Tuesday, November 29, 2011

The lawsuit that could end the ZIOCONNED elite's gangster rule of Western ill-civilization....

The lawsuit that could end the ZIOCONNED elite's gangster rule of Western ill-civilization....

A lawsuit was filed on November 23rd that could end the secret government that has ruled Western civilization for at least the past 300 years. The lawsuit claims that close to $1 trillion was stolen by, among others, UN Secretary General Ban Ki Moon and the UN, former Italian Prime Minister, Silvio Berlusconi and the Italian government, Giancarlo Bruno and the Davos World Economic Forum and others believed to include many of the owners of the US Federal Reserve Board. The lawsuit was filed in New York by Neil Keenan, acting as representative of the Dragon family, a reclusive group of wealthy Asian families. This filing is the result of extensive evidence gathering by international police and law-enforcement agencies including Interpol, the CIA, the Japanese Security Police, Eastern European secret services and has the backing of the Pentagon as well as the armed forces of Russia and China.

The ultimate defendants in this legal action are believed to be the same cabal behind the assassination of US President, John F. Kennedy, and many other major international crimes.

This particular lawsuit was triggered by the illegal detainment of two Japanese citizens, Akihiko Yamaguchi and Mitsuyoshi Watanabe, as well as the seizure of $134.5 billion in bonds they were holding in Italy on June 3, 2009. After the bonds were stolen, self-described 33rd degree Freemason, Leo Zagami, contacted this writer and said the Montecarlo P2 masonic lodge could cash the bonds with the help of Vatican banker, Daniel Dal Bosco. This writer forwarded the information, via a member of the UK Royal family, to the Dragon family who entrusted a further $1 trillion worth of similar bonds to the plaintiff, Neil Keenan. Keenan then, after much negotiation, entrusted the bonds to Dal Bosco.

Dal Bosco subsequently absconded with the bonds and was followed 24-hours a day by various intelligence service agents to see what he would do with them. The Dal Bosco trail led to the Davos World forum, the UN, the Italian government and the Vatican, among other places. Following this, Keenan was approached by a who’s who of powerful figures, including top Vatican officials, Wall Street bankers, European nobles and former US presidents, most offering him astronomical bribes to go away. He was also poisoned with ricin and nearly killed.

According to Keenan, “The roots of this case go back to between 1927 and 1938, when, under arrangements made between T.V. Soong (Finance Minister of China) and Henry Morgethau, Secretary of the Treasury, the United States Government purchased some 50 million ounces of silver and leased vast amounts of gold from the Nationalist Chinese Government, known as Kuomintang. For all the treasure handed in, certificates were given to those who surrendered their precious metals.”

Many of the bonds seized by Dal Bosco are backed with the Chinese gold taken by the Federal Reserve Board during those years and never returned to its legal owners.

Other bonds seized were Kennedy bonds. These bonds were backed by gold held in trust for the people of the planet and were supposed to be used to finance the economic development of the world. Instead, they have mostly been stolen and misused by members of the cabal that has seized control of the Western financial system on behalf of private interests.

The original signatory to the Kennedy bonds was former Indonesian President, Soekarno. Soekarno’s heir, Dr. Seno Edy Soekanto, has given Keenan power of attorney to return to their rightful owners the Kennedy bonds and other property allocated to the people of the world, via something known as the global collateral accounts.

The lawsuit is only the first salvo in a legal battle to restore control of the global financial system to the people and governments of the world, as well as the rightful owners of historical assets that have been seized by members of the banking cartel.

The lawsuit has been filed as Civil Action #8500 at the United States District Court for the Southern District of New York on November 23, 2011.

Background information on the problems with the global financial system

By Neil Keenan and Keith Scott.

The entire cause of the problem

The United States is a private corporation owned by the British Crown (Rothchilds), the Bank of England (Rothchilds) and the Vatican (Rothchilds again). It was previously called the Virginia Company until 3/9/33, when it was dissolved by Roosevelt under the Emergency Banking Act. On 5/5/33, Congress elected to dissolve the Gold Standard and Sovereign Authority of the U.S. and all of its official capacities, including government offices, departments and officers. The U.S. is a corporation, not a nation. The Federal Reserve is neither Federal, nor a Reserve. It is a private counterfeiting organization run by Jewish bankers who lend the money they print out of thin air, at interest, while we keep on paying these criminals to fleece the People.

That technology of theft and deception that has been exported from the United States through their promotion of this fraud as the paradigm of global finance is an obscenity that has set the seeds of its own destruction.

This has been compounded by the refusal of ordinary people to realize, know and understand that it is the duplicity of Governments and the deceit and endless greed of bankers that combined to simply fleece them, like the apathetic sheep they are. Apathy and ignorance of the truth, creates belief in the lie. The truth is self-evident, but most people choose to neither hear it nor understand it. The debts of the Federal Reserve are the debts of a private corporation that is robbing the people of the United States.

The United States Dollar is a Federal Reserve Note and the obligations against the currency are the obligations of the Federal Reserve, not the people of the United States.

Understanding the History

1. Between 1927 and 1938, under arrangements made between T.V. Soong (Finance Minister of China) and Henry Morgethau, Secretary of the Treasury, the United States Government purchased some 50 million ounces of silver and leased vast amounts of gold from the Nationalist Chinese Government, known as Kuomintang. During this period, China was partly occupied by Japanese troops and there was the fear of China being overrun by the Japanese.

2. For all the treasure handed in, certificates were given to those who surrendered their precious metals. The surrendered precious metals and gemstones were sent to the United States under a lease agreement made between T.V. Soong and Henry Morgenthau. The Certificates became the underlying funds of the Kuomintang and were good and accepted securities.

3. In 1934, a new Securities Act was promulgated in the United States, together with the Gold Act, which required all bullion gold and gold coin to be surrendered to the Federal Reserve, a private corporation chartered to operate as the Central Bank of the United States and to be the issuer of the currency known as the United States Dollar.

4. Domestically owned gold was purchased. Foreign Gold held by the Treasury was also surrendered to the Federal Reserve, so, was leased to the Federal Reserve. This began the series 1934 Notes issued by the Federal Reserve. These have never been redeemed and the interest cost was met by further issuances of the 1934 series FRN’s.

5. These 1934 FRN’s guarantee the lease payments and to allow the Chinese Government to continue financially. These came under the control of the Kuomintang, the Nationalist Government in China, from whom the Gold had been received. Many were left in China when the Kuomintang had to flee to Taiwan. The Gold had been nationalized by the Kuomintang, who moved much of the FRN’s (but not all) to Taiwan which was built on these notes. These Notes were the underlying wealth of Taiwan and they were good for value as they were backed by gold.

6. During the war in China, most owners of the depository notes issued by Chinese Banks were killed by the Japanese, others later being killed by both the Kuomintang and the Chinese Communists, thus the Gold became property of the Nation, especially so, the Kuomintang. In Europe, Jews who had owned wealth were stripped of that wealth through various means and were then eliminated. The gold was taken either by stealth or by force, that is a reality of history.

7. The Kuomintang appointed guardians of this Gold and the securities issued by the United States; they are euphemistically known as the Dragon Family. The Dragon Family is, in fact, an organization that operates between old families within China and Taiwan, and, as such, is above the political divide of the two independent Chinese Governments. Chinese are remarkable in this regard, that old family ties and functions supercede political arrangements which, though they might last for generations, are regarded as inconsequential over the passage of time to most Chinese. Attached to this, is the wealth of several nations. The United States, in support of the Kuomintang and resistance groups, actually printed more of these FRN notes inside China itself. These operations were run by the CIA to buy loyalty of various factions in the fight against the communists, eventually being driven out into Burma around 1960. Largely due to the additional printing of these notes, the additional Notes were given in lieu of interest, but directed to specific persons and parties.

