The European Tribune is a forum for thoughtful dialogue of European and international issues. You are invited to post comments and your own articles.
Please REGISTER to post.
Obviously there are only three parties with interest in Nord Stream a) Ukraine b) Russia and c) a coordinated act by one or more members of NATO. The Germans are convinced it was NATO.
The secrecy and complete absence of any transparency by Sweden and Denmark is a sure bet it is c).
The official denial by intelligence agency will not lead to the perpetrator. Neither will any "investigation" by one of the parties involved. 'Sapere aude'
Sweden and Denmark filed in useful idiots by Stoltenberg, each according to their own dubious aspirations in bloc pyramids and, shall we say, prosecutorial expertise in criminal and civil equity law. To be charitable, I'd suppose, their IC were the last to know the mission, declared ex post by NO "seismologists", was accomplished.
Germans are not about to incriminate their "knowledge and belief".
I'm sure a lot are privately, but all I've seen in the media is astonishing message discipline.
What do we get for purchasing twitter blue? How does it help me grow in anyway?— SnailTrail221 (@STrail221) November 1, 2022
What do we get for purchasing twitter blue? How does it help me grow in anyway?
Secret Report: UAE-based intelligence firm said recruiting IDF veterans from elite cyber unit | Jan. 11, 2019 |
Project Raven
Inside the UAE's Secret Hacking Team of American Mercenaries | Reuters - Jan. 30, 2019 Ex-NSA operatives reveal how they helped spy on targets for the Arab monarchy -- dissidents, rival leaders and journalists. Two weeks after leaving her position as an intelligence analyst for the U.S. National Security Agency in 2014, Lori Stroud was in the Middle East working as a hacker for an Arab monarchy. She had joined Project Raven, a clandestine team that included more than a dozen former U.S. intelligence operatives recruited to help the United Arab Emirates engage in surveillance of other governments, militants and human rights activists critical of the monarchy. Stroud had been recruited by a Maryland cybersecurity contractor to help the Emiratis launch hacking operations, and for three years, she thrived in the job. But in 2016, the Emiratis moved Project Raven to a UAE cybersecurity firm named DarkMatter. Before long, Stroud and other Americans involved in the effort say they saw the mission cross a red line: targeting fellow Americans for surveillance.
Ex-NSA operatives reveal how they helped spy on targets for the Arab monarchy -- dissidents, rival leaders and journalists.
Two weeks after leaving her position as an intelligence analyst for the U.S. National Security Agency in 2014, Lori Stroud was in the Middle East working as a hacker for an Arab monarchy.
She had joined Project Raven, a clandestine team that included more than a dozen former U.S. intelligence operatives recruited to help the United Arab Emirates engage in surveillance of other governments, militants and human rights activists critical of the monarchy.
Stroud had been recruited by a Maryland cybersecurity contractor to help the Emiratis launch hacking operations, and for three years, she thrived in the job. But in 2016, the Emiratis moved Project Raven to a UAE cybersecurity firm named DarkMatter. Before long, Stroud and other Americans involved in the effort say they saw the mission cross a red line: targeting fellow Americans for surveillance.
Follow-up:
US charges American mercenary hackers over their work in UAE | The Guardian - Sept. 14, 2021 |
Key words here @EuroTrib #ProjectRaven #DarkMatter #mercenariesofdeath #BlackCube #HarryWeinstein
The willingness of some former US (and, presumably, other FVEY) intelligence personnel to train up intelligence bureaus in repressive governments is abhorrent. I'm glad that this is a first (hopefully not last) attempt to showcase there are consequences for such activities.— Christopher Parsons (@caparsons) September 14, 2021
The willingness of some former US (and, presumably, other FVEY) intelligence personnel to train up intelligence bureaus in repressive governments is abhorrent. I'm glad that this is a first (hopefully not last) attempt to showcase there are consequences for such activities.
Black-Ops Mercenaries On the Internet | Jan. 30, 2019 |
"We use Facebook to schedule the protests, Twitter to coordinate, and YouTube to tell the world." #egypt #jan25— Fawaz Rashed (@FawazRashed) March 18, 2011
"We use Facebook to schedule the protests, Twitter to coordinate, and YouTube to tell the world." #egypt #jan25
#ArabSpring #SyriaUprising 'Sapere aude'
eurativ | EU countries lay bare Europe's limits in securing critical infrastructure, 2 mo 1 wk later
The vulnerability of the EU's critical infrastructure came under the spotlight at the end of September following the detected leakage of two Nord Stream pipelines in the Baltic Sea, an act of deliberate sabotage that Western security agencies attributed to Russia. [...] On 5 October, Commission President Ursula von der Leyen presented a five-point plan to secure critical European infrastructure, which included carrying out stress tests and early implementation of the Critical Entities Resilience directive (CER). [...] Underwater infrastructure A notable criticism from France is that the CER directive does not cover maritime infrastructure, only terrestrial, where internet cables and gas pipelines are submarine and outside national territories. Finland emphasised relying on trusted vendors for subsea cable systems. Since many of these cables are at the end of their lifecycle, substantial investments should be considered to ensure global connections. [...] Added Value Profit The Commission's response to significant infrastructure should be coordinated within the Integrated Political Crisis Response (IPCR). For Germany, it is unclear whether the IPCR should provide a platform for constant coordination or just in case of significant disruptions. Moreover, the Commission proposed the development of a new blueprint for critical infrastructure incidents and crises to define how the IPCR would coordinate its response....Berlin deemed it unacceptable that the Commission could unilaterally determine the cooperation between member states, considering it a decision for the Council. France, the Netherlands, Finland, Slovakia, Austria, and Poland all requested further clarity on the blueprint, notably its added value compared to existing initiatives such as the EU Hybrid Playbook....
A notable criticism from France is that the CER directive does not cover maritime infrastructure, only terrestrial, where internet cables and gas pipelines are submarine and outside national territories. Finland emphasised relying on trusted vendors for subsea cable systems. Since many of these cables are at the end of their lifecycle, substantial investments should be considered to ensure global connections. [...] Added Value Profit The Commission's response to significant infrastructure should be coordinated within the Integrated Political Crisis Response (IPCR). For Germany, it is unclear whether the IPCR should provide a platform for constant coordination or just in case of significant disruptions. Moreover, the Commission proposed the development of a new blueprint for critical infrastructure incidents and crises to define how the IPCR would coordinate its response....Berlin deemed it unacceptable that the Commission could unilaterally determine the cooperation between member states, considering it a decision for the Council. France, the Netherlands, Finland, Slovakia, Austria, and Poland all requested further clarity on the blueprint, notably its added value compared to existing initiatives such as the EU Hybrid Playbook....
Under subsection (p) of Section 2209 of the Homeland Security Act, as amended (6 U.S.C. § 659(p)), CISA has the authority to issue administrative subpoenas for the production of information necessary to identify and notify an entity at risk. This authority applies when CISA identifies a system connected to the internet with a specific security vulnerability and has reason to believe the security vulnerability relates to critical infrastructure and affects a covered device or system, but is unable to identify the entity at risk.
The Intercept | Truth Cops, 31 Oct ppl are US American critical infrastructure, too!
reference CISA Cybersecurity Advisory Committee, meeting minutes 12.05.22 Protecting Critical Infrastructure from "the MDM space" (merits duplication in Crisis as Discipline, NPI Systems Design 2022 > public service media operators)
by Frank Schnittger - Sep 24 2 comments
by Oui - Sep 19 19 comments
by Oui - Sep 13 35 comments
by Frank Schnittger - Sep 11 5 comments
by Cat - Sep 13 9 comments
by Frank Schnittger - Sep 2 2 comments
by Oui - Sep 29
by Oui - Sep 28
by Oui - Sep 274 comments
by Oui - Sep 2618 comments
by Frank Schnittger - Sep 242 comments
by Oui - Sep 1919 comments
by gmoke - Sep 173 comments
by Oui - Sep 153 comments
by Oui - Sep 15
by Oui - Sep 1411 comments
by Oui - Sep 1335 comments
by Cat - Sep 139 comments
by Oui - Sep 127 comments
by Frank Schnittger - Sep 115 comments
by Oui - Sep 929 comments
by Oui - Sep 713 comments
by Oui - Sep 61 comment
by Frank Schnittger - Sep 22 comments
by gmoke - Sep 2
by Oui - Sep 1199 comments