Generational Dynamics: Forecasting America's Destiny Generational
Dynamics
 Forecasting America's Destiny ... and the World's

 |  HOME  |  WEB LOG  |  COUNTRY WIKI  |  COMMENT  |  FORUM  |  DOWNLOADS  |  ABOUT  | 

Generational Dynamics Web Log for 1-Jun-2012
1-Jun-12 World View -- Obama weighs plans to prevent al-Qaeda grabbing Syria's WMDs

Web Log - June, 2012

1-Jun-12 World View -- Obama weighs plans to prevent al-Qaeda grabbing Syria's WMDs

Syria rebels demand apology from Hezbollah's Nasrallah

This morning's key headlines from GenerationalDynamics.com.

Hillary Clinton accuses Russia of fomenting civil war in Syria


Hillary Clinton (AFP)
Hillary Clinton (AFP)

In a speech on Wednesday, U.S. Secretary of State Hillary Clinton warned that unless unchecked, the violence in Syria could lead to a civil war or develop into a proxy war between Iran and the Gulf Arabs.

"The continued slaughter of innocent people, both by the military and by militias supported by the government and increasingly by the opposition ... could morph into a civil war in a country that would be riven by sectarian divides, which then could morph into a proxy war in the region.

Remember you have Iran deeply embedded in Syria – their military are coaching the Syrian military. The Quds Force, which is a branch of the military, is helping them set up these sectarian militias. We know it actually could get much worse than it is."

She said that the Russians "are telling me they don't want to see a civil war. I have been telling them their policy is going to help contribute to a civil war." Telegraph

Debka: Obama weighs plans to prevent al-Qaeda grabbing Syria's WMDs

While Clinton's remarks directed at Russia were made publicly, in the background there is an effort by the Obama administration to convince Russia to cooperate in a military effort to prevent al-Qaeda from gaining control of al-Assad's collection of weapons of mass destruction (WMDs). According to intelligence sources quoted by Debka, the WMDs kept in large barrels or kegs in six underground bunkers, holding Sarin (GB), Tabun (GA) and VX nerve gases, some four kinds of mustard gas and anthrax. Three of the six locations are situated in heavily embattled areas between the Syrian army and rebels, and al-Qaeda elements are penetrating these areas with a view to seizing some of the WMD stores. President Obama hopes to convince Russia's president Vladimir Putin to agree to insert 5,000 international monitors into Syria to protect the WMDs, and if Putin agrees, then it's hoped that al-Assad will agree. Obama has also signaled Russia that if Putin does not agree to the plan, then the U.S. may bypass the U.N. Security Council and take unilateral military action to protect the WMDs. Debka

U.S. Treasury yields plummet as investors scramble for safety

Yesterday we reported that 10-year government bonds from Spain are yielding 6.6%, which means that if you're willing to lend money to Spain for ten years, then Spain will pay you 6.6% interest -- assuming that Spain doesn't go bankrupt, in which case you'll lose all your money. A high bond yield means that investors are betting that a government will default. On Thursday, U.S. Treasury bond yields fell to a historic low -- 1.58% -- down from Wednesday's record low 1.62%. Investors are fearing a fall in American and European stock markets, and are putting their money at record levels into U.S. Treasuries. CNN

Vital industrial control computers remain unprotected from attack

A lot of attention is given to protecting desktop computers and data center servers from cyber-attack, but a third category of computer, those used for supervisory control and data acquisition (SCADA) are almost completely unprotected. These are the computers that are used by utilities, transportation, logistics, manufacturing and pharmaceuticals, and are critical to our lives and the security of the nation. The potential for destruction through a cyber-attack was illustrated in 2010 when the Stuxnet computer virus was launched to attack Iran's nuclear facilities. It took control of the centrifuges and spun them so rapidly that they were disabled. SCADA computer networks are often years or even decades old, because they've been working reliably and nobody wants to touch them -- even to upgrade the software or to provide additional protections from cyber-attack. SCADA networks are the most unprotected networks of all and now cyber-criminals have them in their sights. If they get access, the consequences for many organizations, their customers and perhaps the population at large, could be extremely damaging. Security Week - Part 1 and Part 2

Origins of the 'Flame Virus' still a mystery

News stories have been reporting a new malware attack called "Flame," a highly complex computer virus. The news stories have variously said that it's attacked Iran's major oil terminals and computers in the Mideast, suggesting that Flame was launched by Israel. However, while there have been 189 infected computers found in Iran, there are also 100 in Israel and the Palestinian territories, and 30 in Sudan and Syria. These figures are extremely low when compared with other viruses. Flame is not destructive, like Stuxnet. Instead, it appears to be an espionage tool -- collecting keystrokes, making screenshots, and sending the data back to the mother computer. Flame even searches for nearby Bluetooth devices -- cameras and microphones -- and turns them on so that your actions can be overheard and recorded. Deutsche Welle

Syria rebels demand apology from Hezbollah's Nasrallah

Practically everything about the Syria situation is absolutely dreadful, so if one tiny aspect is amusing, it's worth pointing out. Last week, a busload of Shia Lebanese citizens were kidnapped in Syria, as they traveled back to Lebanon from a religious pilgrimage to Iran. A previously unknown armed group calling itself the "Syrian Revolutionaries - Aleppo Province" claims to have perpetrated the kidnapping, and they're demanding an apology from Hezbollah chief Sheik Sayyed Hassan Nasrallah in exchange for releasing the kidnap victims:

"The kidnapped Lebanese are being looked after by us and are in good health. Negotiations for their release are possible as soon as Nasrallah apologises ... Our problem is not with any particular community but with those who assist in the suppression of the uprising."

