anyway. The scene was pitiful and heart-rending. Brave, virile soldiers who would have defied anybody in battle were now helpless like babies and were groaning and rolling naked on the floor presenting a weird spectacle. I could not bear it and tears started trickling from my eyes as nothing in my life had moved me to that extent. Was this the penalty we were paying for being honest and principled?

From “Koga the Devil”:
…..Owing to agonizing pain, my temperature did not subside. I and the four others requested Koga to shoot us as it was better to die than to remain as their prisoners. He jokingly gave us shovels and spades, asking us to prepare our own graves so that we might be shot the next morning.

Basanta was the one most cruelly mistreated. For some trifling offence, he was tied with live battery wires; and when the unfortunate man cried for mercy, all the Japanese laughed. He fell down. They kicked him and made him get up, again tying him up with the torturing wires. Besides Basanta, there was another Sikh, Kartar Singh, with us. Koga ordered them to shave off their beards as, according to them, the beards made them ill. For disobeying him, they were beaten.

One day, Basanta was standing by. Koga, like a dog, came upon him and passed urine on him. On another occasion, Basanta was spat upon.

We again pleaded with Koga to shoot us all. He warned us not to repeat this request. We were their prisoners and must obey them. Even the British General Percival was being ordered about by a Japanese soldier. We had been defeated in the war and must not speak anything out of the way.

From “Killing to Eat: or Calling Upon the Japanese to Face their Dark Side”:
And though I believe all of us have within us a dark side, and that in a profound sense we are also the Other, it is also important, in the illusory everyday world that we call Reality, that we append the stories of the weak and the voiceless to the histories written by the mighty and the once-mighty, and that each us of register our horror, our personal footnote, to the Official and often Sanitized Communal History. Any lingering doubts I may have had about the title disappeared after I met Roger Mansell, an American war historian who had been examining the Japanese record in World War II. Mansell was horrified by the lack of remorse in a recent Japanese compendium of World War II recollections called Senso. He explained that American G.I.s had been cannibalized simply as an act of demoralization; these acts had nothing to do with the nutritional needs of the Japanese. So I decided to retain the title for this second, public edition, even allowing in a moment of optimism that the book might receive attention in Japan and persuade the Japanese to confront and admit to their widely observed racism and start a national campaign to tackle it, making it less possible for a future Pico Iyer to say, “In Japan, an Indian is the lowest of the low.”

Comment:

What a gift the internet has been. I posted this excerpt not to provoke racial/national animosity or to endorse requests for national apologies or recriminations. But just to add to public knowledge, and to show how much of our real history has been suppressed, ignored or distorted. All these years of reading WW II history, and even reading about the cannibalising of George Bush’s comrades by the Japanese, I’d never heard about the experiences of Indian solders.

Hitler’s Pope And The Serbian Holocaust

The little known slaughter of Orthodox Christians, Jews, and Roma in Yugoslavia at the hands of Nazi-sponsored Croatian leadership had the full approval of the Catholic pope and the Grand Mufti of Jerusalem.

“During the Second World War in Yugoslavia, Catholic priests and Muslim clerics were willing accomplices in the genocide of the nations Serbian, Jewish and Roma population. From 1941 until 1945, the Nazi-installed regime of Ante Pavelic in Croatia carried out some of the most horrific crimes of the Holocaust (known as the Porajmos by the Roma), killing over 800,000 Yugoslav citizens750,000 Serbs, 60,000 Jews and 26,000 Roma. In these crimes, the Croatian Ustasha and Muslim fundamentalists were openly supported by the Vatican, the Archbishop of Zagreb Cardinal Alojzije Stepinac (1898-1960), and the Palestinian Grand Mufti of Jerusalem, Hajj Amin al-Husseini. Many of the victims of the Pavelic regime in Croatia were killed in the war’s third largest death camp – Jasenovac, where over 200,000 people – mainly Orthodox Serbs met their deaths. Some 240,000 were “rebaptized” into the Catholic faith by fundamentalist Clerics in “the Catholic Kingdom of Croatia” as part of the policy to “kill a third, deport a third, convert a third” of Yugoslavia’s Serbs, Jews and Roma in wartime Bosnia and Croatia (The Yugoslav Auschwitz and the Vatican, Vladimar Dedijer, Anriman-Verlag, Freiburg, Germany, 1988).

On April 6th 1941, Nazi Germany invaded Yugoslavia. By April 10th, Croatian fascists led by Ante Pavelic were allowed by Hitler and his ally Mussolini to set up a “independent” puppet state of Croatia. Hitler granted “Aryan” status to Croatia as his fascist allies carved up Yugoslavia. Pavelic had been awaiting these developments whilst under the auspices of Mussolini in Italy who had granted them the use of remote training camps on a Aeolian island and access to a propaganda station Radio Bari for broadcasts across the Adriatic. As soon as the new fascist state of Croatia was born, and campaign of cold-blooded terror began, as noted by John Cornwell in his book Hitler’s Pope: The Secret History of Pius XII (Viking, London, UK, 1999):

“(It was) an act of ‘ethnic cleansing’ before that hideous term came into vogue, it was an attempt to create a ‘pure’ Catholic Croatia by enforced conversions, deportations, and mass exterminations. So dreadful were the acts of torture and murder that even hardened German troops registered their horror. Even by comparison with the recent bloodshed in Yugoslavia at the time of writing, Pavelic’s onslaught against the Orthodox Serbs remains one of the most appalling civilian massacres known to history” (p 249)

Gordon Duff: Look After The Vets Who Are Still Alive

Gordon Duff on Crosses of Distraction:

“Veterans own billions in land across the US, held in trust by the Department of Veterans Affairs. Where that land is wanted by others, it will be given away and sold. Veterans housing, however, will be handled by special interest groups, churches with wild ideas, failed drug rehabilitation programs run by “hucksters” with political connections and petty gangsters who will get free land, free buildings and free money which will, somehow magically, end up being used for everything but veterans housing.

This is going on “full speed” as we speak and no one is saying a word, nobody really but Bob Rosebrock and his small group of supporters, the “Old Guard” who have been protesting these abuses every Sunday, without fail for almost 3 full years.

What is it about? How do we fix it?

It is time we admit that those controlling veterans organizations, the real voices, are nothing but Washington hacks who should be “shilling” for pharmaceutical companies or selling used cars. Their failures are epic and have been for decades. The major veterans organizations lost their way 50 years ago and the “slack” has been picked up by dozens of activist organizations, unfunded but dedicated.

This is the truth of it and it is a shameful thing for the United States.

We could talk war itself. Does anyone know why we are fighting or who? At least check, for each estimated “Al Qaeda” member in Afghanistan, we had 20,000 troops.

In fact, upon closer examination, something newspapers in America and our Congress are unlikely to do, almost everything believed about the “war on terror” and “9/11? is proving to be something very wrong. You may not know it now, you may never want to believe it, but it is true. Something very wrong, very evil, very “unAmerican” happened and is still going on.

With all the talk about honoring the dead, defending “crosses” or dishonoring Jewish War dead, who speaks for the living? In Los Angeles, it is Robert Rosebrock and his friends, harassed and threatened, abandoned by the Jewish War Veterans, abandoned by the American Legion, abandoned by the VFW.

If you want to be abandoned, try defending the weak, the abused, the heroic, the honorable from the rich, the greedy and the heartless.

In February, Rosebrock will be in court. He is suing the Department of Veterans Affairs for arresting him for protesting, trying to force them to do what they are supposed to do, protect and serve America’s veterans. The ACLU is standing with him.

After three years, the police who arrested him repeatedly, employees of the Department of Veterans Affairs are standing with him also.

Most veterans groups are not. Why? Too busy with politics and religion?”

Christmas 1914 in No Man’s Land

Christmas Eve 1914:

Christmas Eve 1914, stars were burning, burning bright
And all along the Western front guns were lying still and quiet
Men lay dozing in the trenches, in the cold and in the dark
And far away behind the lines the village dog began tae bark

Some lay thinking of their families, some sang songs while others were quiet
Rolling fags and playing brag to pass away that Christmas night
As they watched the German trenches, something moved in no man’s land
Through the dark there came a soldier carrying a white flag in his hand

Then from both sides men came running, crossing into no man’s land
Through the barbed wire, mud and shell-holes, shyly stood there shaking hands
Fritz brought out cigars and brandy, Tommy brought corned beef and fags
Stood there talking, shyly laughing, as the moon shone down on no man’s land

Then Christmas Day we all played football in the mud of no man’s land
Tommy brought some Christmas pudding, Fritz brought out a German band
When they beat us at the football we shared out all our grub and drink
Then Fritz showed me a faded photo of a brown-haired girl back in Berlin

For four days after no one fired, not one shell disturbed the night
For old Fritz and Tommy Atkins, they’d both lost their will to fight
So they withdrew us from the trenches, sent us far behind the lines
Sent fresh lads to take our places and told the guns, Prepare to fire

And next night in 1914, flares were burning, burning bright
The orders came, Prepare offensive! Over the top your going tonight
And men stood waiting in the trenches, looked out across our football park
As all along the Western front the Christmas guns began tae bark

And men stood waiting in the trenches, looked out across our football park
As all along the Western front the Christmas guns began tae bark

[1987:]

In no-man’s-land, between the British and the German trenches during the Christmas truce of that year [1914], an extraordinary event occurred.

“The night was cold. We sang, they applauded. Our lines were only two hundred feet apart. We played the mouth organ, they sang, then we applauded. They produced a set of bagpipes and played their poetic tunes.
Men were waving torches and cheering. We had prepared grog and drank a toast.”

[Letter] from a German soldier. –

From both sides men came running, and soon were fraternizing “in the most genuine possible manner. Every sort of souvenir was exchanged, addresses given and received.” A German N.C.O. with an Iron Cross, gained “for conspicuous skill in sniping, started his fellows off on some marching tune. I set the note for the Bonnie Boys of Scotland, and so we went on and ended up with Auld Lang Syne which we all – English, Scots, Irish, Prussians and Wurttembergers – joined in.”

