Welcome to European Tribune. It's gone a bit quiet around here these days, but it's still going.

Nord Stream Whodunnit UPDATE

by Cat Mon Oct 31st, 2022 at 07:29:59 PM EST

One month later. NY Yella Cake | Three Inquiries, but No Answers to Who Blew Holes in Nord Stream Pipelines, pay wall

YouTube "READ OUT" 27 Oct, running time 08:54, EN subtitles, CC autotrans enabled

Politico.eu.com | Nord Stream investigation tests EU intelligence sharing around the Baltic, 28 Oct motive

Most observers believe Russia blew up the pipelines -- which were built to transport gas from Russia to Germany -- in an effort to further destabilize Europe's energy supplies ahead of winter.
contradicting Europe's reported successful, 7-months long EU Russian gas "embargo," RU asset forfeitures, and bank sanctions as well Russian gas and oil supply racketeering, scheduled 5 Dec 2022 and 5 Jan 2023, respectively. vdL's tanks are 97% full, thanks to "war time" rationing to deny "Putin's price" for war on UKRAINE, possibly a Just Transition to net-zero emissions across EU27.


watching the detectives

Key evidence is likely to come from the type of sensitive intelligence that EU members have traditionally been reluctant to share. Allegations last year that intelligence agencies in Denmark had allowed the U.S. to spy on senior Swedish and German lawmakers deepened mistrust.
[...]
opportunity
Suella Braverman resigns as interior minister after 43 days, 19 Oct
Just to be clear, the Tory right is convinced the "security" breach by @SuellaBraverman was relatively trival and exploited by Liz Truss to hand the home office to a centrist, Shapps. They see this as a takeover by Jeremy Hunt's wing of the party. The Brexit Tory right.

Truss phone was hacked by suspected Putin agents when she was foreign minister, the Daily Mail reports, 29 Oct
Those agents gained access to "top-secret details" of negotiations with international allies in addition to private messages exchanged with Truss's close friend Kwasi Kwarteng, who later became finance minister, the report said. The messages are believed to have included discussions with senior international foreign ministers about the war in Ukraine, including details about arms shipments, it added. Up to a year's worth of messages were downloaded, the Mail said, citing unnamed sources.
the dogs that did not bark
Experts say locally controlled secret underwater sensors and submarines will be key to the investigation, along with intelligence from international partners like the U.S. and the U.K.
US Naval Force Visits Baltic, 8 Aug
The US Navy Amphibious Ready Group (ARG) and Marine Expeditionary Units (MEUs) have arrived at multiple Baltic Sea ports for training and reinforcement of ties with regional allies. ...The event marks the return of ARG Kearsarge and the USS Gunston Hall to the Baltic Sea after participating in Exercise Siil 2022 led by the Estonian Defense Forces last May and the multinational exercise Baltic Operations 2022 (BALTOPS22) in June.

NATO | Allied Air Forces Conduct Regular Training Drills in Baltic Sea
RAMSTEIN, Germany - On September 26 and 27, Allies Hungary, Germany, Czech Republic, Italy, Türkiye, the United Kingdom, Estonia, Latvia, and Lithuania, as well as partner Finland will conduct the third Ramstein Alloy exercise in 2022 with a focus on NATO's Deter and Defend concept....
ANONYMOUS:...It was a huge, multinational, interagency operation. In the US, it was CIA, NSA, and the military Cyber Command. From Britain we used raw intel out of GCHQ. But the main partner was Isreal. Over there Mossad ran the show and the technical work was done by Unit 8200. Israel is really the key to the story.
Zero Days
antithesis of "cyber-security"
It's a highly sensitive issue. The prosecutor leading the Swedish investigation has already said his country is not interested in signing up to a so-called Joint Investigation Team under the auspices of Eurojust, the EU agency set up to solve cross-border crime.
conflicts of interest
A spokesman for the Swedish prosecutor's office said the decision related to "secrecy linked to national security" and declined to comment on the progress of Sweden's investigation. A spokesman for the Swedish security service said the country was "cooperating with both Germany and Denmark in this matter."
patsies detained
Tensions are also running high in Norway, where authorities last week said they had arrested six Russians suspected of flying unidentified drones over Norwegian oil and gas installations and other sensitive sites, including airports. Russia's ambassador to Norway called the arrests "hysteria."
means: collecting loose ends

USAF Gen., NSA Dir. (ret'd) MICHAEL HAYDEN: Two answers before you even get started. I don't know, and if I did, we wouldn't talk about it anyway.
NARRATOR: But how can you have a debate if everything is secret?
Staff JA, US Cyber Command, GARY BROWN: I think right now that's just where we are. No one wants to, countries aren't happy about confessing or owning up to what they did, because they're not quite sure where they want the system to go. And so, whoever was behind stuxnet hasn't admitted that they were behind it.
NARRATOR: Asking officials about stuxnet was frustrating and surreal like asking the emperor about his new clothes. Even after the cyper-weapon had penetrated computers all over the world, no one was willing to admit that it was loose or talk about the dangers it posed. What was it about the stuxnet operation that was hiding in plain sight? Maybe there was a way the computer code could speak for itself.

Stuxnet first surfaced in Belarus. I started with a call to the man who discovered it [17 JUNE 2010], when his clients in Iran began to panic over an epidemic of computer shutdowns.

Had you ever seen anything quite so sophisticated before?
SERGEY ULASEN: I have seen very sophisticated virus before, but they didn't have this kind of zero day. It was the first time in my practice. That led me to understand that I should notify web security companies ASAP about the fact that such a danger exists.
Kapersky Lab, VITALY KAMLUK: This room we call a woodpecker's room or virus lab, and this is where virus analysts sit. We call them woodpeckers, because they are pecking the worms, network worms, and viruses. And we see, like, three different groups of hackers behind cyber-attacks.The are traditional cyber criminals. Those guys are interested only in illegal profit and quick an dirty money. Activists, or hacktivists, They are hacking for fun or hacking to push some political message. And the third group is nation-states. They're interested in high-quality intelligence or sabotage activity.
Kapersky Lab, EUGENE KAPERSKY: I got the news about stuxnet from one of my engineers. He came to my office, opened the door, and he said, 'So, Eugene, of course you know that we are waiting for something really bad. It happened.'
Control Systems Security, RALPH LANGNER (Hamburg, DE): Well, I wouldn't call it amazement. It was kind of a shock. It went beyond our worst fears, our worst nighmares, and this continued the more we analyed. The more we researched, the more bizarre the whole story got.
Symantec Security Response, LIAM O'MURCHU: We look at so much malware every day that we can just look at the code and straight away we can say, 'Okay, there's somthing bad going on here, and I need to investigate that.' And that's the way it was when we looked at stuxnet the first time. We opened it up, and there was just bad things everywhere....The most interesting thing that we do is detective work where we try to track down who's behind a threat, what are they doing, what's their motivation, and try to really stop it at the root.
Zero Days

Sir Arthur C. Doyle: It is an old maxim of mine that when you have excluded the impossible...

Russian air and sea missiles, or UAVs, cleverly concealed WWII Soviet-NAZI mines, and midnight submarine-assisted depth charges

...whatever remains, however improbable, must be the truth.

Display:
Interesting ... the pro-NATO crowd, members in U.S. Congress are openly proud the Nord Stream pipelines are blown-up ... in the earliest stage congratulations were expressed on Twitter accounts ...

Obviously there are only three parties with interest in Nord Stream a) Ukraine b) Russia and c) a coordinated act by one or more members of NATO. The Germans are convinced it was NATO.

The secrecy and complete absence of any transparency by Sweden and Denmark is a sure bet it is c).

The official denial by intelligence agency will not lead to the perpetrator. Neither will any "investigation" by one of the parties involved.

'Sapere aude'

by Oui (Oui) on Mon Oct 31st, 2022 at 08:01:37 PM EST
of course, They are. LANG is representative of 20010 cyber-security foresic expertise in DE. I doubt, anyone in the 'stadt or 'wahr has forgotten the Merkel phone taps that they swept under the rug.

Sweden and Denmark
filed in useful idiots by Stoltenberg, each according to their own dubious aspirations in bloc pyramids and, shall we say, prosecutorial expertise in criminal and civil equity law. To be charitable, I'd suppose, their IC were the last to know the mission, declared ex post by NO "seismologists", was accomplished.

by Cat on Tue Nov 1st, 2022 at 12:03:36 AM EST
[ Parent ]
Let's not forget The Turbine(s) manufacturer and maintenance guaranty, Siemans Energy, as well as Scholz's dramatic inspection site photo-op.

Germans are not about to incriminate their "knowledge and belief".

by Cat on Tue Nov 1st, 2022 at 01:19:35 AM EST
[ Parent ]
The Germans are convinced it was NATO.

I'm sure a lot are privately, but all I've seen in the media is astonishing message discipline.

by generic on Tue Nov 1st, 2022 at 10:41:52 AM EST
[ Parent ]
The European Media Freedom Act thread is located in Crisis as Discipline, NPI Systems Design 2022. I encourage you to comment on the latest develpments in cross-border crime, "Twitter must play by our rules," before time disables that feature.
by Cat on Tue Nov 1st, 2022 at 04:11:22 PM EST
[ Parent ]


'Sapere aude'
by Oui (Oui) on Tue Nov 1st, 2022 at 07:09:09 PM EST
[ Parent ]
That blurb left out the protagonist, millionaire novelist Stephen King. Apparently, he exchanged words with Musk on twitter. Complaining that his blue ribbon hall pass was not worth $20/mo, he vowed to quit.
by Cat on Wed Nov 2nd, 2022 at 02:50:11 AM EST
[ Parent ]
by Cat on Sun Nov 6th, 2022 at 10:36:21 AM EST
[ Parent ]
Unit 8200 and NSA specialists getting top salaries in UAE, Abu Dhabi ... DarkMatter

Secret Report: UAE-based intelligence firm said recruiting IDF veterans from elite cyber unit | Jan. 11, 2019 |

Project Raven

Inside the UAE's Secret Hacking Team of American Mercenaries | Reuters - Jan. 30, 2019

Ex-NSA operatives reveal how they helped spy on targets for the Arab monarchy -- dissidents, rival leaders and journalists.

