Welcome to European Tribune. It's gone a bit quiet around here these days, but it's still going.
Mon Oct 31st, 2022 at 07:29:59 PM EST
One month later. NY Yella Cake | Three Inquiries, but No Answers to Who Blew Holes in Nord Stream Pipelines, pay wall
YouTube "READ OUT" 27 Oct, running time 08:54, EN subtitles, CC autotrans enabled
Politico.eu.com | Nord Stream investigation tests EU intelligence sharing around the Baltic, 28 Oct motive
Most observers believe Russia blew up the pipelines -- which were built to transport gas from Russia to Germany -- in an effort to further destabilize Europe's energy supplies ahead of winter.
contradicting Europe's reported successful, 7-months long EU Russian gas "embargo," RU asset forfeitures, and bank sanctions as well Russian gas and oil supply racketeering, scheduled 5 Dec 2022 and 5 Jan 2023, respectively. vdL's tanks are 97% full, thanks to "war time" rationing to deny "Putin's price" for war on UKRAINE, possibly a Just Transition to net-zero emissions across EU27.
watching the detectives
Key evidence is likely to come from the type of sensitive intelligence that EU members have traditionally been reluctant to share. Allegations last year that intelligence agencies in Denmark had allowed the U.S. to spy on senior Swedish and German lawmakers deepened mistrust.
Suella Braverman resigns as interior minister after 43 days, 19 Oct
Just to be clear, the Tory right is convinced the "security" breach by @SuellaBraverman was relatively trival and exploited by Liz Truss to hand the home office to a centrist, Shapps. They see this as a takeover by Jeremy Hunt's wing of the party. The Brexit Tory right.
Truss phone was hacked by suspected Putin agents when she was foreign minister, the Daily Mail reports, 29 Oct
Those agents gained access to "top-secret details" of negotiations with international allies in addition to private messages exchanged with Truss's close friend Kwasi Kwarteng, who later became finance minister, the report said. The messages are believed to have included discussions with senior international foreign ministers about the war in Ukraine, including details about arms shipments, it added. Up to a year's worth of messages were downloaded, the Mail said, citing unnamed sources.
the dogs that did not bark
Experts say locally controlled secret underwater sensors and submarines will be key to the investigation, along with intelligence from international partners like the U.S. and the U.K.
US Naval Force Visits Baltic, 8 Aug
The US Navy Amphibious Ready Group (ARG) and Marine Expeditionary Units (MEUs) have arrived at multiple Baltic Sea ports for training and reinforcement of ties with regional allies. ...The event marks the return of ARG Kearsarge and the USS Gunston Hall to the Baltic Sea after participating in Exercise Siil 2022 led by the Estonian Defense Forces last May and the multinational exercise Baltic Operations 2022 (BALTOPS22) in June.
NATO | Allied Air Forces Conduct Regular Training Drills in Baltic Sea
RAMSTEIN, Germany - On September 26 and 27, Allies Hungary, Germany, Czech Republic, Italy, Türkiye, the United Kingdom, Estonia, Latvia, and Lithuania, as well as partner Finland will conduct the third Ramstein Alloy exercise in 2022 with a focus on NATO's Deter and Defend concept....
ANONYMOUS:...It was a huge, multinational, interagency operation. In the US, it was CIA, NSA, and the military Cyber Command. From Britain we used raw intel out of GCHQ. But the main partner was Isreal. Over there Mossad ran the show and the technical work was done by Unit 8200. Israel is really the key to the story.
antithesis of "cyber-security"
It's a highly sensitive issue. The prosecutor leading the Swedish investigation has already said his country is not interested in signing up to a so-called Joint Investigation Team under the auspices of Eurojust, the EU agency set up to solve cross-border crime.
conflicts of interest
A spokesman for the Swedish prosecutor's office said the decision related to "secrecy linked to national security" and declined to comment on the progress of Sweden's investigation. A spokesman for the Swedish security service said the country was "cooperating with both Germany and Denmark in this matter."
Tensions are also running high in Norway, where authorities last week said they had arrested six Russians suspected of flying unidentified drones over Norwegian oil and gas installations and other sensitive sites, including airports. Russia's ambassador to Norway called the arrests "hysteria."means
: collecting loose ends
USAF Gen., NSA Dir. (ret'd) MICHAEL HAYDEN: Two answers before you even get started. I don't know, and if I did, we wouldn't talk about it anyway.
NARRATOR: But how can you have a debate if everything is secret?
Staff JA, US Cyber Command, GARY BROWN: I think right now that's just where we are. No one wants to, countries aren't happy about confessing or owning up to what they did, because they're not quite sure where they want the system to go. And so, whoever was behind stuxnet hasn't admitted that they were behind it.
NARRATOR: Asking officials about stuxnet was frustrating and surreal like asking the emperor about his new clothes. Even after the cyper-weapon had penetrated computers all over the world, no one was willing to admit that it was loose or talk about the dangers it posed. What was it about the stuxnet operation that was hiding in plain sight? Maybe there was a way the computer code could speak for itself.
Stuxnet first surfaced in Belarus. I started with a call to the man who discovered it [17 JUNE 2010], when his clients in Iran began to panic over an epidemic of computer shutdowns.
Had you ever seen anything quite so sophisticated before?
SERGEY ULASEN: I have seen very sophisticated virus before, but they didn't have this kind of zero day. It was the first time in my practice. That led me to understand that I should notify web security companies ASAP about the fact that such a danger exists.
Kapersky Lab, VITALY KAMLUK: This room we call a woodpecker's room or virus lab, and this is where virus analysts sit. We call them woodpeckers, because they are pecking the worms, network worms, and viruses. And we see, like, three different groups of hackers behind cyber-attacks.The are traditional cyber criminals. Those guys are interested only in illegal profit and quick an dirty money. Activists, or hacktivists, They are hacking for fun or hacking to push some political message. And the third group is nation-states. They're interested in high-quality intelligence or sabotage activity.
Kapersky Lab, EUGENE KAPERSKY: I got the news about stuxnet from one of my engineers. He came to my office, opened the door, and he said, 'So, Eugene, of course you know that we are waiting for something really bad. It happened.'
Control Systems Security, RALPH LANGNER (Hamburg, DE): Well, I wouldn't call it amazement. It was kind of a shock. It went beyond our worst fears, our worst nighmares, and this continued the more we analyed. The more we researched, the more bizarre the whole story got.
Symantec Security Response, LIAM O'MURCHU: We look at so much malware every day that we can just look at the code and straight away we can say, 'Okay, there's somthing bad going on here, and I need to investigate that.' And that's the way it was when we looked at stuxnet the first time. We opened it up, and there was just bad things everywhere....The most interesting thing that we do is detective work where we try to track down who's behind a threat, what are they doing, what's their motivation, and try to really stop it at the root.
Sir Arthur C. Doyle: It is an old maxim of mine that when you have excluded the impossible...
Russian air and sea missiles, or UAVs, cleverly concealed WWII Soviet-NAZI mines, and midnight submarine-assisted depth charges
...whatever remains, however improbable, must be the truth.
by gmoke - Nov 12
by Oui - Nov 30
by Oui - Nov 28
by Oui - Nov 27
by Oui - Nov 25
by Oui - Nov 21
by Oui - Nov 16
by Oui - Nov 15
by Oui - Nov 13
by Oui - Nov 12
by gmoke - Nov 12
by Oui - Nov 11
by Oui - Nov 9
by Oui - Nov 6