Hezbollah and Iran are the principal allies of Syria's president Bashar al-Assad. Nasrallah is a terrorist who is always going on Lebanese television giving speeches fomenting violence against Israel and demanding apologies from various Western countries. Now the shoe is on the other foot, and it's Nasrallah that's calling for calm, and it's a different group of terrorists that are demanding an apology from him. Al-Jazeera

(Comments: For reader comments, questions and discussion, see the 1-Jun-12 World View -- Obama weighs plans to prevent al-Qaeda grabbing Syria's WMDs thread of the Generational Dynamics forum. Comments may be posted anonymously.) (1-Jun-2012) Permanent Link
Receive daily World View columns by e-mail
Donate to Generational Dynamics via PayPal

Web Log Pages

Current Web Log

Web Log Summary - 2016
Web Log Summary - 2015
Web Log Summary - 2014
Web Log Summary - 2013
Web Log Summary - 2012
Web Log Summary - 2011
Web Log Summary - 2010
Web Log Summary - 2009
Web Log Summary - 2008
Web Log Summary - 2007
Web Log Summary - 2006
Web Log Summary - 2005
Web Log Summary - 2004

Web Log - December, 2016
Web Log - November, 2016
Web Log - October, 2016
Web Log - September, 2016
Web Log - August, 2016
Web Log - July, 2016
Web Log - June, 2016
Web Log - May, 2016
Web Log - April, 2016
Web Log - March, 2016
Web Log - February, 2016
Web Log - January, 2016
Web Log - December, 2015
Web Log - November, 2015
Web Log - October, 2015
Web Log - September, 2015
Web Log - August, 2015
Web Log - July, 2015
Web Log - June, 2015
Web Log - May, 2015
Web Log - April, 2015
Web Log - March, 2015
Web Log - February, 2015
Web Log - January, 2015
Web Log - December, 2014
Web Log - November, 2014
Web Log - October, 2014
Web Log - September, 2014
Web Log - August, 2014
Web Log - July, 2014
Web Log - June, 2014
Web Log - May, 2014
Web Log - April, 2014
Web Log - March, 2014
Web Log - February, 2014
Web Log - January, 2014
Web Log - December, 2013
Web Log - November, 2013
Web Log - October, 2013
Web Log - September, 2013
Web Log - August, 2013
Web Log - July, 2013
Web Log - June, 2013
Web Log - May, 2013
Web Log - April, 2013
Web Log - March, 2013
Web Log - February, 2013
Web Log - January, 2013
Web Log - December, 2012
Web Log - November, 2012
Web Log - October, 2012
Web Log - September, 2012
Web Log - August, 2012
Web Log - July, 2012
Web Log - June, 2012
Web Log - May, 2012
Web Log - April, 2012
Web Log - March, 2012
Web Log - February, 2012
Web Log - January, 2012
Web Log - December, 2011
Web Log - November, 2011
Web Log - October, 2011
Web Log - September, 2011
Web Log - August, 2011
Web Log - July, 2011
Web Log - June, 2011
Web Log - May, 2011
Web Log - April, 2011
Web Log - March, 2011
Web Log - February, 2011
Web Log - January, 2011
Web Log - December, 2010
Web Log - November, 2010
Web Log - October, 2010
Web Log - September, 2010
Web Log - August, 2010
Web Log - July, 2010
Web Log - June, 2010
Web Log - May, 2010
Web Log - April, 2010
Web Log - March, 2010
Web Log - February, 2010
Web Log - January, 2010
Web Log - December, 2009
Web Log - November, 2009
Web Log - October, 2009
Web Log - September, 2009
Web Log - August, 2009
Web Log - July, 2009
Web Log - June, 2009
Web Log - May, 2009
Web Log - April, 2009
Web Log - March, 2009
Web Log - February, 2009
Web Log - January, 2009
Web Log - December, 2008
Web Log - November, 2008
Web Log - October, 2008
Web Log - September, 2008
Web Log - August, 2008
Web Log - July, 2008
Web Log - June, 2008
Web Log - May, 2008
Web Log - April, 2008
Web Log - March, 2008
Web Log - February, 2008
Web Log - January, 2008
Web Log - December, 2007
Web Log - November, 2007
Web Log - October, 2007
Web Log - September, 2007
Web Log - August, 2007
Web Log - July, 2007
Web Log - June, 2007
Web Log - May, 2007
Web Log - April, 2007
Web Log - March, 2007
Web Log - February, 2007
Web Log - January, 2007
Web Log - December, 2006
Web Log - November, 2006
Web Log - October, 2006
Web Log - September, 2006
Web Log - August, 2006
Web Log - July, 2006
Web Log - June, 2006
Web Log - May, 2006
Web Log - April, 2006
Web Log - March, 2006
Web Log - February, 2006
Web Log - January, 2006
Web Log - December, 2005
Web Log - November, 2005
Web Log - October, 2005
Web Log - September, 2005
Web Log - August, 2005
Web Log - July, 2005
Web Log - June, 2005
Web Log - May, 2005
Web Log - April, 2005
Web Log - March, 2005
Web Log - February, 2005
Web Log - January, 2005
Web Log - December, 2004
Web Log - November, 2004
Web Log - October, 2004
Web Log - September, 2004
Web Log - August, 2004
Web Log - July, 2004
Web Log - June, 2004


Copyright © 2002-2016 by John J. Xenakis.