خياران متصادمان في العراق: الدولة/ اللادولة وأميركا/ اللاأميركا

أكتوبر 7, 2019

د. عصام نعمان

الصراع في العراق وعليه ليس في الشارع وحسب بل بين أهل السلطة ايضاً. في الشارع، لم يكن للمتظاهرين قائد. في أروقة السلطة ثمة قادة كثر من دون ان يكون اولٌ بينهم. انها ظاهرة فريدة وغير مسبوقة.

المتظاهرون كان لهم دعاة لا قادة. كانت ثمة دعوة للتظاهر تداولتها وسائل التواصل الإجتماعي وفعلت فعلها بسرعة قياسية. الناشطون في الشارع اطلقوا شعاراً لافتاً: لا للسياسيين، لا للمعمَمين . مطلقو الشعار لم يحددوا هوية معيّنة للسياسيين والمعمَمين المطلوب إستبعادهم. ذلك سمح للمراقب الحصيف باستنتاج سريع: المتظاهرون يعارضون، وربما يعادون، كل المسؤولين الناشطين في المشهد السياسي منذ احتلال أميركا للعراق سنة 2003.

ثمة دليل على صحة هذا الإستنتاج: لم يَسْلَم من التخريب مقرّ ايّ حزب او تنظيم مشارك في السلطة في مناطق عدّة من البلاد. ربما لهذا السبب امتنعت المرجعية الدينية العليا ممثلةً بآية الله العظمى السيد علي السيستاني في الايام الثلاثة الاولى للحراك الشعبي عن التعليق على ما رافقه من حوادث واحداث.

الى ذلك ثمة ظاهرات اخرى استوقفت المراقبين:

أكثف التظاهرات كانت في مدن الجنوب الشيعي الكبرى: البصرة والنجف وكربلاء والناصرية، ناهيك عن الحلّة في الوسط.

امتناع التيار الصدري، بقيادة السيد مقتدى الصدر، عن المشاركة في التظاهرات. إلاّ ان الصدر طوّر قراره لاحقاً بإعلانه سحب كتلته، سائرون ، من البرلمان ومطالبته الحكومة بالإستقالة وإجراء انتخابات نيابية مبكرة.

معظم الاحزاب ايّد، بادئ الأمر، مطالب المتظاهرين إلاّ ان عمار الحكيم، زعيم تيار الحكمة، ورئيس الوزراء السابق حيدر العبادي حزب الدعوة سارعا لاحقاً الى تأييد مقتدى الصدر في دعوته الحكومة الى الاستقالة وإجراء انتخابات.

حتى رئيس الوزراء عادل عبد المهدي – ابن الناصرية – ايّد مطالب المتظاهرين، وحرص على القول بأنّ البلاد تقف امام خيارين: الدولة او اللادولة . في مفهومه، الدولةُ تعني الأمن والنظام كما تعني ايضاً الفئة الحاكمة التي تقبض على ناصية السلطة.

معظم المتظاهرين وضعوا اهل النظام كلهم في سلة واحدة وطالبوا بإسقاطهم. أقسى التهم الموجهة اليهم واكثرها رواجاً هي الفساد والسطو على المال العام. لعل احداً لا يجادلهم بأن الفساد في العراق سلطان. ثمة تقارير رسمية تكشف انه، منذ إسقاط نظام صدام حسين بفعل الإحتلال الأميركي، ابتلع الفساد نحو 450 مليار دولار من الأموال العامة، ايّ أربعة اضعاف ميزانية الدولة وأكثر من ضعفيّ الناتج المحلي الإجمالي للبلاد. مفكر وباحث عراقي يساري رصين من اهل النجف اكّد لي انّ دخل العراق من النفط منذ 2004 فصاعداً تجاوز مبلغ تريليون ألف مليون دولار، ومع ذلك لا اثر لمردود مجزٍ لهذا الدخل في ايٍّ من ميادين الصناعة او الزراعة او الخدمات العامة، اذ ما زالت مناطق عدّة في البلاد بلا كهرباء وبلا مياه نظيفة للشرب، وما زال اكثر من 30 في المئة من الشباب عاطلين عن العمل، واكثر من 25 في المئة من العراقيين تحت خط الفقر.

اذ يتضح عداء الشعب العراقي، في معظمه، لأميركا وما جرّته على البلاد منذ احتلالها من ويلات، استوقفت المراقبين فورة الغضب التي تبدّت في تظاهراتٍ عمّت مدن الجنوب الشيعية ما يحمل على التساؤل عمّا اذا كانت هذه الغضبة تطال ايضاً إيران والاحزاب التي تدعم انصارها في السلطة. في هذا السياق، أشار مراقبون الى أحزابٍ معادية لأميركا والسعودية اكدت ثبوت قيام موظفي السفارة الأميركية في بغداد بتحريض منظمات المجتمع المدني المدعومة من قبلها على المشاركة في التظاهرات وإطلاق شعارات ضد إيران وضد حكومة عبد المهدي.

الحقيقة ان ثمة اختلافاً وانزعاجاً متبادلين بين أميركا وعادل عبد المهدي سببهما خطوات خمسة اعتبرتها واشنطن استفزازية اتخذها الرجل وحكومته في الآونة الأخيرة تتمحور حول امورٍ خمسة:

اولاها، زيارته الصين منتصفَ الشهر الماضي وتوقيعه اتفاقات معها لبناء وتطوير بنى تحتية عراقية.

ثانيها، تنديده بـ صفقة القرن واتهامه إسرائيل بالوقوف وراء استهداف عدد من مقار الحشد الشعبي خلال شهريّ تموز/ يوليو وآب/ اغسطس الماضيين.

ثالثها، قيامه بتوقيع اتفاقيات مع شركة سيمنس الالمانية لتطوير قطاع الطاقة الكهربائية، مستبعداً بذلك شركة جنرال الكتريك الأميركية.

رابعها، توجهه الى روسيا لشراء منظومات دفاع جوي من طـراز أس 400 بعد اتهامه إسرائيل بإستهداف مقار الحشد الشعبي .

خامسها، قيامه بكسر اكبر المحظورات الأميركيـة وهو إفتتاح معبر القائم – البوكمال الحدودي مع سورية، معبّداً بذلك طريق طهران بغداد دمشق – بيروت ما يدعم لوجستياً قوى المقاومة العربية الناشطة ضد إسرائيل .

التطور الأهم تخلّي المرجعية الدينية العليا عن موقف الصمت. آية الله السيستاني أصدر بياناً أيّد فيه مطالب المتظاهرين المحقة ودعا الحكومة الى استجابتها بلا إبطاء، مؤكداً على وجوب تأليف لجنة خاصة من خبراء اختصاصيين من خارج الحكومة وخارج محيط الاحزاب المؤيدة لها مهمتها درس الاوضاع الإقتصادية والإجتماعية وتحديد مفاصل الاصلاح الشامل ومتطلبات مكافحة الفساد. عادل عبد المهدي سارع الى تأييد موقف السيستاني ومطالبه والإشادة بمرجعيته كصمام امان للبلاد.

