American Resistance To Empire

US Army Trains World Army To Fight the War for “Pax America”


–the Pentagon Trains the World Armies To Fight the Phantom Threats
–Which we create

ukraine trainingUS Trainers To Deploy To Ukraine

Also Will Begin Shipment of US-funded Armored Vehicles


U.S. Army Africa sponsors African Deployment Partnership Training in Benin/></a></td><br /><br />
                          <td width=U.S. Army Africa sponsors African Deployment Partnership Training in Benin


(Jan. 15, 2015) Marine Maj. Christopher Ross, an infantry officer with the Special Purpose Marine Air-Ground Task Force, looks on as Iraqi army soldiers practice maneuver techniques at Al Asad Air Base, Iraq. Ross is working with Iraq Army officers and noncommisioned officers to develop advanced training for Iraqi army recruits. (U.S. Army photo by Sgt. William White)U.S. Troops headed to Syria to aid fight against ISIS


97814 fullUS military returns to Iraq 3 years after withdrawing


brits training peshmergaBritish Army Training The Peshmerga In Northern Iraq


Sweden is home to some 100,000 Kurdish immigrants

Sweden to send military trainers to Kurdistan

THE REAL DEAL–Rafiq Hariri Assassination

Political Assassination

crime scene 1

Crime of the Century

crime scene 2

The Candor Operation

Six Weeks prior to the Murder of  President Rafik Al Hariri


Most of the operations of political assassination and big crimes are planned in a manner that meant to be never revealed or discovered, such as: John Kennedy, Akino, September 11, Yasser Araffat, Rafik Al-Hariri, etc.

Who killed Rafik Al-Hariri?

Ugine Goldman, the Director of the Planning Unit of the C.I.A Supreme Council; Daniel Iceberg, the specialist in uncovering Pentagon secret information & Michael Shober, the anti-terrorist officer in the C.I.A, reveal to us the truth of what happened

American & Israeli Motivations for Political Assassinations in the Middle East:l

  1. After the occupation of Iraq, and following the issuance of UN on Sept 2, 2004, Decree (resolution) 1559, the idea of political assassination was revived in the Middle East through the Israeli Intelligence Agency .It prepared playing cards with the personalities to be assassinated which included: Sheikh Hassan Nasrallah, President Emil Lahoud, President Rafik Al-Hariri, President Yasser Arafat, Sheikh Ahmed Yassin, among others. The top card, ace heart, carried the photo of Rafik Al-Hariri. Next to his photo they wrote the most wanted. Followed by in these play cards; came the politician Ely Habekah whose photo was crossed out, for he was already assassinated in 2002. In this plan; on the electronic site, the American extreme rightist writer, Richard Pearl, and the political commentator, Daniel Pipes participated in collaboration with the Israeli Military Establishment.

  2. This idea was adopted by the Israeli Mossad, then Sharon miniature council of ministers and then C.I.A followed suit.

  3. The idea of political assassination was next blessed and approved by Bush Administration Security Council, since it lent support to the American New Middle East Project which is based upon introducing changes in the demography and geography of the Middle East through chaos, turmoil, uprisings and civil and sectarian fights between Sunnis and Shiites at first then between the other sects and minorities in the Middle East as well, and also through the formation of several weak and puppet political entities in the Middle East, beginning with Iraq, Lebanon and Palestine then extending to other Middle Eastern countries as well, in order to achieve two aims : first, to establish full and direct geographic and political control over the Middle Eastern oil; and second, to spread Israeli hegemony over the miniature divided countries in the Middle East. 

  4. From American perspective, the Syrian Army, situated in Lebanon, was a big obstacle in the face of launching chaos, turmoil and civil fight in this country.

  5. The Syrian government started to withdraw its forces from Lebanon in a radical way following the withdrawal of the Israeli forces from southern Lebanon. It carried out several withdrawals (six) and repositioned its forces on: June 14, 2001; April 3, 2002; February 19-25.2004; September 27, 2004; and finally on December 18, 2004. In the last withdrawal, and for the first time since 1976, Syria withdrew its intelligence forces out of Lebanon. Security road blocks in and near Beirut International Airport, in Beirut southern suburbs and in the northern coast of Betron city were removed. The withdrawal of the Syrian intelligence forces created a big security gap in Lebanon which led to the penetration of several intelligence Arabic and foreign agencies into Lebanon (American, Israeli, European, Jordan and Saudi). This in addition to the penetration of Al-Qaida Organization and its affiliates into Beirut then into southern and northern Lebanon. This security gap caused the decline and the endanger of security in Beirut and other Lebanese regions two months before Al-Hariri’s assassination. The consecutive withdrawals of the Syrian Army from the various Lebanese zones were in accordance with the recommendations of Al-Taif Conference on Lebanon.

  6. The Syrian opposition to the American occupation of Iraq and the non approval of the Syrian President of the American conditions advanced by the American Secretary of State, Colin Pawell, were two key factors for the American Administration to apply pressure on Syria with the aim of forcing it to withdraw its army from Lebanon; then isolate the Syrian administration; then establishing and supporting a Lebanese opposition to Syrian existence in Lebanon; then establishing and supporting a strong Sunni current to oppose the Shiite current represented by Hezbollah Party which poses a threat to the security of Israel through its missile force.

The Manipulation of the UN as a Tool in the New Middle East Project:

  1. In that context, it wasn’t foreseen to attack Syria militarily according to a decision the American Administration took in 2004, so they turned to the United Nations and its decrees and to the political and economic penalties as a means to isolate Syria, weaken it and destroy its regional influence represented: first, in Lebanon through Hezbollah and Amal. Second, Movement; in the occupied Palestinian territories through Hamas and the other Palestinian opposition parties; and third, in Iraq through its tribal and political weight

The United Nations, together with its Security Council, have been used as tools to exert pressure on Syria and Iran. This has been adopted after signing the agreement between Britain and the USA in alliance with France and Germany in the presence of Israel during 2003, after the Anglo-American occupation of Iraq which has been climaxed with the issuance of Decree 1559 on September 2, 2004,  and the decrees that followed.

