Wastholm.com

Given the images people see on TV and the headlines written about Afghanistan over the past three decades of war, many conclude the country never made it out of the Middle Ages.

But that is not the Afghanistan I remember. I grew up in Kabul in the 1950s and '60s. When I was in middle school, I remember that on one visit to a city market, I bought a photobook about the country published by Afghanistan's planning ministry. Most of the images dated from the 1950s. I had largely forgotten about that book until recently [...]. But recently, I decided to seek out another copy. Stirred by the fact that news portrayals of the country's history didn't mesh with my own memories, I wanted to discover the truth. Through a colleague, I received a copy of the book and recognized it as a time capsule of the Afghanistan I had once known -- perhaps a little airbrushed by government officials, but a far more realistic picture of my homeland than one often sees today.

US President Barack Obama gets precious few opportunities to announce a victory. So it's no wonder he chose grand words on Sunday night as the TV crews' spotlights shone upon him and he informed the nation about the deadly strike against Osama bin Laden. "Justice has been done," he said.

It may be that this sentence comes back to haunt him in the years to come. What is just about killing a feared terrorist in his home in the middle of Pakistan? For the families of the victims of the 9/11 attacks, and for patriotic Americans who saw their grand nation challenged by a band of criminals, the answer might be simple. But international law experts, who have been grappling with the question of the legal status of the US-led war on terror for years, find Obama's pithy words on Sunday night more problematic.

Ett gyllene tillfälle att träna stridspiloter och att säkra tillgång på olja. Det är skälen till varför flera länder nu anfaller mål i Libyen, inte för att stoppa folkets lidande. Det säger Mellanösternexperten Abdulhadi Khalaf till DN.se.

FOR the first time since World War II, Japan is establishing a secret foreign intelligence service to spy on China and North Korea and gather information to prevent terrorist attacks.

The spy unit has been created under the wing of Japan's peak intelligence agency, the Cabinet Intelligence and Research Office, or Naicho. It is modelled on Western intelligence services such as the CIA, the Australian Secret Intelligence Service and Britain's MI6.

The existence of the new Japanese espionage capability is revealed in a leaked US diplomatic cable obtained by WikiLeaks and provided exclusively to the Herald.

Navy officials and military developers are beaming with smiles of success for they are the proud papas of the newest military marvel: a robotic jet fighter. The X-47B, built by Northrop Grumman, completed its first successful test flight on February 4th at Edwards Air Force Base in California without the assistance of an onboard or remote human pilot. It’s all automated. The aircraft’s sleek tailless design will make it harder to spot on radar, but proves a unique challenge for an unmanned aerial system (UAS). Yet the X-47B pulled off the historic test flight with great success, as you’ll see in the video below. The task ahead will prove much harder. The US Navy is looking to place the robot jet fighter on aircraft carriers in the next decade, with ocean-located trials slated for 2013.

After World War II, the military industrial complex became another key component in the twisted road to police state practices, based on the premise of permanent war making, with a cold war arms race, the sending of troops, and the establishment of military bases across the globe. This is another defining feature of a police state: a nation placed in an ongoing state of mobilization to prepare and fight wars throughout the globe. Police states, incorporate war-making into normalized state functions. Permanent war making translates into the global subversion of democracy. Supplementing the military in undermining democracy overseas, the CIA was one of many federal agencies during the second half of the twentieth century that was carrying out an essentially antidemocratic mission in the name of national security.

And this, of course, has been the point all along:

the WikiLeaks disclosures *are* significant precisely because they expose government deceit, wrongdoing and brutality, but the damage to innocent people has been deliberately and wildly exaggerated -- fabricated -- by the very people whose misconduct has been revealed.

There *is* harm from the WikiLeaks documents, but it's to wrongdoers in power, which is why they are so desperate to malign and then destroy the group.

What WikiLeaks is really exposing is the extent to which the western democratic system has been hollowed out. In the last decade its political elites have been shown to be incompetent (Ireland, the US and UK in not regulating banks); corrupt (all governments in relation to the arms trade); or recklessly militaristic (the US and UK in Iraq). And yet nowhere have they been called to account in any effective way. Instead they have obfuscated, lied or blustered their way through. And when, finally, the veil of secrecy is lifted, their reflex reaction is to kill the messenger.

...

Our rulers have a choice to make: either they learn to live in a WikiLeakable world, with all that implies in terms of their future behaviour; or they shut down the internet. Over to them.

A great deal of money is at stake. Cyber security is a major growth industry, and warnings from Clarke, McConnell, and others have helped to create what has become a military-cyber complex.

...

American intelligence and security officials for the most part agree that the Chinese military, or, for that matter, an independent hacker, is theoretically capable of creating a degree of chaos inside America. But I was told by military, technical, and intelligence experts that these fears have been exaggerated, and are based on a fundamental confusion between cyber espionage and cyber war. Cyber espionage is the science of covertly capturing e-mail traffic, text messages, other electronic communications, and corporate data for the purpose of gathering national-security or commercial intelligence. Cyber war involves the penetration of foreign networks for the purpose of disrupting or dismantling those networks, and making them inoperable.

|< First   < Previous   61–70 (81)   Next >   Last >|