إذ حدّد السيستاني لأهل السلطة طريق الخروج من الأزمة التي عصفت بالبلاد وهدّدت الدولة الهشة بالإنهيار، فإنّ عبد المهدي أدرك بلا شك أنّ ما حدث هو حصيلة سنوات طويلة من صراعات اهل السلطة أنفسهم الذين عاد معظمهم بمواكبة الأميركيين مع احتلال البلاد، وان تهافتهم على إحتلاب مواردها وتقاسم خيراتها أنهك بنيتها الاجتماعية ومؤسساتها الاقتصادية، وأغرى قوى خارجية متعددة بإبتزازها واتخاذها ساحة لتصفية حسابات اقليمية ودولية. ولا يفوت عبد المهدي ايضاً الإدراك بأنّ القوتيّن الابرز في الصراع داخل العراق وفي الاقليم هما الولايات المتحدة وإيران، وانّ تداعيات الصراع بينهما وتكالب أهل السلطة على المال والنفوذ وضع البلاد أمام خيارات متصادمة، وانّ شراسة ادارة ترامب، ومن ورائها إسرائيل ، في مواجهة إيران مداورةً بمحاصرتها اقتصادياً، ومباشرةً بالضرب في عمق حلفائها الأقربين سورية والمقاومات اللبنانية والفلسطينية والعراقية دفع الى واجهة الصراع خياراً إضافياً لعله الأكثر إلحاحاً وأهمية هو وجوب بناء عراق بلا أميركا بعدما تمكّن العراقيون الأحرار، او كادوا، من تحرير العراق من الإرهاب والإرهابيين.

اجل، المطلوب من أحرار العراق اعتماد خيارين متكاملين: الدولة القوية الديمقراطية، وعراق متحرر من أميركا المستبطنة دائماً عدوانية صهيونية فاجرة، ومتحرر من مخططات ومطامع اقليمية ماثلة.

Related Videos

Related Articles

Advertisements

الإعدام للعملاء… ولكشف مَن يسوّق لهم

سبتمبر 13, 2019

ناصر قنديل

– تسقط السياسة عند أبواب الوطن، وتنتهي المجاملة وحملات العلاقات العامة عند دماء الشهداء. والعمالة لن تتحوّل إلى وجهة نظر. وما جرى في قضية تسهيل عودة جزار الخيام وجلاد المعتقل العميل الذي لا تزال صرخات الأسى ودماؤهم وأمراضهم وإعاقاتهم، شواهد على أفعاله، ليس مجرد خلل إداري بل هو عمل سياسي أمني خطير يكشف الوضع الهشّ للتعامل القضائي والأمني مع ملف العملاء، وسهولة التلاعب به، والنفاذ من بين ثقوب اللعبة السخيفة للطائفية المريضة، لجعله قابلاً للتساكن. وهذا ببساطة لن يحدث، لأن تلكؤ الدولة عن واجباتها سيعني شيئاً واحداً، أن تتشكل فرق الموت لملاحقة العملاء كما حدث في فرنسا بعد تحرّرها من النازيين قبل أن تتولى المحاكم القيام بواجبها. ومَن يريد أن تكون الدولة مرجعاً حصرياً للعقاب يجب أن يأخذ ذلك في الاعتبار.

عرض الصورة على تويتر

– القضية الآن في عهدة القضاء العسكري، الذي يستعدّ لتوجيه الاتهامات المناسبة للعميل عامر إلياس فاخوري، وستكون عيون الناس مفتوحة على كل تفصيل في القضية، وسيكون أهل المقاومة وأسراها المحررون مجندين قانونياً وإعلامياً كي لا تسهو عين عن سانحة، وصولاً للحكم العادل الذي لا يجب أن يكون دون الإعدام. فهذا العميل مجرم قاتل، سقط على يديه عشرات الأسرى مضرَجين بدمائهم، منهم مَن استشهد ومنهم من لا يزال يحمل ندوب جراحاته. والدعوة مفتوحة لمئات المحامين للتطوع للمرافعة في القضية التي يجب أن تشكل دعاوى مئات وآلاف الأسرى المحررين وأسر الشهداء منهم موضوعاً لها، والدعوة لكل الأحزاب والشخصيات المؤمنة بلبنان وطناً لا مكان فيه للعدو وعملائه للاستنفار لتصويب مسار الأداء القضائي والأمني الذي تقف وراء سقطاته السياسة بكل وضوح، لكشف الجهة التي حضرت ورتبت وسوقت لهذا الاختراق القذر والقبيح لصورتنا كوطن ودولة.

– الفارق كبير بين الحديث عن مبادرات لاستعادة الأسر التي فرت إلى فلسطين المحتلة خلال التحرير لاعتبار الخوف من حسابات طائفية، أو بعض الذين كانوا مجنّدين في جيش العملاء وليس في سجلهم ارتكابات، وبين الدعوة للصفح عن القتلة المأجورين من العملاء وعلى رأسهم جلاد سجن الخيام وجزار غرف التعذيب فيه، ومَن مثله من المرتكبين الذين لا يملك أحد لا في السياسة ولا في القانون حق الدعوة لاعتبار تجاهل تاريخهم، دعوة مشروعة تحت شعار استعادة الإبن الضال، أو منح فرصة ثانية للمخطئين، أو التلطي وراء قناع الطائفية والحديث عن الوحدة الوطنية في سياق تبرير العمالة وتقديمها كخطأ عابر، أو زلة قدم، أو تعبيراً عن انقسام أهلي. فالعمالة في عرف الوطن والقانون هي العمالة وليست لها شفاعة، لا طائفية ولا سياسية ولا حزبية ولا عائلية.

عرض الصورة على تويتر

– ما جرى خطير وخطير جداً، ولا يكفي لمسح سواده السير بمحاكمة الجلاد والجزار عامر فاخوري، فالمطلوب حملة متواصلة متصاعدة لكشف المستور في قضيته وجعل الحقيقة ملكاً للرأي العام، وجعل المحاكمة العلنية لهذا الخائن عبرة لسواه، تحت شعار الإعدام أقل القصاص للقتلة الذين باعوا وطنهم للعدو. ويبقى أن الأهم أن تصل بنا هذه الحملة لتأديب وردع من يظنّ أن هناك تبييضاً للعمالة، يشبه تبييض الأموال، ويمكن تمريره في ظل المنظومة الإجرامية المسماة قلب المفاهيم حيث يعاقب المقاومون بتهم الإرهاب والتبييض ويتم عبره تبييض صفحات العملاء.

Related Videos

Related Articles

Kidnapping as a tool of imperial statecraft?

Kidnapping as a tool of imperial statecraft?

September 06, 2019

[This column was written for the Unz Review]

There is nothing new about empires taking hostages and using them to put pressure on whatever rebel group needs to reminded “who is boss”. The recent arrest in Italy of Alexander Korshunov, the director for business development at Russia’s United Engine Corporation (UEC), is really nothing new but just the latest in a long string of kidnappings. And, as I already mentioned in distant 2017, that kind of thuggery is not a sign of strength but, in fact, a sign of weakness. Remember Michael Ledeen’s immortal words about how “”Every ten years or so, the United States needs to pick up some small crappy little country and throw it against the wall, just to show the world we mean business“? Well, you could say that this latest spat of kidnappings is indicative of the same mindset and goal, just on a much smaller, individual, scale. And, finally, it ain’t just Russia, we all know about the kidnapping of Huawei’s CFO Meng Wanzhou by the Canadian authorities.