2.The American Secretary of State, together with the American Embassy in Beirut, coordinated with some Lebanese personalities including Qorna Shahwan, who was received in Los Angeles; Michael Oun, who was received in Chicago; Patriarch Safeer, who was received in Washington; in addition to the Sunni current led by Rafik Al- Hariri, along with the Social Progressive Party led by Walid Jumblatt, all whom the Americans coordinated with during meetings in the American Embassy in Beirut. These events were followed by imposing the American penalties onSyria, and the adoption of Shalom Plan on which basis Decree 1559 was issued.

3.The “Pristol” opposition coalition was formed with the support and blessings of Rafik Al-Hariri to confront the Syrian support to extend President Emil Lahoud’s term, on Sept 3, 2004, for three additional years.

Picking the Political Assassination Victim in the New Middle East Project:

  1. President Rafik Al-Hariri disappointed first the American Administration, then the French one, by participating himself, his ministers and his Parliament members in the efforts to extend President Emil Lahoud’s term.

  2. The non attendance of President Rafik Al-Hariri of the meetings of the Pristol opposition block; the certainty of his leaving the opposition; and his frequent and repeated encounters in December and January with Sheikh Hassan Nasr Allah, increased the outrage and fear of the American Administration. Therefore, the assassination process was accelerated, especially since Al-Hariri withdrew his support of the Pristol block, as he himself declared to the Lebanese Newspaper “Al Safir”.

  3. Also the opposition of President Rafik Al-Hariri for the (Bechtel & Jacob) Project to build an American base in south Tripoli “Patron”, and his opposition to the construction of the largest American Embassy in the Middle East in Lebanon, again increased the outrage and fears of the American Administration. Accordingly, the C.I.A. excluded for the moment the idea of assassinating the Shiite Sheikh Hassan Nasrallah; given the difficulty of that task, and adopted instead the idea of eliminating the Sunni President Rafik Al-Hariri; for he was an easy target, and because that venture was more profitable from the point of view of its results and outcomes that help the realization of the New Middle East Project.

  4. On Aug 29, 2004, the electronic site of “the American comity for freedom of Lebanon “, nicknamed Rafik Al-Hariri “the foremost  Lebanese  agent that  works for Syria.”
  5. The assassination of Al-Hariri was a decision taken by the American Administration and Sharon government. National Security Advisor Aide, Eliot Abrams, played a key role linking the White House and Sharon Intelligence offic

The C.I.A. (UN Branch) Plans for the Assassination of Rafik Al-Hariri:

  1. While the parliamentary committees were convening in Beirut, the C.I.A. (UN Branch) , made a terrestrial map and a satellite map for the district of San George, Venezia Intercontinental Hotel and the surrounding buildings in collaboration with the Israeli Mossad (Unit 504). Next, they determined the daily appointments, timings and meetings of Rafik Al-Hariri. The new UN Building (Alaskwa) comprising 8 floors with glass facades was used for monitoring Hariri’s movements from and to the Lebanese Parliament, including all roads and cross roads.

  2. The C.I.A doesn’t have the capabilities for carrying out such an operation without local Lebanese help. The Israeli Mossad offered such help through their agents in the disbanded Southern Lebanese Army (Israeli Assassination Unit 504) whom have been trained in Israel.

  3. Despite the presence of those Lebanese elements who are loyal to the Mossad; such an operation must be carried in a suicidal manner that can’t be entrusted to those elements of the Mossad. Therefore, it was agreed to have the participation of some Lebanese and Palestinian elements of the “Nasra and Jihad” Group that makes part of “Gond Al-Sham” militia, centered around Saida, south Lebanon, in the district of Tammeer, Ein Al-Helwa, in order to carry out such suicidal operation.

  4. President Rafik Al-Hariri, in the Sunni Religious Circles, is considered to represent Saudi Arabia in Lebanon. He was chosen with the approval of Syria. It is well known that Saudi Arabia opposes the Islamic extremists and it is at war with Al-Qaida Organization. In that context, the C.I.A. in the American Embassy in Riyadh, in collaboration with the Australian Intelligence Agency and the Saudi Security Forces, contacted Al-Oteebi (Saud Al-Oteebi, the head of Al-Qaida branch in Saudi Arabia) & Al-Ghamdi Cells in Mecca. This contact was made through two C.I.A elements of Lebanese origin and with a terrorist façade. The reason was to secure a meeting to be attended by Lebanese extremists carrying Australian passports who will visit Mecca for worship.  Planning and financing were made under the nomination of Al-Qaida. Next Al-Oteebi Cell was liquidated by the Saudi Security Forces and the F.B.I. The hardest venture for the American C.I.A. was to enlist Lebanese extremists in the assassination plan without being discovered later on. Accordingly, orders and executive steps remained piecemeal, vague and unclear without fixing time, place or target. Al-Oteebi, Gond Al-Sham and the Australian Lebanese extremists groups were all unaware of the common link between them and the American Central Intelligence Agency (C.I.A). The Australian Lebanese extremists, who were seven persons, were accommodated in a flat in Beirut, four weeks before the operation, with the help of two elements (a Lebanese and a Palestinian) of Gond Al-Sham group in coordination also with Sheikh Al Gozo.

  5. A Mitsubishi stolen truck was stolen and transported from Japan via UAE to Lebanon on October, 12, 2004. It was assembled by elements of the C.I.A in the American Embassy in Beirut, where it was equipped with several electronic devices that included: C-GUARD EXP device which is a special and counter jamming device; a thermometer; an electronic shocker; a specially developed mini navigator; a transceiver linked with the satellites via GPS-11; and a transceiver linked with unit 8200 AWACS Planes. The truck was next handed over to the Israeli Mossad. The connecting elements were always Lebanese working for the Mossad, under cover of the Federal Bureau Investigation (F.B.I) situated in the American Embassy in Beirut.