8. At the end of the World War II, with Communist and Kuomintang factions at war in China, the International Community and the Chinese assented to the Gold being placed under the overt control of Indonesian President Soekarno. Soekarno then, on August 17, 1945, came to be known as M1 under United Nations Approval No. MISA 81704 “Operation Heavy Freedom". This was because much of the world’s gold had been delivered into Indonesia and the Philippines. Canada, Australia, Great Britain, India and other British Colonies sent their gold to the so-called “impregnable Singapore”. The Japanese, as per the arrangements agreed to by Hirohito in the 1921 Pact Between Nations made in London, delivered much of this gold to Indonesia (then a Dutch Colony) and to the Philippines (then a US Colony) into secret bunkers that had been mostly constructed by the Japanese between 1924 and 1945. This is why the Allied troops in Malaya had no air cover or sufficient supplies that would have allowed them to resist the Japanese. Singapore had to fall so most of the global wealth could be “lost” into a secret system that made the gold standard redundant and fiat currencies a reality.

This gold was documented into accounts through the Swiss Commercial Bank, Union Bank of Switzerland, placed under protection of the Swiss Attorney General, registered through the Swiss National Bank into the Bank for International Settlements International Collateral Combined accounts and then from within the BIS, blocked to form the Institutional Parent Registration Accounts of the Federal Reserve System.

Later, President Marcos of the Philippines was appointed and held the position of M1 until 1987 and then the position was transferred to Dr. Ray C. Dam, in October of 1987, under Legal Decadency to Heir RCD1087 Far East Entire, with formal Power of Attorney and Assignment of Indonesian Assets signed by Sarinah Soetiwi (holder of the assets on behalf of the Nation of Indonesia, as assigned by President Soekarno) in 1992, Dam’s authority later promulgated January 20, 1995. Dam proved to be impossible for the entire system to work with, (either because he refused to allow those who placed him in authority to steal, or because of his personal arrogance…. difficult to know which is correct) and his authority over the Institutional parent registration Accounts set aside and the system reverted to the three Nations who had controlled these accounts since World war II, United States, Great Britain and France, who systematically and illegally subverted the established system since 1996.

9. From this we can see that there are two functional operations. One was ownership and Depository control by the owners of the Gold and the other a control system set in place to administer and control the Collateral Combined Accounts as an independent Arbiter. Ownership rights are held by the signatory to the Depository Accounts in Commercial Banks and Control Rights have been held by M1.

10. So it was, that the entire world supply of bullion and coinage gold was withdrawn and fiat currencies became the order of the day. However, underneath the notes and money issued by the Federal Reserve was the underlying wealth within a centralized system that Nations was intended to be used equitably, but Bankers determined they would use to raid national economies.

11. In 1963, President John F. Kennedy entered into an Agreement with President Soekarno to provide the funds to allow the United States Treasury to print its own currency, thus subverting the “right” to print the currency held by the Federal Reserve. The Agreement would have transferred some 59,000 tons of gold to underpin this currency. The problem with this was that the US domestic currency would have then been backed by gold which would have been a violation of international agreements meant to stabilize currencies. 11 days after signing this agreement, President Kennedy was assassinated. President Johnson then suspended EO11110, as issued by Kennedy, and transferred the bullion to the Federal Reserve. The Green Hilton Agreement was not implemented until 1968 when Soekarno fell from office and when Global Trade made it imperative that the world have a Global Currency. As the Gold had been transferred to the US Treasury in 1968, a series of Bonds known as Kennedy Bonds were issued in order to honor the terms of the Green Hilton Agreement made between Kennedy and Soekarno, the 1968 terms of the gold delivery to the United States being different than made in 1934. When after 30 years, interest had not been paid as promised, a reissue of the bonds in an increased number were issued as commemorative notes and were accepted by the owners of the Gold, the Dragon Family.

12. From copies of Bank documents received by Neil Keenan, within the Green Hilton Memorial Agreement, the funds the amounts of gold and platinum are specified. These amounts of gold are certificated and the certificates and ledger copies with full and exact identification and recognition codes are available. These certificates are further proven by the bank reports, copies of which are now held by Neil Keenan. The truth of these instruments can be vigorously defended through documentation in our hands and further through interrogation of the Black Screens where the off ledger collateral is held, together with an interrogation of the grey and blue screens where we will find enormous fraud from the illegal use of these assets.

13. In the few documents we present with this complaint, we can see that the assets have been deposited, the counter-assets created and presented to the depositors, the depositors have been cheated for over 70 years through the intentional and fraudulent failure of the Obligor to honor the Agreements.

14. In recent weeks, we have come into possession of the books and records of the late President Soekarno, and all the codes and ledgers of the Global Accounts. The size of these accounts can be seen by reviewing the Collective Agreement between the Garuda Memorial Hilton Indonesia and the Green Memorial Hilton Geneva, established, structured and made operational between 1961 and final signature in 1972. Under this Agreement, the assets of the international collateral combined were established and brought forward, then, within a short period of time misused to change the operating systems of banks.

15. Reviewing these books, we can now see that Banks set aside the notion of operating under the Charters they hold as banks; instead of being Banks, they became like very poor casino operators and traders, selling what they do not own. The records in our possession, signed and registered by the receiving and managing commercial bank, show the underlying funds in numbers and amounts that stagger the imagination. The Green Hilton and Garuda Memorial Agreements demonstrate clearly the value of the global account system.

a) Gold and Platinum Deposits ran into millions of tons.

b) 1934 series Federal Reserve System Bonds, Notes issued in 1928 , Kennedy Bonds ran into Quadrillions of US Dollars. Dragon Bonds are all recorded and acknowledged within the Green Hilton and Memorial Hilton Collective Agreements. Both Assets in the form of Bullion surrendered to the Global Accounts through the United States Government and then entrusted to a private corporation, the Federal Reserve System.

The complete text of the lawsuit can be read here. (PDF).....

Once again, the same ZIOCONNED Playuz begin a revolution/insurrection - this time in Syria - and, proceed to use its useful idiots (UN and fellow travelers) to "legalize" its military actions... Syria is doomed unless Russia comes to its aid. This has nothing to do with "human rights" - everything to do with Zio-Anglo-Amerikan hegemony over the planet...

West demands Security Council action on Syria

Pakistan and Iran are in their sights, too. Bet on it.....

Sunday, November 27, 2011

Target IRAN, Lebanon and Hezbollah: Zioconned Wahhabi Washington to War in MENA.....

Target IRAN, Lebanon and Hezbollah: Zioconned Wahhabi Washington to War in MENA.....

The Iranian people know what it means to earn the enmity of the global godfather....

As William Blum documented in Killing Hope: U.S. Military and CIA Interventions Since World War II, 1953's CIA-organized coup against Iranian Prime Minister Mohammed Mossadegh, guilty of the "crime" of nationalizing the Anglo-Iranian Oil Company, may have "saved" Iran from a nonexistent "Red Menace," but it left that oil-rich nation in proverbial "safe hands"--those of the brutal dictatorship of Mohammad Reza Shah Pahlavi.

Similarly today, a nonexistent "nuclear threat" is the pretext being used by Washington to install a "friendly" regime in Tehran and undercut geopolitical rivals China and Russia in the process, thereby "securing" the country's vast petrochemical wealth for American multinationals.

As the U.S. and Israel ramp-up covert operations against Iran, the Pentagon "has laid out its most explicit cyberwarfare policy to date, stating that if directed by the president, it will launch 'offensive cyber operations' in response to hostile acts," according to The Washington Post.

Citing "a long-overdue report to Congress released late Monday," we're informed that "hostile acts may include 'significant cyber attacks directed against the U.S. economy, government or military'," unnamed Defense Department officials stated.