By the way, you might wonder how can I speak of “kidnapping” when, in reality, these were legal arrests made by the legitimate authorities of the countries in which these arrests were made? Simple! As I mentioned last weekwords matter and to speak of an “arrest” in this case wrongly suggest that 1) some crime was committed (when in reality there is ZERO evidence of that, hence the talk of “conspiracy” to do something illegal) 2) that this crime was investigated and that the authorities have gathered enough evidence to justify an arrest and 3) that the accused will have a fair trial. None of that applies to the cases of Viktor BoutKonstantin IaroshenkoMarina Butina or, for that matter, Meng Wanzhou or Wang Weijing. The truth is that these so-called “arrests” are simple kidnappings, the goal is hostage taking with the goal to either 1) try to force Russia (and China) to yield to US demands or 2) try to “get back” at Russia (and China) following some humiliating climb down by the US Administration (this was also the real reason behind the uncivilized seizure of Russian diplomatic buildings in the USA).

This is not unlike what the Gestapo and the SS liked to do during WWII and their kidnapping of hostages was also called “arrest” by the then state propaganda machine. By the way, the Bolsheviks also did a lot of that during the civil war, but on a much larger scale. In reality, both in the case of the Nazi authorities and in the case of the imperial USA, as soon as a person is arrested he/she is subjected to solitary confinement and other forms of psychological torture (Manning or Assange anybody?!) in order to either make them break or to at least show Russia and China that the US, being the World Hegemon gets to seize anybody worldwide, be it by a CIA kidnapping team or by using local colonial law enforcement authorities (aka local police forces).

US politicians love to “send messages” and this metaphor is used on a daily basis by US officials in all sorts of circumstances. Here the message is simple: we can do whatever the hell we want, and there ain’t nothing you can do about it!

But is that last statement really true?

Well, in order to reply to this we should look at the basic options available to Russia (this also applies to China, but here I want to focus on the Russian side of the issue). I guess the basic list of options is pretty straightforward:

Frankly, in the case of the USA, options one and two are useless: the AngloZionist leaders have long given up any hope of not being hated and despised by 99% of mankind and they have long dropped any pretense of legality, nevermind morality: they don’t give a damn what anybody thinks. Their main concern is to conceal their immense weakness, but they fail to do so time and time again. Truly, when wannabe “empires” can’t even bring an extremely weakened country such as Venezuela to heel, there ain’t much they can do to boot their credibility. If anything, this thuggery is nothing more than the evidence of a mind-blowing weakness of the Empire.

But that weakness in no way implies that Russia and China have good options. Sadly, they don’t.

Russia can engage in various types of sanctions, ranging from the petty bureaucratic harassment of US representations, diplomats, businessmen and the like to economic and political retaliations. But let’s not kid ourselves, there is very little Russia can do to seriously hurt the USA with such retaliations. Many would advocate retaliation in kind, but that poses a double problem for the Kremlin:

  • Once a country has gone down the road of illegal brute force, there is no way back. The examples of the US, Israel or, for that matter, the Ukraine show that once primitive thuggery becomes part of your political arsenal you will forever remain a thug and everybody will see this (whether everybody will have the courage to openly state this is a different issue altogether).
  • The reality is that double and triple standards have long become the essential key feature of all western ideological systems, from the Papacy to modern capitalism. The Kremlin fully understands that in the AngloZionist Empire “some are more equal than others” and that that which is “allowed” to the World Hegemon is categorically forbidden to everybody else. Thus if Russia retaliates in kind, there will be an explosion of hysterical protests not only by the western legacy corporate and state ziomedia, but also from the 5th columnist in the Russian “liberal” press.

And yes, unlike the USA, Russia does have a vibrant, diverse and pluralistic media and each time when Putin agrees to a press conference (especially one several hours long) he knows that he will be asked the tough, unpleasant, questions. But since he, unlike most western leaders, can intelligently answer them he does not fear them. As for Dmitrii Peskov and Maria Zakharova, they have heard it all a gazillion during the past years, including often the most ridiculously biased, mis-informed and outright ridiculous “questions” (accusations, really) from the western presstitute corps in Russia.

So yes, Russia could, in theory, retaliate by arresting US citizens in Russia (or by staging Cold War type provocations) or by kidnapping them abroad (Russia does have special forces trained for this kind of operation). But this is most unlikely to yield any meaningful results and it would create a PR nightmare for the Kremlin.

The truth is that in most of these cases we always come down to the fundamental dichotomy: on one hand we have a rogue state gone bonkers with imperial hubris, arrogance and crass ignorance (say, the USA and/or Israel) while on the other we have states which try to uphold a civilized international order (Russia, China, Iran, etc.). This is by logical necessity a lop-sided struggle in which the thugs will almost always have the advantage.

[Sidebar: here I want to address a logical fallacy which I regularly hear in the West: when one political system proves stronger, or more capable of survival, than another one, this supposedly proves that the stronger state is also somehow “superior”. This is the argument used by those who claim that the Soviet Union “lost the Cold War” and that “Capitalism has proven much more sustainable/efficient than Communism”. This is utter nonsense for at least two reasons: first, the USSR did not “lose” the Cold War – the CPSU and the Soviet ruling Nomenklatura decided to break-up the USSR (against the will of the people!) and, second, the fact is that the Soviet Union was squandering its wealth all over the planet while the USA was robbing the entire planet blind. How can we compare the two? Finally, allow me this metaphor to make my point: if we would lock up a human being and a hyena in a small empty cell to see who will survive we can be pretty darn sure that the hyena will immediately and very “effectively” kill the human and eat him. Does that “victory” somehow prove the hyena’s “superiority”? Of course not! For one thing, capitalism implies infinite growth in a finite environment, which is exactly what a malignant tumor does for a living and which is self-evidently non-sustainable. So are we going to compare one political system – Communism – which does not rely on growth and which is therefore sustainable, and which spread its wealth all over the planet with one based on (international) “highway robbery” (don’t take my word for it, take it from Paul Craig Roberts himself who unambiguously stated recently that “American Capitalism is Based on Plunder”). Yes, the Soviet system was fundamentally rotten, profoundly dysfunctional and ineffective (only imbeciles or ignoramuses would deny that!), but it was not in any way “defeated” by the West nor is Capitalism any “better” or “superior” (whatever you want that to mean) than Communism (more on this here if you are interested).]

For all these reasons, there is really nothing much Russia (or China) can do about this situation besides publishing an official warning to the Russian people saying that if they travel abroad they should realize that “US intelligence agencies continue their current hunt for Russians around the world”. They also made public the list of countries which have extradition treaties with the USA: Australia, Austria, Albania, Antigua and Barbuda, Argentina, Bahamas, Barbados, Belize, Belgium, Bulgaria, Bolivia, Brazil, United Kingdom, Hungary, Canada, Colombia, Congo, Costa Rica, Cuba, Dominican Republic, Denmark, Dominican Republic, Egypt, Dominica, Greece, Guyana, Haiti, Guatemala, Germany, Honduras, Greece, Israel, India, Jordan, Iraq, Ireland, Iceland, Italy, Kenya, Latvia, Lesotho, Liberia, Lithuania, Venezuela, Zambia, Zimbabwe, Liechtenstein, Luxembourg, Malawi, Malaysia, Malta, Mauritius, Marshall Islands, Mexico, Micronesia, Monaco, Myanmar, Nauru, Nigeria, Netherlands, Nicaragua, new Zealand, Norway, Pakistan, Palau, Panama, Papua New Guinea, Paraguay, Peru, Poland, Portugal, Romania, El Salvador, San Marino, Swaziland, Seychelles, Saint Vincent and the Grenadines, Saint Lucia, Singapore, Slovakia, Slovenia, Solomon Islands, Suriname, Sierra Leone, Thailand, Tanzania, Tonga, Trinidad and Tobago, Tuvalu, Turkey, Uruguay, Philippines, Finland, France, Czech Republic, Chile, Switzerland, Sweden, Sri Lanka, Ecuador, Estonia, South Africa, South Korea, Jamaica and Japan.