Two weeks after leaving her position as an intelligence analyst for the U.S. National Security Agency in 2014, Lori Stroud was in the Middle East working as a hacker for an Arab monarchy.

She had joined Project Raven, a clandestine team that included more than a dozen former U.S. intelligence operatives recruited to help the United Arab Emirates engage in surveillance of other governments, militants and human rights activists critical of the monarchy.

Stroud had been recruited by a Maryland cybersecurity contractor to help the Emiratis launch hacking operations, and for three years, she thrived in the job. But in 2016, the Emiratis moved Project Raven to a UAE cybersecurity firm named DarkMatter. Before long, Stroud and other Americans involved in the effort say they saw the mission cross a red line: targeting fellow Americans for surveillance.

Follow-up:

US charges American mercenary hackers over their work in UAE | The Guardian - Sept. 14, 2021 |

Key words here @EuroTrib #ProjectRaven #DarkMatter #mercenariesofdeath #BlackCube #HarryWeinstein

Black-Ops Mercenaries On the Internet | Jan. 30, 2019 |

#ArabSpring #SyriaUprising

'Sapere aude'

by Oui (Oui) on Sun Nov 6th, 2022 at 05:26:52 PM EST
[ Parent ]

Ill-advised water feature photos of the w/e 5 Nov

eurativ | EU countries lay bare Europe's limits in securing critical infrastructure, 2 mo 1 wk later

The vulnerability of the EU's critical infrastructure came under the spotlight at the end of September following the detected leakage of two Nord Stream pipelines in the Baltic Sea, an act of deliberate sabotage that Western security agencies attributed to Russia.
[...]
On 5 October, Commission President Ursula von der Leyen presented a five-point plan to secure critical European infrastructure, which included carrying out stress tests and early implementation of the Critical Entities Resilience directive (CER).
[...]
Underwater infrastructure

A notable criticism from France is that the CER directive does not cover maritime infrastructure, only terrestrial, where internet cables and gas pipelines are submarine and outside national territories. Finland emphasised relying on trusted vendors for subsea cable systems. Since many of these cables are at the end of their lifecycle, substantial investments should be considered to ensure global connections.
[...]
Added Value Profit
The Commission's response to significant infrastructure should be coordinated within the Integrated Political Crisis Response (IPCR). For Germany, it is unclear whether the IPCR should provide a platform for constant coordination or just in case of significant disruptions. Moreover, the Commission proposed the development of a new blueprint for critical infrastructure incidents and crises to define how the IPCR would coordinate its response....Berlin deemed it unacceptable that the Commission could unilaterally determine the cooperation between member states, considering it a decision for the Council. France, the Netherlands, Finland, Slovakia, Austria, and Poland all requested further clarity on the blueprint, notably its added value compared to existing initiatives such as the EU Hybrid Playbook....

archived wut
by Cat on Thu Nov 3rd, 2022 at 05:56:39 PM EST
[ Parent ]
Dept. of Homeland Security, Cybersecurity & Information Security Agency
Under subsection (p) of Section 2209 of the Homeland Security Act, as amended (6 U.S.C. § 659(p)), CISA has the authority to issue administrative subpoenas for the production of information necessary to identify and notify an entity at risk. This authority applies when CISA identifies a system connected to the internet with a specific security vulnerability and has reason to believe the security vulnerability relates to critical infrastructure and affects a covered device or system, but is unable to identify the entity at risk.

The Intercept | Truth Cops, 31 Oct
ppl are US American critical infrastructure, too!

reference
CISA Cybersecurity Advisory Committee, meeting minutes 12.05.22
Protecting Critical Infrastructure from "the MDM space" (merits duplication in Crisis as Discipline, NPI Systems Design 2022 > public service media operators)

by Cat on Thu Nov 3rd, 2022 at 11:55:26 PM EST
[ Parent ]
Nord-Stream-Gasleitungen: CIA warnte Bundesregierung vor Anschlag auf Ostsee-Pipelines - DER SPIEGEL
Es verdichten sich die Anzeichen für eine geplante Attacke gegen die beiden Nord-Stream-Gasleitungen. Nach SPIEGEL-Informationen gab es bereits im Vorfeld Hinweise darauf aus den USA.

Weird how the CIA warned the German government about planned attacks, yet they don't name a culprit.

by generic on Mon Oct 31st, 2022 at 08:18:55 PM EST
You may think so, but I don't. Over the years, I've been much impressed by one constant alibi running through US reportage: fed agency "silos" of information, command centers, and IT networks. Sometimes it's a persuasive explanation for congressional patrons bickering over supplementary budget amendments and NEW! special purpose commissions for inveterate contractors. Sometimes it's inexcusable, like 70 years of suburban sprawl.
ANONYMOUS: ... Fresh from the surge, I went to work at NSA in '07 in a supervisory capacity. Fort Meade. You know, I commuted to that massive complex every single day. I was in TAO-S321, "The ROC." TAO is Tailored Access Operations. It's where the NSA hackers work. Of course, we didn't call them that. On net operators, they're the only people at NSA allowed to break in or attack on the internet. Inside TAO headquarters in the ROC, Remote Operations Center. If the US government wants to get in somewhere, it goes to the ROC. I mean, we were flooded with requests, so many that we could only do about 30% of the missions that were requested of at one time throuth the web, but also by hijacking shipments of parts. You know, sometimes the CIA would assist in putting implants in machines, so once inside a target network, we could just watch or we could attack.
Zero Days
by Cat on Tue Nov 1st, 2022 at 12:28:42 AM EST
[ Parent ]
Linda Moore, president and CEO of TechNet, a tech lobbying group that counts Amazon, Apple[,] and Google among its members, said The Sector™ can now frame follow-up immigration action as a chance "to deliver on the promise of what this bill [CHIPS and Science] was passed to do."

"It is a national security issue," Moore said. "Cybersecurity alone, but also the fact that it's high-skilled immigration and filling the jobs that we need in companies across the industry, defense contractors being one of them."

by Cat on Tue Nov 1st, 2022 at 04:22:10 PM EST
[ Parent ]
Attack on Russian fleet leads to collapse of deal ensuring vital grain shipments | WSWS |

The Russian foreign ministry said the strikes were "directed, among other things, against Russian ships that ensure the functioning of the specified humanitarian corridor." Following the attack, the ministry claimed that "the Russian side cannot guarantee the safety of civilian dry cargo ships participating in the `Black Sea Initiative.'"

The Black Sea Grain Initiative was an agreement between Russia and Ukraine, brokered by Turkey in July, that allowed the transportation of 9.5 million tons of food products out of Ukraine and onto global markets, against the backdrop of an unprecedented surge in food prices.

Like the bombing of the Kerch Bridge and the assassination of Russian fascist ideologue Daria Dugina, the announcement of the Ukrainian attack followed a similar pattern. The New York Times reported that Ukrainian forces carried out the attack, confirming the assertions of Russian officials.

The Times' confirmation came in the form of an article published Saturday, "With Western Weapons, Ukraine Is Turning the Tables in an Artillery War," which declared, "The new capabilities were on display in the predawn hours Saturday when Ukrainian drones hit a Russian vessel docked in the Black Sea Fleet's home port of Sevastopol, deep in the occupied territory of Crimea, once thought an impregnable bastion."

As with previous attacks, Ukrainian officials denied being involved, absurdly claiming Russia blew up its own ships. Other US reports treated the claims that Ukrainian forces were involved as unsubstantiated allegations by the Kremlin.



'Sapere aude'
by Oui (Oui) on Mon Oct 31st, 2022 at 09:11:13 PM EST
I see that skirmish as the last straw.

I've comment on that ... de facto...120-day cease fire for the sake of starving Africans since tri-lateral negotiation started in June. Which is to say, agreement dragged on to end July, not only because UA wouldn't meet, but RU wanted G7 concessions on PI shipping and port sanctions to move its MY 2022/2023 harvest. Although G7 insisted it had imposed no RU grain or fertilizer commodity sanctions on buyers, the RU logistics piece of distribution slipped under incessant UA "blockade," bloated yield agitprop, US State red-baiting AU55, and Guterres equivocation.

The JCC only measures UA tonnes shipped, as if indeed no other trade exists.

I don't know exactly how RU managed it, but word on the trades' grape vine is RU has delivered 8M mt/40M mt harvested for export—by-passing Baltic and Black Seas— so far.

by Cat on Tue Nov 1st, 2022 at 01:00:27 AM EST
[ Parent ]
That's entertaining, in retrospect.
120-day cease fire for the sake of starving Africans

News to me. Clearly it didn't involve a ceasefire on Russian missiles targeting civilian port infrastructure in Odessa (where the grain leaves from).

It is rightly acknowledged that people of faith have no monopoly of virtue - Queen Elizabeth II

by eurogreen on Fri Nov 4th, 2022 at 02:27:09 PM EST
[ Parent ]
hmm, yes, well, "wheat" for "starving Africans" and "JCC"  are searchable eurotrib KEYWORDS to use, if you care to recap The Grain Deal® progress: MY 2021/2022 world producers, Ukraine principal buyers, Ukraine port conditions, mine sweeping, in/outbound vessel movements since 1 Aug from 3, covered ports, and actual cargo delivered.