[Diary] of a British Captain. – From some old rags and cord a makeshift football was made, and by the light of flares the two sides played a game of soccer, their previous deadly activities forgotten. (Notes Danny
Doyle, ’20 Years A-Growing’)

[1988:] At some points a “live and let live” system evolved – a means of existence involving tacit co-operation between the sides, recognizing a rough parity of forces. […] One was to have an unspoken agreement […] not to shell latrines nor to open fire during breakfast. Another was to make as
much noise as possible before a minor raid, so that the other side could withdraw to their protected bunkers. This limitation on hostilities did not exist everywhere and was stamped on by command when it came to light. But even such informal arrangements as survived could be quickly buried,
along with men killed by snipers, by the odd shell, or gas. The fraternization that did go on briefly between the lines on Christmas Day 1914 did not characterize the way the war was fought in the trenches.
Violence was always below the surface, ready to explode. (J.M. Winter, The Experience of World War I, 133ff)

I’m Changing My Name To Chrysler

I’m Changing My Name to Chrysler – by Tom Paxton, sung by Arlo Guthrie

Oh the price of gold is rising out of sight/And the dollar is in sorry shape tonight.
What a dollar used to get us/Now won’t buy a head of lettuce/No, the economic forecast isn’t right
But amidst the clouds I spot a shining ray/I can even glimpse a new and better way
I’ve devised a plan of action/Worked it down to the last fraction/And I’m going into action here today.

[Cho:]
I am changing My Name To “Chrysler”/I am going down to Washington, D.C.
I will tell some power broker/What they did for Iacocca/Will be perfectly acceptable to me.
I am changing my name to ‘Chrysler’/I am heading for that great receiving line,
So when they hand a million grand out/I’ll be standing with my hand out/Yes sir, I’ll get mine.r you

Jeff Blankfort Deconstructs Chomsky On America and Israel

Update

I should make it clear that, as a libertarian, I don’t support sanctions against any country. I wouldn’t have supported sanctions against South Africa, didn’t support them on Iraq, and don’t support them on Israel. However, targeted boycotts against specific, responsible parties (journalists, academics, government officials, businessmen or military officials directly involved in genocidal crimes or in their cover-up) would be defensible under international law. General sanctions only impoverish people and undermine resistance.

So my problem here is less with Chomsky’s position on divestment – whatever it is – so much as his apparent double-standards on the issue – one standard for South Africans…… and another for Israel.One for Israel…and another for Palestine. One for the US…and another for Israel.

If the Jews deserved a homeland, and they did, the Palestinians surely deserved land that was already their home and had been their home for centuries…

Original Post [all varieties of emphasis –  underlines, capitals, and italics – are mine, not Blankfort’s]:

The indefatigably brave and honest Jeff Blankfort analyzes Noam Chomsky’s writings on Israel and Palestine. I’ve  been very conflicted about Chomsky’s blind-eye on  9-11 for some time now. What to think about it? This analysis convinces me finally that Chomsky’s bias is not simply an emotional blind-spot, but a deliberate obfuscation that in such a prominent, sophisticated, and powerful voice, must be called out and questioned closely.

“His reluctance to label Israel’s control of the Palestinians as “apartheid” out of concern that it be seen as a “red flag,” like describing it as “inflammatory,” was a red flag itself and raised questions that should have been asked by the interviewer, such as who would be inflamed by the reference to ‘apartheid’ as a “red flag” in Israel’s case and what objections would Chomsky have to that?

A more disturbing exchange occurred later in the interview when Chomsky was asked if sanctions should be applied against Israel as they were against South Africa. He responded:

“In fact, I’ve been strongly against it in the case of Israel. For a number of reasons. For one thing, even in the case of South Africa, I think sanctions are a very questionable tactic. In the case of South Africa, I think they were [ultimately] legitimate because it was clear that the large majority of the population of South Africa was in favor of it.

Sanctions hurt the population. You don’t impose them unless the population is asking for them. That’s the moral issue. So, the first point in the case of Israel is that: Is the population asking for it? Well, obviously not.”

Obviously not. But is it acceptable to make such a decision on the basis of what the majority of Israelis want? Israel, after all, is not a dictatorship in which the people are held in check by fear and, therefore, cannot be held responsible for their government’s actions. Israel has a largely unregulated, lively press and a “people’s army” in which all Israeli Jews, other than the ultra-orthodox, are expected to serve and that is viewed by the Israeli public with almost religious reverence. Over the years, in their own democratic fashion, the overwhelming majority of Israelis have consistently supported and participated in actions of their government against the Palestinians and Lebanese that are not only racist, but in violation of the Geneva Conventions.

Chomsky made his position clear:

“So calling for sanctions here, when the majority of the population doesn’t understand what you are doing, is tactically absurd-even if it were morally correct, which I don’t think it is. The country against which the sanctions are being imposed is not calling for it.”

The interviewer, Lee, understandably puzzled by that answer, then asked him, “Palestinians aren’t calling for sanctions?

Chomsky: “Well, the sanctions wouldn’t be imposed against the Palestinians, they would be imposed against Israel.”

Lee: “Right… [And] Israelis aren’t calling for sanctions.”

That response also disturbed Palestinian political analyst, Omar Barghouti, who, while tactfully acknowledging Chomsky as “a distinguished supporter of the Palestinian cause,” addressed the issue squarely:

Of all the anti-boycott arguments, this one reflects either surprising naiveté or deliberate intellectual dishonesty. Are we to judge whether to apply sanctions on a colonial power based on the opinion of the majority in the oppressors community? Does the oppressed community count at all? [7]

For Chomsky, apparently not……

………In an exchange with Washington Post readers, Chomsky was asked by a caller:

Why did you sign an MIT petition calling for MIT to boycott Israeli investments, and then give an interview in which you state that you opposed such investment boycotts? What was or is your position on the proposal by some MIT faculty that MIT should boycott Israeli investments?

Chomsky replied:

As is well known in Cambridge, of anyone involved, I” was the most outspoken opponent of the petition calling for divestment, and in fact refused to sign until it was substantially changed, along lines that you can read if you are interested. The “divestment” part was reduced to three entirely meaningless words, which had nothing to do with the main thrust of the petition. I thought that the three meaningless words should also be deleted… On your last question, as noted, I was and remain strongly opposed, without exception — at least if I understand what the question means. How does one “boycott Israeli investments”? (Emphasis added). [10]

I will assume that Chomsky understood very well what the caller meant: investing in Israeli companies and in State of Israel Bonds of which US labor union pension funds, and many states and universities have purchased hundreds of millions of dollars worth. These purchases clearly obligate those institutions to lobby Congress to insure that the Israeli economy stays afloat. This isn’t something that Chomsky talks or writes about.

The caller was referring to a speech that Chomsky had made to the Harvard Anthropology Dept. shortly after the MIT and Harvard faculties issued a joint statement on divestment. It was gleefully reported in the Harvard Crimson by pro-Israel activist, David Weinfeld, under the headline “Chomsky’s Gift”:

MIT Institute Professor of Linguistics Noam Chomsky recently gave the greatest Hanukkah gift of all to opponents of the divestment campaign against Israel. By signing the Harvard-MIT divestment petition several months ago—and then denouncing divestment on Nov. 25 at Harvard—Chomsky has completely undercut the petition.

At his recent talk for the Harvard anthropology department, Chomsky stated: “I am opposed and have been opposed for many years, in fact, I’ve probably been the leading opponent for years of the campaign for divestment from Israel and of the campaign about academic boycotts.”

He argued that a call for divestment is “a very welcome gift to the most extreme supporters of US-Israeli violence… It removes from the agenda the primary issues and it allows them to turn the discussion to irrelevant issues, which are here irrelevant, anti-Semitism and academic freedom and so on and so forth.” [11] …….

….

Chomsky’s rationalization of Israel’s criminal misdeeds in The Fateful Triangle should have rung alarm bells when it appeared in 1983. Written a year after Israel’s invasion of Lebanon, in what would become a sacred text for Middle East activists, he actually began the book not by taking Israel to task so much as its critics:

In the war of words that has been waged since Israel invaded Lebanon on June 6, 1982, critics of Israeli actions have frequently been accused of hypocrisy. While the reasons advanced are spurious, the charge itself has some merit. It is surely hypocritical to condemn Israel for establishing settlements in the occupied territories while we pay for establishing and expanding them. Or to condemn Israel for attacking civilian targets with cluster and phosphorous bombs “to get the maximum kill per hit.” When we provide them gratis or at bargain rates, knowing that they will be used for just this purpose. Or to criticize Israel’s ‘indiscriminate’ bombardment of heavily-settled civilian areas or its other military adventures, while we not only provide the means in abundance but welcome Israel’s assistance in testing the latest weaponry under live battlefield conditions... .In general, it is pure hypocrisy to criticize the exercise of Israeli power while welcoming Israel’s contributions towards realizing the US aim of eliminating possible threats, largely indigenous, to American domination of the Middle East region.[ 21]

First, the PLO was seen as a threat by Israel, not by the United States in 1982, particularly since it had strictly abided by a US-brokered cease-fire with Israel for 11 months, giving it a dangerous degree of credibility in Israeli eyes. Second, whom did Chomsky mean by “we?” Perhaps, President Reagan and some members of Congress who gently expressed their concern when the number of Palestinians and Lebanese killed in the invasion and the wholesale destruction of the country could not be suppressed in the media. But he doesn’t say. It certainly wasn’t those who took to the streets across the country to protest Israel’s invasion. Both political parties had competed in their applause when Israel launched its attack, as did the AFL-CIO which took out a full page ad in the NY Times, declaring “We Are Not Neutral. We Support Israel!” paid for by an Israeli lobbyist with a Park Avenue address. The media, in the beginning, was also supportive, but it is rare to find an editorial supporting US aid to Israel. It is rarely ever mentioned and that’s the way the lobby likes it. So is Chomsky creating a straw figure? It appears so.

If we follow Chomsky’s “logic,” it would be an injustice to bring charges of war crimes against Indonesian, El Salvadoran, Guatemalan, Haitian, or Filipino officers, soldiers, or public officials for the atrocities committed against their own countrymen and women since they were funded, armed and politically supported by the US. Perhaps, General Pinochet will claim the Chomsky Defense if he goes to trial.

He pressed the point of US responsibility for Israel’s sins again in his introduction to The New Intifada, noting that as one of the High Contracting Parties to the Geneva Conventions, “It is therefore Washington’s responsibility to prevent settlement and expropriation, along with collective punishment and all other measures of violence… .It follows that the United States is in express and extreme violation of its obligations as a High Contracting Party.” [22]

I would agree with Chomsky, but is the US refusal to act a more “extreme violation” than the actual crimes being committed by another signatory to the Conventions, namely Israel? Chomsky would have us believe that it is.

It is a point he made clear at a talk in Oxford in May, 2004, when he brought up the killing a week earlier of the Hamas spiritual leader, Sheik Ahmed Yassin by the Israeli military as he left a Mosque in Gaza. “That was reported as an Israeli assassination, but inaccurately” said Chomsky. “Sheikh Yassin was killed by a US helicopter, flown by an Israeli pilot. Israel does not produce helicopters. The US sends them with the understanding that they will be used for such purposes, not defense, as they have been, regularly.”

Chomsky is correct to a point. What is missing from his analysis is any reference to the demands from Congress, orchestrated by the American Israel Public Affairs Committee (AIPAC), Israel’s officially registered lobby, to make sure that the US provides those helicopters to Israel to use as its generals see fit. (In fact, there is not a single mention of AIPAC in any one of Chomsky’s many books on the Israel-Palestine conflict). What Chomsky’s British audience was left with was the conclusion that the assassination of Sheik Yassin was done with Washington’s approval.

While its repeated use of helicopters against the Palestinian resistance and civilian population has been one of the more criminal aspects of Israel’s response to the Intifada, absolving the Israelis of blame for their use has become something of a fetish for Chomsky as his introduction to The New Intifada [23] and again, in more detail in Middle East Illusions, illustrates:

On October 1, [at the beginning of the Al-Aksa Intifada] Israeli military helicopters, or, to be more precise, US military helicopters with Israeli pilots, sharply escalated the violence, killing two Palestinians in Gaza… . The continuing provision of attack helicopters by the United States to Israel, with the knowledge that these weapons are being used against the civilian Palestinian population, and the silence of the mainstream media is just one illustration of many of how we live up to the principle that we do not believe in violence. Again, it leaves honest citizens with two tasks: the important one, do something about it; and the second one, try to find out why the policies are being pursued. (Emphasis added) [24]

What to do Chomsky again doesn’t say, but he does try to tell us why:

“On that matter, the fundamental reasons are not really controversial… It has long been understood that the gulf region has the major energy sources in the world… ” [25]

Chomsky then goes on for two pages explaining the importance of Middle East oil and the efforts by the US to control it. It is the basic explanation that he has repeated and republished, almost verbatim, over the years. What it has to do with the Palestinians who have no oil or how a truncated Palestinian state would present a threat to US regional interests is not provided, but after two pages the reader has forgotten that the question was even posed. In his explanation there is no mention of the lobby or domestic influences.

Chomsky does acknowledge that “major sectors of American corporate capitalism, including powerful elements with interests in the Middle East [the major oil companies!]” have endorsed a “two-state solution” on the basis that

the radical nationalist tendencies that are enflamed by the unsettled Palestinian problem would be reduced by the establishment of a Palestinian mini-state that would be contained within a Jordanian-Israeli military alliance (perhaps tacit), surviving at the pleasure of its far more powerful neighbors and subsidized by the most conservative and pro-American forces in the Arab world… .This would, in fact, be the likely outcome of a two-state settlement.” [26]

Such an outcome would have little direct influence on regional Arab politics, except to demoralize supporters of the Palestinian struggle in the neighboring countries and around the world, a development that would clearly serve US interests. It would, however, curb Israel’s expansion, which is critical to Israel’s agenda, not Washington’s. Chomsky also fails to recognize a fundamental contradiction in his argument. If the support of Israel has been based on its role as protector of US strategic resources, namely oil, why does not that position enjoy the support of the major oil companies with interests in the region?…”

(Lila: My emphasis)

Stuxnet: A Chronology (Ongoing)

October 2, 2010

The NY Times now backtracks, claiming that Israeli cyber warfare experts are “too smart” to leave a clue behind. Thus..by inference…it must be a country that wants to implicate Israel, which..by inference…is Iran (surprise).  Too clever by half, these folks. Another reason I believe Israel or an Israeli-backed team is behind Stuxnet is the fact that Wikileaks apparently had a reference to a possible nuclear “accident” in Iran in July 2009. That is around the time when some researchers argue Stuxnet infections first began.

October 2, 2010

Jeffrey Carr backs off from the allegation that Israel is the culprit, claiming that Ralph Langner was the sole source of the allegation and was irresponsible in posting it on his blog as though it were the opinion of the intelligence community. Carr quotes an earlier piece of his, along with these words:

“Last week I wrote about how the Israel-Iran conspiracy theory around the Stuxnet worm was built entirely on one security engineer’s personal conjecture (Ralph Langner) with absolutely no weighing of alternative possibilities for attribution, nor any objective assessment of the evidence.”

However, if you click on the earlier piece he cites, he wrote nothing of the sort in it. Nowhere in that piece did Carr claim that Langner was the sole source of the allegation; he quotes the NY Times as noting several people who’d reached the same conclusion. Also, there is no hint in the piece that he considered Langner’s allegation speculative or poorly founded. He cited it instead as a likely possibility. This is clear back-pedaling, probably provoked by the fear that the story might lead to a crackdown on Iranian dissidents and foreigners. Well, of course it will. But that’s not the fault of journalists reporting on the story. Or of Ralph Langner, who clearly states on his blog that he is “speculating” (see previous link).

The fault lies with the unknown cybercriminal/s who came up with Stuxnet.

“Stuxnet Speculation Fuels Crackdown By Iranian Intelligence,” Jeffrey Carr, The Firewall, Forbes, October 2, 2010/

*October 1, 2010

[See “Clues Emerge About Genesis Of Stuxnet Worm,” CS Monitor, October 1, 2010]

*October 1, 2010

[“Israel: Smart Enough To Create Stuxnet; Stupid Enough To Use It” War In Context, Oct. 1, 2010]

*October 1, 2010

Cryptome is arguing that Israel would never have done anything so sloppy as what’s alleged. Could it be that some group is deliberately playing off one side against the other, that is, playing divide-and-conquer? Or is this more “plausible deniability”?

On looking back, I notice that one of the first people to launch the “Israel did it” allegation is one Richard Falkenrath, who works for the Chertoff Group (my emphasis).

That makes me wonder.

Here’s Cryptome:

“Really? Personally I’d be surprised if a crack team of Israeli software engineers were so sloppy that they relied on outdated rootkit technology (e.g. hooking the Nt*() calls used by Kernel32.LoadLibrary() and using UPX to pack code). Most of the Israeli developers I’ve met are pretty sharp. Just ask Erez Metula.

http://www.blackhat.com/presentations/bh-usa-09/METULA/BHUSA09-Metula-ManagedCodeRootkits-
PAPER.pdf

“It may be that the “myrtus” string from the recovered Stuxnet file path

“b:\myrtus\src\objfre_w2k_x86\i386\guava.pdb” stands for “My-RTUs”

as in Remote Terminal Unit. See the following white paper from Motorola, it examines RTUs and PICs in SCADA systems. Who knows? The guava-myrtus connection may actually hold water.

http://www.motorola.com/web/Business/Products/SCADA%20Products/_Documents/Static%20Files/SCADA_
Sys_Wht_Ppr-2a_New.pdf

As you can see, the media’s propaganda machine is alive and well.”

I am completely out of my depth in the technical part of this. But not in the propaganda part.

As an instance of the way group conflicts can be set off, think of how during the financial crisis there were an inordinate number of Indians being trotted out to do the explaining…and taking the brunt of the public’s anger, although last I looked, despite a respectable number of Indian billionaires, the head honchos of the major banks (with one exception) and the biggest and most important speculators, managers, and  international officials were not Indian, to phrase it as politely as possible.

Setting race and nation each against other is of course the modus operandi of the power elite, and both Kashmir and Israel have played that divisive role in the past….and continue to do so.

*October 1, 2010

A link to an Examiner piece is coming up right at the top of a Google search of Stuxnet and Israel. With all due respect to the author, who probably thinks he/she is on the side of the angels and simply preempting an outburst of anti-Semitism by this effort, the piece is quite misleading….and, apparently, deliberately so, as an examination of the other links listed here, from a variety of  sources in the West (see this NY Times pieces) will prove.

For instance, the Examiner piece doesn’t cite the reports from many western security companies and research teams (see links below) that have extensively researched the issue, nor does it acknowledge that it was these sites that first advanced the claim that Israel/Israeli hackers were likely responsible. Instead, it cites a Times of India piece that republishes the claims.

The attempt, apparently, is to mislead the public into thinking that the allegation of Israeli involvement is one mainly advanced by untrustworthy foreigners with axes to grind (note the description “Iran’s friend, India”).

“Another of Iran’s friends, India, is pushing the notion that Israel did it. According to an http://timesofindia.indiatimes.com on Friday, “A Biblical reference has been detected in the code of the computer virus that points to Israel as the origin of the cyber attack.” It’s further explained that the word “myrtus” is in the code, and that this is a “reference to the myrtle tree”

In point of fact, it was western security companies and western researchers who came to that conclusion.  Moreover, the targets of the worm fit very well with Anglo-Zionist imperial objectives – covering as they do the largest Muslim populations in Asia.

[See “German Firm Employee May Have Created Stuxnet; Israel Blames.” Examiner.com, October 1, 2010

*September 30, 2010

Quote:

“Buried in Stuxnet’s code is a marker with the digits “19790509” that the researchers believe is a “do-not infect” indicator. If the marker equals that value, Stuxnet stops in its tracks, and does not infect the targeted PC. The researchers — Nicolas Falliere, Liam O Murchu and Eric Chen — speculated that the marker represents a date: May 9, 1979. While on May 9, 1979, a variety of historical events occurred, according to WikipediaHabib Elghanian was executed by a firing squad in Tehran sending shock waves through the closely knit Iranian Jewish community,” the researchers wrote. Elghanian, a prominent Jewish-Iranian businessman, was charged with spying for Israel by the then-new revolutionary government of Iran, and executed May 9, 1979.”

Quote:

“Last weekend, Iranian officials confirmed that tens of thousands of PCs in their country had been infected by Stuxnet, including some used at a nuclear power plant in southwestern Iran that’s planned to go online next month. The Symantec researchers also revealed a host of other Stuxnet details in their paper, including a “kill date” of June 24, 2012, after which the worm will refuse to execute.”

[See “Stuxnet Code Hints At Possible Israeli Origin, Researchers Say,” by Gregg Keizer, Symantec, Sept. 30, 2010]

*September 30, 2010

Symantec puts out a dossier of information on Stuxnet that includes the following:- attack scenario and timeline, infection statistics, malware architecture, description of all the exported routines, injection techniques and anti-AV, the RPC component, propagation methods, command and control feature, and the PLC infector.

Eric Chien summarizes findings about the worm:

“Only more recently did the general public realize Stuxnet’s ultimate goal was to sabotage an industrial control system.

Analyzing Stuxnet has been one of the most challenging issues we have worked on. The code is sophisticated, incredibly large, required numerous experts in different fields, and mostly bug-free, which is rare for your average piece of malware. Stuxnet is clearly not average. We estimate the core team was five to ten people and they developed Stuxnet over six months. The development was in all likelihood highly organized and thus this estimate doesn’t include the quality assurance and management resources needed to organize the development as well as a probable host of other resources required, such as people to setup test systems to mirror the target environment and maintain the command and control server.”

[See W32.Stuxnet Dossier, Eric Chien, Sept. 30, 2010]

*September 25, 2010

Quote:

The director of the Information Technology Council of the Industries and Mines Ministry has announced that the IP addresses of 30,000 industrial computer systems infected by this malware have been detected, the Mehr New Agency reported on Saturday. An electronic war has been launched against Iran,” Mahmoud Liaii added.“This computer worm is designed to transfer data about production lines from our industrial plants to (locations) outside of the country,” he said.

[See “Iran Successfully Battling Cyber Attack,” Mehr News, Sept. 25, 2010]

*September 24, 2010

A piece in the Guardian suggests that a government agency is most likely behind the worm but warns against leaping to conclusions. It notes that many hackers/criminals might have become sophisticated enough to create a worm of this type. The piece notes that attacks against Iran have increased and that the identification of the worm was originally made by a Belarus security firm for an Iranian client and that Iran had been experiencing problems with their nuclear facility at Bushehr for months. It notes that the worm uses a stolen cryptographic key from the Taiwanese semiconductor manufacturer Realtek.

[See “Stuxnet Worm Is The Work Of A National Government Agency,” Josh Halliday, Guardian, Sept. 24, 2010]

“Stuxnet: The Trinity Test Of Cyberwarfare,” War In Context, Sept. 23, 2010

*September 16, 2010

Symantec researchers say that Stuxnet had to be created by a state, because it was the most devious and sophisticated malware they’d come across.

Quote:

“I don’t think it was a private group,” said O Murchu. “They weren’t just after information, so a competitor is out. They wanted to reprogram the PLCs and operate the machinery in a way unintended by the real operators. That points to something more than industrial espionage.”

The necessary resources, and the money to finance the attack, puts it out the realm of a private hacking team, O Murchu said.

“This threat was specifically targeting Iran,” he continued. “It’s unique in that it was able to control machinery in the real world.”

“All the different circumstances, from the multiple zero-days to stolen certificates to its distribution, the most plausible scenario is a nation-state-backed group,” said Schouwenberg, who acknowledged that some people might think he was wearing a tin foil hat when he says such things. But the fact that Iran was the No. 1 target is telling.”

[See “Is Stuxnet the Best Malware Ever?” Gregg Keizer, Symantec Security Response, Sept. 16, 2010]

*September 13, 2010

German computer security research Ralph Langner speculates that Stuxnet is part of cyberwar:

Ralph’s theory — completely speculative from here

“It is hard to ignore the fact that the highest number of infections seems to be in Iran. Can we think of any reasonable target that would match the scenario? Yes, we can. Look at the Iranian nuclear program. Strange — they are presently having some technical difficulties down there in Bushehr. There also seem to be indications that the people in Bushehr don’t seem to be overly concerned about cyber security. When I saw this screenshot last year (http://www.upi.com/News_Photos/Features/The-Nuclear-Issue-in-Iran/1581/2/) I thought, these guys seem to be begging to be attacked. If the picture is authentic, which I have no means of verifying, it suggests that approximately one and a half year before scheduled going operational of a nuke plant they’re playing around with software that is not properly licensed and configured. I have never seen anything like that even in the smallest cookie plant. The pure fact that the relevant authorities did not seem to make efforts to get this off the web suggests to me that they don’t understand (and therefore don’t worry about) the deeper message that this tells.

Now you may ask, what about the many other infections in India, Indonesia, Pakistan etc. Strange for such a directed attack. Than, on the other hand, probably not. Check who comissions the Bushehr plant. It’s a Russian integrator that also has business in some of the countries where we see high infection rates. What we also see is that this company too doesn’t seem to be overly concerned about IT security. As I am writing this, they’re having a compromised web site (http://www.atomstroyexport.com/index-e.htm) that tries to download stuff from a malware site that had been shut down more than two years ago (www.bubamubaches.info). So we’re talking about a company in nukes that seems to be running a compromised web presence for over two years? Strange.
I could give some other hints that have a smell for me but I think other researchers may be able to do a much better job on checking the validity of all this completely non-technical stuff. The one last bit of information that makes some sense for me is the clue that the attackers left in the code, as the fellows from Symantec pointed out — use your own imagination because you will think I’m completely nuts when I tell you my idea.

Welcome to cyberwar.”

[See “Stuxnet is a directed attack: hack of the century,” Ralph Langner]

*September 8, 2010

German computer security expert Ralph Langner writes to a friend:

Historical document: Ralph informs Joe Weiss what Stuxnet is. Note the date of the email.

*July 22, 2010

Symantec analyzed W32.Stuxnet as a worm that uses a  hitherto unknown Windows bug to attack and then searches the target for SCADA systems and design documents. SCADA is a network used to control utilities, transportation and other critical infrastructure. The worm then contacted Command &Control servers that control the infected machines and retrieved the stolen information. The servers were located in Malaysia and Symantec redirected traffic away from them to prevent the take-over of the information.

Within a 72 hours period Symantec identified close to 14,000 IP addresses infected with W32.Stuxnet trying to contact the C&C server. 58.85 % came from Iran, with the rest coming from Indonesia (18.22%), India (8.31%), with the Azerbaijan, US, and Pakistan making up the other affected countries, with under 2% each (this information is also provided at the Microsoft website).

[See Symantec Security Response,W32.Stuxnet – Network Information, Vikram Thakur, July 22, 2010]

*July 21, 2010

Quote:

“The zero-day vulnerability, rootkit, main binaries, stolen digital certificates, and in-depth knowledge of SCADA software are all high-quality attack assets. The combination of these factors makes this threat extremely rare, if not completely novel.

Quote:

The complexity and quality of the attack assets lead some to believe only a state would have the resources to conduct such an attack. However, the usage of the second digital certificate is a bit odd. One could make the case that once the first attack succeeded, a state would take cover and not waste the second digital certificate. Instead, by signing a very similar binary, security companies were immediately able to detect the second stolen certificate, making it useless in further compromises…..

Quote:

.. Hackers bound by a common cause may target another country, organization, or company that they feel are their enemies. Such hacking groups often have the patience and expertise to gather such attack assets. Further, their goals of continued attack may lead them to continue to refine their attack as they are thwarted or discovered, such as resigning their driver files with a newly stolen digital certificate, modifying their binaries to avoid security product detection, and moving their command-and-control hosts as they are decommissioned…..

Quote:

…..This scenario [terrorism] is like something out of movie and, while for most attacks we’d immediately dismiss this as a possibility, given the amount and quality of the attack assets, terrorism even seems within the realms of possibility in this case.

[See “The Hackers Behind Stuxnet” by Patrick Fitzgerald, Symantec Security Response,  July 21, 2010]

*July 17, 2010

Researchers find that Stuxnet targets industrial control systems of the kind that control manufacturing and utility companies. It targets Siemens management software called Simatic WinCC, which runs on the Windows operating system.

The systems that run the Siemens software, called SCADA (supervisory control and data acquisition) systems, aren’t usually connected to the Internet, but the virus spreads when an infected USB stick is inserted. If it detects the Siemens software, the virus logs in using a default password.

[See “New Virus Targets Industrial Secrets,” Robert McMillan, Computer World, July 17, 2010]

*July 16, 2010

Symantec starts a blog series on the Stuxnet infection that continues through the summer and into September

[See also Microsoft Security Advisory, July 16, 2010 and Krebson Security, July 16, 2010]

*July 7, 2010

Stuxnet could well have caused the glitch in the solar panels of India’s Insat-4B satellite on July 7, 2010. That led to the shutting down of 12 out of 24 of the transponders and 70% of the customers dependent on Direct to Home (DTH) including those using Doordarshan (Indian TV), Sun TV and Tata’s VSNL. The customers were redirected to point to the Chinese satellite  ASIASAT-5, owned and operated by Asia Satellite Telecommunications Co., Ltd (AsiaSat) whose two main shareholders are General Electric (GE) and China International Trust and Investment Co. (CITIC), a state-owned company

[See “Did The Stuxnet Worm Kill India’s INSAT-4B Satellite?” by Jeffrey Carr, The Firewall, Forbes.com, Sept. 29, 2010]

*June 16, 2010

Symantec Security Response Team begins its investigation into the Stuxnet worm. The first sample dates from June 2010, but the team believes the worm dates back a year, or maybe even earlier.

*June 2010

The malware is first identified by a Belarus security company, Virusblokada, for its Iranian client.

[See Symantec Security Response, webpage, Sept 30, 2010]

*January 2010

Stuxnet infection begins, according to Symantec

*July 2009

Stuxnet infection begins, according to to Kasperksy