The MoFA concluded by warning that “The Russian foreign Ministry strongly urges all Russian citizens planning trips abroad to carefully weigh all the risks, especially if there is reason to assume the possibility of claims against them by American law enforcement agencies”.

Some caveat emptor before buying your airline ticket, right?!

Conclusion: it will get a lot worse before it gets better

First, we need to always remember that kidnappings are just the latest manifestation of an overall pattern of thuggery by the USA. The attitude is pervasive, and US citizens are not free of this climate of thuggery. Another good example are the outright bribes offered to the ships captains of Iran, to sail their crude carriers to somewhere were the US can literally pirate the carrier. Remember the amazing confession by Pompeo himself:

We lied, we cheated, we stole…. it reminds you of the glory of the American experiment”?

You don’t?

Then here is a quick refresher:

It can almost be rewritten and expanded like this:

We lie, we cheat, we steal, we kidnap, we bribe, we extort, we pirate, then we threaten, and then we tell everyone how exceptionally morally superior we are.

Yet a certain limit has been crossed. It is as if their own belief in their own moral superiority has inverted to the extent that their own moral superiority is so big, and so certain, that any small actions of thuggery is allowed to them. This will not change any time soon and even the most innocent traveler must have awareness of this. This is why the Chinese are now openly wondering if sending Chinese students to the USA is such a good idea after all.

So the first thing we have to accept is that this pattern of thuggery will not stop, if anything – it will expand.

Second, we have to also realize that there are no good options for the Russians or the Chinese. In fact, this is normal: civilized actors often find themselves “out-gunned”, so to speak, by thugs, sociopaths and criminals. Over time, however, thuggery is always self-defeating because it is inevitably linked to a delusion of impunity. As for civilized states, while it is true that they are at a fundamental disadvantage when faced by uncivilized thugs but, again, over time they eventually prevail if only because everybody always ends up fed up and disgusted with the thugs. Finally, while thuggery can seem attractive to people with sociopathic inclinations, most human beings need a higher ideal than just unbridled consumption to inspire them. Communism had (and I would argue, still has) this ability. Capitalism does not.

For the foreseeable future, however, we can only expect more of the same. Thanks to the ceaseless efforts of Obama and Trump the Empire is collapsing even faster than it normally would and we can expect that the current sequence of humiliating defeats for the USA (and, of course, Israel which has its own humiliating wounds to lick!) will continue and that the USA (and, of course, Israel!) will have to find more small targets (be it kidnapped Russian nationals or empty buildings in Syria) to kidnap or destroy and feel powerful again.

This will be revolting, disgusting and simply plain stupid.

But there is nothing Russia (or China) can do to stop it, at least not for the foreseeable future.

The Saker

بين حروب الكلام… وقوانين الحرب

Image result for Avivim strike

سبتمبر 4, 2019

ناصر قنديل

بين حروب الكلام… وقوانين الحرب

– حجم التهالك الذي يعيشه الحلف الذي تقوده واشنطن، ويشكل كيان الاحتلال عموده الفقري ورأس حربته، وعنوان قوته، وقدرة ردعه، بلغ حداً صارت الحروب عند كلمنجية العرب في السياسة والإعلام، حروب كلام، ولعبة خداع بصري، وذكاء اصطناعي. ففي مرحلة سبقت الحشود الأميركية في الخليج، كان كل الحشد الكتابي والكلامي والخطابي يجري تحت عنوان، الويل والثبور وعظائم الأمور، وها هي إيران تواجه ساعة الحقيقة والعقاب آتٍ، والحشود العسكرية تأتي للحرب أو للتلويح بالحرب، وهذا هو الردع. ولكن إيران لم تمتثل ولم تفت في عضدها لا الحشود الحربية ولا التهديدات، ووقعت أول مواجهة وأسقطت إيران أهم الطائرات الأميركية في العالم، وصمتت واشنطن وهربت من المواجهة، وبدأت تتحدّث عن استفزاز إيراني لجرها إلى حرب لا تريدها، دون أن تفسر إذن لماذا جاءت بالحشود. ثم تفتقت عبقرية الكلمنجية عن تسخيف إسقاط الطائرة، والبعض قال إنها خدعة أميركية لكشف الدفاعات الإيرانية، ومعلمهم دونالد ترامب قال إنه خشي من الرد على الضربة لأنها ستزهق أرواح مدنيين.

– في تداعيات ما فعله جيش الاحتلال عبر العدوان المزدوج في سورية ولبنان، وأسفر عن شهيدين للمقاومة، وخرق عدواني للأجواء اللبنانية، وإعلان المقاومة عزمها على الرد، عادت حشود الكلمنجية لصف الحكي، واجترار الكلام ذاته، لبنان معرض للدمار بسبب مغامرات حزب الله، أو حزب الله لن يجرؤ على الرد لأن إيران في حال مفاوضات، أو خطر الحرب وشيك وخطير وكبير، أو أن حزب الله كما محور المقاومة يكثرون الكلام عن حق الرد، ولكنهم يحتفظون به في ثلاجة مبردة طويلة الأمد، لكن ماذا حدث عندما وقع رد المقاومة بما فيه من جديد نوعي يتمثل باستهداف موقع للاحتلال في فلسطين المحتلة عام 48، وتهرب جيش الاحتلال من الرد، مكتفياً بقذائف القشرة كتقليد عسكري لكل الجيوش بعد كل تعرض للاستهداف لا يعتبر رداً، الذي حدث أن كيان الاحتلال انكفأ تحو حرب الكلام، ومن ورائه هبت حشود الكلام، تارة تسخف العملية، وتنسى أنه لو أطلقت طلقة عبر الحدود، وخصوصاً نحو فلسطين المحتلة عام 48 قبل سنوات أو من غير حدود لبنان لخاض كيان الاحتلال حرباً. وكما أغرقوا الناس بطوفان من الشائعات والفبركات بالتشكيك بكون الطائرتين للكيان وجيشه، صارت القضية عدم وقوع قتلى أو إصابات في جيش الاحتلال كما في الطائرة الأميركية في هرمز، لكن الحقيقة بقيت، أن الضربة التي تلقاها الأميركي والإسرائيلي قد أصابته في صميم قوة ردعه، لكنها رغم الألم أقل مخاطرة من الحرب، فيبحث عن ذريعة للهروب، الحقيقة التي باتت قانون حرب، هي أن واشنطن ومثلها تل أبيب تريدان الحرب على محور المقاومة ولكنهما تخشيانها، وأن محور المقاومة لا يريد هذه الحرب لكنه لا يخشاها.

– ببساطة الردع مهابة، وإعلان جهوزية لدخول الحرب عند مجرد تخطي الآخر الخطوط الحمراء، والهزيمة اختراع الذرائع والمبررات للتهرب من خوض حرب جرى التهديد بخوضها رغم دوس الآخر على الخطوط الحمراء، وثمة مهابة تتمرغ بالوحل ومهابة تعانق عنان السماء.

Related Videos

Related Articles

 

Aoun’s Adviser to Al-Ahed: ’Israel’ to Receive Strong Response

By Al-Ahed

Beirut – The Advisor of Political Affairs to the Lebanese President Pierre Raffoul told Al-Ahed News Website that President Michel Aoun’s decision to respond to “Israel” would be carried out despite those disapproving of it. He warned of a strong response to the latest “Israeli” aggression. The position of the president of the republic is clear in this regard.

“There are positions from those who claim to be sovereign and they do not even issue a statement of condemnation against ‘Israel’. On the contrary, they are attacking the sovereign decisions and protection of Lebanon,” Raffoul said. “We are preserving our dignity and our country. Anyone who opposes the decisions of the state that protect Lebanon and defends “Israel” in one form or another must be prosecuted. People who do not adopt a national position do not know the taste of freedom and sovereignty. Unfortunately, they only know how to be subordinate. ”

The president’s advisor for political affairs explains to Al-Ahed that “Israel has reached Dahiyeh [Beirut’s southern suburbs] and the Bekaa and attacked us, and we must preserve the sovereignty of Lebanon. There are some voices that must be tried because we are under ‘Israeli’ aggression and there are those who refuse to defend our homeland. This also happened during the July war when certain figures got involved and wanted the war to continue to eliminate the resistance.”

He stressed that today in Lebanon there is national unity. The three levels of leadership in the state want to defend Lebanon and protect its territory. He pointed out that “the position in the Council of Ministers is aligned with this direction.”

Raffoul praised the position of the Supreme Defense Council regarding the recent “Israeli” aggression against Lebanon, which he described as “a national and honorable position that can be relied on now and in the future to protect Lebanon.”

Related News

مَن هم أعداء الوطن؟

أغسطس 29, 2019

ناصر قنديل

– عندما يقول رئيس الجمهورية إن العدوان الإسرائيلي إعلان حرب، فهذا يعني أننا في حالة حرب. وعندما يقول رئيس الحكومة على طاولة مجلس الوزراء إننا في مواجهة عدوان وليس الأوان لسجالات مؤذية، فهذا يعني أن الوضع على درجة عالية من الوضوح وعلى درجة عالية من الخطورة، كي يلتقي رئيسا الجمهورية والحكومة بما يمثلان دستورياً وما يرمزان إليه من اختلاف في اللون السياسي، على تشخيص واحد دقيق هو درجة الخطورة ووضوح العدوان وإعلان الحرب. ولمثل هذه الحالات تمّ سن القوانين التي تتحدث عن تهوين الروح الوطنية وتوهينها، ببث الشائعات أو إطلاق المواقف المشككة التي تزعزع التماسك الداخلي وتفتح نقاشات وسجالات تعرف أن العدو يحتاجها للتعامل مع جبهة داخلية مفككة.

– لا يجوز الخضوع في مواجهة الذين يبيعون الوطن لأعدائه بداعي العمالة أو الأحقاد أو النفوس الصغيرة المناكفة، لابتزاز عنوانه التخوين، على قاعدة أنه لا يجوز تخوين أحد ويجب أخذ كل ما يُقال بصفته وجهة نظر وحق مشروع في التعبير عن الرأي، لأن الخضوع للابتزاز هنا يتم على حساب الوطن باسم الديمقراطية. ونحن لا ندعو إلى إجراء قانوني بحق هؤلاء، بل على الأقل إلى عدم منحهم شرف كونهم أصحاب رأي. فهم الطابور الخامس الذي تتحدّث عنه أدبيات الحروب، وهم حالة الإشغال الداخلي التي تتولى العمل خلف خطوطنا لحساب العدو. أدركوا ذلك بسبب عمالة بعضهم أم لم يدركوا بعدما أعماهم الحقد والكيد. فالواجب الوطني يقتضي فضح دورهم ورفض تسميته وجهة نظر وحق بإبداء الرأي.

– نحن لا نعلن حرباً كي يسألوا عن الممسك بقرار الحرب، بل نحن نمارس حق الدفاع بوجه عدوان، وأقلّ الخسائر في المواجهة التي أرادها العدو، هي أن لا يتولى الجيش الردّ، وهم لا يطالبون بأن يفعل الجيش ذلك بل يطلبون أن نمسح العدوان بجلدنا ونصمت بداعي العجز والخوف. والبديهي رفض مطلبهم بداعي الوطنية، كما البديهي طالما أن المقاومة كركن من أركان قوة لبنان هي المستهدفة فأقل الواجب الوطني أن يصطف اللبنانيون وراءها بتفويض وطني شامل يربك العدو، لتتولى الردّ الذي يعيد الأمور إلى نصابها ويمنع تغيير قواعد الاشتباك الذي يريده العدو، كما قال رئيس الحكومة.

– المشوّشون والمشككون اليوم، والمتبرّعون بالنق وقسمة الصفوف وزرع الوهن في النفوس، وتوهين الشعور الوطني والقومي، هم طابور خامس يجب عزله. والإشارة بالإصبع إليه، والقول له بواضح الكلام صفته الخبيثة بين عينيه، فذلك واجب وطني، وأن يعرف الناس اليوم وغداً وقبل الرد وبعده وما قد يترتب عليه، وما يستعدّ المتربّصون من هؤلاء للمتاجرة بالبكاء على الخسائر واستغلالها، لمواصلة المهمة المشبوهة. هؤلاء يجب أن يصنفوا اليوم كأعداء للوطن يراقب الناس كلماتهم وتصرفاتهم ويحسبونها ليحاسبوهم عليها، بعد النصر، ومنعهم من تصدّر الصفوف بين المهنئين مرة أخرى كما فعلوا عام 2000 بعد التحرير. وقد كانوا يشتمون المقاومة صبحاً ومساء ويشككون بوطنية شهدائها وتضحيات دمائها.. وفجأة قفزوا إلى مقدمة صفوف المهنئين يحاضرون في العفة.

Related Videos

Fifth Column الطابور الخامس

 

 

Related Articles

The Terrorists Among US- Cyber War and Privateers are the true Domestic Terrorists

August 14, 2019

by George Eliason for The Saker Blog

The Terrorists Among US- Cyber War and Privateers are the true Domestic Terrorists

What are Cyber Privateers and should you be afraid of them? Cyber privateers and cyber bounty hunters are criminals that are not covered under international law as government agents. In reality, this almost nullifies the chance for war to start over any particular hacking or compromised data event.

The problems hired or volunteer contractors create include a projectable legal attribution. You don’t have to be able to prove a country was behind a cyber attack or hack as long as you meet certain conditions. You can literally project the blame entirely to a different entity. The legal aspects will be covered in the next article.

It also nullifies the myth cyber privateers/ bounty hunters can use government tools on civilian or otherwise protected classes of people and infrastructure at will. International law doesn’t give people hired or volunteering to commit crimes under any auspices a free pass.

This is a new class of terrorism which separates a cowardly criminal element from the victim the same way a remotely detonated explosive would when used at a shopping mall. This criminal activity is spreading at a rate that raises alarm bells especially with the projection of 3 million untrained new hires over the next few years.

In the last article, I introduced you to Jimmy and Gary. After three difficult months of online Youtube training, both of our heroes were ready to take on careers as international men of mystery.

The absolute risk this presents to international peace and security should be obvious regardless of what accepted policy is. Everybody gets to spy or nobody gets to spy is the mantra this generation of Intel managers was brought along with. Most of the tools in the NSA arsenal have their start or at the very least a counterpart that is freeware.

Disgruntled people have access to software that can literally trigger a heart attack for someone with a pacemaker, cause a seizure, or even take control of your car.

More than 70 percent of the Pentagon’s Counterintelligence Field Activity: CIFA is staffed by green badge contractors. The majority of personnel at the DIA, the CIA National Clandestine Service, the National Counter Terrorism Center, and more than 80% of the NSA budget goes to private contractors.

All of the agencies are filled with what amounts to day labor. How many of them already have the keys to the barn that potentially starts the 4 Horsemen of the Apocalypse on their way?

State sized tools give emotionally inadequate and politically repulsive people the ability to illegally mimic or ply actions that are inherently governmental in nature. These same disgruntled overpaid groups fill out the do not fly lists. They are putting people on domestic terrorist watch lists. They are deplatforming journalists and people expressing opinions contrary to their employers and taking over social media and opinion for their employers.

The same groups are hacking websites and stealing financial account information. They gain access to bank accounts through phishing exploits and siphon your account dry. One group I am writing about did this to a family member of mine because of the exposure I’m giving. I’ll get back to that later in the series.

Over the last five years, I’ve not only described the role cyber privateers are playing in world affairs, but have been documenting the players and the damage they are causing.

This article will describe the now accepted US cyber policies that were written by cybercriminals to give themselves cover so they can use the American people and people of the world as their own personal cash cow or reservoir. If they don’t like you, no need to wonder who gets to pay for that.

The inherent problem with cyber privateers is covered in the job description as well as their rather fanciful notion they are anything but criminals.

Privateers operate as sanctioned pirates. These throwbacks pretend to operate like their 18th century inspirations did. Back in the day, the sponsor country allowed them to make money attacking merchant and military vessels they didn’t like but didn’t necessarily want a war with. When mistakes were made, privateers supposedly made reparations to the groups they victimized. They had to identify themselves and offer a remedy for damages.

The 2019 cyber privateer or bounty hunter is under no such compunction. They don’t identify themselves and their victims rarely know who hit them. In fact, when they do identify themselves, it’s just to gloat. They do it in a setting that implies the message that needs to get across without confessions that would hold up in a court.

If this sounds wordy, cutesy, or alarmist, private contractors have interrupted the power grid in Venezuela and hacked into Iran’s nuclear infrastructure. They are penetrating the power grid in Russia. This is an ongoing problem that’s exasperated by the fact legislators rely on the terrorists to draft the laws to protect them from everyone else.

Think of it this way, if Joey, going by the cool hacker name HedCh33z3, decides he doesn’t like Latvia, can he disrupt their electrical infrastructure, medical infrastructure, or elections?

The fact is they move in and out of government service so often, they never bother to switch hats or status. Think of it this way, Joey works for the NSA for a week under a subcontractor and picks up a ton of tools to stalk his Ex and sadistically destroy her life piece by piece.  This is what happens when people assume the right to government powers without the authority or responsibility to use them.

Are you willing to send your kid to war or go yourself because Joey HedCh33z3’s ex-girlfriend’s family thinks he’s a creep and they are from XXX country? Yet, we are now snugly very close to being put in this horrific position by politically and emotionally stunted people.

Privateers are Terrorists

So, where do they get the right to do this? Starting right after September 11, 2001, OSINT and cyber started as a serious money-making cottage industry. In the last article, we closed with the DOD actively hiring cyber Bounty Hunters to hack into foreign countries infrastructure.

This practice didn’t just start yesterday. Since 2001, there have been many attempts to codify US hiring of cyber privateers or bounty hunters into law. What this has done is enshrine it in US cyber-policy. The DOD use of subcontractors says a lot.

  • What are cyber bounty hunters and cyber privateers and what do they actually do?
  • Work with direct action military subcontractors
  • Work for NGOs, corporations, lobby groups
  • Work for US government agencies like the FBI, CIA, DIA, DOD, DNI
  • Work for political parties and causes
  • Work for foreign governments like Ukraine as shown in this series against the interests of the American people
  • Work for themselves

They provide Intel through OSINT and hacking. They provide direct action through hacking and Information Operations. Today, they are taking on inherently governmental responsibilities and making decisions they don’t have the authority to make and they make decisions that belong to State agencies.

  • Who is the enemy?
  • Who is friendly (or are there really any friends out there)?
  • Who is a danger and how?
  • Why are they a danger?
  • What is their motivation?
  • What steps will the US need to take to stop them, turn them in a different direction, or make peace with them?

One attempt to legalize this activity is called the Morgan Doctrine.

You’re aware that the U.S. Secretary of State is actually dumb enough to host her own email server. Even if you’re a third-world country without the infrastructure to create serious cyber attacks yourself, a few thousand dollars in Bitcoins to Hackers-R-US will get you zero-day exploits to crack just about any individual server. Either way, you’re going to OWN that server before the next national holiday (pick your country, pick your holiday).

The Morgan Doctrine states simply that if you attack my computers (or my banking assets held in US-based computers), then under a certain set of well-defined conditions, a licensed and bonded “cyber privateer” may attack you in your home country and split the proceeds with the U.S. government…You raid our bank accounts, we raid yours. You make money from off-shore child pornography, we’re going to loot your bank accounts and, with some REALLY creative black hat operations, you will be taken off the grid worldwide to the extent that you’ll not even complete a cell phone conversation for the remainder of your miserable depraved life.- The Morgan Doctrine

Who decides what is right, legal, or legally binding? Is it right when someone who gets paid to find you and accuse you also makes his money from destroying your life and reputation, or directly by stealing money directly from you?

According to the Morgan doctrine blogger who does this kind of work for Oracle, Salesforce.com, BIGFIX, and other technology companies, the answer is a big yes.

The USA followed by Ukraine makes up the highest percentage of over 50,000 readers which reflects the numbers the Ukrainian Diaspora hired to create the illusion of Russian aggression in Ukraine and the 2016 election interference meme. This is a serious attempt to push legislators for legal cover for what is accepted at the policy level.

Let’s spell this out. If a cyber bounty hunter or cyber privateer say you work for Russia while they work against Russia, according to this, you picked your side in the war they get paid to fight. It doesn’t matter if you don’t know you’re in one.

When they work for NGOs, foreign governments, political parties, and companies, they are given cover. They found out along the way they are entitled to your bank account as part of their payment as well as the joy of ruining your life every way they can. It means no more than a video game to them.

In the private sector they now illegally, harass, stalk, and locate people with no legal justification. They are trying to facilitate renditions and executions. Let’s be clear, these are your neighbors doing this to your neighbors.

Aric Toler and Bellingcat helped set up the functionality of Ukraine’s hit for hire website Myrotvorets (peacemaker). The only goal of the site is to publish personal and contact information of anyone they consider standing against Ukrainian nationalism so they can be dealt with by private parties.

toler go get him.JPG

The above clipped from Christelle Neant’s article should be clear enough to understand on its own and she asks the right questions. Bellingcat’s work with privateer groups has included trying to leverage their collective expertise and locate and rendition me.