However, Air Force General Robert Kehler, the commander of U.S. Strategic Command (
USSTRATCOM) told Reuters, "I do not believe that we need new explicit authorities to conduct offensive operations of any kind."

The Pentagon report, which is still not publicly available, asserts: "We reserve the right to use all necessary means--diplomatic, informational, military and economic--to defend our nation, our allies, our partners and our interests."

Washington's "interests," which first and foremost include "securing its hegemony over the energy-rich regions of the Middle East and Central Asia" as the World Socialist Web Site observed, may lead the crisis-ridden U.S. Empire "to take another irresponsible gamble to shore up its interests in the Middle East ... as a means of diverting attention from the social devastation produced by its austerity agenda."

Recent media reports suggest however, that offensive cyber operations are only part of Washington's multipronged strategy to soften-up the Islamic Republic's defenses as a prelude to "regime change."

Terrorist Proxies

For the better part of six decades, terrorist proxies have done America's dirty work. Hardly relics of the Cold War past, U.S. and allied secret state agencies are using such forces to carry out attacks inside Iran today.

Asia Times Online reported that "deadly explosions at a military base about 60 kilometers southwest of Tehran, coinciding with the suspicious death of the son of a former commander of the Islamic Revolutionary Guards Corps (IRGC) in Dubai in the United Arab Emirates, have triggered speculation in Iran on whether or not these are connected to recent United States threats to resort to extrajudicial executions of IRGC leaders."

And Time Magazine, a frequent outlet for sanctioned leaks from the Pentagon, reported that the blast at the Iranian missile base west of Tehran, which killed upwards of 40 people according to the latest estimates, including Major General Hassan Moqqadam, a senior leader of Iran's missile program, was described as the work "of Israel's external intelligence service, Mossad."

An unnamed "Western intelligence source" told reporter Karl Vick: "'Don't believe the Iranians that it was an accident,' adding that other sabotage is being planned to impede the Iranian ability to develop and deliver a nuclear weapon. 'There are more bullets in the magazine,' the official says."

While Iranian officials insist that the huge blast was an "accident," multiple accounts in the corporate press and among independent analysts provide strong evidence for the claim that Israel and their terrorist cat's paw, the bizarre political cult, Mojahedin-e Khalq (MEK) were responsible for the attack.

Richard Silverstein, a left-wing analyst who writes for the Tikun Olam web site, said that the blast was a sign that "the face of the Israeli terror machine may have reared its ugly head in the world."

Citing "an Israeli source with extensive senior political and military experience," Silverstein's correspondent provided "an exclusive report that it was the work of the Mossad in collaboration with the MEK."

Hardly a stranger to controversial reporting, Silverstein published excerpts of secret FBI transcripts leaked to him by the heroic whistleblower Shamai Leibowitz. Those wiretapped conversations of Israeli diplomats caught spying on the U.S., "described an Israeli diplomatic campaign in this country to create a hostile environment for relations with Iran."

In a Truthout piece, Silverstein wrote that Leibowitz, a former IDF soldier who refused to serve in the Occupied Territories, "explained that he was convinced from his work on these recordings that the Israel foreign ministry and its officials in this country were responsible for a perception management campaign directed against Iran. He worried that such an effort might end with either Israel or the US attacking Iran and that this would be a disaster for both countries."

Unfortunately, while Leibowitz sits in a U.S. prison his warnings are all but ignored.

According to Silverstein's latest account, "it is widely known within intelligence circles that the Israelis use the MEK for varied acts of espionage and terror ranging from fraudulent Iranian memos alleging work on nuclear trigger devices to assassinations of nuclear scientists and bombings of sensitive military installations."

Silverstein noted that "a similar act of sabotage happened a little more than a year ago at another IRG missile base which killed nearly 20."

Terrorist attacks targeting defense installations coupled with the murder of Iranian scientist, five "targeted killings" have occurred since 2010, aren't the only aggressive actions underway.

On Friday, The Washington Post reported that "a series of mysterious incidents involving explosions at natural gas transport facilities, oil refineries and military bases ... have caused dozens of deaths and damage to key infrastructure in the past two years."

According to the Post, "suspicions have been raised in Iran by what industry experts say is a fivefold increase in explosions at refineries and gas pipelines since 2010."

With Iran's oil industry under a strict sanctions regime by the West, maintenance of this critical industrial sector has undoubtedly suffered neglect due to the lack of spare parts.

However, "suspicions that covert action might already be underway were raised when four key gas pipelines exploded simultaneously in different locations in Qom Province in April," the Post disclosed.

"Lawmaker Parviz Sorouri told the semiofficial Mehr News Agency that the blasts were the work of 'terrorists' and were 'organized by the enemies of the Islamic Republic'," hardly an exaggerated charge given present tensions.

Whether or not these attacks were the handiwork of Mossad, their MEK proxies or even CIA paramilitary officers and Pentagon Joint Special Operations Command (JSOC) commandos, as Seymour Hersh revealed more than three years ago in The New Yorker, it is clear that Washington and Tel Aviv are "preparing the battlespace" on multiple fronts.

'Collapse the Iranian Economy'

Along with covert operations and terrorist attacks inside the Islamic Republic, on the political front, a bipartisan consensus has clearly emerged in Washington in favor of strangling the Iranian economy.

Indeed, congressional grifters are threatening to crater Iran's Central Bank, an unvarnished act of war.
IPS reported that neocon Senator Mark Kirk (R-IL), "a key pro-Israel senator," has offered legislation "that would effectively ban international financial companies that do business with the Central Bank of Iran (CBI) from participating in the U.S. economy."

"Dubbed the 'nuclear option' by its critics," Jim Lobe reported that "the measure, which was introduced Thursday in the form of an amendment to the 2012 defence authorisation bill, is designed to 'collapse the Iranian economy'... by making it virtually impossible for Tehran to sell its oil."

However, "independent experts," Lobe wrote, "including some officials in the administration of President Barack Obama, say the impact of such legislation, if it became law, could spark a major spike in global oil prices that would push Washington's allies in Europe even deeper into recession and destroy the dwindling chances for economic recovery here."

That amendment was introduced as tensions were brought to a boil over allegations by the International Atomic Energy Agency (IAEA) in its latest
report that Iran may be seeking to develop nuclear weapons.

IAEA Director General Yukiya Amano claims the Agency has "identified outstanding issues related to possible military dimensions to Iran's nuclear programme and actions required of Iran to resolve these."

"Since 2002," Amano averred, "the Agency has become increasingly concerned about the possible existence in Iran of undisclosed nuclear related activities involving military related organizations, including activities related to the development of a nuclear payload for a missile, about which the Agency has regularly received new information."

However, despite the fact that the "Agency continues to verify the non-diversion of declared nuclear material at the nuclear facilities," to whit, that such materials have not been covertly channeled towards military programs, Amano, reprising former Defense Secretary Donald Rumsfeld's famous gaff that "the absence of evidence is not the evidence of absence," the IAEA "is unable to provide credible assurance about the absence of undeclared nuclear material and activities in Iran, and therefore to conclude that all nuclear material in Iran is in peaceful activities."

Far from being an independent "nuclear watchdog," the IAEA under Amano's stewardship has been transformed into highly-politicized and pliable organization eager to do Washington's bidding.

As a 2009 State Department cable released by
WikiLeaks revealed, U.S. Ambassador Glyn Davies cheerily reported: "Yukiya Amano thanked the U.S. for having supported his candidacy and took pains to emphasize his support for U.S. strategic objectives for the Agency. Amano reminded Ambassador on several occasions that he would need to make concessions to the G-77, which correctly required him to be fair-minded and independent, but that he was solidly in the U.S. court on every key strategic decision, from high-level personnel appointments to the handling of Iran's alleged nuclear weapons program." (emphasis added)

Although the new report "offered little that was not already known by experts about Iran's nuclear programme" IPS averred, "it cited what it alleged was new evidence that 'Iran has carried out activities relevant to the development of a nuclear device' since 2003--the date when most analysts believe it abandoned a centralised effort to build a nuclear bomb'."

