Fake Revolutions: The debate is over; the revolutions are fake, the people behind them illegitimate.
By Tony Cartalucci – BLN Contributing Writer
CANVAS leader Srdja Popovic stands here before Columbia, a public sponsor of the US State Department’s Movements.org. While he denies he is being funded by the US government, just as his disingenuous movement did in 2000 before being found to have lied, his organization works in tandem with the US State Department’s agenda and the various organizations it openly funds.
The degenerate, profiteering liars that populate the Serbian based “CANVAS” organization maintain that while the US government had initially funded them as they overthrew the government of Serbia in 2000, currently the US government does not fund them – that they are privately funded. Unfortunately for these meddling interlopers, the US government itself is “privately owned” by many of the people who fund the organizations they claim as partners.
These partners include:
United States Institute for Peace (USIP) (funded through Congress)
Freedom House (Neo-Con infested)
International Republican Institute (IRI) (headed by warmonger John McCain)
New Tactics (Ford Foundation-funded, Soros-funded)
Humanity in Action (Ford Foundation-funded, US State Department-funded)
The organization is obviously sensitive about who it is seen dealing with, partnering with, and receiving money from. Knowledge of its true nature and purpose has systematically been lied about from its very inception. Foreign Policy reported that “Like the entire opposition to Milosevic, Otpor [now known as CANVAS] took money from the U.S. government, and lied about it. When the real story came out after Milosevic fell, many Otpor members quit, feeling betrayed.” As CANVAS was exposed for its more recent involvement in Egypt, they quickly changed their “Partnership” page to “External Links.” In a recent documentary, where CANVAS openly claims responsibility for training and guiding unrest across the planet, they reiterate that they are not funded by the US government. This is a dubious claim at best, considering who they associate with and how their “mission” dovetails with identical efforts by openly US-funded and sponsored organizations like Movements.org.
The documentary produced by Journeyman Pictures features CANVAS, its founder, and the story of how they have influenced “color revolutions” all over the globe. While the documentary is fairly objective about its particular subject matter, namely CANVAS’ role in the unrest, within a greater context and amidst overwhelming evidence there is no question at all whether or not these revolutions are entirely engineered and contrived.
Apparently unaware of the giant, foreign-funded logo looming over his right shoulder, Mohamed Adel of April 6 tries to convince his audience that there was no foreign plot behind Egypt’s recent foreign-funded revolution.
The documentary concludes contemplating the future of Egypt and Tunisia and the changes that are to come. One Egyptian activist, Mohamed Adel of the April 6 Movement, while siting in front of a giant banner featuring the US-funded Otpor fist claims that the US is incapable of influencing millions of people – seemingly unaware of the mass manipulation and social engineering of America’s 300 million people, or the billions conned, duped, manipulated, and certainly “influenced” by the Fortune 500 globally on a daily basis. He claims that the Egyptian people want to be the masters of their own destiny, ironically, even as a US-funded logo looms over his shoulder and even after he himself trained in Serbia at the US-founded CANVAS and his own April 6 Movement attended a US State Department-sponsored confab in NYC in 2008 to train for a revolution now admittedly engineered from abroad and led by Mohamed ElBaradei, a listed member on the US corporate-funded International Crisis Group.
The documentary claims that Tunisians are busy enjoying their new “freedoms,” showing footage of people talking on phones and conversing in public. Unfortunately, freedom is not talking, nor is it even casting a vote in an election. Freedom is being the undisputed master of your own destiny, being independent both politically and economically. However, with the nationalistic regimes deposed and the “economic liberation” underway in the US State Department’s newly despoiled lands, rules, regulations, decrees and laws will be imposed upon these “free nations” by self-proclaimed international arbiters, corporate-funded policy think-tanks, and contrived, illegitimate “international” courts – all entirely offshore and removed from any sense of accountability to the people they lord over, including the Tunisians and Egyptians.
As the global corporate-financier elite and their tangled web of NGOs, civil society organizations, and their international military machines stall in Libya and Syria, they still are staging and moving against other sovereign nations with their social engineering “color revolutions.” The list is extensive, including Belarus, Venezuela, Iran, Thailand, China, Myanmar, and even Pakistan.
Know these charlatans and know their game, as they are far from through. And while their dark deeds are done in far flung distant lands, the empowerment and hubris they reap from afar will soon enough be brought home to bear. Threats to target Texas with a “no-fly zone” after an attempt to usurp the TSA’s authority already echos the madness being exercised in war-ravaged Libya. Libya’s battle and the dangerous precedent a victory there for the globalists would set is already hitting home.Start Slide Show with PicLens Lite
EHRAN, May 2 (UPI) — Israeli fighter jets are conducting drills at a military base in Iraq in preparation for a strike on Iran, the Islamic Republic’s Press TV reported.
The report said the Israeli planes participating in the drills include F-15, F-16, F-18 and F-22 fighter jets. It said they have conducted weeklong exercises,flying mainly at night.
Press TV said its report was based on information received from a source close to Moqtada al-Sadr’s group in Iraq.
Sadr is considered to be one of the most influential religious political figures in Iraq but holds no official title. He has repeatedly called for the immediate withdrawal of U.S.-led coalition troops and U.N. forces deployed in Iraq.
The air drills are being conducted in collaboration with the U.S. military, the report said. It said Iraq was not informed of the exercises.
The U.S. maintains a number of military bases in Iraq and the government in Baghdad is not involved in any military activities occurring there, the report said.
There was no official comment on the report by Israeli government or military officials.
Last month, Brig. Gen Mohammed Ali Safari, the commander of the Revolutionary Guards, declared Israeli and American military bases in the Middle East are within range of Iran’s missiles.
“Although we are capable of increasing the range of our missiles, we don’t think it would be necessary because today our extra-regional enemy — the Zionist regime of [Israel] — is within the range of our missiles,” he told the Fars news agency.
“As for the American forces — if they were to back Israeli threats — they would be closer to us than them [Israel] and they would be within the range of our firepower as well,” he said.
2010 Cyber Storm III global cybersecurity exercise concludes on 10.01.10: All of at this coinsides with Mossad release of ‘Stuxnet Virus’
In places like Arlington, Va.; Washington, D.C.; across the U.S. and around the world, a global cybersecurity exercise is underway designed to test the limits not only of the “network of networks,” but the ingenuity of the people charged with protecting it.
Welcome to Cyber Storm III.
This is the third time that the Department of Homeland Security, in conjunction with other federal agencies, is holding this global cybersecurity exercise. Previous Cyber Storm exercises were conducted in 2006, and again in 2008. For the first time, DHS will manage its response to Cyber Storm III from its new National Cybersecurity and Communications and Integration Center.
Normally, this facility, located in a nondescript office building in Arlington is classified and closed to the public. But the NCCIC recently opened its doors for an inside look to let DHS officials brief the media on Cyber Storm III, a worldwide cybersecurity response exercise that has been underway since late Monday.
Brett Lambo, the director of the Cybersecurity Exercise Program with DHS’s National Cybersecurity Division, is the architect, or game master for this global cybersecurity exercise.
“The overarching philosophy,” he told reporters in a recent briefing at the NCCIC, “is that we want to come up with something that’s a core scenario, something that’s foundational to the operation of the Internet.”
Cyber Storm III includes many players in places across the U.S. and around the world:
* Seven federal departments: Homeland Security, Defense, Commerce, Energy, Justice, Treasury and Transportation.
* Eleven states: California, Delaware, Illinois, Iowa, Michigan, Minnesota, North Carolina, New York, Pennsylvania, Texas, Washington, plus the Multi-State Information Sharing and Analysis Center (ISAC). This compares with nine states that participated in Cyberstorm II.
* Twelve international partners: Australia, Canada, France, Germany, Hungary, Japan, Italy, the Netherlands, New Zealand, Sweden, Switzerland, and the United Kingdom (up from four countries that participated in Cyber Storm II).
DHS officials also say 60 private sector companies will participate in Cyber Storm III, up from 40 who participated in Cyber Storm II. Firms include banking and finance, chemical, communications, defense industrial, information technology, nuclear, transportation and water.
Lambo said to preserve the exercise’s value as a vigorous test of cybersecurity preparedness, exact details of the scenario which participants will deal with over the next three days are secret. However, he did share some of the broad parameters of the scenario he helped write, and which he will administer.
“In other exercises, you do have specific attack vectors; you have a denial of service attack, you have a website defacement, or you have somebody dropping a rootkit,” he said. “But we wanted to take that up a level to say, ‘All of those things can still happen, and based on what you do, if you’re concerned about the availability of infrastructure, we can look at what happens when the infrastructure is unavailable.’”
Lambo said another way to look at the scenario is that it builds upon what they learned from previous exercises.
“In Cyber Storm I, we attacked the Internet, in Cyber Storm II, we used the Internet as the weapon, in Cyber Storm III, we’re using the Internet to attack itself,” he said.
Lambo added under normal circumstances, the Internet operates based on trust that a file, or a graphic, or a computer script is what it says it is, and comes from a trusted source. But what if that source was not what it said it was, or the source has a malicious intent?
“What we’re trying to do is compromise that chain of trust,” he said, in further explaining in broad strokes of the Cyber Storm III exercise scenario.
Lambo and his colleagues at the Cyber Storm control center also will introduce new, and hopefully unexpected conditions to the scenario to further test participants.
“We have the ability to do what we call dynamic play,” he said. “If we get a player action coming back into the exercise that is either different from what we expected it to be, if it’s something we’d like to chase down further, or if it’s something we’d like to pursue, we have the ability to write injects on the fly.”
He said those injects could include new attacks.
The Cyber Storm exercise will be conducted primarily using secure messaging systems like e-mail or text messages to relay intersects to participants and that the simulated attacks are not being conducted over a live or a virtual network now in operation on the Internet, he said.
For the U.S. government, Cyber Storm III also offers the opportunity to test the DHS’ National Cyber Incident Response Plan.
“We want to focus on information sharing issues,:” he said. “We want to know how all of the different organizations are compiling, acting on, aggregating information that they’re sharing, especially when you’re thinking about classified lines coming into the unclassified domain. There’s a concept called tearlining, in which we take classified information, and get it below the tearline, so that those without security clearances and get it, and act on it.”
The Cyber Storm III exercise is expected to conclude by 10.01.10
Was Stuxnet Built to Attack Iran’s Nuclear Program?
By Robert McMillan, IDG News
A highly sophisticated computer worm that has spread through Iran, Indonesia and India was built to destroy operations at one target: possibly Iran’s Bushehr nuclear reactor.
People who read this also read:
That’s the emerging consensus of security experts who have examined the Stuxnet worm. In recent weeks, they’ve broken the cryptographic code behind the software and taken a look at how the worm operates in test environments. Researchers studying the worm all agree that Stuxnet was built by a very sophisticated and capable attacker — possibly a nation state — and it was designed to destroy something big.
Though it was first developed more than a year ago, Stuxnet was discovered in July 2010, when a Belarus-based security company discovered the worm on computers belonging to an Iranian client. Since then it has been the subject of ongoing study by security researchers who say they’ve never seen anything like it before. Now, after months of private speculation, some of the researchers who know Stuxnet best say that it may have been built to sabotage Iran’s nukes.
Last week Ralph Langner, a well-respected expert on industrial systems security, published an analysis of the worm, which targets Siemens software systems, and suggested that it may have been used to sabotage Iran’s Bushehr nuclear reactor. A Siemens expert, Langner simulated a Siemens industrial network and then analyzed the worm’s attack.
Experts had first thought that Stuxnet was written to steal industrial secrets — factory formulas that could be used to build counterfeit products. But Langner found something quite different. The worm actually looks for very specific Siemens settings — a kind of fingerprint that tells it that it has been installed on a very specific Programmable Logic Controller (PLC) device — and then it injects its own code into that system.
Because of the complexity of the attack, the target “must be of extremely high value to the attacker,” Langner wrote in his analysis.
Langner is set to present his findings at a closed-door security conference in Maryland this week, which will also feature a technical discussion from Siemens engineers. Langner said he wasn’t yet ready to speak to a reporter at length (“the fact of the matter is this stuff is so bizarre that I have to make up my mind how to explain this to the public,” he said via e-mail) but others who have examined his data say that it shows that whoever wrote Stuxnet clearly had a specific target in mind. “It’s looking for specific things in specific places in these PLC devices. And that would really mean that it’s designed to look for a specific plant,” said Dale Peterson, CEO of Digital Bond.
This specific target may well have been Iran’s Bushehr reactor, now under construction, Langner said in a blog posting. Bushehr reportedly experienced delays last year, several months after Stuxnet is thought to have been created, and according to screen shots of the plant posted by UPI, it uses the Windows-based Siemens PLC software targeted by Stuxnet.
Peterson believes that Bushehr was possibly the target. “If I had to guess what it was, yes that’s a logical target,” he said. “But that’s just speculation.”
Langner thinks that it’s possible that Bushehr may have been infected through the Russian contractor that is now building the facility, JSC AtomStroyExport. Recently AtomStroyExport had its Web site hacked, and some of its Web pages are still blocked by security vendors because they are known to host malware. This is not an auspicious sign for a company contracted with handling nuclear secrets.
Tofino Security Chief Technology Officer Eric Byres is an industrial systems security expert who has tracked Stuxnet since it was discovered. Initially he thought it was designed for espionage, but after reading Langner’s analysis, he’s changed his mind. “I guessed wrong, I really did,” he said. “After looking at the code that Ralph hauled out of this thing, he’s right on.”
One of the things that Langner discovered is that when Stuxnet finally identifies its target, it makes changes to a piece of Siemens code called Organizational Block 35. This Siemens component monitors critical factory operations — things that need a response within 100 milliseconds. By messing with Operational Block 35, Stuxnet could easily cause a refinery’s centrifuge to malfunction, but it could be used to hit other targets too, Byres said. “The only thing I can say is that it is something designed to go bang,” he said.
Whoever created Stuxnet developed four previously unknown zero-day attacks and a peer-to-peer communications system, compromised digital certificates belonging to Realtek Semiconductor and JMicron Technology, and displayed extensive knowledge of industrial systems. This is not something that your run-of-the-mill hacker can pull off. Many security researchers think that it would take the resources of a nation state to accomplish.
Bushehr is a plausible target, but there could easily be other facilities — refineries, chemical plants or factories that could also make valuable targets, said Scott Borg, CEO of the U.S. Cyber Consequences Unit, a security advisory group. “It’s not obvious that it has to be the nuclear program,” he said. “Iran has other control systems that could be targeted.”
Iranian government representatives did not return messages seeking comment for this story, but sources within the country say that Iran has been hit hard by the worm. When it was first discovered, 60 percent of the infected Stuxnet computers were located in Iran, according to Symantec.
Now that the Stuxnet attack is public, the industrial control systems industry has come of age in an uncomfortable way. And clearly it will have more things to worry about
“The problem is not Stuxnet. Stuxnet is history,” said Langner in an e-mail message. “The problem is the next generation of malware that will follow.”
Letter from an Israeli Jail, by Cynthia McKinney News
Saturday, 04 July 2009 13:47
Written by Free Gaza Team
Original audio message available here:
This is Cynthia McKinney and I’m speaking from an Israeli prison cellblock in Ramle. [I am one of] the Free Gaza 21, human rights activists currently imprisoned for trying to take medical supplies to Gaza, building supplies – and even crayons for children, I had a suitcase full of crayons for children. While we were on our way to Gaza the Israelis threatened to fire on our boat, but we did not turn around. The Israelis high-jacked and arrested us because we wanted to give crayons to the children in Gaza. We have been detained, and we want the people of the world to see how we have been treated just because we wanted to deliver humanitarian assistance to the people of Gaza.
At the outbreak of Israel’s Operation ‘Cast Lead’ [in December 2008], I boarded a Free Gaza boat with one day’s notice and tried, as the US representative in a multi-national delegation, to deliver 3 tons of medical supplies to an already besieged and ravaged Gaza.
During Operation Cast Lead, U.S.-supplied F-16′s rained hellfire on a trapped people. Ethnic cleansing became full scale outright genocide. U.S.-supplied white phosphorus, depleted uranium, robotic technology, DIME weapons, and cluster bombs – new weapons creating injuries never treated before by Jordanian and Norwegian doctors. I was later told by doctors who were there in Gaza during Israel’s onslaught that Gaza had become Israel’s veritable weapons testing laboratory, people used to test and improve the kill ratio of their weapons.
The world saw Israel’s despicable violence thanks to al-Jazeera Arabic and Press TV that broadcast in English. I saw those broadcasts live and around the clock, not from the USA but from Lebanon, where my first attempt to get into Gaza had ended because the Israeli military rammed the boat I was on in international water … It’s a miracle that I’m even here to write about my second encounter with the Israeli military, again a humanitarian mission aborted by the Israeli military.
The Israeli authorities have tried to get us to confess that we committed a crime … I am now known as Israeli prisoner number 88794. How can I be in prison for collecting crayons to kids?
Zionism has surely run out of its last legitimacy if this is what it does to people who believe so deeply in human rights for all that they put their own lives on the line for someone else’s children. Israel is the fullest expression of Zionism, but if Israel fears for its security because Gaza’s children have crayons then not only has Israel lost its last shred of legitimacy, but Israel must be declared a failed state.