Almost every time I’ve been threatened by Ukraine, it’s an American collaborator making the threat for them. The linked article shows one such person who also designed Ukraine’s Information Policy. He also wrote the policy paper for the US government’s cyber policy.

The people that testify for the US Congress on cyber and OSINT are the same people doing these things. They are training and setting up groups in multiple countries and under different auspices.

More than one of them trained the full spectrum of alphabet agencies. CIA, NSA, DIA, FBI, DNI, DOD, and we can keep going across the board.

They were behind setting up the policy that guided the Tallinn Manual defining cyberwar and international law. We’ll be opening that up within a couple of articles.

As a testament of their cyber mojo, they spent the last few years collectively trying to locate someone who didn’t change locations often and used normal communications and social media. I publish articles in 5 or 6 publications regularly. I have 4 or 5 different social platform accounts.

helfire missile targeter.jpg

They couldn’t figure out that I was where I said I was for the last 5 years. This spring I wrote a Victory Day article with local video and interviews. Even though I clearly showed my location, they still weren’t too sure.

The one thing you can say about them and their ally Bellingcat is they are consistent. Consistently wrong that is. In Ukraine, Bellingcat’s chief source of Intel is Ukrainian Intelligence. This includes the Ukrainian State hackers that contacted me after my sister was hacked. Journalism from the Donbass side of the contact line is a crime against Ukrainian sensibilities.

This group supplies Intel to NATO and individual EU countries and makes the rounds in Congress. Bellingcat’s work in Syria is chiefly supplied by the other side of Bellingcat’s Intel fabricators who also work for Ukraine.

We now have Americans working with foreign Intel stalking Americans and foreign citizens/ journalists for foreign countries they know will be tortured and killed. This clearly falls under terrorist activity.

One side of the group that works for Ukrainian Intel contacted me for the first time the day after the bank account was hacked and cleaned out using the hacker’s preferred method. What was the reason for the sudden communication? He wanted me to know how smart he really was.

Yet, these same so-called super spies claim to be able to find information about things people are actively trying to hide like weapons systems, motive. Most of the time they don’t speak the language of the country they claim to have expertise for. They decide guilt even though reality shows they aren’t able to actually do the job. Strange, isn’t it?

It was US policy to make them extra-legal but not illegal in the US after 9-11. Congress worked with these groups to write laws that refuse to criminalize what they do when it’s done on citizens. In fact, it no longer matters which side of the spectrum holds the reins, they feel empowered and will continue to do so until laws are written regulating their industry.

Over the last articles, I developed a slow-burn look into the world of the private spy. The idea that in less than 4 years the industry wants to hire 3 million unlicensed, unbonded, and untrained experts to work both government and corporate Intel and spy gigs should scare the hell out of you.

Can you give me a reason why the US which already collects and analyzes every piece of data on the internet needs so many more of what amounts to interns working with state sized software packages?

That’s 82 US citizens per new hire private sector OSINT agent. They have to literally spend 4 days on each person they investigate (82 per year including babies) just to get a full year’s worth of work because of the existing DNI, FBI, CIA, DIA, DOD OSINT agents have the rest of the world covered.

How serious is the information I’m providing? The EU Computer Emergency Response Team (CERT-EU) sent the articles to the EU institutions, agencies and bodies as well as outside governments and agencies. This means the EU has real concerns about the practice, laws, and policies allowing the practice because of the inherent damage so-called bit-players in private Intel and Information Operations (IO) can do at home and abroad not to mention diplomatically.

cert-eu for article.JPG

After you grasp the magnitude of the problem and begin unwinding the moving parts it can become manageable again through lawfare. Legal and societal protections you take for granted no matter where you live went out the window as soon as these practices became the norm.

Even from street level, people can make large sweeping changes to the world. Before you poo-poo, the idea, look at the CERT-EU screenshot again. I believe this can be done because I have already done it.

Towards the bottom of the article, we’ll get into the international policy for cyberwar and non-war situations. The same people that I’ve been writing about for the last 5 years exposing how they go after groups with protected status also wrote the policy for the US Government, all the agencies. While they didn’t write international policy directly, people they trained or work with closely did.

Four years ago, I exposed a flaw that exposes them to justice in the Tallinn Manual and threatened to pursue it. I did this because to win, I needed that gap closed. Tallinn is about applying the laws of war to cyber. It is something that otherwise would get no mention at all because it’s not considered a gap in any other context.

They closed that specific gap verbosely and gave me the opportunity to show how sordid this mess is. This also paves the way to provide a real resolution from private spies attacking civilians, social groups, political groups, journalists and other protected parties. Myrotvorets and Propornot should take note as should the other better and lesser-known companies and personalities.

No one has the right to use what they, themselves, rightfully label as Al Qaeda tactics on civilian populations, social activists, journalists, and other protected groups without assuming the legal definition of a terrorist, i.e. cyber terrorist.

Should lawfare (legal activism) fail to provide a remedy, the penalties for cyber assault (terrorism) and the right to a vigorous defense against perpetrators is what can make the laws change-FAST. Terrorism is terrorism is terrorism.

Once that fact is established anyone supporting them or hiring them in any way shape or form is guilty of material or direct support of terrorist activities against their own nation. Congressman, what say ye?

Law and policy makers fell in love with this power they never had before because it gives them the ability to shape policy they have no right to change for the sake of constituent and lobbyist cash and gift donations. They create loopholes in the cyber laws they write with the help of the companies and practitioners engaged in criminal behavior (under every other circumstance). Today, they hire the same criminals to help them with elections.  Oppo-research, reputation management, Information Operations, and even projecting their (congressman’s private) own foreign policy agenda into the international arena.

Imagine Congress asking a cybercriminal what kind of regulation or oversight their industry needed? What if Congress then asked the same societal deviants to write the laws that define the limit to what is legal they would agree to. Real criminals decided what the laws protecting their victims should be. They decided what the penalties should be if they got caught.

The tradeoff is this same Congress that was never allowed access to Top Secret information unless they have security clearance on their committee can get the actionable Intel before it’s marked “secret” if it’s gathered through OSINT by a private contractor working for US Intel agencies. That loophole makes it ok for anybody to move information before it’s been vetted and resell it.

Imagine these same legislators hiring you because you’re the expert they trust and they knowingly wink at the crimes you’re committing against your own people. They haven’t updated labeling the new twist on criminal law yet, and they won’t because you don’t want them to. And hardly anyone is referencing the same crimes using older precedent as a reference for prosecution or lawsuits.

This creates huge gray zones in the law. Gray zones are areas of law where even though something is illegal, there is no law on the books against a specific method of a known crime. Stalking is the easiest example. If someone is stalking you, follows you, and threatens you, we can all agree a crime was committed.

So is stalking a crime? Not if you are an OSINT practitioner doing it online because there is no legal or regulatory system you have to justify yourself to.

The gray zone, in this case, exists in a couple of areas. The first is attribution or identifying the perpetrator. This isn’t a small thing. The person with the Twitter handle “little ice cream girl” could actually be Stan from Milwaukee who was hired to sway the vote for his candidate. You annoyed him. The state sized software package he inherited working for XXX contractor that was working for the CIA toppling Antarctica is going to come in handy wrecking your life as thoroughly as the preverbal bull in the china shop.

The second is time and distance. Money concerns aside, if you are stalked, harassed, or threatened from the other side of the country or globe, what local prosecutor can even get his head around this new dimension of law?