  6. Three charges of T.N.T. mixed with phosphorus, having a destructive power of one ton, were transported at consecutive times, through a narrow passage in the Israeli mine fields, by Lebanese agents working for the Mossad whose chief directly supervised the operation together with Chief of the Intelligence of the Israeli Army, Mayer Daghan. The explosives were assembled, transported and handed over by the Mossad agents and elements of Gond Al-Sham group and the seven Australian Lebanese, in the district of Al Tameer, Saida, in a place beyond the control of the Lebanese army and Hezbollah security.

  7. Two months after Syrian security withdrawals, and on day 17, Friday Jan 28, 2005, before his assassination, Rafik Al-Hariri was informed with the necessity of visiting Washington for consultation and coordination with the American Foreign Ministry and President Bush. The American Ambassador in Beirut asked President Rafik Al-Hariri to come over to the Embassy to arrange for the forthcoming meeting in Washington. On the day 13, on Tuesday Feb 1, 2005, before the assassination, President Rafik Al-Hariri visited the American Embassy in Beirut to meet the Ambassador Feldman and to have the diplomatic visa stamped on his passport for the entry of the USA. In an ordinary routine act, his cellular phone was taken from him upon his entry in the Embassy. During the meeting that lasted for one hour, Al-Hariri cell phone was bugged with a closed-circuit electronic chip and a navigator, thus Al-Hariri’s movements were monitored by the satellites and the Awacs. Also, the memory of Hariri’s cellular phone chip was copied in order to spy on the calls he  receives in order to know his movements in advance. Thus, Hariri’s movements became under control and monitoring, and completely clear unsecured.

  8. The crime theater was monitored from the ground, from sea and from air by the satellites and the Awacs.

  9. On Day 4 prior to Hariri’s  assassination (Thursday February 10, 2005), Terry Rod Larson (UN supreme emissary) warned Al Hariri of the bad situation and advised his to be cautious. The UN had appointed Larson to supervise the implementation of  the Security Council Resolution No. 1559.

  10.  The assassination operation which was planned for on Friday February 11, 2005, was postponed for three days due to a misunderstanding between the Lebanese elements working for the Mossad and the Australian Lebanese elements, whom one of them would carry out the suicidal operation, and the operations center in the UN headquarters and the American Embassy in Beirut. This because of the heavy traffic after President Rafik Al-Hariri had left Mohammed Al Amin  Mosque following Friday Prayer.

  11. Monday February 14, 2005, was the first of three days for the Parliament to debate the new electoral law.

  12. At 11:55 on the morning of February 14, 2005, Yehia Al Arab (Abu Tarek), the chief body guard of Al Hariri,  informed Al Hariri that Mr. Naguib Fregi, the UN Speaker in Beirut, and some newsmen are awaiting him in the Actuel Café located at the other side of the Nejma Square. Al-Hariri told Abu Tarek that he will soon join them. He was then sitting in the main room of the Parliament together with Marawan Hamada,  Ghazi Al-Areedi and other colleagues discussing the electoral law.

  13.  At 12:15 on the same day, Naguib Fregi, an elegant Tunisian that smokes cigars and manages the Information Center (Of the UN branch of the C.I.A), was meeting some outstanding Lebanese newsmen to inform them about the results of a meeting that was held the previous Thursday between Terry Rod Larson and President Bashar Al-Assad. Four outstanding journalists were sitting around the table in the Café with Fregi, among them Ali Hamada, from Al Nahar Lebanese Newspaper, and Walid Shuker, from Al-Hayat Newspaper. While they were talking, Abu Tarek, Al-Hariri’s bodyguard, entered the Actuel Café and informed Fregi that Al-Hariri will come within few minutes. It was customary that Fregi and Hariri take the opportunity from time to time to exchange views and information.

  14.  At 12:35 on the same day, Hariri crossed Nejma Square towards the Actuel Café , entered it and discussed with the journalists, the Parliament affairs. However, Naguib Fregi, asked Hariri to talk with him separately about Hezbollah and its disarmament. Hariri advised Fregi that the UN must deal directly with it, and told him to make sure to tell the Americans about it before he goes lest they would worry.

  15.  At 12:42 p.m., Hariri’s motorcade was waiting on one side of the road near the Parliament. Abu Tarek informed the motorcade police officer and his assistant with the road that they should follow to return to Quraitem. That was the last encounter for Hariri with the First Watchman (the C.I.A. agent in the UN Branch), Naguib Fregi, who in his turn informed the Second Watchman in the UN headquarter, on the eighth floor, who  checked  what he watches directly and indirectly via an electronic monitoring screen connected with satellites.  He watched the exit of  Hariri’s motorcade from Nejma Square through the road leading to San George. In his turn he passed on the information to the Third Watchman situated on the motorcade way. On the screen, there were two illuminated dots: a red one representing the Mitsubishi truck movement, and a green representing Hariri’s movements. In the monitoring and control center, watching the screen connected with satellites, there was the security officer of the C.I.A. , UN Branch, Ugine Goldman. On the same terminal, in the American Embassy in Beirut, another monitoring screen was being watched by Robert Miller, from the Federal Bureau Investigation (F.B.I).

