Search

band annie's Weblog

I have a parallel blog in French at http://anniebannie.net

Date

November 4, 2011

Lang Lang plays Beethoven’s Sonata No.23 “Appassionata” Op. 57 No. 23 1st Movement.

[youtube http://youtu.be/49KBYCja2tM?]

Wishing you a nice week-end

An Open Letter to the Brave People of Syria

source

Gilad Atzmon: Armageddon Ahead

Friday, November 4, 2011 at 7:39AM Gilad Atzmon

It does not take a genius to gather that the Israeli aggression towards Iran would endanger every living species on this planet. Devastatingly enough, our Western governments  do nothing to stop the Jewish State. That should not take us by surprise: our politicians are largely funded and vetted by Israeli lobbies that openly support attack on Iran.

Here in Britain Defence Secretary Liam Fox had to resign two weeks ago when it became clear that he was ‘breaching ministerial laws’. The British press went out of its way to reduce the issue of his resignation into just another ‘gay-ish mini scandal’. But we actually have strong reason to believe that Fox was working intensively for Israel.

He was enthusiastically advocating Israeli interests such as an attack on Iran.  Together with his ‘best friend’ Adam Werritty,   he was also funded by the Israeli lobby. We  know also that Fox and his ‘flat mate’ Werritty were in direct contact with  Mossad, and were even warned by MI6 about it.

But Fox was not alone: with 80% of our leading party’s MP’s being Conservative Friends Of Israel’s (CFI) members, we have good reason to believe that treachery is now institutional amongst UK elected politicians.

As we brace ourselves while learning from the Israeli press about the IAF’s final preparations ahead for an attack on Iran’s nuclear plants, I would like to share with you a short passage from The Wandering Who.

In the following extract, I explore the exact genocidal scenario that Israeli pilots are now  training to accomplish, in these very days. As much as it is clear that our treacherous elected puppets will fail to restrain Israel, it is equally and tragically obvious that Israel lacks the means to restrain its own madness.

“…I will try to elucidate this idea through a simple and hypothetical yet horrifying war scenario. We, for instance, can envisage a horrific situation in which an Israeli so-called ‘pre-emptive’ attack on Iran escalates into a disastrous nuclear war, in which tens of millions of people perish. I guess that amongst the survivors of such a nightmare scenario, some may be bold enough to argue that ‘Hitler might had been right after all.’

The above is obviously a fictional scenario, and by no means a wishful one, yet such a vision of a ‘possible’ horrific development should restrain Israeli or Zionist aggression towards Iran. As we know, Israeli officials threaten to flatten Iran rather too often. In practice, pre-TSD[1] Israelis make this devastating scenario into a possible reality.

Seemingly, Israelis and Zionist politicians fail to see their own actions in the light of history.  They fail to look at their actions in terms of their consequences. From an ethical perspective, the above  ‘imaginary’ scenario is there to prevent Israel from attacking Iran. Yet, as we all know, Israel and its lobbies are desperate to dismantle the so-called ‘Iranian threat’. My explanation is simple. The Jewish state and the Jewish discourse in general are completely foreign to the notion of temporality. Israel is blinded to the consequences of its actions, it only thinks of its actions in terms of short-term pragmatism. Instead of temporality, Israel thinks in terms of an extended present.” (The Wandering Who pg. 179)

The Jewish State and its lobbies are the greatest threat to world peace.  If we want to save ourselves, there is no other way of doing so than looking closely into Jewish, Israeli and Zionist culture, identity and ideology. There is no other way of doing so than scrutinising Israel’s unique and relentless attitude towards lobbying.

The issues we are dealing with here are not solely political  they are actually deeply philosophical, psychological and sociological — and it is also about life and death.

 

You can now order The Wandering Who on Amazon.com  or Amazon.co.uk


[1] Pre TSD Pre-Traumatic Stress Disorder-Within the condition of the Pre-Traumatic Stress Disorder, the stress is the outcome of a phantasmic event, an imaginary episode set in the future; an event that has never taken place.

Fighting in the Fifth Dimension

Innovations in technology are changing the tactics of modern-day conflict, turning the cyberworld into a new frontline.

Al Jazeera World Last Modified: 02 Nov 2011 14:10
click on link for video

It has been called the ‘fifth dimension of warfare’. Along with land, sea, air and space – the cyberworld is increasingly becoming a new frontline.

Innovations in technology are changing the tactics of modern-day conflict. There are new tools in today’s arsenal of weapons. Helped by advances in electro-magnetics and modern information and communications technology, a new form of electronic warfare has been created. It is called cyberwar and is increasingly recognised by governments and the military as posing a potentially grave threat.

“If you have a few smart people and a good computer, then you can do a lot. You don’t need an aircraft, you don’t need tanks, you don’t need an army. You can penetrate another country, create huge damage without even leaving your armchair.”Alon Ben David, military analyst for Israel’s Channel 10

And it is not just cyberwar that is a growing phenomenon. The internet has empowered cyberactivism, allowing people to share information and mobilise support to take direct action – both online and on the streets.

Social networking sites such as Facebook, Twitter and YouTube have been at the forefront of this new wave of cyberactivism, helping to galvanise the protests that have recently spread across the Arab world.

The so-called Arab Spring has been described as an electronic revolution. Protesters were turned into citizen journalists – taking frontline images on their mobile phones and uploading them via their computers for the world to see. The regimes may have jammed the signals of satellite news channels and banned international reporters from entering their country, but they were unable to prevent citizens from becoming reporters in their own right.

From cyberactivism to cyberwar

Using the internet as a platform for political action is one thing. But infiltrating and disrupting computer networks and databases takes cyberwar to another level. American security experts have warned that a cyber-attack could cripple key governmental and financial systems and it is a threat the US is taking seriously.

“Cyberspace is real. And so are the risks that come with it. From now on, our digital infrastructure, the networks and computers we depend on every day, will be treated as they should be, as a strategic national asset.”Barack Obama, the US president

In recent years a cyberwar has been brewing between China and the US, with both countries accusing each other of running an ‘army of hackers’.

A key battlefield in this war has been the case of Google.

The US internet company partially withdrew from China in 2010 after a tussle with the government over censorship and government-backed hacking.

China accuses the US of using Google to spy on the country, while Google accuses China of hacking into the email accounts of some of its members.

“We must differentiate between independent hackers and those of the state. We must understand that in some countries the authorities hire hackers with excellent technical knowledge to serve their interests. Everything is possible and states shouldn’t accuse each other since all options are open in this war.”Han, a Chinese internet hacker

The US also appears to be engaged in a cyberwar with another erstwhile enemy: Iran.

It appeared to begin in 2009 following Iranian anti-government protests – sparked by the disputed presidential elections which saw Mahmoud Ahmadinejad win another term in office.

Seeking to deprive the opposition of its main means of mobilising the masses, the Iranian authorities sought to choke off internet access.

But the protestors continued to use sites such as YouTube and Twitter and when Twitter planned some routine maintenance that would have taken it offline for a few hours, Hillary Clinton, the US secretary of state, asked the site to stay up and running while the protests continued.

Electronic eyes and ears

In the Middle East, Israel has set up a cyber command to secure the country against hacking attacks on its key networks.

Israel’s immediate neighbourhood is the place where it puts into use much of its technical know-how. Along its northern border with Lebanon, Israel deploys a large network of electronic eyes and ears.

And in the ongoing intelligence war between Israel and Lebanon’s Hezbollah, increasingly sophisticated electronic equipment is being used.

In February 2010, Lebanon arrested a man who reportedly confessed to being a Mossad agent. It was claimed that he had used sophisticated surveillance equipment that sent signals to his Israeli handlers via a mobile phone and computer located in a hidden compartment inside his car.

It may all sound like science fiction, but a global spying network does exist that can eavesdrop on every single phone call and email on the planet.

Eavesdropping on phone calls and text messages has become increasing easy for those with the right equipment, especially with the development of GSM networks – the technology used on the vast majority of mobile phone networks around the world.

“Give me your mobile phone for 30 seconds, give me 30 seconds alone with your mobile phone and I can install software that would make your mobile phone a travelling microphone. From that moment on, even if it is shut down, your mobile phone will broadcast everything that goes on around you, through a number that I determine.”Alon Ben David, military analyst for Israel’s Channel 10

A brave new world?

Many analysts are amazed at how internet users voluntarily hand over vast amounts of personal data to social media sites.

And planting software into a person’s phone or computer to steal data has become a new tactic of warfare in the fifth dimension.

“Our entire life is now on the internet: personal information, emails, credit cards. We give all this information on the internet to sites like Facebook, Google and Amazon. Governments impose pressure on these sites as they know how much information they have. These governments have asked for personal information from these sites, and they gave them what they needed.”Marwan Taher, IT specialist

We live in a brave new world of information and communication technology. The possibilities seem infinite, endless … and uncertain.

Fighting in the Fifth Dimension can be seen from Tuesday, November 1, at the following times GMT: Tuesday: 2000; Wednesday: 1200; Thursday: 0100; Friday: 0600; Saturday: 2000; Sunday: 1200; Monday: 0100.

Create a free website or blog at WordPress.com.

Up ↑