I am facing deportation from the state that brought me here at gunpoint after commandeering our boat. I was brought to Israel against my will. I am being held in this prison because I had a dream that Gaza’s children could color & paint, that Gaza’s wounded could be healed, and that Gaza’s bombed-out houses could be rebuilt.
But I’ve learned an interesting thing by being inside this prison. First of all, it’s incredibly black: populated mostly by Ethiopians who also had a dream … like my cellmates, one who is pregnant. They are all are in their twenties. They thought they were coming to the Holy Land. They had a dream that their lives would be better … The once proud, never colonized Ethiopia [has been thrown into] the back pocket of the United States, and become a place of torture, rendition, and occupation. Ethiopians must free their country because superpower politics [have] become more important than human rights and self-..determination.
My cellmates came to the Holy Land so they could be free from the exigencies of superpower politics. They committed no crime except to have a dream. They came to Israel because they thought that Israel held promise for them. Their journey to Israel through Sudan and Egypt was arduous. I can only imagine what it must have been like for them. And it wasn’t cheap. Many of them represent their family’s best collective efforts for self-..fulfilment. They made their way to the United Nations High Commission for Refugees. They got their yellow paper of identification… They got their certificate for police protection. They are refugees from tragedy, and they made it to Israel only after they arrived Israel told them “there is no UN in Israel.”
The police here have license to pick them up & suck them into the black hole of a farce for a justice system. These beautiful, industrious and proud women represent the hopes of entire families. The idea of Israel tricked them and the rest of us. In a widely propagandized slick marketing campaign, Israel represented itself as a place of refuge and safety for the world’s first Jews and Christian. I too believed that marketing and failed to look deeper.
The truth is that Israel lied to the world. Israel lied to the families of these young women. Israel lied to the women themselves who are now trapped in Ramle’s detention facility. And what are we to do? One of my cellmates cried today. She has been here for 6 months. As an American, crying with them is not enough. The policy of the United States must be better, and while we watch President Obama give 12.8 trillion dollars to the financial elite of the United States it ought now be clear that hope, change, and ‘yes we can’ were powerfully presented images of dignity and self-..fulfilment, individually and nationally, that besieged people everywhere truly believed in.
It was a slick marketing campaign as slickly put to the world and to the voters of America as was Israel’s marketing to the world. It tricked all of us but, more tragically, these young women.
We must cast an informed vote about better candidates seeking to represent us. I have read and re-read Dr. Martin Luther King Junior’s letter from a Birmingham jail. Never in my wildest dreams would I have ever imagined that I too would one day have to do so. It is clear that taxpayers in Europe and the U.S. have a lot to atone for, for what they’ve done to others around the world.
What an irony! My son begins his law school program without me because I am in prison, in my own way trying to do my best, again, for other people’s children. Forgive me, my son. I guess I’m experiencing the harsh reality which is why people need dreams. [But] I’m lucky. I will leave this place. Has Israel become the place where dreams die?
Ask the people of Palestine. Ask the stream of black and Asian men whom I see being processed at Ramle. Ask the women on my cellblock. [Ask yourself:] what are you willing to do?
Let’s change the world together & reclaim what we all need as human beings: Dignity. I appeal to the United Nations to get these women of Ramle, who have done nothing wrong other than to believe in Israel as the guardian of the Holy Land, resettled in safe homes. I appeal to the United State’s Department of State to include the plight of detained UNHCR-..certified refugees in the Israel country report in its annual human rights report. I appeal once again to President Obama to go to Gaza: send your special envoy, George Mitchell there, and to engage Hamas as the elected choice of the Palestinian people.
I dedicate this message to those who struggle to achieve a free Palestine, and to the women I’ve met at Ramle. This is Cynthia McKinney, July 2nd 2009, also known as Ramle prisoner number 88794.
Cynthia McKinney is a former U.S. Congresswoman, Green Party presidential candidate, and an outspoken advocate for human rights and social justice. The first African-..American woman to represent the state of Georgia, McKinney served six terms in the U.S. House of Representatives.., from 1993-2003, and from 2005-2007. She was arrested and forcibly abducted to Israel while attempting to take humanitarian and reconstruction supplies to Gaza on June 30th. For more information, please see http:../../..www…FreeGaza.org