  16.  At 12:53 p.m., we follow up what happened during the last minutes that preceded Hariri’s assassination before the movement of Hariri’s motorcade. The conversation ended in the Actuel Café and Hariri left accompanied by Basel Flihan. They walked towards the awaiting motorcade. Flihan entered the armored Mercedes car and accommodated himself in the front passenger seat, whereas, Hariri was smilingly waving to Fregi and the newsmen from the driver seat of the car. At the motorcade end there was an ambulance, a modified Chevrolet, which carried Rashid Hamoud, an emergency specialist in the American University Hospital. Its driver was Mahmoud Aweini. The second medical assistant was Mazen Al-Zahabi. A Toyota Land Cruiser, was leading the procession carrying four of the internal security police officers. It was followed by a Mercedes S-500, driven by Amer Shehada, accompanied by two private guards: Mohammed Reda, in the front seat, and Hassan Agiuz in the rear seat. Hariri’s armored Mercedes S-600 was the third in the procession, followed by other two Mercedes cars, each carries three private guards. Abu Tarek was sitting  in the front seat of the fourth car. The private guards sitting in the front seats were carrying machine pistols of the type “ Hilker & Couch”, which are small and light weight weapons, whereas those on the rear seats were carrying a “ Berta Glouk”  9 mm automatic pistol, that is hanged in a pouch near the shoulder.
  17. As the procession went around the Clock Tower in the middle of the square, and then up the street, passing by the Italian Embassy towards the northern direction, the Second Watchman, observed  from the building of the UN (the C.I.A. branch), that the procession is directing northward. Accordingly he made a communication from a cellular phone. It was the first of four calls he made in the next few minutes. That who were receiving the calls were the group of the Third Watchman, in the neighborhood, covering all possible ways that Hariri’s procession might take in the direction of Quretem. In the next few minutes, the Lebanese Mossad (Unit 504), closed down the other two roads leading to Quretem by placing barricades belonging to Beirut Municipality. The cellular phones of the Watchmen, whose calls were prepaid, were eight phones, and were acquired more than a month before. The calls that were made between these phones were between those Watchmen in order to check and control the movement of Hariri’s procession. The hierarchy of command, management, surveillance and monitoring of Hariri’s procession was as follows:

    1. The First Watchman : Naguib Fregi from the C.I.A, UN Branch.
    2. The Second Watchman : Ugine Goldman, the C.I.A.; and Robert Miller, the Federal Bureau Investigation F.B.I.
    3. The Third Watchman : Mayer Daghan, Unit 504, the Lebanese Mossad.
    4. The Fourth Watchman : Gond Al-Sham group and the suicidal (Ahmed Abu Alades and Khaled Taha).

One of the four persons (the Fourth Watchman)  has received a call from ( the Second Watchman)situated in the Nejma Square (the UN building). The driver of a Mitsubishi Canter white vane remained beside San George Hotel awaiting the call. The van moved very slowly on the public road. The cars and the trucks were moving quickly, whereas the van was moving at the speed of 8 km/h in accordance with the Second Watchman instructions. He over passed the small roofed entrance leading to the Beach Club of the San George Hotel. He stopped after few meters according to the instructions.

18.  At 12:55 p. m. : the driver of the white Mitsubishi truck, through the left mirror of his car, that was standing beside San George Hotel for less than a minute, was able to see the gray Toyota Land Cruiser, boarded by the  policemen, increasing in size as it was racing towards the road parallel to the yacht port of the San George Hotel, followed by the Mercedes driven by Amer Shehada, within a time interval less than a fraction of a second. The next car that passed beside the Mitsubishi was the third in the procession – Hariri’s Mercedes S-600 armored car. When it passed parallel to it, the Second Watchman pressed the automatic control key, this before the encounter of the red point with the green point on his monitoring screen, which in turn is connected with the American spy satellite. With an accuracy of milliseconds, the electronic monitoring and ignition circuit situated in the explosive truck was reacting in this second with the electronic and monitoring circuit situated in the Hariri’s motorcade at the moment of the encounter of both victims within the field of black imaginary points.

19.  On day Zero, Monday February 14, 2005 (Valentine Day), the operation was postponed for 20 minutes, for more coordination and control, during Hariri’s stopping Actuel Café after his meetings in the Parliament. With the movement of the monitoring ground group controlling the Mitsubishi truck laden with the explosives, the contacts resumed again and the movements of both Al-Hariris motorcade and the Mitsubishi truck towards the location X were ascertained. At the proper instant and timing, at 12:56:26 Beirut local time on February 14.2005,the detonation of the truck occurred through a complicated electronic network linking the detonator, navigator Al- Hariris cell phone, American satellites and AWACS planes, control room, the truck laden with the explosives and the electronic devices mentioned previously; in addition of the security-TV camera of the HSBC British bank which was already aiming at the cross roads where Al-Hariris motorcade would encounter the Mitsubishi truck laden with explosives, connected with the monitoring ground group. This cipher was there only for confusing and for reception by the receivers using the frequencies used by Al-Hariri’s motorcade and the Mitsubishi truck. The order for explosion was given at the moment the two victims encountered each other, regardless of the instructions that were given to the Mitsubishi truck driver. This order to explode the Mitsubishi truck was given at the moment the truck approached Al-Hariri’s motorcade.

20. Operation Candor was successful; which was the name given for Al-Hariri’s assassination.

21. Six of the Australian Lebanese extremists left Lebanon, leaving behind their colleague who drove the Mitsubishi suicidal truck bomb. They flew out of Beirut International Airport, three hours after Al-Hariri’s assassination, in a hurry without even taking their luggage with them. Their part in the plot was camouflaged by the C.I.A and the Australian Intelligence Agency. In the meanwhile, judge Mozahr and General Rify were messing with the crime theater. As for the suspects, the Palestinian suicidal Ahmed Abu Hades and Khaled Taha were considered lost by the International Investigation Committee. The Witness, Nawar Habib Douna was liquidated in a traffic  accident. He was a cellular phones cards seller in Tripoli, which the assassination group members of the Lebanese Mossad used.