Resolution of disagreement among the parties
Reuters | Russia's statement on resuming participation in Black Sea grain deal, 2 Nov

Here is a translation by Reuters from the Russian....
India Narative | Russia returns to Black Sea Grain Initiative after 'written guarantees', 2 Nov
The United Nations, which is backing the initiative signed by Russia, Ukraine[,] and Turkey in Istanbul on July 22 in order to give global access to Ukrainian food products and Russian food and fertilizer, too[,] announced that it will not to plan any movement of vessels in the region for Wednesday....
China Daily | Moscow returning to Black Sea grain deal, 3 Nov
The Russian defense ministry said it had received written guarantees from Kyiv not to use the Black Sea grain corridor for military operations against Russia.

"The Russian Federation considers that the guarantees received at the moment appear sufficient, and resumes the implementation of the agreement," the ministry statement said.

Daily Sabah | Türkiye, Russia agree to send grains to African countries for free, 4 Nov
"In my phone call with (Russian President) Vladimir Putin, he said, 'Let's send this grain to countries such as Djibouti, Somalia[,] and Sudan for free' - and we agreed," Erdoğan said in his speech during the MÜSIAD EXPO in Istanbul.

The comment came after Russia on Wednesday resumed its participation in the United Nations and Türkiye-brokered grain agreement, ending four days of non-cooperation that still saw exports continue from Ukrainian ports.
[...]
The U.N. and Türkiye brokered separate deals with Russia and Ukraine in July to ensure Africa, the Middle East and parts of Asia would receive grain and other food from the Black Sea region during Russia's war in Ukraine.

The 120-day deal pact is up for renewal on Nov. 19, three days after the G-20 summit concludes.

reference
UN | Initiative on the Safe Transportation of Grain and Foodstuffs from Ukrainian Ports
[...]
B. Inspection teams will be set up in Türkiye. The inspection teams in Türkiye will consist of
representatives from all Parties and the UN. Vessels will transit to and enter the Ukrainian ports in
line with the JCC-approved schedule upon the vessels' inspection by an Inspection Team. The primary responsibility of the Inspection Teams will be to check for the absence of unauthorised cargoes and personnel on board vessels inbound to or outbound from the Ukrainian ports.

C. All activities in Ukrainian territorial waters will be under authority and responsibility of Ukraine.

The Parties will not undertake any attacks against merchant vessels and other civilian vessels and port facilities engaged in this Initiative.

Should demining be required, a minesweeper of another country, agreed by all Parties, shall sweep the approaches to the Ukrainian ports, as necessary.
[...]
E. To prevent any provocations and incidents, the movement of vessels transiting the maritime humanitarian corridor will be monitored by the Parties remotely. No military ships, aircraft, unmanned aerial vehicles (UAV) may approach the maritime humanitarian corridor closer than a distance agreed by the JCC, without the authorization of the JCC, and after consultation with all Parties.
[...]
H. This initiative will remain in effect for 120 days from the date of signature by all Parties and can be extended automatically for the same period, unless one of the Parties notifies the other of the intent to terminate the initiative or to modify it.
[...]

AFAIK, texts of UN, TR sideline RU Black Sea Initiative agreements have not been published, leaving an incomplete impression of tri-lateral obligations and duties that NATO allies have filled with more "unprovoked Russian agression."
by Cat on Sun Nov 6th, 2022 at 12:27:22 PM EST
[ Parent ]
Boats bringing ...food...to nl with a waiver

https:/www.dutchnews.nl/news/2022/10/dutch-government-grants-91-waivers-to-russian-sanctions

by Oosterbeek on Sun Nov 6th, 2022 at 05:50:05 PM EST
[ Parent ]
A mix of some news items with very unfounded allegations working for some propaganda outfit. Ever since the MH17 crash in Donbas in July 2014, Rutte has supported every Pentagon and CIA narrative anti-Russia. The Dutch too were consistent with the Tories in Great Britain.

"To hell with your war," the Netherlands shows Biden his place and re-joins Putin | TFI Global |

Moreover, Ministry for Climate and Energy granted 25 exemptions, allowing Dutch entities to continue purchasing energy from former Gazprom enterprises. According to the Ministry, 150 businesses and organisations, including municipalities, schools and water boards, benefit from the waivers.

Netherlands rebukes Biden

The Netherlands is a founding member of the European Union and NATO. In a historical move, it has become the first country to withdraw sanctions against Russia. Additionally, its decision to waive sanctions has both symbolic and direct implications.

Waving off sanctions and helping Russia to evade sanctions hasn't been done so openly by any other western country yet. It proves that the European country values its sovereignty more and is ready to refuse to walkon the path shown by USA.

It is a major blow to Biden's efforts to unite Europe against Russia to fill American coffers and destroy Europe. Europe needs an independent foreign policy and Netherlands has shown how it's done.

Also, this is just the beginning, as the winter approaches, the heat of sanctioning Russia is only going to increase among European countries. The cracks in the EU are only going to widen. This move by the Netherlands will have a domino effect and the meltdown is only going to grow as the winters are now around the corner.



'Sapere aude'
by Oui (Oui) on Sun Nov 6th, 2022 at 06:31:55 PM EST
[ Parent ]
The Parties will not undertake any attacks against merchant vessels and other civilian vessels and port facilities engaged in this Initiative.

... is this the part that the attack on Russian military vessels in a Russian military port transgressed? Or is it another part? Perhaps one of the unpublished or unwritten parts?

It was the last straw... until it wasn't. The forbearance of the camel is admirable.

It is rightly acknowledged that people of faith have no monopoly of virtue - Queen Elizabeth II

by eurogreen on Sun Nov 6th, 2022 at 05:51:55 PM EST
[ Parent ]
port facilities are the site of what "Initiative" protocol?
by Cat on Sun Nov 6th, 2022 at 08:56:27 PM EST
[ Parent ]
I was just trying to parse what Putin was complaining about, with respect to the attack on his warships in Sevastopol. And what last straw you were talking about.

But that's just grasping at straws on my part. You two are equally inscrutable.

It is rightly acknowledged that people of faith have no monopoly of virtue - Queen Elizabeth II

by eurogreen on Mon Nov 7th, 2022 at 10:22:17 AM EST
[ Parent ]
euractiv | UN seeks exports of "stranded" Russian fertilisers [in European ports] ahead of Black Sea grains deadline, 4 Nov "efforts to export stranded Russian fertilisers from European ports"
Western sanctions in response to Moscow's invasion of Ukraine do not ["]explicitly["] target Russian food and fertilisers but nevertheless have ["]complicated["] shipments because of their impact on finance, logistics[,] and insurance. [UNCTAD Gen-Sec Rebeca] Grynspan conceded that removing the obstacles was proving "difficult".
archived our sanctions don't affect ... 5 June 2022
"We have been CLARIFYING together and ENGAGING  with the EU, with the US[,] with the UK to solve these problems. And I think that we are making progress (but) not all the progress that I would want to see right now," she said. She warned of a crisis of "food availability" next year MY 2022/20223 if farmers did not receive fertilisers before the end of their sowing seasons.
euractiv | Russia seeks sanctions exemptions for state bank in Ukraine grain deal talks, 5 Nov
Russia has not detailed its demands publicly beyond calls to unblock Russian fertiliser stuck in European ports and warehouses and resume exports of ammonia, an important ingredient in fertiliser, through a Russia-Ukraine pipeline.

The four Sources®, who declined to be identified due to the sensitivity of the subject, said Russia was asking Western countries to allow state lender Rosselkhozbank to restore its relations with correspondent banks despite Western sanctions.

UTV Russian blackmail weapon war crime story developing ...
Asked to comment, a spokesperson for the EU's executive Commission said EU sanctions were designed not to target the trade in Russian agricultural and food products and included exemptions where that was the purpose.

"Russia is using food as a weapon of war and this is yet another manipulation of the facts and spreading disinformation," the [EC] spokesperson said, declining to be named. "We urge all parties to renew the agreement."

archived Western P&I clubs and Marty Sall
A senior [US] State Department official told Reuters the United States had taken steps to reassure the private sector that food exports were exempted from its sanctions, including by translating  guidance into multiple languagesand by issuing so-called comfort letters to companies seeking assurance that their business was not in breach of the sanctions.

The official, who discussed the issue on condition of anonymity, said private actors sometimes "engage in de-risking" in response to sanctions[,] and that the United States was willing to address specific issues if the UN raises them....

archived Hag Watch Int'l "in violent agreement"
by Cat on Sun Nov 6th, 2022 at 10:41:06 PM EST
[ Parent ]
War is such a complicated judicial and legal matter nowadays 😣
Battleground officers need a minor in economics or agriculture to target the enemy. Like football, the attacking game is the best defense. Pouring in resources without clear vision of an end game. Will 8 Nov. be a turn-around? Joe looking a defeat in the eye, leaving Zelensky at the mercy of Republicans ... again! MEGA

'Sapere aude'
by Oui (Oui) on Mon Nov 7th, 2022 at 06:01:00 AM EST
[ Parent ]
The latest round of "peace efforts" between Azerbaijan and Armenia, hosted by  Putin, has ended. He met with Azerbaijan President Ilham Alyev and Armenia PM Nikol Pashinyan separately. Kremlin.ru posted "read outs" of each party's prepared opening remarks.

Meeting with Prime Minister of Armenia Nikol Pashinyan
Meeting with President of Azerbaijan Ilham Aliyev

At the end of the day, maybe they got a room, because apa.az published a joint statement.

G7 media operators handled this diplomatic diversion from Putin's war of aggression on Ukraine with perfunctory cricism. The substance of "No breakthrough" (CTV News) and "With Moscow increasingly isolated on the world stage following its offensive on Ukraine, the US and the EU have taken a leading role in mediating the Armenia-Azerbaijan peace talks."(F24) are indicative of thin attendance and interest in Putin's televised press conference.

under the radar

Kremlin.ru has not posted the presser transcript yet, but RT, TASS, and al Mayadeen noted that NATO custodians of Nord Stream  wreckage finally allowed Gazprom reps to inspect the site. In any case, details conveyed to Putin do not resemble the "holes" packaged in The Three Inquistors' murky video exhibits or tastefully lighted artist rendering. Machine-translated TASS quotes:

"Today, Gazprom head Alexei Miller reported to me in the morning that they examined, by the way, allowed Gazprom to examine the site of the explosion," the Russian leader said.

According to him, two funnels [?] were found—three and five meters deep. "A pipe 40 meters long was torn out, the gap is, in total the pipes have diverged for 259 meters, in my opinion," he added. "This piece of the pipe, which was torn out, was bent 90 degrees and thrown 40 meters to the side. Just in the direction of Nord Stream 2, which was also damaged, apparently by this explosion and fragments, the remains of this pipe...It's hard for us to control it [material and documentary evidence], because it's all in the special economic zone of Denmark, Sweden, then further to Germany < eyebrow >," he added.

RT (EN) translates this comment, "The blast 'tore off' a 40-meter section of the pipe and separated the lines by 250 meters, Putin said, adding there was 'a piece bent by 90 degrees and thrown against another part of Nord Stream.'"
archived Pörschmann analyzes images in CDU and SPD Resisting Baerbock's Russia Policy
by Cat on Tue Nov 1st, 2022 at 05:10:45 AM EST
Nord Stream | Incident on the Nord Stream Pipeline (updated 02/11/2022)
As of 2 November 2022, Nord Stream AG has completed initial data gathering at the location of the pipeline damage on Line 1 in the Swedish exclusive economic zone.

According to preliminary results of the damage site inspection, [two] technogenic craters with a depth of 3 to 5 meters were found on the seabed at a distance of about 248 m from each other. The section of the pipe between the craters is destroyed, the radius of pipe fragments dispersion is at least 250 m. Experts continue to analyse the survey data.

/EOM

by Cat on Thu Nov 3rd, 2022 at 03:32:17 PM EST
[ Parent ]
Round craters. Ringworm virus.

It is rightly acknowledged that people of faith have no monopoly of virtue - Queen Elizabeth II
by eurogreen on Fri Nov 4th, 2022 at 02:19:20 PM EST
[ Parent ]

gravel displaced by multiple Harpoon torpedoes?

by Cat on Sun Nov 6th, 2022 at 10:54:42 PM EST
[ Parent ]
Pentagon Press Secretary Air Force Brig. Gen. Pat Ryder Holds an On-Camera Press Briefing, 1 Nov
Howard from War Zone: Thanks, Pat. Got a question: A Russian hacker called Joker[DPR] claims to have accessed the Ukrainian Delta command -- command and control system. Can you confirm that? And do you have -- has that raised additional concerns about similar U.S. systems?
GEN. RYDER: Thanks, Howard.
I -- I don't have any information to provide on that. I'd -- I'd refer you to the Ukrainians to talk about their own systems. As you know, from a U.S. military standpoint, cybersecurity is something that we take very seriously at -- at every level, and while I don't have anything specific to provide, that's an area that we'll continue to pay close attention to and ensure that not only are we protecting our systems, but that our people are taking the appropriate training and taking appropriate precautions. But nothing specific to provide.

Thanks, Howard.

by Cat on Wed Nov 2nd, 2022 at 02:42:11 AM EST
gov.uk | UK boosts Ukraine's cyber defences with £6.35 million support package, 1 Nov
The UK Ukraine Cyber Programme uses world-leading expertise to protect Ukraine's critical national infrastructure and vital public services from cyber attacks. A £6.35 million support package from the UK government is protecting Ukraine's critical national infrastructure and vital public services from cyber attacks, Foreign Secretary James Cleverly has revealed.
fail
The programme has not been made public until now to protect its operational security.
[...]
Foreign Secretary James Cleverly said: "The UK's support to Ukraine is not limited to military aid - we are drawing on Britain's world-leading expertise to support Ukraine's cyber defences. Together, we will ensure that the Kremlin is defeated in every sphere: on land, in the air and in cyber space."

Lindy Cameron, Chief Executive Officer of the National Cyber Security Centre (NCSC), said: "The NCSC is proud to have played a part in supporting Ukraine's cyber defenders. They have mounted an impressive defence against Russian aggression in cyberspace, just as they have done on the physical battlefield."

silicon.co.uk | UK Defending Ukraine From Russian Cyberattacks, 1 Nov
Offensive operations
The UK's admission of aiding Ukraine in the cyberspace, comes after the US government in June this year admitted that American military hackers had conducted `a series of operations' in support of Ukraine.

A senior US General (the head of US Cyber Command General Paul Nakasone), said that US military hackers had conducted offensive operations in support of Ukraine.

"We've conducted a series of operations across the full spectrum; offensive, defensive, [and] information operations," General Nakasone told Sky News.

The General declined to describe those operations.

gov.uk | Cyber and Information Systems job centre
"It's not the stuff that we can say about our work that makes it exciting... it's the stuff we can't!"
by Cat on Wed Nov 2nd, 2022 at 05:54:49 AM EST
Turkey and Russia Agree on End Destination Grain Shipments

As of Tuesday, the total tonnage of grain and foodstuffs moved from Ukrainian ports under the Black Sea Grain Initiative is more than 9.7 million metric tonnes.

Black Sea grain deal shipments on hold today, following Russia suspension | UN News |

'Sapere aude'

by Oui (Oui) on Wed Nov 2nd, 2022 at 10:26:24 AM EST
#BREAKING: Ukrainian grain delivery under Ankara-brokered agreement will resume as of midday after phone call between Turkish and Russian defence ministers - Turkish President Erdogan

Related reading ...

How Ukraine grain shipments process from Black Sea ports to Türkiye

'Sapere aude'

by Oui (Oui) on Wed Nov 2nd, 2022 at 10:27:09 AM EST
[ Parent ]
He added that three outbound vessels had used the maritime humanitarian corridor, on Tuesday, as agreed by the three remaining delegations to the JCC.

i.e. as announced by Erdogan, the convoys were resuming in defiance of Russia, effectively daring Putin to stop them.

So he's back on board... I didn't see the list of concessions he obtained by this whole pantomime?

It is rightly acknowledged that people of faith have no monopoly of virtue - Queen Elizabeth II

by eurogreen on Wed Nov 2nd, 2022 at 03:09:56 PM EST
[ Parent ]
(or not. Whatever)

... this diary conflates two subjects, the Nord Stream sabotage and Stuxnet.

Is it your thesis that the explosions were caused by a computer virus?

It is rightly acknowledged that people of faith have no monopoly of virtue - Queen Elizabeth II

by eurogreen on Wed Nov 2nd, 2022 at 03:12:22 PM EST
yes.
by Cat on Wed Nov 2nd, 2022 at 03:25:05 PM EST
[ Parent ]
'k.
I've seen some destructive virii in my time, but ripping 50 metre sections out of undersea pipelines... Respect.

It is rightly acknowledged that people of faith have no monopoly of virtue - Queen Elizabeth II
by eurogreen on Wed Nov 2nd, 2022 at 04:03:10 PM EST
[ Parent ]
by Cat on Wed Nov 2nd, 2022 at 05:03:49 PM EST
[ Parent ]
Though I think it is more likely that it was planted explosives - in particular given how two explosions hit the same pipeline, and one was missed - I will add that if it was a virus, CIA has a track record when it comes to software and pipelines to Europe from Russia.

CIA plot led to huge blast in Siberian gas pipeline

The breakthrough came when Vetrov told the CIA of a specific "shopping list" of software technology that Moscow was seeking to update its pipeline as it sought to export natural gas to Western Europe.

Washington was keen to block the deal and, after securing President Reagan's approval in January 1982, the CIA tricked the Soviet Union into acquiring software with built-in flaws.

"In order to disrupt the Soviet gas supply, its hard currency earnings from the West, and the internal Russian economy, the pipeline software that was to run the pumps, turbines and valves was programmed to go haywire after a decent interval, to reset pump speeds and valve settings to produce pressures far beyond those acceptable to pipeline joints and welds," Mr Reed writes.

The project exceeded the CIA's wildest dreams. There were no casualties in the explosion, but it was so dramatic that the first reports are said to have stirred alarm in Washington.


by fjallstrom on Wed Nov 2nd, 2022 at 05:04:57 PM EST
[ Parent ]
Thomas Reed, senior US national security official, claims in his book "At The Abyss" that the United States allowed the USSR to steal pipeline control software from a Canadian company. This software included a Trojan Horse that caused a major explosion of the Trans-Siberian gas pipeline in June, 1982. The Trojan ran during a pressure test on the pipeline but doubled the usual pressure, causing the explosion.


'Sapere aude'
by Oui (Oui) on Wed Nov 2nd, 2022 at 05:58:41 PM EST
[ Parent ]
Sputnik, 1 Oct
"The pipeline software that was to run the pumps, turbines and valves was programmed to go haywire, to reset pump speeds and valve settings to produce pressures far beyond those acceptable to the pipeline joints and welds. The result was the most monumental non-nuclear explosion and fire ever seen from space," Reed recalled [WaPoo 27.02.04].
[...]
Portions of the operation were disclosed earlier, in a 1996 paper in CIA journal Studies in Intelligence by [Spec. Assist. Sec DOD, NSA Dir. Int'l. Economics Gus] Weiss. In it, the former official recalled how, at an economic summit in Ottawa in 1981, French President Francois Mitterrand had informed Ronald Reagan that a KGB double agent named Vladimir Vetrov had come forward to provide French intelligence with 4,000 documents and photographs related to alleged Soviet efforts to get their hands on Western technologies which the US and allies refused to sell due to sanctions and embargoes. The collection of documents was dubbed the 'Farewell Dossier'. [Weiss, "The Farewell Dossier"] .
In a private meeting associated with the July 1981 Ottawa economic summit, he [Mitterand] told Reagan of the source and offered the intelligence to the United States. It was passed through Vice President Bush and then to CIA. The door had opened into Line X [USSR industrial espionage unit].
[..]
Since 1970, Line X had obtained thousands of documents and sample products, in such quantity that it appeared that the Soviet military and civil sectors were in large measure running their research on that of the West, particularly the United States. Our science was supporting their national defense. Losses were in radar, machine computers, tools, and semiconductors. Line X had fulfilled two-thirds to three fourths of its collection requirements—an impressive performance.
[...]
I met with Director of Central Intelligence William Casey on an afternoon in January 1982. I proposed using the Farewell material to feed or play back the products sought by Line X, but these would come from our own sources and would have been improved, that is, designed so that on arrival in the Soviet Union they would appear genuine but would later fail. US intelligence would match Line X requirements supplied through Vetrov with our version of those items, ones that would hardly meet the expectations of that vast Soviet apparatus deployed to collect them.
[...]
American industry helped in the preparation of items to be marketed to Line X. Contrived computer chips found their into way Soviet military equipment, flawed turbines were installed on a gas pipe line, and defective plans disrupted the output of chemical plants and output a tractor factory. The Pentagon introduced misleading information pertinent to stealth aircraft, space defense, and tactical aircraft. The Soviet Space Shuttle was a rejected NASA design. When Casey told President Reagan of the undertaking, the latter was enthusiastic. In time, the project proved to be a model of interagency cooperation, with the FBI handling domestic requirements and CIA responsible for overseas operations. The had program great success, and it was never detected.
[...]
in a further use of the Farewell product, Casey sent the Deputy Director of Central Intelligence to Europe to tell NATO and governments' intelligence services of the Line X threat. These meetings led to the expulsion or compromise of about 200 Soviet intelligence officers and their sources, causing the collapse of Line X operations in Europe. Although some military intelligence officers avoided compromise, the heart of Soviet technology collection crumbled and would not recover. This mortal blow came just at the beginning of Reagan's defense buildup, his Strategic Defense Initiative (SDI), and the introduction of stealth air craft [BWAH!] into US forces.
[...]
In 1985, the case took a bizarre turn, when information on the Farewell Dossier surfaced in France. Mitterrand came to suspect that [Soviet Col. Vladimir I.] Vetrov had all along been a CIA plant set up to test him to see if the material would be handed over to the Americans or kept by the French. Acting on this mistaken belief, Mitterrand fired the chief of the French service, Yves Bonnet.
To this day, Russian officials have never conceded that the 1982 explosion was the result of CIA interference. In the 1990s and 2000s, when relations between [Yeltsin] and the US still looked rosy, engineers and ex-KGB agents came forward to tell media that industrial negligence or even shoddy [SOVIET] workmanship, and not sabotage, was to blame.
Rule of Atty #1
The CIA never directly confirmed its involvement in the Urengoy-Surgut-Chelyabinsk pipeline explosion. However, in a page on the CIA's official website, the agency did boast that "flawed turbines were installed on a gas pipeline" [ibid.] as part of a broader US technological sabotage campaign against the USSR.
by Cat on Sun Nov 13th, 2022 at 07:15:03 PM EST
[ Parent ]
Pardon me while I weave public records into a short story of "cyber" programming development and testing between G.W. Bush and B.H. Obama admins, from 2001 to 2016 the year of Zero Days release.

NSA PRISM (2007) domestic and foreign ITC espionage exposed
transcript of Zero Days

[VIDEO G.W. BUSH, December 9, 2008: Finally we are transforming our military for a new kind of war that we're fighting now and for wars of tomorrow. We have made our military better trained, better equipped, and better prepared to meet the threats facing America today and tomorrow and long in the future.]
NYT, David SANGER: Back in the end of the Bush administration, people within the US government were just begining to convince President Bush to pour into offensive cyber weapons. Stuxnet started off in the defense department. Then Robert Gates, Secretary of Defense [2006-2011], reviewed this program and then he said, This program shouldn't be in the defense department. It should really be under the covert authorities over in the intelligence world [NSA, 1974-1979; CIA/DCI, 1991-1993]. So the CIA was very deeply involved in this operation, while much of the coding work was done by the National Security Agency and Unit 8200, its Israeli equivalent, working together with a newly created military position called US Cyber Command. And interstingly, the director of the National Security Agency would also have a second role as the commander of US Cyber Command. And US Cyber Command is located at Fort Meade in the same building as the NSA.
Vault7 dev (2013-2016)
Since 2001 the CIA has gained political and budgetary preeminence over the U.S. National Security Agency (NSA). The CIA found itself building not just its now infamous drone fleet, but a very different type of covert, globe-spanning force -- its own substantial fleet of hackers.
ANONYMOUS: ... I was in TAO-S321, "The ROC." TAO is Tailored Access Operations. It's where the NSA hackers work. Of course, we didn't call them that. On net operators, they're the only people at NSA allowed to break in or attack on the internet....
By the end of 2016, the CIA's hacking division, which formally falls under the agency's Center for Cyber Intelligence (CCI), had over 5000 registered users and had produced more than a thousand hacking systems, trojans, viruses, and other "weaponized" malware.
[...]
U.S. Consulate in Frankfurt is a covert CIA hacker base
In addition to its operations in Langley, Virginia the CIA also uses the U.S. consulate in Frankfurt as a covert base for its hackers covering Europe, the Middle East and Africa. CIA hackers operating out of the Frankfurt consulate ("Center for Cyber Intelligence Europe" or CCIE) are given diplomatic ("black") passports and State Department cover. ... A number of the CIA's electronic attack methods are designed for physical proximity.
...Inside TAO headquarters in the ROC, Remote Operations Center. If the US government wants to get in somewhere, it goes to the ROC. I mean, we were flooded with requests, so many that we could only do about 30% of the missions that were requested of uat one time throuth the web, but also by hijacking shipments of parts. You know, sometimes the CIA would assist in putting implants in machines, so once inside a target network, we could just watch or we could attack.
In these cases, a CIA officer, agent or allied intelligence officer acting under instructions, physically infiltrates the targeted workplace. The attacker is provided with a USB containing malware developed for the CIA for this purpose, which is inserted into the targeted computer.
proof of concept
...We never called it stuxnet. That was the name invented by the antivirus guys. When it hit the papers--we're not allowed to read about classified operations even if it's in The New York Times--we went out of our way to avoid the term. It means, saying "stuxnet" out loud was like saying "Voldemorte" in Harry Potter" The name that shall not be spoken. The Natanz attack--and this is out there already--was called "Olympic Games," or OG. There was a huge operation to test the code on PLCs here at Fort Meade and in Sandia [National Laboratories], New Mexico. Remember in the Bush era, when Libya turned over all the centrifuges? Those were the same models the Iranians got A.Q. Khan. P1's. We took them to Oak Ridge [National Laboratories, TN] and used them to test the code which demolished the insides. At Dimona [Negev Nuclear Research Center], the Israelis also tested the P1's. Then, partly by using our intel on Iran, we got the plans for the newer models, the IR-2's. We tried out different attack vectors. We ended up focusing on ways to destroy the rotor tubes. In the tests we ran, we blew them apart.
SANGER: They swept up the pieces, they put it on an airplaine, the flew it to Washington, they stuck it in the truck, they drove it through the gates of the White House, and dumped the shards out on the conference room table in the Situation Room. And then they invited President Bush to come down and take a look. And when he could pick up the shards of a piece of centrifuge ... he was convinced this might be worth it, and he said, "Go ahead and try."
There's a physics-for-dummies sequence in the documentary, when the "antivirus guys" who decrypted OG run a lab experiment using a PLC switch attached to a balloon in order to demonstrate "a planted explosive".

So. Unitl SE, DK, or NO reveal this underwater warhead cleaned off the scene, I'm sticking to malware planted in Siemens' equipment.

by Cat on Wed Nov 2nd, 2022 at 07:39:56 PM EST
[ Parent ]
Yeah, though I must add that if it was actually possible to blow up the pipelines using only software solutions that would also remove my biggest objection to considering possible Russian involvement.
by generic on Wed Nov 2nd, 2022 at 10:24:05 PM EST
[ Parent ]
not external force—the MSM explantion—because the Zero Days study of the Natanz exploit was "a revolution" back in 2010.

This brief, "MONITORING AND CONTROL PARAMETERS OF GAS PIPELINE BY USING PLC AND SCADA SYSTEM" is schematic. It lists common types of PLCs in the field a/o 2020 that monitor or actuate flow from either terminal point and along the loop. Anyone of these could be compromised by malware.

