War June 2012 Archives
Archives May 2012 →
Military drones have worked just fine for armies to remotely carry out their attacks on enemies. It has also proven lethal when chasing down supposed terrorists in Pakistan and Afghanistan where US led military attacks have murdered innocent children, men and women. Those attacks too, have been labeled successful, despite the unnecessary killing of unsuspecting victims.
Revelations about casket linings, plan for evacuation of London blacklisted.
The United States and Israel jointly developed a sophisticated computer virus nicknamed Flame that collected critical intelligence in preparation for cyber-sabotage attacks aimed at slowing Iran’s ability to develop a nuclear weapon, according to Western officials with knowledge of the effort.
The In Vivo technology would also have commercial applications for physiological monitoring of patients.
One of these leaves circles down to us from the United Nations Environmental Programme (UNEP) displays a collection of “key messages” written by the usual suspects, such as dedicated man-hater Paul Ehrlich, eco-terrorist James Lovelock and NASA’s own mad-as-hell environmentalist James Hansen.
“Unless you are a criminal, then you’ve nothing to worry about from this new law.” How many times have humans heard that old saw? Only as many times as governments have taken away more of their liberties in the name of fighting crime.
So was Bush, Clinton, Carter and almost all previous presidents. The Founders knew better.
The US is planning to expand secret intelligence bases throughout Africa with a view to combating terrorism in the region, says a new report by the Washington Post. It is the latest in a US push to militarize its presence on the continent.
The U.S. Military is looking to relocate some of their predator drones, sending some to South and Central America, according to a new article in Wired Magazine.
We are fighting a war in the FATA, we are fighting a war against terrorism,” said Defense Secretary Leon Panetta on Wednesday, referring to the tribal areas of Pakistan that the U.S. has spent three years bombing heavily. Was that so hard to admit?
This move by the technology giant shouldn’t be understood as an attempt to keep user information safe. Google, a government-sponsored data mining operation is perhaps the largest violator of privacy on the Internet.
Armed groups say not committed to Annan’s peace plan anymore, and instead side with British-led attack.
Main Stream Media carefully justifies attacks under the excuse that Iran might be producing a nuclear bomb or that Al-Qaeda — a USA creation — is using computers somewhere.
Security experts said on Monday a highly sophisticated computer virus is infecting computers in Iran and other Middle East countries and may have been deployed at least five years ago to engage in state-sponsored cyber espionage.
Army Brigadier General Neil Tolley, commander of US special forces in South Korea, told a conference held in Florida last week that Pyongyang had built thousands of tunnels since the Korean war, The Diplomat reported.
Archives May 2012 →