Consequences of Al-Hariri’s Assassination for the New Middle East Project:

  1. The assassination operation succeeded, and, as planned, attention turned to Syria as the primary actor of the assassination. The American Embassy in Lebanon started to turn the Lebanese political forces against Syria, Hezbollah and against the Lebanese President Emil Lahud. The important things for them were to isolate Syria and to force her to withdraw her armed forces from Lebanon; to enforce UN Decree 1559; to hit Hezbollah and to ignite a sectarian turmoil between Sunnis and Shiites. And if it weren’t possible to assassinate Sheikh Hassan Nasrallah, the Shiite; then it was possible to assassinate President Rafik Al-Hariri, the Sunni, and achieve the same goal!
  2. The operation of Al-Hariri’s assassination and its consequences were reviewed in their entirety by the C.I.A Supreme Council, when Ambassador Feldman was summoned to Washington for three weeks. The American extraordinary ambassador, Satterfield, was sent to Lebanon to supervise the consecutive explosions in the Christian zones in Beirut.
  3. Robert Miller, was the supreme coordinator and the general manager of the Candor Operation in coordination with the Mossad Chief, General Mayer Daghan.
  4. The American C.I.A. embroiled the United Nations, using the C.I.A. branch there, in the operation of the assassination of Rafik Al-Hariri.
  5. Gihad ben Ahmed Gebril, from the Popular Front for the Liberation of Palestine, Ali Hassan Saleh; one of the leaders of Hezbollah Party, the Parliament member Ely Hebeqa, commander George Hawi, and Parliament member Gibran Twini were also assassinated with planning from the C.I.A, the UN branch,  and execution by the F.B.I and the Mossad, which murdered also Ezz Al-Din Sobhi Sheikh Khalil, one of the leaders of Hamas in Damascus.
  6. Technically, the deep rift theory was adopted in the selection of the assassination location in a manner that causes deep and horizontal destruction. Also, the illusory four black points theory was adopted to ensure that the explosion covers all Al-Hariri’s motorcade. These four black points distributed along the entire road from San George Hotel and the neighboring building. These four points represented the main control for the explosion and arranged the timing for launching the loaded and mobile explosives on the Mitsubishi truck.

The electronic explosion control functions only in case the explosive cars are provided with electronic control devices such as electronic jamming, alarming and monitoring devices, which were available in Al-Hariri’s motorcade. USA and Israel are the only two countries in the region that possess satellites and AWACS planes in addition to control systems with a high degree of technological sophistication. Satellites with AWACS can send signals to detonators with the size of a watch battery. Such technology is monopolized by the USA, Israel and Russia.

The passage of Al-Hariri’s motorcade, which equipped with the highly advanced electronic alarm devices and jamming devices (4 Mega Hz) through the illusory black points, allows the functioning of the explosives. The process of linking the black points with explosives is very complicated and needs very high advanced technology such as systems that can jam the devices protecting Al-Hariri’s motorcade and which depend upon the same source for the protection systems including satellites.

Whether for jamming or exploding, the illusory black points theory to hit the target during explosion, is considered the most recent theory that the Israeli discovered with the help of one of their scientists, Dioth Fasilon, a Russian Jewish scientist in 1999, and it is the same system that the USA developed and supplied the assassination groups with.

• Is it now clear who assassinated Rafik Al-Hariri ?!

• Member of the Administrative Committee of the Association of the
American Arab Physicians.

The anti-fascist struggle is class struggle–Antiwar Internationalist Movement

[SEE:  Preparing a new Gladio for the Left in Greece! ]

Antiwar Internationalist Movement: The anti-fascist struggle is class struggle

dawn gr.

Antiwar Internationalist Movement: The anti-fascist struggle is class struggle

“The battle and the struggle against fascism-nationalism is a struggle against modern totalitarian capitalism and similar manifestations in each field of action,” said in a statement Antiwar Internationalist Movement and notes that “fascism is not a phenomenon but clean face of capitalism “.

Cited entire statement issued by the Movement, on the occasion of the first anniversary of the murder of Paul Fyssas:

“To celebrate the antifascist week and one year after the murder of Paul Fyssas from Nazi gang with the police facing them, it might be a good time to do a review of that period on the subject of fascism and in context, totalitarianism. From this perspective we can not recognize that this period was unfortunately rich in events and situations from which, however, can and should come useful policy conclusions that the antifascist action and the struggle against modern totalitarianism have as possible better targeting and effectiveness of anti-capitalist-antikratika properties rather detached from a purely class analysis against oppression and social destruction we experience in this increasingly totalitarian system.

“The fascist reasonable and practical and stable channel in every aspect of the state and in large parts of the society is going to show the situation, if the revolutionary movement did not stand in the projects of local and foreign capitalist imperialist order to overcome their crisis and further our fully exploited.

From statements in TIF Prime Minister about how important the contribution of military and police in the armor of ‘democracy’ and border security to changes in antiracist baptized bills silence any free speech, fascist mentality and practice takes sovereign state nature of organization and enforcement through and new doctrines of defense and security. Essentially workers’ struggle prohibited democratic rights-Lay freedoms disappear, the claims come outlawed and searches of social liberation come outlawed poinikopoiounaii the new penal code, the University Asylum waived for competitors giving Asylum Market laws and Profit, the promiscuity of companies.

The fascist concentration camps, indirect dips boats with immigrants, refugees from the port and the stewardship-patrol of the main metropolis streets against anyone who looks more miserable by the nationalist ‘desirable’ average person creates a state of war ‘low’ power for immigrants.

The increasingly deepening fascist nationalist intolerance to security forces and the army, by chrysafgites – Nazis in all stratifications Army (ret EP.OP. to generals and current MEPs) to nationalist ‘songs’ of storm trooper and forcing the soldiers of Samothrace to sing from their superiors, and formerly the junta devoutness in Academy amid the celebration of the Polytechnic uprising, compose a mosaic of how the spread of fascism is now firmly on the tougher side enforcement the bourgeois state.

In particular, the prosecution of those who oppose the above as the political persecution of the Solidarity Committee militant exactly as opposed to the modern building of totalitarianism by creating movement in and out of the army, is a sign of nationalism and fascist state functions as the official state now ideology.

The tough battle to promote nationalism and ekfasismou society comes to be with every propaganda tool as all the mainstream media that identify each immigrant -prosfyga with terrorist-jihadists of the ISIS and promote all the dominant conception of Europe fortress.