I'm idly looking for PNG pressure containment parameters, comparable to Nord Stream 1 casing which I will assume is not reinforced up to RU-TR Turkstream II 2022 spec. So far, most the public lit covers leaks typically attributed to low-pressure deformation or unidentified corrosion of moving parts and joint seals, the most frequent maintenance issues.

OG was a successful software attack for a few reasons. It ran with instructions to save data, hijack firmware, and mask data reporting by PLCs in the network.

LANGNER: So a centrifuge, it's driven by an electrical motor, and the speed of this electrical motor is controlled by another PLC, by another programmable logic controller.  
CHIEN (VO): Stuxnet would wait for 13 days [ARCHIVE VIDEO: Natanz engineers inspecting physical equipment] before doing anything, because 13 days is about the time it takes to actually fill an entire cascade of centrifuges with uranium. They didn't want to attack when the centrifuges essentially empty or at the beginning of the enrichment process.  
[ARCHIVE VIDEO: Natanz operators room stations, panel displays of PID controller blocks] What stuxnet did was it actually would sit there during the 13 days and basically record all of the normal activities that were happening and save it. And once ithey saw them spinning for 13 days, then the attack occurred. Centrifuges spin at incredible speeds, about 1,000 hertz. [VISUAL: 3-D spline simulation]
LANGNER (VO): They have a safe operating speed, 63,000 rpm.
CHIEN (VO): Stuxnet caused the uranium enrichment centrifuges to spin up to 1,400 hertz. [VISUAL: OG document detail, sub-routine parameter]
LANGNER (VO): Up to 80,000 rpm.
CHIEN: What would happen was those centrifuges would go through what's called a resonance frequency. It would go through a frequency at which the metal would basically vibrate uncontrollably and essentially shatter. THere'd be uranium gas everywhere. And then the second attack they attempted was they actualy tried to lower it to 2 hertz.
LANGNER: They were slowed down to almost a standstill.
CHIEN: And at 2 hertz, sort of an opposite effect occurs. You can imagine a toy top that you spin [VISUAL    : 3-D spline simulation] and as the top begins to slow down, it begins to to wobble. That's what would happen to these centrifuges. They'd begin to wobble and essentially shatter and fall apart. And instead of sending back to the computer what was realy happening, it would send back that old data that it had recorded. So the computer's sitting there "thinking" [ARCHIVED STILL FRAMES: Natanz operators room, monitor disply of PID block diagram, control switch stations] "Yep, running at 1,000 hertz. Everything is fine. But those centrifuges are potential spinning up wildly, a huge noise would occure. It'd be like, you know, a jet enginve. SO the operators then would know, 'Whoa, something is going wrong here.' They might look at their monitors and say, ' hmmmm, it says it's 1,000 hertz,' but they would hear that in the room something gravely bad was happening.
LANGNER: Not only are the operators fooled into thinking everything's normal, but also any kind of automated protective logic is fooled.
There's no way Cyber Command put that genii back in a bottle.
by Cat on Thu Nov 3rd, 2022 at 01:27:18 AM EST
[ Parent ]
Really depends on those containment parameters, but I still wouldn't bet on it. Centrifuges supposedly are built to spin at one working point and would easily break if turned up a notch. A pipeline needs to withstand large differences in internal pressure anyway, and I really see no reason why you would use turbines strong enough that they could rupture the pipes. And if they could I'd expect something else to fail first. Surely there are more delicate parts than the steel mantle? Also we're looking at ruptures in one line of NS2 and NS1. If I'm not completely off only NS1 uses the Siemens turbines.

Though there certainly might be another trick you could do to make them explode. Not a pipe expert.

by generic on Thu Nov 3rd, 2022 at 11:20:46 AM EST
[ Parent ]
I was thinking the same thing. It would blow out the joints, not shatter steel pipes.

It is rightly acknowledged that people of faith have no monopoly of virtue - Queen Elizabeth II
by eurogreen on Thu Nov 3rd, 2022 at 01:36:05 PM EST
[ Parent ]
supra Nord Stream PR describes the system design in "three sections".

Elsewhere, SOP is 40 m pipe sections (max) fabricated off-site and finished on-board "pipelay vessels," obviously, because there is no known sea-borne vessel of 1,224+ km length. (wikiwtf Nord Stream I article puports to list project contractors, but not suppliers, named by PR placemnt.)

ICYMI The Longest Gas Pipeline till date (2022)

Now. Who honestly believes that there are no "moving parts" or digital sensors between Nord Stream I 1,224 km pipeline terminals? That "turbine stations" at each end are sufficient to maintain constant pressure and flow end-to-end?

I don't, but, yanno, I'm no "expert." My skepticism about MSM torpedo theory (see euractiv's elegant, 1-dimensional, arial "submarine explosion" feature photo, above) relies on sundry maps of x-country PNG lines in the public domain —some which actually feature compressor station intersection locations—and my low-brow intuition that atmospheric pressure above and below sea level differ substantially, such that the possibility of a manned vehicle precisely placing detonation devices without a map at -80 m is, frankly, comical. So I question vintage WW II sabotage scenarios and search for  trade and canonical knowledge of "best practices" in PNG structural design as well as relevant "stress testing" in research lit. (For example, months ago, in the Azovstal ERA, when MSM drop a thinly sourced story about "bunker busters" to one (untitled) CHINESE!! research "tied to" the PLA, I donated an inordinate amount of time searching relevant papers in the Journal of Rock Mechanics and Geotechnical Engineering.) So far I've found only one "Underwater explosion effects of 60 mm H.E. mortar bomb on a cylindrical concrete structure - PIT", which is irrelevant not only because "the tube" is capped and concrete reinforced with rebar, but full-text discussion of underwater "effects" requires payment. So. What have I learned? Not much; I already knew that trade secrets are predictable barriers to the flow of information and common understanding of HOW people, processes, and things work, whether or not pertaining to "defense" technology.

by Cat on Fri Nov 4th, 2022 at 03:32:04 PM EST
[ Parent ]
by Cat on Fri Nov 4th, 2022 at 03:49:33 PM EST
[ Parent ]
I don't see how internal pressure can explain the second explosion North Stream 2 Pipe A.

Ukraine Latest: US Will Give Another $1 Billion in Security Aid

The monitoring network said the first explosion occurred on Monday at 2:03 a.m. Swedish time with a magnitude of 1.9 on the Richter scale, followed by a second at 7:04 p.m. on the same day with a magnitude of 2.3.

Far as I understand the first explosion took out North Stream 2 Pipe A southeast of Bornholm at 02:03 AM.

The second explosion took out North Stream 1 pipe A & pipe B, and North Stream 2 Pipe A again. The second explosion happened north-east of Bornholm on the border between the Swedish and Danish economic zones. It is not close to the first explosion site.

I don't see how North Stream 2 Pipe A could have exploded from internal pressure twice, given that the first explosion punctured the pipe and the gas had 17 hours to leak out. I also find it unlikely that North Stream 1 pipe A & pipe B, and North Stream 2 Pipe A would explode from internal pressure at exactly the same time.

On the other hand I think hitting the same pipe twice with some form of external explosives is a rather likely thing to happen if you try to explode four seperate pipes at two locaitons.

by fjallstrom on Fri Nov 4th, 2022 at 01:11:40 PM EST
[ Parent ]
impact of "debris" the size of the first section
by Cat on Sat Nov 5th, 2022 at 12:49:28 AM EST
[ Parent ]
Could you spell this out?

How did "debris" from the first explosion in North Stream 2 pipe A, 17 hours later cause a second, larger, explosion some 50-100 km away (looking at not great maps), that also took out North Stream 1 pipe A & pipe B?

To me, that doesn't sound possible.

by fjallstrom on Mon Nov 7th, 2022 at 08:37:04 AM EST
[ Parent ]
that's the timeline given after explosions
by Cat on Sat Nov 5th, 2022 at 12:50:57 AM EST
[ Parent ]
freelance journalist from Denmark, Niels Eriksen reports:
"U.S. Torpedo Appeared at Explosion Site of the Nord Stream".
40-year-old motive, one destroyer, "200 hrs" of stealth seabed surveys over 9 months, master "underwater fast attack" commander, one Harpoon "tested on the battlefield in Ukraine", Guardian rendered "approximate location" of four (4) leaks, AND

the remains of the American torpedo near the Nord Stream pipeline explosion site,
computer image taken from hidden camera
by Cat on Sun Nov 6th, 2022 at 10:31:59 AM EST
[ Parent ]
Wired | 'Dark Ships' Emerge From the Shadows of the Nord Stream Mystery, 11 Nov
According to the analysis by satellite data monitoring firm SpaceKnow, the two "dark ships," each measuring around 95 to 130 meters long, passed within several miles of the Nord Stream 2 leak sites. "We have detected some dark ships, meaning vessels that were of a significant size, that were passing through that area of interest," says Jerry Javornicky, the CEO and cofounder of SpaceKnow.
where?
"They had their beacons off, meaning there was no information about their movement, and they were trying to keep their location information and general information hidden from the world," Javornicky adds.

The discovery, which was made by analyzing images from multiple satellites, is likely to further increase speculation about the cause of the blasts....Once SpaceKnow identified the ships, it reported its findings to officials at NATO, who are investigating the Nord Stream incidents. Javornicky says NATO officials asked the company to provide more information.

when?
NATO spokesperson Oana Lungescu says it does not comment on the "details of our support or the sources used" but confirmed that NATO believes the incident was a "deliberate and irresponsible act of sabotage" and it has increased its presence in the Baltic and North Seas. However, a NATO official, who did not have permission to speak publicly, confirmed to WIRED that NATO had received SpaceKnow's data and said satellite imagery can prove useful for its investigations.
[...]
To detect the ships, Javornicky says, the company scoured 90 days of archived satellite images for the area....Once it gathered archive images of the area, SpaceKnow created a series of polygons around the gas leak sites. The smallest of these, around 400 square meters, covered the immediate blast area, and larger areas of interest covered several kilometers. In the weeks leading up to the explosions, SpaceKnow detected 25 ships passing through the region, from "cargo ships to multipurpose larger ships," Javornicky says.  In total, 23 of these vessels had their automatic identification system (AIS) transponders turned on. Two did not have AIS data turned on, and these ships passed the area during the days immediately ahead of the leaks being detected.

27.09.22 Berlingske video "area of interest" d: 1km, 2 jet NS1 leak  (src: Norwegian Defense Command)
by Cat on Sun Nov 13th, 2022 at 08:27:06 PM EST
[ Parent ]
I have yet to see anyone back up Reed's claim or even show the Soviets had switched to the digital controls necessary to make such an attack possible.
by rifek on Sat Nov 5th, 2022 at 12:28:45 AM EST
[ Parent ]
Ivantsov,"Pipeline Transportation of Natural Gas in the USSR," The Economics of Long-Distance Transportation, a long, illustrious history of gas and oil volume and export growth from 1878 ($29.95)

The Four Generations of SCADA Architectures, mid-20th century into present; note PLC integration

How did Soviets keep pace with PNG "digital" tech?
Stern, "Gas pipeline co-operation between political adversaries: examples from Europe", 13 pp

At the Ottawa Summit in July 1981, President Reagan attempted to persuade European leaders
to reject imports of additional gas from the USSR. When this failed, the American Administration first tried to offer financial incentives and then applied extra-territorial sanctions to those components of gas compressor stations [!], being supplied by European companies, which were of American origin. This created a political crisis in relations between the US and its European allies. Eventually, after several months of dispute, the US lifted the sanctions and the Urengoy pipeline(s) went ahead with rather more Soviet, and rather less American, equipment than had been intended.14
How could the CIA sabotage a Soviet pipeline in 1982?

CIA continuous residence in Germany since WWII is indisputable.

Why would CIA sabotage Soviet PNG?

CRS, "SOVIET PIPELINE IP0219S (1982), Ronald Reagan administrative actions to "block Soviet pipeline" plus press clippings documenting US frustration with allies' opposition, 29 pp

There you have it: means, motive, opportunity to cripple Soviet critical infrastructure ...official denial deposited in the Reagan Library notwithstanding.

by Cat on Sat Nov 5th, 2022 at 01:56:36 AM EST
[ Parent ]
After Shock | ancient history, new realities: "Since the appearance of first Soviet and then Russian gas on the European gas market ..."

Eric Li: "I make the joke..."

by Cat on Sat Nov 5th, 2022 at 02:10:07 AM EST
[ Parent ]
And I went through all that long ago, and there's no there there.
by rifek on Sat Nov 5th, 2022 at 10:21:08 PM EST
[ Parent ]
< wipes tears >
by Cat on Sun Nov 6th, 2022 at 10:09:08 AM EST
[ Parent ]
I most assuredly am.
by rifek on Mon Nov 7th, 2022 at 04:26:31 AM EST
[ Parent ]
The Dutch with Mark Rutte close to GCHQ, NSA and partner in Nine-Eyes ... key role in anti-Russia sentiment and war propaganda.

Dutch Hackers Infiltrated Kremlin's Cozy Bear in 2014

Think about it ... NSA and the White House were aware where and when the Russians infiltrated.

The Dutch obedient to US "requests" to ban anti-virus software from Kaspersky Lab. The Dutch have been leading in the anti-Russia propaganda ever since the coup d'état in Kiev in February 2014. With US pressure mounting to conform with the new sanctions on Iran, the European nations will be forced to choose for the warmongering AngoSaxons or transgess to open markets of EurAsian block of nations.

Cyber Vulnerability: Contour of Next Global War | Dec. 2016 |

'Sapere aude'

by Oui (Oui) on Wed Nov 2nd, 2022 at 06:05:01 PM EST
Thus the Siemens PLC fitted with a vulnerability for Israel's Stuxnet worm tested in Dimona nuclear site in the Negev desert.

Stuxnet US-Israel-German Cooperation Cyber Warfare on Iran | @BooMan - May 31, 2011 |

Apparently the Stuxnet worm did most harm in the ultra-centrifuges plant at Natanz in Iran.

(New York Times) - In early 2008 the German company Siemens cooperated with one of the United States' premier national laboratories, in Idaho, to identify the vulnerabilities of computer controllers that the company sells to operate industrial machinery around the world -- and that American intelligence agencies have identified as key equipment in Iran's enrichment facilities.

Siemens says that program was part of routine efforts to secure its products against cyberattacks. Nonetheless, it gave the Idaho National Laboratory -- which is part of the Energy Department, responsible for America's nuclear arms -- the chance to identify well-hidden holes in the Siemens systems that were exploited the next year by Stuxnet.

If I recall correctly, the Stuxnet was entered into Natanz through an agent trained and coordinated by the Dutch. The Western world united through intelligence ... and now by military through the war in Ukraine.

'Sapere aude'

by Oui (Oui) on Wed Nov 2nd, 2022 at 06:11:58 PM EST
[ Parent ]
O'MURCHU: We continued to search, and we continued to search in code, and eventually we found some other bread crumbs left we were able to follow. It was doing something with Siemens, Siemens software, possibly Siemens hardware. We'd never even seen that in any malware before, something targeting Siemens. We didn't even know why they would be doing that. But after Googling, very quickly we understood, it was targeting Siemens PLCs.
CHIEN:Stuxnet was targeting a very specific hardware device, something called a PLC or a programmable logic controller.
LANGER: The PLC is a kind of very small computer attached to physical equipment, like pumps, like valves, like motors. So this little box is running a digital program, and the actions of this program turns that motor on, off, or sets a specific speed.
CHIEN: Those program module controllers control things like power plants, power grids.
[...]
O'MURCHU: And of course we did notice that at the time there had been assassinations of nuclear scientists. So that was worrying. We knew that there was something bad happening.
CHIEN: We'd been publishing information about stuxnet all through that summer. And then in November, the industrial control system sort of expert in Holland contacted us, and he said all of these devices that would be inside of an industrial control system hold a unique identifier number that identified the make and model of that device. And we actully had a couple of these number in the code that we didn't know what they were. So we realized that maybe what he was referring to was the magic numbers we had. Then when we searched for those magic numbers in that context, we saw that what had to be connected to this industrial control system that was being targeted were something called frequency converters from two specific manufacturers, one of which was in Iran. So at this time, we absolutely knew that the facility that was being targeted had to be in Iran and had equipment made from Irania manufacturers.When we looked up those frequency converters, we immediately found out that they were actually export controlled by the [US] Nuclear Regulatory Commission [USC DOCUMENT OVERLAY: Specific license required when exported to embargoed destinations listed in 10 CFR 110.28] And that immediately led us then to some nuclear facility.
by Cat on Wed Nov 2nd, 2022 at 08:01:22 PM EST
[ Parent ]
Stuxnet Facts Report - 2012

Stuxnet was first discovered by Belarusian security company VirusBlokAda (www.anti-virus.by) on June 17, 2010, in the computers of one of its customers, who asked the company for technical help with some unexplainable system reboots. The malware was found on 14 systems, the majority of which were located in Iran.

24 June 2012. Self-kill date (after this date Stuxnet auto-terminates itself).

'Sapere aude'

by Oui (Oui) on Wed Nov 2nd, 2022 at 08:46:31 PM EST
[ Parent ]
The original code is archived for study, modification, and improvement.
by Cat on Thu Nov 3rd, 2022 at 01:58:28 AM EST
[ Parent ]
That TAO ("Tailored Access Operation") iteration targeted Iranian equipment, specifically, and did enough damage to their enrichment schedule. What followed? Capitualtion to duplicitous Obama clemency, the long-winded JCPOA.

Other than that, there's reason not to assume parallel dev tailored to handicap any other US arch-rival.

by Cat on Thu Nov 3rd, 2022 at 02:33:23 AM EST
[ Parent ]
ANONYMOUS: For Natanz, it was a CIA-led operation, so we had to have agency sign-off. Someone from the agency stood behind the operator and the analyst and gave the order to launch every attack.
CHIEN: Before they could have even started this attack, they put inside the code the kill date, a date at which it would stop opperating.
O'MURCHU: Cut-off dates. We don't normally see that. And you have to think, well, 'Why is that cut-off date in there?' When you realize, well, this section was probably written by government and that there are laws regarding how you can use this sort of software, there may have been a legal team who said, 'No. You need to have a cutt-off date in there, and you can only do this and you can only go this far. We nee to check if this is legal or not. That date is a few days before Obama's inauguration [JANUARY 20,2009]. So the theory was that this was an operation that needed to stopped at a certain time, because there was going to be a hand-over and more approval was needed.
Zero Days
archived U.S. Senators Introduce Expedited LNG for American Allies Act, 2012
goes to motive for Nord Stream I sabotage in the long run
by Cat on Thu Nov 3rd, 2022 at 02:12:04 AM EST
[ Parent ]
In my estimation, it was developed by NSA in Idaho facilities in close cooperation with Israel Mossad/Unit 8200 experts. It was tested at Dimona and spread and implemented by Israel. The damage done was less than envisioned. Therefore Israel's political leadership pushed its national security cabinet to bomb the nuclear facilities in 2012. Launch bases included airfields in Azerbaijan. Obama blocked the endeavor by sending a public warning to parties involved. Israel's military and intelligence agencies were not convinced it would bring less harm to Israel. Secrets were leaked to the media.

The relationship between Obama-Kerry and Israel's Netanyahu and Moshe Ya'alon would never recover. Obama intervened in early 2016 election in Israel in an failed attempt to unseat Bibi. In the fall of 2016, Netanyahu, oligarchs with (Arab) allies succeeded to change White House color from blue to red.

Israel tests on worm called crucial in Iran nuclear delay | 16 Jan 2011 |

Meir Dagan told the Israeli Knesset in recent days that Iran had run into technological difficulties that could delay a bomb until 2015--a sharp reversal from Israel's long-held argument that Iran was on the cusp of success.

The biggest single factor in putting time on the nuclear clock appears to be Stuxnet, the most sophisticated cyberweapon ever deployed.

Experts who have picked apart the computer worm describe it as far more complex--and ingenious--than anything they had imagined when it began circulating around the world, unexplained, in mid-2009.

Many mysteries remain, chief among them, exactly who constructed a computer worm that appears to have several authors on several continents.

Stuxnet and the Limits of Cyber Warfare

'Sapere aude'

by Oui (Oui) on Thu Nov 3rd, 2022 at 10:45:41 AM EST
[ Parent ]
Nord Stream | From Pipes to Pipeline, 1,224-kilometre construction 2010-2012
...Both lines of the Nord Stream Pipeline system were laid in three sections. The three sections have different wall thicknesses following the direction of the gas flow. Gas pressure reduces as it makes its way through the pipelines. Therefore, the walls are thickest at the start of the pipelines at Portovaya Bay, Russia, and thinnest at the landing point at Greifswald, Germany.
[...]
In preparation for pipe laying, the seabed was surveyed with a remotely operated vehicle (ROV) to ensure pipelay safety and to confirm the seabed data gathered during the lengthy route planning phase. Additionally, in some locations along the route, the strategic placement of coarse gravel was necessary to create a stable base on which the pipeline can rest. Gravel was transported and placed by dedicated rock placement vessels to the specific locations where support was required prior to pipe laying. On board the pipelay vessels, the construction cycle is made up of several steps including bevelling, welding, testing and the lowering of the pipeline onto the seabed. There are exact procedures defined for each process to ensure quality and compliance with health and safety regulations. Following the laying process, the pipelines were again monitored underwater by ROV to ensure correct positioning...
by Cat on Wed Nov 2nd, 2022 at 09:49:54 PM EST
[ Parent ]
Look for go fair and its cloud in nl
by Oosterbeek on Wed Nov 2nd, 2022 at 08:24:11 PM EST
[ Parent ]
Effect of Underwater Explosion on Pipeline Integrity (2015)

Not easy to sabotage a pipeline moving a large section laterally, severed from the rest.

'Sapere aude'

by Oui (Oui) on Mon Nov 7th, 2022 at 10:17:31 AM EST
Thank you!

Altho' I discarded the WWII mine theory at first public notice (27 Sep), this research declares several, extremely interesting parameters (dependent variables) for purposes of modelling structural deformation. For example,

Internal Pressure 145bar[!]g, Charge Distance 4m [!], Water Depth 744m [!]
Internal pressurization deeply modifies the pipeline local and global response with respect to the empty pipeline behavior.The presence of pressurized fluid in the pipe increases the cross-sectional stiffness improving the pipeline strength capacity against impulsive loads due to the underwater explosion event.

In particular the pipeline does not develop localized inward buckles and buckle propagation phenomena are avoided since, for the given internal and external pressure values, the differential pressure acting on the pipeline is equal to 7.0MPa and is applied on the internal surface of the pipeline.

• Nord Stream 1 and II differential material properties (eg. concrete weights | sleeve, internal psi)
• depth 80m-110m
• TNT charge weight ("massive releases of energy" in a range—equivalent to 500kg of TNT (30.09.22 Guardian "intellegence sources") to 700kg (29.09.22 Ukriform)
• number and position of ordnance
• ordnance velocity, if any
DIGRESSION: I'm loving the "propagation" (distribution) curve figures—reminds me of "bunker buster" phys lab results measuring direct missile impact derivative stress effects on fluid permeable rock...over time.
and independent variables
• seismographic shock wave
• Bjerknes force, depicted as a localized, singular phenomenon—The Leak (D: 2 km) which, for all intents and purpose, subsided seven (7) days later into The Mostly Methane Threat to Humanity.
• radical NS I deformation, the focal point of Gazprom's proprietary survey which had been delayed one month by relevant EZ authorities.

I'm open to a plausible torpedo theory, just not Harpoon (because accurate delivery would have necessitated significant reconfig and testing not in evidence) or TINA. Coincidentally, I noted this morning at MoA a passing detail attibuted to S&P Global.

The accident at the Freeport terminal on June 8 led to a reduction in LNG production. This terminal provided approximately 23% of all LNG produced in the United States. As a result of overpressure in the pipeline from the tank to the offshore export terminal, LNG leaked and ignited.

by Cat on Mon Nov 7th, 2022 at 07:42:44 PM EST
[ Parent ]
I used to support the software that French gas utility GDF used to run simulations on the gas transport network. All of the transport and storage entities (pipelines, compressors, decompressors, underground storage facilities etc) were modelled, and the engineers could run simulations, varying the parameters for different scenarii (cold wave, Algerian crisis, Russian crisis, etc...)

But I'm thirty years out of date with it now.

It is rightly acknowledged that people of faith have no monopoly of virtue - Queen Elizabeth II

by eurogreen on Thu Nov 10th, 2022 at 01:30:45 PM EST
[ Parent ]
20 years ago I gave up 3 months of my life running Shell Int'l. Global Business Oil Producers Microworld optimization simulations and writing CapEx business case for multiple, competitive scenarios.

This game did not test either optimal pipeline or mechanical sytems structural engineering parameters.

Did GDF's?

by Cat on Sun Nov 13th, 2022 at 07:37:20 PM EST
[ Parent ]

Do not expect a non-Western opinion from Ian ... 🔥 Atlanticism #WeAreNato

'Sapere aude'

by Oui (Oui) on Thu Nov 17th, 2022 at 07:33:06 AM EST
Sputnik
Explosions occurred on September 26 at three of the four strings of Nord Stream 1 and 2 underwater pipelines built to carry a combined annual 110 billion cubic meters of Russian gas to Europe. Germany, Denmark and Sweden launched separate investigations into the suspected sabotage incident.
Investigation of the site of the incident at the Nord Stream 1 and 2 pipelines has confirmed sabotage, the Swedish Security Service has stated.
In the course of its intensive crime scene investigations carried out on the site of the detonations in the Baltic Sea, probes showed that the pipelines had been subject to gross sabotage, it was added in a statement.
The Swedish Security Service probe, headed by a National Security Unit prosecutor, had documented extensive damage to the gas pipelines resulting from the blasts, it was underscored, with a number of seizures made, including foreign items. Sabotage was confirmed after explosive residue was identified on a number of the seized and analyzed items. It was underscored that the extensive and complex ongoing probe, coupled with thorough analysis work, would allow for more definitive conclusions about the Nord Stream blasts.
Whether anyone can be suspected of, and later prosecuted for the sabotage will rest with the outcome of the investigation, the Swedish Security Service stated. A number of agencies, including the Swedish Coast Guard, the Swedish Armed Forces and the Swedish police Authority, were assisting the investigation, it added.


It is rightly acknowledged that people of faith have no monopoly of virtue - Queen Elizabeth II
by eurogreen on Fri Nov 18th, 2022 at 01:41:24 PM EST
It's amazing how a foregone conclusion reveals itself, given time for persons of interest to string non sequiturs around their cordon sanitaire rather than bring examination of the corpse, as it were, into evidence.

.aklagare.se | Confirmed sabotage at Nord Stream, 18.11.22

Analyzes that have now been carried out show traces of explosives on several of the foreign objects that were found [WHERE?]. The advanced analysis work continues to be able to draw safer conclusions about the incident, says Mats Ljungqvist.

The preliminary investigation is very complex and extensive. The continued preliminary investigation must show whether anyone can be served with suspicion of a crime.

credibility timeline
PR team: DK Armed Forces, DK Energy Agency (NS2), SE Armed Forces, SE Coast Guard, SE Maritime Admin, SE National Seismic Network 2, DE Geology Research Centre GFZ, Center for Maritime Operations, Royal Danish Defence College, 27.09.22
Prosecutors at the National Security Unit, 28.09.22
Public Prosecutor, National Unit against International and Organized Crime, 28.09.22
[break in series]
aklagare.se | Supplementary crime scene investigation at Nord Stream, 28.10.22
[break in series]
- The cooperation with authorities in Sweden and in other countries works excellently. For the continued work with the preliminary investigation and for the various collaborations that are ongoing, it is important that we can work in peace and quiet [5 nautical mi radius], says Chamber prosecutor Mats Ljungqvist.

The prosecutor cannot provide more information at this time and is not able to be available to the media.

by Cat on Fri Nov 18th, 2022 at 05:15:12 PM EST
[ Parent ]

Amazing ... no EU-27 censorship 🇪🇺

'Sapere aude'

by Oui (Oui) on Sat Nov 19th, 2022 at 06:06:42 PM EST


'Sapere aude'
by Oui (Oui) on Sat Nov 19th, 2022 at 06:07:30 PM EST
[ Parent ]
Check for residue on foreign objects near the site.
by Cat on Sat Nov 19th, 2022 at 06:55:42 PM EST
[ Parent ]


Display:
Go to: [ European Tribune Homepage : Top of page : Top of comments ]