But as the United States, with the connivance of corporate media, bury the conclusions of not one, but two National Intelligence Estimates issued by the U.S. Director of National Intelligence, it is clear to any objective observer that "nonproliferation" is a cover for aggressive geopolitical machinations by Washington.

Both estimates, roundly denounced by U.S. neoconservatives and media commentators when they were published, insisted that "in fall of 2003, Tehran halted its nuclear weapons program," a finding intelligence analysts judged with "high confidence."

In contrast, the highly-politicized IAEA report is a provocative document whose timing neatly corresponds with the imposition of a new round of economic sanctions meant to crater the Iranian economy. Never mind that even according to the IAEA's own biased reporting, they could find no evidence that Iran had diverted nuclear materials from civilian programs (power generation, medical isotopes) to alleged military initiatives.

Indeed, with sinister allusions that hint darkly at "undeclared nuclear materials," the agency fails to provide a single scrap of evidence that diverted stockpiles even exist.

Another key allegation made by the Agency that Iran had constructed an "explosives chamber to test components of a nuclear weapon and carry out a simulated nuclear explosion," was denounced by former IAEA inspector Robert Kelley as "highly misleading," according to an
IPS report filed by investigative journalist Gareth Porter.

With "information provided by Member States," presumably Israel and the United States, the IAEA said it "had 'confirmed' that a 'large cylindrical object' housed at the same complex had been 'designed to contain the detonation of up to 70 kilograms of high explosives'. That amount of explosives, it said, would be 'appropriate' for testing a detonation system to trigger a nuclear weapon."

"Kelley rejected the IAEA claim that the alleged cylindrical chamber was new evidence of an Iranian weapons programme," Porter wrote. "We've been led by the nose to believe that this container is important, when in fact it's not important at all," the former nuclear inspector said.

But as Mark Twain famously wrote, "A lie can travel half way around the world while the truth is putting on its shoes." This is certainly proving to be the case with the IAEA under Yukiya Amano.

Another player "solidly in the U.S. court" is David Albright, the director of the Institute for Science and International Security (
ISIS), a Washington, D.C. "think tank" funded by the elitist Carnegie, Ford and Rockefeller Foundations.

In an earlier piece for
IPS, Porter demolished Albright's "sensational claim previously reported by news media all over the world that a former Soviet nuclear weapons scientist had helped Iran construct a detonation system that could be used for a nuclear weapon."

"But it turns out that the foreign expert, who is not named in the IAEA report but was identified in news reports as Vyacheslav Danilenko, is not a nuclear weapons scientist but one of the top specialists in the world in the production of nanodiamonds by explosives," Porter wrote.

"In fact," Porter averred, "Danilenko, a Ukrainian, has worked solely on nanodiamonds from the beginning of his research career and is considered one of the pioneers in the development of nanodiamond technology, as published scientific papers confirm."

"It now appears that the IAEA and David Albright ... who was the source of the news reports about Danilenko, never bothered to check the accuracy of the original claim by an unnamed 'Member State' on which the IAEA based its assertion about his nuclear weapons background."

It is no small irony, that Albright, corporate media's go-to guy on all things nuclear, penned an alarmist
screed in 2002 entitled, "Is the Activity at Al Qaim Related to Nuclear Efforts?", an article which lent "scientific" credence to false claims made by the Bush White House against Iraq.

As investigative journalist Robert Parry pointed out on the Consortium News web site, "Albright's nuclear warning about Iraq coincided with the start of the Bush administration's propaganda campaign to rally Congress and the American people to war with talk about 'the smoking gun in the form of a mushroom cloud'."

"Yet," Parry noted, "when the
Washington Post cited Albright on Monday, as the key source of a front-page article about Iran's supposed progress toward reaching 'nuclear capability,' all the history of Albright's role in the Iraq fiasco disappeared."

History be damned. Congressional warmongers and corporate media who cite these fraudulent claims, are "spurred by Israel's whisper campaign to create a sense of urgency on Capitol Hill where the Israel lobby, acting mainly through the American Israel Public Affairs Committee, exerts its greatest influence," as IPS noted, and punish Iran for the "crime" of opening its nuclear facilities to international inspection!

That "whisper campaign" has now bloomed into a full court press for war by "liberal" Democrats and "conservative" Republicans alike, even as public approval of Congress's work by the American people tracks only slightly higher than the popularity enjoyed by child molesters or serial killers.

As tensions are dialed up, the United States is spearheading a relentless drive to throttle Iran's economy. The New York Times reported that "major Western powers took significant steps on Monday to cut Iran off from the international financial system, announcing coordinated sanctions aimed at its central bank and commercial banks."

A strict sanctions regime was also imposed on Iran's "petrochemical and oil industries, adding to existing measures that seek to weaken the Iranian government by depriving it of its ability to refine gasoline or invest in its petroleum industry," the Times reported.

In a move which signals that even-more stringent sanctions are on the horizon, the U.S. Treasury Department "named the Central Bank of Iran and the entire Iranian banking system as a 'primary money laundering concern'."

That's rather rich coming from an administration which slapped Wachovia Bank on the wrist after that corrupt financial institution, now owned by Wells Fargo Bank, pleaded guilty to laundering as much as $378 billion for Mexico's notorious drug cartels as Bloomberg Markets Magazine reported last year!

Going a step further, France's President Nicolas Sarkozy called on the major imperialist powers "to freeze the assets of the central bank and suspend purchases of Iranian oil."

The Guardian reported that Britain "went the furthest by, for the first time, cutting an entire country's banking system off from London's financial sector."

Playing catch-up with war-hungry Democrats and Republicans, President Obama stated that the "new sanctions target for the first time Iran's petrochemical sector, prohibiting the provision of goods, services and technology to this sector and authorizing penalties against any person or entity that engages in such activity."

"They expand energy sanctions, making it more difficult for Iran to operate, maintain, and modernize its oil and gas sector," Obama said.

"As long as Iran continues down this dangerous path, the United States will continue to find ways, both in concert with our partners and through our own actions, to isolate and increase the pressure upon the Iranian regime."

Last summer, Rep. Brad Sherman (D-CA), a strong backer of punishing sanctions, echoed Richard Nixon's vow to "make the economy scream" prior to the CIA's overthrow of Chile's democratically-elected socialist president, Salvador Allende, and wrote in The Hill that "critics ... argued that these measures will hurt the Iranian people. Quite frankly, we need to do just that."

With a new round of crippling economic sanctions on tap from the West, "liberal" Democrat Sherman might just get his wish.

Targeting Civilian Infrastructure

While the Obama administration claims that their aggressive stance towards Iran is meant to promote "peace" and "help" the Iranian people achieve a "democratic transformation," ubiquitous facts on the ground betray a far different, and uglier, reality.

Anonymous U.S. "intelligence officials" told The Daily Beast "that any Israeli attack on hardened nuclear sites in Iran would go far beyond airstrikes from F-15 and F-16 fighter planes and likely include electronic warfare against Iran's electric grid, Internet, cellphone network, and emergency frequencies for firemen and police officers."

According to Newsweek national security correspondent Eli Lake, "Israel has developed a weapon capable of mimicking a maintenance cellphone signal that commands a cell network to 'sleep,' effectively stopping transmissions, officials confirmed. The Israelis also have jammers capable of creating interference within Iran's emergency frequencies for first responders."

But Israel isn't the only nation capable of launching high-tech attacks or, borrowing the Pentagon's euphemistic language, conduct "Information Operations" (IO).

The U.S. Air Force Cyberspace & Information Operations Study Center (
CIOSC) describe IO as "The integrated employment of the core capabilities of electronic warfare, computer network operations, psychological operations, military deception and operations security, in concert with specified supporting and related capabilities, to influence, disrupt, corrupt or usurp adversarial human and automated decision making while protecting our own."

In this light, The Daily Beast disclosed that "Israel also likely would exploit a vulnerability that U.S. officials detected two years ago in Iran's big-city electric grids, which are not 'air-gapped'--meaning they are connected to the Internet and therefore vulnerable to a Stuxnet-style cyberattack--officials say."

The anonymous officials cited by Lake informed us that "a highly secretive research lab attached to the U.S. joint staff and combatant commands, known as the Joint Warfare Analysis Center (JWAC), discovered the weakness in Iran's electrical grid in 2009," the same period when Stuxnet was launched, and that Israeli and Pentagon cyberwarriors "have the capability to bring a denial-of-service attack to nodes of Iran's command and control system that rely on the Internet."

But as Ralph Langer, the industrial controls systems expert who first identified the Stuxnet virus warned in an interview with The Christian Science Monitor, the deployment of military-grade malicious code is a "game changer" that has "opened Pandora's box."

Among a host of troubling questions posed by Stuxnet, Langer said: "It raises, for one, the question of how to apply cyberwar as a political decision. Is the US really willing to take down the power grid of another nation when that might mainly affect civilians?"

But as we have seen, most recently during the punishing air campaign that helped "liberate" Libya--from their petrochemical resources--the U.S. and their partners are capable of doing that and more.

Future targeting of Iran's civilian infrastructure may in fact have been one of the tasks of the recently-discovered Duqu Trojan, which Israeli and U.S. "boutique arms dealers" are suspected of designing for their respective governments.

And whom, pray tell, has the means, motives and expertise to design weaponized computer code?

As BusinessWeek disclosed in July, when one of America's cyber merchants of death, Endgame Systems, pitch their products they "bring up maps of airports, parliament buildings, and corporate offices. The executives then create a list of the computers running inside the facilities, including what software the computers run, and a menu of attacks that could work against those particular systems."

According to BusinessWeek, "Endgame weaponry comes customized by region--the Middle East, Russia, Latin America, and China--with manuals, testing software, and 'demo instructions'."

"A government or other entity," journalists Michael Riley and Ashlee Vance revealed, "could launch sophisticated attacks against just about any adversary anywhere in the world for a grand total of $6 million. Ease of use is a premium. It's cyber warfare in a box."

Kaspersky Lab analyst Ryan Naraine, writing on the
Duqu FAQ blog averred that Duqu's "main purpose is to act as a backdoor into the system and facilitate the theft of private information. This is the main difference when compared to Stuxnet, which was created to conduct industrial sabotage."

In other words, unlike Stuxnet, Duqu is an espionage tool which can smooth the way for future attacks such as those described by The Daily Beast.

As The Washington Post disclosed last May, while the military "needs presidential authorization to penetrate a foreign computer network and leave a cyber-virus that can be activated later," it does not need such authorization "to penetrate foreign networks for a variety of other activities."

According to the Post, these activities include "studying the cyber-capabilities of adversaries or examining how power plants or other networks operate," and can "leave beacons to mark spots for later targeting by viruses."

Or more likely given escalating tensions, Iranian air defenses and that nation's power and electronic communications grid which include "emergency frequencies for firemen and police officers" who would respond to devastating air and missile attacks.

Countdown to War

We can conclude that Israel, NATO and the United States are doing far more than placing "all options on the table" with respect to the Islamic Republic of Iran.

Along with ratcheting-up bellicose rhetoric, moves to collapse the economy, an assassination and sabotage campaign targeting Iranian scientists and military installations, cyberwarriors are infecting computer networks with viruses and "beacons" that will be used to attack air defense systems and civilian infrastructure.

After all, as Dave Aitel, the founder of the computer security firm
Immunity told BusinessWeek, "nothing says you've lost like a starving city."

As Global Research analyst Michel Chossudovsky warned last year, now confirmed by CIA and Pentagon leaks to corporate media: "It is highly unlikely that the bombings, if they were to be implemented, would be circumscribed to Iran's nuclear facilities as claimed by US-NATO official statements. What is more probable is an all out air attack on both military and civilian infrastructure, transport systems, factories, public buildings."

With the global economy in deep crisis as a result of capitalism's economic meltdown, and as the first, but certainly not the last political actions by the working class threaten the financial elite's stranglehold on power, the ruling class may very well gamble that a war with Iran is a risk worth taking.

As Chossudovsky warned in a subsequent Global Research report, "there are indications that Washington might envisage the option of an initial (US backed) attack by Israel rather than an outright US-led military operation directed against Iran."

"The Israeli attack--although led in close liaison with the Pentagon and NATO--would be presented to public opinion as a unilateral decision by Tel Aviv. It would then be used by Washington to justify, in the eyes of world opinion," Chossudovsky wrote, "a military intervention of the US and NATO with a view to 'defending Israel', rather than attacking Iran. Under existing military cooperation agreements, both the US and NATO would be 'obligated' to 'defend Israel' against Iran and Syria."

This prescient analysis has been borne out by events. As regional tensions escalate, the USS George H.W. Bush, "the Navy's newest aircraft carrier, has reportedly parked off the Syrian coast," The Daily Caller reported.

Earlier this week, the financial news service Zero Hedge disclosed that "the Arab League (with European and US support) are preparing to institute a no fly zone over Syria."

"But probably the most damning evidence that the 'western world' is about to do the unthinkable and invade Syria," analyst Tyler Durden wrote, "and in the process force Iran to retaliate, is the weekly naval update from Stratfor."

According to Zero Hedge, "CVN 77 George H.W. Bush has left its traditional theater of operations just off the Straits of Hormuz, a critical choke point, where it traditionally accompanies the Stennis, and has parked... right next to Syria."

In an earlier report, citing Kuwait's Al Rai daily, Zero Hedge warned that "Arab jet fighters, and possibly Turkish warplanes, backed by American logistic support will implement a no fly zone in Syria's skies, after the Arab League will issue a decision, under its Charter, calling for the protection of Syrian civilians."

BBC reports that the Arab League "has warned Syria it has one day to sign a deal allowing the deployment of observers or it will face economic sanctions."

"Meanwhile," BBC averred, "France has suggested that some sort of humanitarian protection zones," à la Libya, "be created inside Syria."

American moves towards Syria are fraught with dangerous implications for international peace and stability. As analyst Pepe Escobar disclosed in Asia Times Online the Arab League, a wholly-owned subsidiary of Saudi Arabia and repressive Gulf emirates, dances to Washington's tune.

"Syria is Iran's undisputed key ally in the Arab world--while Russia, alongside China, are the key geopolitical allies. China, for the moment, is making it clear that any solution for Syria must be negotiated," Escobar wrote.

"Russia's one and only naval base in the Mediterranean is at the Syrian port of Tartus. Not by accident," Escobar notes, "Russia has installed its S-300 air defense system--one of the best all-altitude surface-to-air missile systems in the world, comparable to the American Patriot--in Tartus. The update to the even more sophisticated S-400 system is imminent."

"From Moscow's--as well as Tehran's--perspective, regime change in Damascus is a no-no. It will mean virtual expulsion of the Russian and Iranian navies from the Mediterranean."

"In other words," Zero Hedge warned, "if indeed Europe and the Western world is dead set upon an aerial campaign above Syria, then all eyes turn to the East, and specifically Russia and China, which have made it very clear they will not tolerate any intervention. And naturally the biggest unknown of all is Iran, which has said than any invasion of Syria will be dealt with swiftly and severely."