But you should not stay only in the manifestations of fascism that have to do directly or indirectly with certain fascist ideologies. Although most blatantly make their use and support them from the countries of West and their imperialist unions (EU, NATO, etc.) as in the case of Ukraine which the West actively supports political, economic and military, the fascist government of Kiev . Who chose to declare war on the fifth and most of the population with nationalist and racist criteria and requires all Memoranda EU-IMF, the consequences of which knows better than all our people. But see the resistance of world fascism brings results,

On the other hand we have new data. The targeted THE CLASS ENEMY!

Totalitarianism in contemporary capitalism does not directly require the use of classical nationalist tools always to hit the real class enemy who are exploiting subjects and those who are opposed to the very nature and existence of this system. As recently showed the uprising in Ferguson, Missouri in the US, the state machine has begun to reorganize in order to fight the enemy in the most modern mutation of capitalism, which is none other than the ‘internal enemy disobedient’, the working class, impoverished segments society and people in general are disobedient to, bourgeois legality and oppression, dictates.

With practices fueled by war and ethnic cleansing (training American police by Israeli soldiers in dealing with protesters from their experiences in Gaza, military police tactics in attack against impoverished residents in Brazilian favelas) and the police militarization or policed ​​by the army, two bodies increasingly becomes more blurred the difference between them because of the role that now show the clean face of capitalism and the dominance of neoliberal doctrines for continuous social competition at all costs.

What must be understood is that the battle and the struggle against fascism-nationalism is a struggle against modern totalitarian capitalism and similar manifestations in each field of action.

This fight should be a global anticapitalist perspective if we want to attack the roots and move to create the anti-fascist movement in society by linking immigrants in this race as an organic part of it. By creating solidarity infrastructure and racing centers in modern metropolises of impoverished and desperate people and in confrontation with which prospect of defeat. By connecting youth struggles and workers with the antifascist struggle.

You need to create the infrastructure and the necessary resistance movements in and out of the army, the soldiers’ committees and the creation of antifascist front in the army until the creation of an anti-war anti-capitalist movement that has the potential to put a brake on urban plans for holding inside or outside the imperialist interventions.

All these require a basic condition to understand that fascism is not a phenomenon but the clean face of capitalism and that this period is not just a difficult time but the principle of complete mutation of capitalism to a higher stage of domination and exploitation towards of subjects.





Co-financed by Greece and the European Union.

NSA–“Your data is our data, your equipment is our equipment.”

The Digital Arms Race: NSA Preps America for Future Battle

der spiegel

By Jacob Appelbaum, Aaron Gibson, Claudio Guarnieri, Andy Müller-Maguhn, Laura Poitras, , Leif Ryge, and

Photo Gallery: 'Controlled Escalation' Photos

The NSA’s mass surveillance is just the beginning. Documents from Edward Snowden show that the intelligence agency is arming America for future digital wars — a struggle for control of the Internet that is already well underway.

Normally, internship applicants need to have polished resumes, with volunteer work on social projects considered a plus. But at Politerain, the job posting calls for candidates with significantly different skill sets. We are, the ad says, “looking for interns who want to break things.”

Politerain is not a project associated with a conventional company. It is run by a US government intelligence organization, the National Security Agency (NSA). More precisely, it’s operated by the NSA’s digital snipers with Tailored Access Operations (TAO), the department responsible for breaking into computers.Potential interns are also told that research into third party computers might include plans to “remotely degrade or destroy opponent computers, routers, servers and network enabled devices by attacking the hardware.” Using a program called Passionatepolka, for example, they may be asked to “remotely brick network cards.” With programs like Berserkr they would implant “persistent backdoors” and “parasitic drivers”. Using another piece of software called Barnfire, they would “erase the BIOS on a brand of servers that act as a backbone to many rival governments.”

An intern’s tasks might also include remotely destroying the functionality of hard drives. Ultimately, the goal of the internship program was “developing an attacker’s mindset.”

The internship listing is eight years old, but the attacker’s mindset has since become a kind of doctrine for the NSA’s data spies. And the intelligence service isn’t just trying to achieve mass surveillance of Internet communication, either. The digital spies of the Five Eyes alliance — comprised of the United States, Britain, Canada, Australia and New Zealand — want more.

The Birth of D Weapons

According to top secret documents from the archive of NSA whistleblower Edward Snowden seen exclusively by SPIEGEL, they are planning for wars of the future in which the Internet will play a critical role, with the aim of being able to use the net to paralyze computer networks and, by doing so, potentially all the infrastructure they control, including power and water supplies, factories, airports or the flow of money.

During the 20th century, scientists developed so-called ABC weapons — atomic, biological and chemical. It took decades before their deployment could be regulated and, at least partly, outlawed. New digital weapons have now been developed for the war on the Internet. But there are almost no international conventions or supervisory authorities for these D weapons, and the only law that applies is the survival of the fittest.

Canadian media theorist Marshall McLuhan foresaw these developments decades ago. In 1970, he wrote, “World War III is a guerrilla information war with no division between military and civilian participation.” That’s precisely the reality that spies are preparing for today.

The US Army, Navy, Marines and Air Force have already established their own cyber forces, but it is the NSA, also officially a military agency, that is taking the lead. It’s no coincidence that the director of the NSA also serves as the head of the US Cyber Command. The country’s leading data spy, Admiral Michael Rogers, is also its chief cyber warrior and his close to 40,000 employees are responsible for both digital spying and destructive network attacks.

Surveillance only ‘Phase 0′

From a military perspective, surveillance of the Internet is merely “Phase 0″ in the US digital war strategy. Internal NSA documents indicate that it is the prerequisite for everything that follows. They show that the aim of the surveillance is to detect vulnerabilities in enemy systems. Once “stealthy implants” have been placed to infiltrate enemy systems, thus allowing “permanent accesses,” then Phase Three has been achieved — a phase headed by the word “dominate” in the documents. This enables them to “control/destroy critical systems & networks at will through pre-positioned accesses (laid in Phase 0).” Critical infrastructure is considered by the agency to be anything that is important in keeping a society running: energy, communications and transportation. The internal documents state that the ultimate goal is “real time controlled escalation”.

One NSA presentation proclaims that “the next major conflict will start in cyberspace.” To that end, the US government is currently undertaking a massive effort to digitally arm itself for network warfare. For the 2013 secret intelligence budget, the NSA projected it would need around $1 billion in order to increase the strength of its computer network attack operations. The budget included an increase of some $32 million for “unconventional solutions” alone.

In recent years, malware has emerged that experts have attributed to the NSA and its Five Eyes alliance based on a number of indicators. They include programs like Stuxnet, used to attack the Iranian nuclear program. Or Regin, a powerful spyware trojan that created a furor in Germany after it infected the USB stick of a high-ranking staffer to Chancellor Angela Merkel. Agents also used Regin in attacks against the European Commission, the EU’s executive, and Belgian telecoms company Belgacom in 2011.Given that spies can routinely break through just about any security software, virtually all Internet users are at risk of a data attack.

The new documents shed some new light on other revelations as well. Although an attack called Quantuminsert has been widely reported by SPIEGEL and others, documentation shows that in reality it has a low success rate and it has likely been replaced by more reliable attacks such as Quantumdirk, which injects malicious content into chat services provided by websites such as Facebook and Yahoo. And computers infected with Straitbizarre can be turned into disposable and non-attributable “shooter” nodes. These nodes can then receive messages from the NSA’s Quantum network, which is used for “command and control for very large scale active exploitation and attack.” The secret agents were also able to breach mobile phones by exploiting a vulnerability in the Safari browser in order to obtain sensitive data and remotely implant malicious code.

In this guerilla war over data, little differentiation is made between soldiers and civilians, the Snowden documents show. Any Internet user could suffer damage to his or her data or computer. It also has the potential to create perils in the offline world as well. If, for example, a D weapon like Barnfire were to destroy or “brick” the control center of a hospital as a result of a programming error, people who don’t even own a mobile phone could be affected.

Intelligence agencies have adopted “plausible deniability” as their guiding principle for Internet operations. To ensure their ability to do so, they seek to make it impossible to trace the author of the attack.

It’s a stunning approach with which the digital spies deliberately undermine the very foundations of the rule of law around the globe. This approach threatens to transform the Internet into a lawless zone in which superpowers and their secret services operate according to their own whims with very few ways to hold them accountable for their actions.

Attribution is difficult and requires considerable forensic effort. But in the new documents there are at least a few pointers. Querty, for example, is a keylogger that was part of the Snowden archive. It’s a piece of software designed to surreptitiously intercept all keyboard keys pressed by the victim and record them for later inspection. It is an ordinary, indeed rather dated, keylogger. Similar software can already be found in numerous applications, so it doesn’t seem to pose any acute danger — but the sourcecode contained in it does reveal some interesting details. They suggest that this keylogger might be part of the large arsenal of modules that that belong to the Warriorpride program, a kind of universal Esperanto software used by all the Five Eyes partner agencies that at times was even able to break into iPhones, among other capabilities. The documents published by SPIEGEL include sample code from the keylogger to foster further research and enable the creation of appropriate defenses.‘Just a Bunch of Hackers’

The men and women working for the Remote Operations Center (ROC), which uses the codename S321, at the agency’s headquarters in Fort Meade, Maryland, work on one of the NSA’s most crucial teams, the unit responsible for covert operations. S321 employees are located on the third floor of one of the main buildings on the NSA’s campus. In one report from the Snowden archive, an NSA man reminisces about how, when they got started, the ROC people were “just a bunch of hackers.” Initially, people worked “in a more ad hoc manner,” the report states. Nowadays, however, procedures are “more systematic”. Even before NSA management massively expanded the ROC group during the summer of 2005, the department’s motto was, “Your data is our data, your equipment is our equipment.”

The agents sit in front of their monitors, working in shifts around the clock. Just how close the NSA has already gotten to its aim of “global network dominance” is illustrated particularly well by the work of department S31177, codenamed Transgression.The department’s task is to trace foreign cyber attacks, observe and analyze them and, in the best case scenario, to siphon off the insights of competing intelligence agencies. This form of “Cyber Counter Intelligence” counts among the most delicate forms of modern spying.


ISIS is NOT ‘Blowback’ from Western Foreign Policy; It is Western foreign policy



ISIS is not ‘Blowback’ from Western Foreign Policy;

They ARE Western Foreign Policy

empire strikes black
By the Editor.

Notice that ISIS are sworn enemies of Syria, Hizbu’llah, and Iran. This in itself gives a most obvious clue as to the identity of the group’s benefactors.

A prevalent liberal cliché is the “blowback” theory – the theory that ISIS terror attacks, and indeed the group’s very existence, are somehow in retaliation to US/Western/”Israeli” foreign policy actions.

This is a disingenuous theory that is disseminated in order to keep the empire’s citizens on side. Crucially, it distracts from a key truth.

Western and “Israeli” intelligence has historically effected deep infiltration of ‘jihadist’ terror cells throughout the Arab world and the West; these groups are used literally as foot-soldiers (see Afghanistan throughout the 1980s) to achieve Western and “Israeli” military and strategic objectives. The “blowback” theory distracts from this key fact.

ISIS aren’t retaliating against Western foreign policy; they are Western foreign policy. These very people were mobilized against Muammar Gaddafi in Libya’s bogus ‘revolution’ of 2011, as with Syria in the same year.

In moving across the Syrian-Iraqi border, ISIS – Zionism’s foot-soldiers – underwent a magical media transformation into the ‘bad guys’. The ‘war against ISIS’ is a con, a total scam. It is a pretext for a war against the resistance axis: chiefly Syria, Hizbu’llah, Iran, and the Palestinian resistance. It is a pretext to kick the ‘Yinon plan’ – the plan to balkanise the Arab world to ensure “Israeli” hegemony – into high gear

The WMD lies of 2003 never went away; they simply got re-packaged for the liberal crowd in the post-Bush era.

The Yinon Plan, “Greater Israel”, Syria, Iraq, and ISIS: the Connection


The Zionist Plan for the Middle East, also known as the Yinon Plan, is an Israeli strategic plan to ensure Israeli regional superiority. It insists and stipulates that Israel must reconfigure its geo-political environment through the balkanization of the surrounding Arab states into smaller and weaker states.

Reach of a "Greater Israel"

 “Greater Israel” consists in an area extending from the Nile Valley to the Euphrates.

When viewed in the current context, the war on Iraq, the 2006 war on Lebanon, the 2011 war on Libya, the ongoing war on Syria, not to mention the process of regime change in Egypt, must be understood in relation to the Zionist Plan for the Middle East. The latter consists in weakening and eventually fracturing neighboring Arab states as part of an Israeli expansionist project. (READ HERE)


Suspicion Grows That Paris Commando Attack Involved Intelligence Agencies


[SEE:  CIA behind Paris attack?]

As AQAP claims Paris attack, suspicious role of others possible


Yemen Post Staff

Al-Qaida in the Arabian Peninsula (AQAP) on Wednesday claimed responsibility for the last week’s attack on the French Newspaper Charlie Hebdo.
In a videotape on a pro-Al-Qaida website, an AQAP leader said the group had carried out the attack under an order from Ayman Al-Zawahiri, leader of the global terrorist network.
Though AQAP has been seen as the most dangerous branch of Al-Qaida, observers argued that the videotape was not sufficient evidence it had already carried out the attack. Contradictory statements on the attack including those by senior US and Yemeni officials and the statuses of Al-Qaida in the region boost such assumption, they said.
Nabil Albukiri, a researcher focused on militant groups and head of the Arab center for political studies and development, said the videotape could be part of the media competition between Al-Qaida branches in the region.
“These branches have been facing a global war weakening them to the extent it is possible they claim successful attacks on their enemies even though they are not behind attacks in reality. Such a move aims to keep high spirits of their exhausted militants and then convince others that Al-Qaida is still strong and can fight back,” he said.
Beyond Qaida ability
The Middle East has recently become an obvious arena for struggle of regional and foreign countries, a matter which made observers don’t exclude that countries are using terrorism as a key card in their struggle.
Yemeni observers said the post-Arab Spring violence has further exposed the struggle of big powers and rising regional powers over oil and other interests in the region.
“Now, these countries are seeking  to transfer part of their struggle from Iraq and Syria into Yemen, mainly for oil,” Albukiri said.
Abdul Salam Muhammad, head of the ABAAD studies and research center, said the attack on Charlie Hebdo was beyond the abilities of Al-Qaeda.
The attack points to involvement of international intelligence agencies and countries. No one can deny terrorism of Islamist militants; the point, however, is that neither AQAP nor ISIS has the abilities to carry out such a deadly attack in downtown the capital of one of the countries playing a key role in the fight against terror,” Muhammad said.
“The Kouatchi brothers were able to raid, camouflage and fight back with necessary guns which means they were well-trained at hands of combat professionals, not from Yemen,” he said.
Alsalahi, a political sociology professor at Sanaa University, said the West’s involvement can’t be ruled out when it comes to international terrorism.
“The West especially the US has been seeking to create a giant enemy after the fall of the Soviet Union in order to interfere militarily in areas of conflicts, guarantee suitable sales of their weapons and in the end to convince people to pay taxes without asking about the military spending,” Alsalahi said.
AQAP has been seen as the most dangerous and active branch of Al-Qaida in the world. It has been responsible for several plots for attacks including a few bombing plots against US targets.
In response, the US has been providing direct support including drone strikes to the Yemeni army to fight AQAP. In this context, observers said the US is a direct enemy of AQAP which means the possibility of AQAP attack on Paris is low.
Local violence
Locally, AQAP has been very active since it was founded in 2009.
The group has lately increased its deadly attacks  mostly against the Houthi Militant Group.
In case AQAP was really responsible for the Paris attack, it is logical to link that to the plot backed by some Western countries which included handing power in Yemen to the Houthi Group, observers said.
Houthis were engaged in the war on Al-Qaida after they seized capital.
Muhammad said the power seizure by Houthi militias has resulted in increasing solidarity with Al-Qaida.
“As Houthi militias continue to tighten grip on power, power vacuum deepens, Al-Qaida finds more hotbeds and then its success in carrying out attacks increases,” he said.
Meanwhile, observers ruled out that the Coalition against ISIS will expand its operations into Yemen in response to terrorist threats to Europe including the Paris attack.
“In Yemen, the international community is directly backing the transition process and what is needed is that they help the country to build a real state not ruled by militants,” Muhammad said.



Guantanamo and The Saudi Rehabilitation Program Behind AQAP–(Intentional, or Major Fowl-UP?)

The Eleven Saudi Guantanamo Veterans Returning to the Fight


“Arguably, the most dangerous of the eleven Saudi Gitmo veterans currently on the run—Saeed al-Shehri and Mohammed al-Harbi—were cooperative, non-confrontational, and even charming during their interactions with ARB panel members in Guantanamo Bay. One cannot but appreciate the irony
of Mohammed al-Harbi—now thought to be in the midst of planning imminent terrorist attacks against U.S. interests in Saudi Arabia and in Yemen—making a “heartfelt” offer “to work for American authorities once he was back in Saudi Arabia.”356

356 “Unclassified Summary of Evidence for Administrative Review Board in the Case of al Harbi, Mohamed Atiq Awayd.” Administrative Review Board (ARB) Round 2. U.S. Department of Defense; Office for the Administrative Review of the Detention of Enemy


THE ELEVEN al shehri

al jebairy al shehrial jebairy al shehri1

al faifyTHE ELEVEN al faify

al jutayli

al harbi 1al harbi 2

al hadrami

al shedoky1al shedoky2

al sayegh1al sayegh

ar rabeish

al assiri1al assiri

al ghamdi1al ghamdi


%d bloggers like this: