Will Kerry Give Mahmoud Abbas a P5+1 Deal?

ToI: Former Palestinian peace negotiator Nabil Shaath said in an interview earlier this month that he often asks Westerners whether Arabs have to “hijack your planes and destroy your airports again” to make the world take notice of the Palestinian cause

In a February 1 interview with the Palestinian Authority’s Awdha TV, translated by MEMRI, Shaath slammed American efforts at Israeli-Palestinian peacemaking.

Asked about a French proposal for an international peace conference, Shaath replied, “Well, anything is better than American control of the negotiations. Anything. The US has never been a reliable honest broker. Never. It is the strategic ally of Israel. Period. Therefore any discussion of a different formula is a positive thing.”

But, he added, “an international conference is not what is needed. What is needed is a smaller framework. Today, at the African Union summit, President [Mahmoud] Abbas reiterated that we want something similar to the 5+1 framework” of six world powers who negotiated the nuclear deal with Iran.

“Like it or not, the US will be part of it. But we want France, Germany, Britain, the EU, Russia, China, Brazil, India. From the Arab countries we want Egypt at least. We want a small international framework.”

***

Shaath then turned to what he described as Western apathy toward suffering in the Middle East.

“If the Syrian problem had not been exported to Europe through the refugees on the one hand and terrorism on the other, the Europeans would not have cared even if the entire Syrian people had died,” he charged.

“But when all of a sudden there were four million Syrian refugees in Europe, 1.2 million of them in Germany alone, and when this was accompanied by Islamic State operations in France and elsewhere, all these countries began to fear that IS might have infiltrated through the refugees. And this started a debate about racial transformation in Europe with the entrance of non-white, non-European, non-Anglo-Saxon races, like the Syrian refugees, the Africans and others. This is what made the Syrian problem the most pressing from their perspective.”

He added: “I always say to these people, after I tell them about Syria and IS: ‘Do we have to hijack your planes and destroy your airports again to make you care about our cause? Are you waiting for us to cut off your oil supply? You always wait for things to reach boiling point and explode, causing you harm, before you intervene to end the crimes and violations.’”  

Shaath served as the PA’s first foreign minister, and has served as a top peace negotiator and

The Kremlin’s War Propaganda

Many in the West, from leaders to citizens are often freaked out at what is published on tens of thousands of websites including media sites. One can never know the extent of propaganda much less which are the nuggets of truth. When it comes to Russia, they are professional trollers, ambassadors of information warfare. Verification of information, checks on people, dates and locations are required. Admittedly, this is almost impossible due to a aggressive news cycle that never ends, events occur too fast. Yet, advancing propaganda is done at a peril to false information. Below will describe this dynamic.

Another reference to an article is also posted below that does explain Ukraine and Crimea demonstrating the depths of concocted and false information.

MoscowTimes: Several years ago, I traveled to the taiga in the republic of Altai with a former KGB officer who had worked in military propaganda during the war in Afghanistan. While we drank tea beside the campfire one night, he described in detail the principles of military propaganda. Today, I see that the Kremlin is implementing all of those principles in its information campaign surrounding the Ukrainian crisis.

In authoritarian countries like Russia, independent information is losing out to mass propaganda, and whole populations have become victims of brainwashing.

The main objective of war propaganda is to mobilize the support of the population — or in the case of Ukraine, an expansionist campaign. It should also demoralize the enemy and attract the sympathy and support of third countries. Widespread support among Russians for the military operations in Crimea and its ultimate annexation indicate that the Kremlin has succeeded in its first two objectives but has gained little ground on the third.

Moscow accomplished this by using seven basic methods:

First, it is necessary to convince the general population that the government is acting correctly and that the enemy is guilty of fomenting the crisis. That is why the Kremlin places the full blame for the entire Ukrainian crisis on the Maidan protesters and what it calls the Western-backed Ukrainian opposition. Moscow conspicuously leaves out the fact that former Ukrainian President Viktor Yanukovych himself provoked the crisis by ruining the country’s economy, double-dealing with the European Union and engaging in corrupt deals while also permitting extreme corruption among members of his family and inner circle.

To incite hatred for the enemy and deflect attention away from Yanukovych’s flaws, the Kremlin says the new government in Kiev, dominated by the main opposition groups, is linked to everything that is despised and vilified in Russia: fascists, extremists, the U.S. and the West in general. It is necessary to paint the Western enemy as the aggressor.

Second, the Kremlin created myths about the terrible persecutions of the Russian-speaking population in Ukraine, particularly in Crimea. Federation Council speaker Valentina Matviyenko even came up with a story about victims of such aggression that nobody has been able to corroborate, saying there were casualties among locals in Simferopol from a Kiev-backed attempt to take over a police building. The claim was never verified.

The main idea behind such claims is to find just the right balance between truth and fiction. Nazi Propaganda Minister Joseph Goebbels once said that if you add one-fourth of the truth to three-fourths of a lie, the people will believe you. Hitler and Stalin applied the principles and techniques of war propaganda on a national scale.

Third, the enemy must be demonized. Just about anything will work, from alleging that one of the leaders of the opposition, acting Prime Minister Arseniy Yatsenyuk, is a Scientologist, or showing medical records that another leader was treated for a psychological disorder. NTV and other state-controlled television stations have been at the forefront in spreading these smear campaigns.

If an actual radical or nationalist can be found among the enemy’s ranks, such as Right Sector leader Dmitry Yarosh, this is like manna from heaven for propagandists. Although they represent fringe factions, they are turned into the face of the enemy. The entire opposition, which in reality includes a wide range of moderate forces,  is presented as “fascist” and “neo-Nazi.”

Fourth, the authorities always disguise their aggressive actions as a humanitarian mission. “We have to protect defenseless Russians at the hands of fascists. They are in danger of being beaten and killed,” propagandists say.

Fifth, the Kremlin has attributed its own cynical methods to the enemy. For example, if Moscow intends to annex part of a brotherly, neighboring country, it must first accuse the U.S. and the authorities in Kiev of striving for world domination and hegemony, while depriving Russia of its ancestral territories and its righftful sphere of influence in its own backyard.

Sixth, the authorities must present all of their actions as purely legal and legitimate, and the actions of the enemy as gross violations of international law. That is why President Vladimir Putin refers to the “legitimate and inherent right of Crimeans to self-determination” — the same right he strongly denied to the people of Chechnya and Kosovo.

According to this logic, the parliament’s unanimous vote to strip Yanukovych of his authority on Feb. 22 was illegal, while the referendum for secession in Crimea — which violated the Ukrainian Constitution — is completely legal and legitimate.

Seventh, the success of war propaganda depends entirely on its totalitarian approach. The authorities must shut down every independent media outlet capable of identifying and exposing the propagandists’ lies. That is why Ukraine blocked Russian television. It also explains why Moscow is cracking down on Dozhd television and why it recently replaced the head of Lenta.ru with a ­Kremlin-friendly editor-in-chief.

Information warfare is well known throughout the world and is used by all leading countries. The U.S. government successfully used the same principles when it bombed Yugoslavia and invaded Grenada, Panama and Iraq. The difference, of course, is that the U.S. government does not own mainstream media outlets, so their ability to manipulate the truth is less effective.

Take, for example, the Iraqi invasion in 2003. Within a relatively short time period after the invasion was initiated, leading Western media went the complete other direction by criticizing the U.S. government for misleading the public on the Iraqi weapons of mass destruction that were never found. This self-correction process does not occur in Russia, where the main media outlets are state-controlled.

In authoritarian countries like Russia, independent information is losing out to mass propaganda, and whole populations have become victims of brainwashing. Politicians speak about the need for peace even while stirring up war hysteria. And that means the likelihood of war is far closer and more real than many might imagine.

Vladimir Ryzhkov, a State Duma deputy from 1993 to 2007, is a political analyst.

*** Ukraine war points all the way to Putin, even while he played a role of a victim.

dve-bs

In February 2015, pro-Russian separatists aided by Russian troops took the strategic railway hub of Debaltseve in Eastern Ukraine, forcing Ukrainian forces to withdraw.

This investigation intends to prove the decision to take Debaltseve and close the “Debaltseve pocket” was taken at the highest level of the Russian state. Explaining Russian leadership’s actions requires a look back to the international situation in late 2014 — early 2015

(full summary with proof and photos)

After Angela Merkel canceled the Normandy format meeting in Astana and Vladimir Putin wasn’t invited to the 70th anniversary of Auschwitz liberation, a major escalation started in Donbass (mid-January 2015). The main fighting took place around Debaltseve, which is a major transportation hub, giving Donetsk a railway link with Luhansk and Russia. Russia’s 5th and 6th Separate Tank Brigades were proven to have taken part in the battle. During the battle, a serviceman of the 6th brigade Evgeniy Usov got a shrapnel wound and arrived to Moscow’s military hospital named after Burdenko no later than February 14, 2015. No later than February 21, 2015, he was visited by Russia’s Defense Minister Sergey Shoigu, who awarded Usov with a watch bearing a Russia’s Ministry of Defense logo.

We believe the facts mentioned above prove that the decision to escalate the conflict in Ukraine and attack Debaltseve was taken in the highest ranks of the Russian authorities. Given that the Debaltseve offensive started while Russia’s and Ukraine’s presidents were conducting negotiations, it is hard to believe this decision could have been taken by anyone than Russia’s president Vladimir Putin. Such an initiative from Russia’s Minister of Defense could have severely hampered Putin’s negotiation efforts, which is why we believe that the decision to attack Debaltseve and close a pocket around Ukrainian forces was personally taken by Russia’s President Vladimir Putin. This decision was a reaction to the actions of the Normandy Four and was used as leverage against Ukraine’s President Petro Poroshenko and leaders of the West. Full article here.

The DoJ Hacked, DHS Files Compromised

Hackers leaked DHS staff records, 200GB of files are in their hands

A hacker accessed an employee’s email account at the Department of Justice and stole 200GB of files including records of 9,000 DHS staffers and 20,000 FBI employees.

SecurityAffairs: Yesterday, the data related a Department of Homeland Security (DHS) staff directory were leaked online, a Twitter account shared the link to an archive containing 9,355 names.

The responsible for the data leakage first contacted Motherboard to share the precious archive.

Each record of the DHS Staff Directory includes name, title, email address, and phone number.

Going deep in the archive it is possible to note that it includes information of DHS security specialists, program analysts, InfoSec and IT and also 100 employees with a title “Intelligence”.

The same Twitter account has announced later the imminent release of an additional data dump containing 20,000 FBI employees.

DHS firewall

Are the records authentic?

Motherboard that obtained the archive reached the operations center of the FBI, and in one case the individual who pick up the phone presented himself with the same name associated with that number in the archive. A similar circumstance occurred with a DHS employee, Motherboard so confirmed that the information is legit.

Which is the source of data?

According to Motherboard, a hacker accessed an employee’s email account at the Department of Justice. As proof, the hacker sent the email message to Motherboard’s contributor Joseph Cox directly from the compromised account.

“A hacker, who wishes to remain anonymous, plans to dump the apparent names, job titles, email addresses and phone numbers of over 20,000 supposed Federal Bureau of Investigation (FBI) employees, as well as over 9,000 alleged Department of Homeland Security (DHS) employees, Motherboard has learned.” wrote Cox in a blog post.

“The hacker also claims to have downloaded hundreds of gigabytes of data from a Department of Justice (DOJ) computer, although that data has not been published.”

The hacker first tried to use the compromised credentials to access a DOJ staff portal, but without success, then he called the department directly and obtained the access through social engineering techniques.

The hacker accessed the DoJ intranet where the database is hosted, then he downloaded around the, out of 1TB that he had access to.

“I HAD access to it, I couldn’t take all of the 1TB,” the hacker told to MotherBoard.

The hackers confirmed his intention to release the rest of the data in the near future.Which is the motivation behind the attack?

It is not clear at the moment why the hacker released the archive, surely it’s not financially motivated. The hacker only left the following message when has leaked the data-

“This is for Palestine, Ramallah, West Bank, Gaza, This is for the child that is searching for an answer…” which are the verses of “Long Live Palestine”

The only certainty right now is that similar incidents are becoming too frequent, apparently the government staff is not properly trained on the main cyber threats or the hacking technique. Similar incidents show the lack of knowledge on the most basic security measures.
Whenever a hacker leaks so sensitive data, I think the number of his peers who had access to the same information with the intent to use them in other attacks or resell them, perhaps to a foreign government.

Pierluigi Paganini

*** As a reminder, in 2014 a much more dangerous hack intrusion happened at the DHS:

The Department of Homeland Security (DHS) alerted critical infrastructure operators to recent breaches within the sector – including the hack of a U.S. public utility that was vulnerable to brute-force attacks.

This week, the Industrial Control Systems Cyber Emergency Response Team (ICS-CERT), a subgroup of DHS, revealed information about the incidents in a newsletter (PDF).

According to ICS-CERT, industrial control systems were compromised in two, new incidents: one, involving the hack of an unnamed public utility, and another scenario where a control system server was remotely accessed by a “sophisticated threat actor.”

After investigating the public utility hack, ICS-CERT found that the system’s authentication mechanism was susceptible to brute-force attacks – where saboteurs routinely run through a list of passwords or characters to gain access to targeted systems. The control system used a simple password mechanism, the newsletter revealed.

In