Despite, or possibly because no credible evidence exists that Iran is building a nuclear bomb as a hedge against "regime change," belligerent rhetoric and regional military moves targeting Syria and Iran simultaneously are danger signs that imperialism's manufactured "nuclear crisis" is a cynical pretext for war.....
For another view of this wretched imperialist cat's paw, a cult and a terrorist outfit to boot, despised across the Iranian political spectrum--left, right and center--check out Jasmin Ramsey's take on Jim Lobe's blog: http://www.lobelog.com/facts-vs-fiction-and-the-meks-pr-campaign/

Why are MEK useful idiots for the CIA and Mossad? Here's Ramsey:

"...the MEK killed Iranians through organized terror bombings and assassinations during and after the revolution and because it fought against its own people during the Iran-Iraq war. The war took hundreds of thousands of Iranian lives. It is ingrained in Iranian memory as nearly a decade of suffering imposed on them by the U.S.-backed regime of Saddam Hussein who even used chemical weapons on young Iranian soldiers. Which nation's people would forgive such an act of treason?"

Darlings of U.S. neoncons, "liberal" Democratic hawks and AIPAC's "juiced" settler-colonialist lobby machine in Washington, the MEK is reprising the role played by Ahmad Chalabi's CIA-funded Iraqi National Congress during the run-up to the Iraq war. Here's David Swanson at War Is A Crime http://warisacrime.org/content/war-iran-us-neocons-aim-repeat-chalabi-style-swindle:

"Appearing before the House Foreign Affairs Committee on June 24, John Bolton, the former ambassador to the UN under President Bush, reiterated his calls for military action against Iran and openly expressed his support for the MEK. Weeks later, former Bush attorney general Michael Mukasey appeared before the Oversight and Investigation Subcommittee and called for the US to delist the MEK. Mukasey was even photographed prior to the hearing receiving counsel from the leadership of the National Council of Resistance of Iran, the MEK's political wing, which is also designated as a terrorist organization.

"Bolton and Mukasey are not alone in their avowed public support for this known terrorist group. They have been joined by a number of former senior Bush administration officials, other hawks and advocates of the whatever-it-takes war on terror - luminaries such as Rudy Giuliani, former CIA director James Woolsey, and former head of Homeland Security Tom Ridge, as well as a number of Republican and Democratic legislators.

"Why would some of the most vocal advocates for prosecuting the war on terror now take an Islamic terrorist group under its wing and persistently lobby the State Department and the US Congress to have the group removed from terrorist list? Simply put, they say the enemy of the enemy is our friend. Maryam Rajavi, the MEK leader and self-proclaimed president of Iran, is their new Chalabi."

Gee, sounds like they're perfect candidates to "lead" a CIA-NED "Color Revolution" in Tehran! Trouble is, the Iranians just won't buy their adulterated "product."....

Tuesday, November 22, 2011

ايلي حبيقة افتدى لبنان واللبنانيين

ايلي حبيقة افتدى لبنان واللبنانيين

إن الإنسان المؤمن بربه وبكتبه المقدسة وبتعاليمه وبموت وقيامة السيد المسيح لا يموت، بل يرقد على رجاء القيامة بانتظار يوم الحساب الأخير، والرب الذي وهب الإنسان نعمة الحياة هو وحده يقرر متى يستردها وليس أي مخلوق أخر.

اليوم ونحن نصلي في الذكرى التاسعة لروح الشهيد النائب والوزير الراحل ايلي حبيقة نردد بايمان وخشوع ووقار ما قاله النبي أيوب رغم كل المصائب التي حلت عليه فيما كان الشيطان يحاول جاهداً إيقاعه في التجربة دون أن يتمكن من أن يحقق هدفه اللعين هذا كون إيمان أيوب بربه كان قوياً وراسخاً: "عرياناً خرجت من بطن أمي، وعرياناً أعود إلى هناك، الرب أعطى والرب أخذ تبارك اسم الرب". (ايوب01/21).

يقول السيد المسيح: "أَنَا هُوَ الْقِيَامَةُ وَالْحَيَاةُ. مَنْ آمَنَ بِي، وَإِنْ مَاتَ فَسَيَحْيَا" (يوحنا 25/11). إن تعلقنا بلبناننا الحبيب حتى الشهادة يعزينا ويقوي إيماننا ويرسخ الرجاء في نفوسنا ويساعدنا على تقبل غياب الشهداء الأبرار برضوخ كامل لمشيئة أبينا السماوي فهم لا يموتون بل يبقون أحياء في وجداننا وضمائرنا وقلوبنا وعقولنا وفي كل عمل نقوم به يهدف لخدمة ومساعدة الآخرين الذين هم بحاجة إلينا.

يقول الشاعر: "ما استحق أن يعيش، من عاش لنفسه فقط". لذلك فالشخص المؤمن يجد لذته في أن يحيا لأجل غيره، عملاًً بقول الرب، "تحب قريبك كنفسك" (متى39/22). ولهذا يحب كل الناس من أعماق قلبه وتكون محبته للآخرين محبة عملية حسبما قال الرسول يوحنا: "يا أبنائي، لا تكن محبتنا بالكلام أو باللسان بل بالعمل والحق". (1يو18:3).

هذه المحبة العظيمة، والله هو محبة، تتميز بالعطاء والبذل والتفاني سواء من الناحية الجسدية، أو الناحية الروحية. لذلك فإن الشخص المؤمن والمعطاء والصادق هو بطبيعته إنسان نقي وتقي وشفاف وصادق ومحب يخاف الله الذي خلقه على صورته ومثاله.

هذا الإنسان يجهد بفرح كبير ليكون خادماً يخدم غيره في كل المجالات، لا لأنه مطالب بهذا، وإنما لأن الخدمة جزء من طبيعته ونفسيته وثقافته، ومكون أساسي من مكونات كيانه الإيماني. في خدمة الآخرين يشعر بالحب ويتغذى روحياً من تقديم الخدمات أكثر مما يغذي غيره بها. وإذا كانت الخدمة هي من عمل الملائكة (عبرانيين14:1)، فكم بالأولى البشر. وقد أعطانا السيد المسيح المثال الأبلغ في هذا الشأن إذ قال: "ومن أراد أن يكون الأول فيكم، فليكن لكم عبدا، وهكذا ابن الإنسان جاء لا ليخدمه الناس، بل ليخدمهم ويفدي بحياته كثيراً منهم". (متى 20/27 و28)

جاء في إنجيل القديس يوحنا (15/13): "ما من حب أعظم من هذا: أن يضحي الإنسان بنفسه في سبيل أحبائه". وقال الشهيد النائب والوزير الراحل ايلي حبيقة: "إن الوطن الذي لا يفتديه شبابه بأرواحهم لا يستمر ويزول. إن خدمة الآخرين وبذل الذات من أجلهم هي أعمال مقدسة والمسيح الإله قبل الصلب والعذاب والإهانات وقدم نفسه على الصليب فداء للإنسان ليعتقه من نير وعبودية الخطيئة ويحرره.

إن الشهيد لا يطلب شيئاً لنفسه من مقتنيات هذه الدنيا الفانية، وإنما يسعي لنيل بركات الله ليستحق بجدارة أفعاله وإيمانه العودة إلى منزل أبيه السماوي، والمسيح قال لنا: "ماذا ينفع الإنسان لو ربح العالم كله وخسر نفسه". (متى 16/26).

الشهيد هو قربان طاهر يقدم نفسه طواعية على مذبح الله بمحبة واندفاع وفرح من أجل أحبائه تماماً كما هو حال كل شهيد من شهداء لبنان الأبرار. عرفاناً بجميلهم نقول أنه وبفضل استشهادهم بقينا، وسوف نبقى بإذن الله طالما بقي الشباب اللبناني مؤمنا بلبنان وبرسالته وعلى استعداد تام ودائم للشهادة.

الشهيد النائب والوزير الراحل ايلي حبيقة لم يمت لأنه باق في كل جهد وعمل يقوم بهما أي لبناني من أجل الحفاظ على سيادة واستقلال وحرية وطنه الحبيب، ولصون كرامة وعزة اللبنانيين، كما أن عائلة حبيقة هي نبع معطاء لا ينضب في دفق الإيمان والوطنية والشهادة للحق والشهداء من أجل لبنان الرسالة والقداسة والقديسين.

نصلي من أجل أن يسكن الله روح الشهيد النائب والوزير الراحل ايلي حبيقة فسيح جناته إلى جوار البررة والقديسين وأن يلهم عائلته ومحبيه الصبر والسلوان

Tuesday, November 15, 2011

Killers of Iranian civilians and Zioconned American officials guests on Capitol Hill's Knesset on the Potomac....

Killers of Iranian civilians & Zioconned American officials guests on Capitol Hill's Knesset on the Potomac....

'Look at me!' I am Billary the Lesbian Bitch....

The US overlooks the history of the Mujahideen-e-Khalq because they could be of service against Tehran. That would not be the first time: From assisting anti-Shah forces, through assisting Saddam Hussein against Tehran, the MEK's history of cult-for-hire is rich!
"...About 50 supporters of the Mujahideen-e-Khalq (MEK) took over the first three rows of the audience at Tuesday morning's hearing of the Senate Armed Services Committee in the Senate Hart Office Building. The hearing was to examine President Barack Obama's decision to withdraw all U.S. troops from Iraq by the end of the year, and featured testimony by Defense Secretary Leon Panetta and Joint Chiefs Chairman Gen. Martin Dempsey.
Unlike the Code Pink representatives, who were famous for disrupting Senate hearings, the MEK supporters at the Hart building today sat politely in their bright yellow sweatshirts and ponchos,...We overheard one staffer at the hearing quip, "When your critics allege you are a cult, you probably shouldn't dress like one."
The MEK, whose ideology fuses Islam and Marxism, was formed in Iran in 1965. It allied itself with Ayatollah Ruhollah Khomeini and fought against the Shah and his Western backers during the Iranian Revolution. After falling out of favor with Khomeini, the group was given shelter in Iraq by Saddam Hussein, who used them to conduct brutal cross-border raids during the Iraq-Iran war...
Since 2009, the MEK has conducted a multi-million advocacy and lobbying campaign in Washington, with the help of dozens of senior U.S. officials and lawmakers, many of whom have been paid for their involvement. The list includes Congressman John Lewis (D-GA), former Pennsylvania Gov. Ed Rendell, former FBI Director Louis Freeh, former Sen. Robert Torricelli, Rep. Patrick Kennedy, former CIA Deputy Director of Clandestine Operations John Sano, former National Security Advisor Gen. James Jones, former Vermont Gov. Howard Dean, former New York Mayor Rudolph Giuliani, former Joint Chiefs Chairman Gen. Richard Myers, former White House Chief of Staff Andy Card, Gen. Wesley Clark, former Rep. Lee Hamilton, former CIA Director Porter Goss, senior advisor to the Romney campaign Mitchell Reiss, Gen. Anthony Zinni, former Pennsylvania Gov. Tom Ridge, former Sen. Evan Bayh, and many others.
In an August rally outside the State Department, Kennedy declared, "One of the greatest moments was when my uncle, President [John F.] Kennedy, stood in Berlin and uttered the immortal words ‘Ich bin ein Berliner,'" Kennedy exclaimed. "Today, I'm honored to repeat my uncle's words, by saying [translated from Farsi] ‘I am an Iranian, I am an Ashrafi.'"
Kennedy admitted he was paid $25,000 to emcee the rally....".

Thursday, November 10, 2011

Boomerang; Is the Pentagon Field-Testing 'Son of Stuxnet'?

Boomerang! Is the Pentagon Field-Testing 'Son of Stuxnet'?

When the cybersecurity firm Symantec announced they had discovered a sophisticated Trojan which shared many of the characteristics of the Stuxnet virus, I wondered: was the Pentagon and/or their Israeli partners in crime field-testing insidious new spyware?

According to researchers, the malicious program was dubbed "Duqu" because it creates files with the prefix "~DQ." It is a remote access Trojan (RAT) that "is essentially the precursor to a future Stuxnet-like attack." Mark that carefully.

In simple terms, a Trojan is malicious software that appears to perform a desirable function prior to its installation but in fact, steals information from users spoofed into installing it, oftentimes via viral email attachments.

In the hands of enterprising security agencies, or criminals (the two are functionally synonymous), Trojans are primarily deployed for data theft, industrial or financial espionage, keystroke logging (surveillance) or the capture of screenshots which may reveal proprietary information.

"The threat" Symantec averred, "was written by the same authors (or those that have access to the Stuxnet source code) and appears to have been created since the last Stuxnet file was recovered."

The malware, which began popping-up on the networks of several European firms, captured lists of running processes, account and domain information, network drives, user keystrokes and screenshots from active sessions and did so by using a valid, not a forged certificate, stolen from the Taipei-based firm, C-Media.

Whereas Stuxnet, believed to be a co-production of U.S. and Israeli cyber-saboteurs, was a weaponized virus programmed to destroy Iran's civilian nuclear power infrastructure by targeting centrifuges that enrich uranium, Duqu is a stealthy bit of spy kit that filches data from manufacturers who produce systems that control oil pipelines, water systems and other critical infrastructure.

Sergey Golovanov, a malware expert at Kaspersky Labs told Forbes that Duqu is "is likely the brainchild of a government security apparatus. And it's that government's best work yet."

Speaking from Moscow, Golovanov told Forbes in a telephone interview that "right now were are pretty sure that it is the next generation of Stuxnet."

"We are pretty sure that Duqu is a government cyber tool and are 70% sure it is coming from the same source as Stuxnet," Golovanov said.

"The victims' computer systems were infected several days ago. Whatever it is," Golovanov noted, "it is still in those systems, and still scanning for information. But what exactly it is scanning for, we don't know. It could be gathering internal information for encryption devices. We only know that it is data mining right now, but we don't know what kind of data and to what end it is collecting it."

Whom, pray tell, would have "access to Stuxnet source code"?

While no government has claimed ownership of Stuxnet, IT experts told Forbes "with 100% certainty it was a government agency who created it."

Suspects include cryptologists at the National Security Agency, or as is more likely given the outsourcing of intelligence work by the secret state, a combination of designers drawn from NSA, "black world" privateers from large defense firms along with specialists from Israel's cryptologic division, Unit 8200, operating from the Israeli nuclear weapons lab at the Dimona complex, as The New York Times disclosed.

Analyst George Smith
noted: "Stuxnet was widely distributed to many computer security experts. Many of them do contract work for government agencies, labor that would perhaps require a variety of security clearances and which would involve doing what would be seen by others to be black hat in nature. When that happened all bets were off."

Smith averred, "once a thing is in world circulation it is not protected or proprietary property."

While one cannot demonstrably prove that Duqu is the product of one or another secret state satrapy, one can reasonably inquire: who has the means, motive and opportunity for launching this particular bit of nastiness into the wild?

"Duqu's purpose," Symantec researchers inform us, "is to gather intelligence data and assets from entities, such as industrial control system manufacturers, in order to more easily conduct a future attack against another third party."

In other words, while Stuxnet was programmed to destroy industrial systems, Duqu is an espionage tool that will enable attackers "looking for information such as design documents that could help them mount a future attack on an industrial control facility."

Although it can be argued, as Smith does, that "source code for malware has never been secure," and "always becomes something coveted by many, often in direct proportion to its fame," it also can't be ruled out that military-intelligence agencies or corporate clones with more than a dog or two in the "cyberwar" hunt wouldn't be very interested in obtaining a Trojan that clips "industrial design" information from friend and foe alike.

Black Programs

The circulation of malicious code such as Duqu's is highly destabilizing. Considering that the U.S. Defense Department now considers computer sabotage originating in another country the equivalent to an act of war for which a military response is appropriate, the world is on dangerous new ground.

Speaking with MIT's Technology Review, Ronald Deibert, the director of
Citizen Lab, a University of Toronto think tank that researches cyberwarfare, censorship and espionage, told the publication that "in the context of the militarization of cyberspace, policymakers around the world should be concerned."

Indeed, given the fact that it is the United States that is now the biggest proliferator in the so-called cyber "arms race," and that billions of dollars are being spent by Washington to secure such weapons, recent history is not encouraging.

With shades of 9/11, the anthrax mailings and the Iraq invasion as a backdrop, one cannot rule out that a provocative act assigned to an "official enemy" by ruling elites just might originate from inside the U.S. security complex itself and serve as a convenient pretext for some future war.

A hint of what the Pentagon is up to came in the form of a controlled leak to The Washington Post.

Last spring, we were informed that "the Pentagon has developed a list of cyber-weapons and -tools, including viruses that can sabotage an adversary's critical networks, to streamline how the United States engages in computer warfare."

The list of "approved weapons" or "fires" are indicative of the military's intention to integrate "cyberwar" capabilities into its overall military doctrine.

According to Ellen Nakashima, the "classified list of capabilities has been in use for several months and has been approved by other agencies, including the CIA."

The Post reported that the new "framework clarifies, for instance, that the military needs presidential authorization to penetrate a foreign computer network and leave a cyber-virus that can be activated later."

On the other hand, and here's where Duqu may enter the frame, the "military does not need such approval, however, to penetrate foreign networks for a variety of other activities. These include studying the cyber-capabilities of adversaries or examining how power plants or other networks operate."

Additionally, Nakashima wrote, Pentagon cyberwarriors "can also, without presidential authorization, leave beacons to mark spots for later targeting by viruses, the official said."

As part of Washington's on-going commitment to the rule of law and human rights, as the recent due process-free drone assassination of American citizen Anwar Al-Awlaki, followed by that of his teenage son and the revenge killing of former Libyan leader Muammar Qaddafi by--surprise!--
Al Qaeda-linked militias funded by the CIA clearly demonstrate, the "use of any cyber-weapon would have to be proportional to the threat, not inflict undue collateral damage and avoid civilian casualties."

Try selling that to the more than 3,600 people killed or injured by CIA drone strikes, as
Pakistan Body Count reported, since our Nobel laureate ascended to his Oval Office throne.

As George Mason University researchers Jerry Brito and Tate Watkins described in their recent paper, Loving the Cyber Bomb? The Dangers of Threat Inflation in Cybersecurity Policy, despite overheated "rhetoric of 'cyber doom' employed by proponents of increased federal intervention," there is a lack of "clear evidence of a serious threat that can be verified by the public."

However, as Brito and Watkins warned, "the United States may be witnessing a bout of threat inflation similar to that seen in the run-up to the Iraq War," one where "a cyber-industrial complex is emerging, much like the military-industrial complex of the Cold War. This complex may serve to not only supply cybersecurity solutions to the federal government, but to drum up demand for them as well."

A "demand" which will inevitably feed the production, proliferation and deployment of a host of viral attack tools (Stuxnet) and assorted spybots (Duqu) that can and will be used by America's shadow warriors and well-connected corporate spies seeking to get a leg-up on the competition.

While evidence of "a serious threat" may be lacking, and while proponents of increased "cybersecurity" spending advanced "no evidence ... that opponents have 'mapped vulnerabilities' and 'planned attacks'," Brito and Watkins noted there is growing evidence these are precisely the policies being pursued by Washington.

Why might that be the case?

As a declining imperialist Empire possessing formidable military and technological capabilities, researcher Stephen Graham has pointed out in Cities Under Siege: The New Military Urbanism, the United States has embarked on a multibillion dollar program "to militarize the world's global electronic infrastructures" with a stated aim to "gain access to, and control over, any and all networked computers, anywhere on Earth."

Graham writes that "the sorts of on-the-ground realities that result from attacks on ordinary civilian infrastructure are far from the abstract niceties portrayed in military theory."

Indeed, as "the experiences of Iraq and Gaza forcefully remind us," robotized drone attacks and already-existent cyberwar capabilities buried in CIA and Pentagon black programs demonstrate that "the euphemisms of theory distract from the hard fact that targeting essential infrastructure in highly urbanized societies kills the weak, the old and the ill just as surely as carpet bombing."

A Glimpse Inside the Complex

In the wake of the HBGary hack by Anonymous earlier this year, the secrecy-shredding web site
Public Intelligence released a 2009 Defense Department contract proposal from the firm.

Among other things, it revealed that the Pentagon is standing-up offensive programs that "examine the architecture, engineering, functionality, interface and interoperability of Cyber Warfare systems, services and capabilities at the tactical, operational and strategic levels, to include all enabling technologies."

HBGary, and one can assume other juiced defense contractors, are planning "operations and requirements analysis, concept formulation and development, feasibility demonstrations and operational support."

"This will include," according to the leaked proposal, "efforts to analyze and engineer operational, functional and system requirements in order to establish national, theater and force level architecture and engineering plans, interface and systems specifications and definitions, implementation, including hardware acquisition for turnkey systems."

Indeed, the company will "perform analyses of existing and emerging Operational and Functional Requirements at the force, theater, Combatant Commands (COCOM) and national levels to support the formulation, development and assessment of doctrine, strategy, plans, concepts of operations, and tactics, techniques and procedures in order to provide the full spectrum of Cyber Warfare and enabling capabilities to the warfighter."

During the course of their analysis Symantec learned that Duqu "uses HTTP and HTTPS to communicate with a command-and-control (C&C) server that at the time of writing is still operational."

"The attackers were able to download additional executables through the C&C server, including an infostealer that can perform actions such as enumerating the network, recording keystrokes, and gathering system information. The information is logged to a lightly encrypted and compressed local file, which then must be exfiltrated out."

To where, and more importantly by whom was that information "exfiltrated" is of course, the $64,000 question.

A working hypothesis may be provided by additional documents published by
Public Intelligence.

According to a cyberwar proposal to the Pentagon by General Dynamics and HBGary, "Project C" is described as a program for the development "of a software application targeting the Windows XP Operating System that, when executed, loads and enables a covert kernel-mode implant that will exfiltrate a file from disk (or other remotely called commands) over a connected serial port to a remote device."

We're informed that Project C's "primary objectives" was the design of an implant "that is clearly able to exfiltrate an on-disk file, opening of the CD tray, blinking of the keyboard lights, opening and deleting a file, and a memory buffer exfiltration over a connected serial line to a collection station."

"As part of the exploit delivery package," HBGary and General Dynamics told their prospective customers, presumably the NSA, that "a usermode trojan will assist in the loading of the implant, which will clearly demonstrate the full capability of the implant."

Duqu, according to Symantec researchers, "uses a custom C&C protocol, primarily downloading or uploading what appear to be JPG files. However, in addition to transferring dummy JPG files, additional data for exfiltration is encrypted and sent, and likewise received."

While we don't know which firms were involved in the design of Stuxnet and now, Duqu, we do know thanks to Anonymous that HBGary had a Stuxnet copy, shared it amongst themselves and quite plausibly, given what we've learned about Duqu, Stuxnet source code may have been related to the above-mentioned "Project C."

Kevin Haley, Symantec's director of product management told The Register that "the people behind Stuxnet are not done. They've continued to do different things. This was not a one-shot deal."