Last year when I was originally going to publish this series, I spoke to an attorney specializing in international law. He listened for a short time and told me to stop. He didn’t want to hear any more. It wasn’t because of a lack of proof. His reasoned that the substance of what I was saying would put him in a very dangerous position.

It wasn’t his first rodeo and he claimed the last time around, his own national government refused to give him any cover or come to his aid. In his words, his government views taking on private Intel contractors as akin to taking on the CIA directly. And they weren’t willing to do that.

This is the attitude most people and even Congress takes. You can’t beat the deep state. But, the deep state ISN’T sworn-in law enforcement or agency personnel anymore. The illegal hiring practices for almost 2 decades gave private sector (green badges) oversight of agency personnel and projects. The problem multiplies because they trained the managers at the agencies and wield tremendous influence.

A fundamental truth is private industry cannot take on inherently governmental responsibilities legally or successfully. In the end, a company’s only consideration is their bottom line. Patriotism and companies part ways when it is no longer profitable. That’s just business.

What Congress and policymakers have done is to allow a huge gray area to be created where criminals are allowed to thrive because they provide political candy in the form of mostly fake Intel that supports whatever project a member of Congress needs to appease his pet cause lobbyists.

This could all be cleaned up by applying existing stalking and assault laws to online stalkers by making the punishment extreme. The same goes for political activists that are doing this under the cover written for them. As long as they volunteer, they are not targetable for retribution internationally. If they are provably working with a country or company working with a country, as soon as they stop, they can’t be touched. How’s that for a policy?

Fixes for Online Troll Remediation

Putting all these online Intel related cottage industries under rigid government oversight and forcing them to document what they are doing and to whom both domestically and internationally is the one way any type of privateer scenario that is already OK’d by the current policy can actually work. It also gives protected classes the opportunity to stop harassment and demand damages. This is precisely why it won’t happen unless it is pushed hard.

Congress could write and pass a one-page bill to write protection against this if they had the inclination. The crimes exist in the law already. The only expansion is applying them to technology. They won’t.

The other more realistic approach is to demand US president Donald Trump takes out his magic pen and write an executive order guaranteeing reasonable protections and appropriate punishment.

This is unlikely to happen because the move would literally box in this already metastasized invasive cancer commonly called the deep state. The celebrated work of the CIA and FBI infiltrating perfectly legal civil groups or dispersing propaganda through news platforms like the New York Times has been rendered child’s play in both scope and impact.

And we’re still waiting to see what kind of trouble 3 or 4 million unregulated new hires will bring domestically and internationally.

International Law and Policy for Online and Cyberattacks

Next, let’s establish a few things directly from Tallinn Manual I. From a 2015 article I’ll be highlighting a lot more in the next article I showed clearly that:

  • Civilians are a protected class.
  • If you work with a foreign country against their perceived enemies you are considered a military asset even if you work for a private contractor. You are targetable in every sense that word conveys.
  • If you work with a foreign country against their perceived enemies you are considered a military asset and attacks against civilians is a terrorist act.
  • To my knowledge no western country allows its citizens to make war on each other or citizens of other countries they are at peace with. The Black Letter Rules include: Rule 23.3 Cyber attacks against civilians is a war crime defined by rule 32.
  • Rule 26.7 The concept of “belonging to” defines whether you can be targeted or not. This rule defines civilians as off limits unless they are “engaged” in real war duties. It includes undeclared relationships where behavior makes it clear which side a person is fighting for.
  • Rule 26.9 Virtual online communities and people expressing opinions do not qualify as combatants.
  • Rule 30 defines a cyber attack as a non-kinetic attack reasonably expected to cause damage or death to persons resulting from the attack. If attacker mistakenly calls civilians lawful targets, the attack on civilians still occurred. It is a crime. This is an important consideration considering how interconnected the internet has made people.
  • Rule 31 Psy-Ops including leaflets, mass emails is not prohibited behavior.
  • Rule 33 If there is doubt to the status of a person, that person is to be considered a civilian and not targetable.
  • Rule 35.5 Gathering information for the military makes you a combatant.
  • Journalists are prohibited targets.
  • Once an attack is made, the retribution is legal and does not necessarily need to be in kind.

A cyber attack can be met with conventional weapons.

  • Rule 41 Means and Methods describes cyber weapons broadly as the means to carry out cyber war by use, or intended use of cyber “munitions” designed to cause damage, destruction, or death to its targets. The breadth of the rule is required because of the wide array of possible attacks through cyber means.

Now, the first loophole I wanted to be closed comes from an inverse look at a cyber war attack including stalking and targeting protected classes. Here’s how this can be elevated to war crimes.

Cyber can come from anywhere across the globe, anonymously, and stealthily (you may not even realize you were attacked). Because of today’s events people being attacked are from different parts of a given country and even spread across the globe.

This means if political or social activists are targeted, it may look like random events even though the numbers of victims could be in the hundreds of thousands or potentially millions. Here’s the two-minute example from one of the industry pioneers that attack civilians.

If the attack is considered as a single event because one single protected class or group is targeted even though they are physically at different geographical locations, we can reach the threshold for a cyber attack governed by the laws of war. Since it’s civilians, it would need to be litigated but the settlement would come from the offending country. Cha-ching!

Nevertheless, I collected a sample of 50+- IP addresses. Thank you, Mr. Justin, you are an eminently useful idiot.. . Also, many (most?) of the US readers were at work when they visited antiwar.com. Those US readers are concentrated in New York metro, Washington DC, greater Boston, the Bay Area, and Illinois (Chicago and main campus, U of I). Meanwhile, the Russian readers (there are only two in the dataset) are split between Moscow and Saint-Petersburg.”- Andrew Aaron Weisburd @webradius

https://www.opednews.com/populum/visuals/2015/10/2015-10-58313-500-ImagesAttr-populum_uploadnic_anti-war-10-15--jpg_58313_20151022-534.jpg

I ask why is this Info war agent that trained all the US Intel agencies, NATO, and works for Ukraine geolocating American citizens for Ukrainian purposes?

This group is a political social group reading and commenting at a media platform in a country that still has the 1st Amendment. It is a protected class.

THIS IS ONLY ONE STEP FROM A WAR CRIME. As soon as it’s established Weisburd is doing this for less than Ukraine’s hit for hire site Myrotvorets, we are in the neighborhood of WAR CRIMES. Interestingly, Weisburd helped spawn Myrotvorets and enhanced Ukraine’s geolocation abilities.

Secondly, if it doesn’t meet the war threshold, it is still a terrorist attack on protected groups. When I proposed that injured parties have the right to robust self-defense, Tallinn II closed up the language by barring civilians the right of redress, self-defense, or preemptive assault because this was the domain of nations.

But, that language also makes it imperative for them to persuade Congress to step up to bat and write restrictive laws or the future looks very bleak for private industry spies and IO working against the public interest.

But, that language also makes it an imperative for them to persuade Congress to step up to bat and write restrictive laws or the future looks very bleak for private industry spies and IO working against the public interest.

Did Andy Weisburd take that final step? Stay tuned, it’s detailed in the next articles. Next up, we’ll show the same small groups of OISINT and IO trailblazers are responsible for most fake news, bad Intel, and are covering up crimes against humanity.

Make no doubt about it, they are terrorists. They can be treated like terrorists and people have the right to robustly defend themselves.

%d bloggers like this: