Nov 13

- America and Israel Created a Monster Computer Virus Which Now Threatens Nuclear Reactors Worldwide (Washington’s Blog, Nov 12, 2013):

Even Threatens the International Space Station

In their obsession to stop Iran from developing nuclear weapons, the U.S. and Israel created a computer virus (called “Stuxnet”) to take out Iran’s nuclear enrichment machinery.

The virus appears to have spread to other countries.

One of the world’s top computer security experts – Eugene Kaspersky – said this week that the virus has attacked a Russian nuclear reactor.   As The Register notes: Continue reading »

Tags: , , , , , , , , , , , , ,

Nov 12

- Stuxnet infected Russian nuclear plant (SC Magazine, Nov 8, 2013):

Jumped airgap, Kaspersky boss says.

Stuxnet had ‘badly infected’ the internal network of a Russian nuclear plant after the sophisticated malware caused chaos in Iran’s uranium facilities in Natanz.

The malware, widely considered to have been developed by the US Government as a means to disrupt Iran’s uranium enrichment plans, had crossed a physically separated ‘air-gapped’ network in the Russian plant after it was carried across on a USB device.

Eugene Kaspersky, the charismatic boss of the Russian antivirus company bearing his name, said a staffer at the unnamed nuclear plant informed him of the infection.

Continue reading »

Tags: , , , , , ,

Aug 03

Flashback.


- Meet The Man In Charge Of America’s Secret Cyber Army (In Which ‘Bonesaw’ Makes A Mockery Of PRISM):

Inside Fort Meade, Maryland, a top-secret city bustles. Tens of thousands of people move through more than 50 buildings—the city has its own post office, fire department, and police force. But as if designed by Kafka, it sits among a forest of trees, surrounded by electrified fences and heavily armed guards, protected by antitank barriers, monitored by sensitive motion detectors, and watched by rotating cameras. To block any telltale electromagnetic signals from escaping, the inner walls of the buildings are wrapped in protective copper shielding and the one-way windows are embedded with a fine copper mesh.

This is the undisputed domain of General Keith Alexander, a man few even in Washington would likely recognize. Never before has anyone in America’s intelligence sphere come close to his degree of power, the number of people under his command, the expanse of his rule, the length of his reign, or the depth of his secrecy. A four-star Army general, his authority extends across three domains: He is director of the world’s largest intelligence service, the National Security Agency; chief of the Central Security Service; and commander of the US Cyber Command. As such, he has his own secret military, presiding over the Navy’s 10th Fleet, the 24th Air Force, and the Second Army.

Schematically, Alexander’s empire consists of the following: virtually every piece in America’s information intelligence arsenal.

 

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Jun 23

- Meet The Man In Charge Of America’s Secret Cyber Army (In Which “Bonesaw” Makes A Mockery Of PRISM)

With his revelations exposing the extent of potential, and actual, pervasive NSA surveillance over the American population, Edward Snowden has done a great service for the public by finally forcing it to answer the question: is having Big Brother peek at every private communication and electronic information, a fair exchange for the alleged benefit of the state’s security. Alas, without further action form a population that appears largely numb and apathetic to disclosures that until recently would have sparked mass protests and toppled presidents, the best we can hope for within a political regime that has hijacked the democratic process, is some intense introspection as to what the concept of “America” truly means.

However, and more importantly, what Snowden’s revelations have confirmed, is that behind the scenes, America is now actively engaged in a new kind of war: an unprecedented cyber war, where collecting, deciphering, intercepting, and abusing information is the only thing that matters and leads to unprecedented power, and where enemies both foreign and domestic may be targeted without due process based on a lowly analyst’s “whim.”

It has also put spotlight on the man, who until recently deep in the shadows, has been responsible for building America’s secret, absolutely massive cyber army, and which according to a just released Wired profile is “capable of launching devastating cyberattacks. Now it’s ready to unleash hell.”

Meet General Keith Alexander, “a man few even in Washington would likely recognize”, which is troubling because Alexander is now quite possibly the most powerful person in the world, that nobody talks about. Which is just the way he likes it. Continue reading »

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Apr 15

- Pentagon calls off new medal for drone, cyber warriors (AFP, Aproil 15, 2013):

WASHINGTON — Defense Secretary Chuck Hagel on Monday cancelled a new combat medal for US troops who launch drone strikes or cyber attacks after a torrent of criticism from veterans and lawmakers.

Hagel opted to scrap the new “Distinguished Warfare Medal” for a pin or device that could be added to existing medals to recognize service members operating unmanned aircraft or cyber weapons, Hagel said in a statement.

The now cancelled medal had provoked outrage among active duty and retired troops, who called it insulting due to its high ranking in the military’s hierarchy of traditional combat medals — above the prestigious Bronze Star for valor and the Purple Heart.

Continue reading »

Tags: , , , , , , , , , , , ,

Mar 14


National Security Agency Director Gen. Keith Alexander

- Pentagon creates 13 offensive cyber teams for worldwide attacks (RT, March 13, 2013):

The head of the United States Cyber Command says the US is developing 40 new teams of cyber-agents that will both protect America’s critical infrastructure from hackers and as well as launch attacks against the country’s adversaries.

Gen. Keith Alexander, who leads both the Cyber Command and the National Security Agency, told the US Senate Armed Services Committee on Tuesday that the 40 online support teams should be ready for action by 2015, with 13 of those units existing specifically to attack other countries.

Alexander has been reluctant to go into detail about how the newly-designed teams will engage in cyber battle with America’s enemies, but he did say that the 13 squads of offensive fighters won’t be sitting around waiting for hackers from abroad to strike first. The NSA chief described the groups as ‘‘defend-the-nation’’ teams but also stressed that their role will be one that puts them on both sides of the action. Continue reading »

Tags: , , , , , , , , , , , ,

Mar 09

- US considering pre-emptive cyberattacks (DW, Feb 2, 2013):

Media reports claim that the US is secretly claiming the right to launch pre-emptive cyberattacks in “credible threat” scenarios, in the wake of the attacks on US media outlets. But how credible are those threats?

The damage done by cyberattacks is not always immediately apparent, even after they have been carried out. Many were surprised when the New York Times, the Wall Street Journal and the Washington Post announced recently that they had been hit for over four months by cyberattacks, in part coming from China. Perhaps more alarmingly, the US Department of Homeland Security said that one power station had been knocked out for weeks by a cyberattack, though it declined to say which.

The US has of course launched a number of digital onslaughts of its own, most notably on Iran’s nuclear enrichment facilities. And that attack was not risk-free, as the so-called Stuxnet virus injected into Iranian systems ended up being leaked onto the Internet and copied millions of times.

Continue reading »

Tags: , , , , , , , , , ,

Feb 21

- Cyber-assault HQ: how US is under attack from this office in Shanghai (Independent, Feb 19, 2013):

A barrage of malicious cyber-attacks against computer networks in the United States and other countries over several years has been sourced by a private US security firm to a single building on the fringes of Shanghai, which, it says, is occupied by the Chinese military.

A 60-page report released by Mandiant, a Virginia-based firm that specialises in cyber-espionage, concludes that hundreds or perhaps thousands of English-speaking Chinese computer experts toil daily inside the anonymous-looking 12-storey building in the Pudong district of Shanghai. ‘Unit 61398’, as it is known, hacks into foreign networks on behalf of the People’s Liberation Army (PLA), Mandiant alleges.

“The nature of Unit 61398’s work is considered by China to be a state secret; however, we believe it engages in harmful computer network operations,” the security firm said in the report, which drew instant rebukes from the Chinese government. “It is time to acknowledge the threat that is originating in China, and we wanted to do our part to arm and prepare security professionals to combat that threat effectively.”

The company asserted that the unit, one of several in China believed to be involved in invading overseas computer systems, had “stolen hundreds of terabytes of data from at least 141 organisations across a diverse set of industries beginning as early as 2006”.  While most of the activity targeted corporations in the United States are smaller number is located in Canada and Britain, it said.

- US ready to strike back against China cyberattacks (AP, Feb 19, 2013):

WASHINGTON (AP) – As public evidence mounts that the Chinese military is responsible for stealing massive amounts of U.S. government data and corporate trade secrets, the Obama administration is eyeing fines and other trade actions it may take against Beijing or any other country guilty of cyberespionage.

According to officials familiar with the plans, the White House will lay out a new report Wednesday that suggests initial, more-aggressive steps the U.S. would take in response to what top authorities say has been an unrelenting campaign of cyberstealing linked to the Chinese government. The officials spoke on condition of anonymity because they were not authorized to speak publicly about the threatened action.

The White House plans come after a Virginia-based cybersecurity firm released a torrent of details Monday that tied a secret Chinese military unit in Shanghai to years of cyberattacks against U.S. companies. After analyzing breaches that compromised more than 140 companies, Mandiant has concluded that they can be linked to the People’s Liberation Army’s Unit 61398.

- China denies cyber attack allegations (BBC News, Feb 20, 2013)

Tags: , , , , , ,

Feb 09

- Obama Declares Global Cyberwar (Veterans Today, Feb 8, 2013):

Throughout his tenure, Obama governed lawlessly for the monied interests that own him. He’s waged no-holds-barred war on humanity.

Strategy includes homeland tyranny, fear-mongering, saber rattling, hot wars, proxy ones, drone ones, domestic political ones, geopolitical ones, financial ones, anti-populist ones, sanctions, subversion, sabotage, targeted assassinations, mass murder, cyberwar, and more.

In May 2009, Obama prioritized cybersecurity. He called cyber-threats “one of the most serious economic and national security challenges we face as a nation.”

“America’s economic prosperity in the 21st century will depend on cybersecurity.”

Continue reading »

Tags: , , , , , , ,

Feb 05

- Pre-Emptive Cyber-Wars Begun They Have (ZeroHedge, Feb 4, 2013):

As the world’s economic powers squabble over the intricacies of cause and effect in a vicious cycle of currency devaluation and domestic economic defense; it appears, NYTimes reports, that the US is leading the way in another direction. A secret legal review on the use of America’s growing arsenal of cyberweapons has concluded that President Obama has the broad power to order a pre-emptive strike if the United States detects credible evidence of a major digital attack looming from abroad – i.e. if we ‘suspect’ someone is going to hack us, we can hack them. In what appears to be Stuxnet’s bigger (and scarier) brother,one official noted, “there are levels of cyberwarfare that are far more aggressive than anything that has been used or recommended to be done.” New policies will also govern how the intelligence agencies can carry out searches of faraway computer networks for signs of potential attacks on the United States and, if the president approves, attack adversaries by injecting them with destructive code – even if there is no declared war. Cyberweaponry is the newest and perhaps most complex arms race under way, based in Cyber Command at The Pentagon, with the unspoken question being, ‘What are we going to do about China?’

Via NY Times
,

A secret legal review on the use of America’s growing arsenal of cyberweapons has concluded that President Obama has the broad power to order a pre-emptive strike if the United States detects credible evidence of a major digital attack looming from abroad, according to officials involved in the review. Continue reading »

Tags: , , , , , , , ,

Feb 05

- Secret rules to let Obama order ‘pre-emptive’ cyber attacks (PressTV, Feb 4, 2013):

A secret legal review on the use of America’s growing arsenal of cyberweapons has concluded that President Obama has the broad power to order a pre-emptive strike if the United States detects credible evidence of a major digital attack looming from abroad, according to officials involved in the review.

That decision is among several reached in recent months as the administration moves, in the next few weeks, to approve the nation’s first rules for how the military can defend, or retaliate, against a major cyberattack.

New policies will also govern how the intelligence agencies can carry out searches of faraway computer networks for signs of potential attacks on the United States and, if the president approves, attack adversaries by injecting them with destructive code – even if there is no declared war.

Continue reading »

Tags: , , , , , , , , , , ,

Feb 01

- Who’s Faking It? Pentagon “Cyber-Warriors” Planting “False Information on Facebook” (Global Research, Jan 26, 2013):

On November 22, 2012, the Los Angeles Times published an alarming piece of news entitled “Cyber Corps program trains spies for the digital age”. The “cyber-warriors” who are headed for organizations such as the CIA, NSC, FBI, the Pentagon and so on, are trained to stalk, “rifle through trash, sneak a tracking device on cars and plant false information on Facebook [emphasis added]. They also are taught to write computer viruses, hack digital networks, crack passwords, plant listening devices and mine data from broken cellphones and flash drives.”

Not surprisingly, less than a month later, it was rumored that Iran ’s Supreme Leader, Ayatollah Khamenei had started a Facebook page. The style and content of the site ruled out its authenticity, but the State Department was amused. In spite of the potential for alarm, State Department Spokeswoman Victoria Nuland jokingly expressed Washington ’s curiosity to see how many “likes’ Khamenei would receive. This is no joking matter. Any message on this page would be attributed to Khamenei with a potential for dangerous ramifications.

Continue reading »

Tags: , , , , , , , , , ,

Nov 22

- NSA Refuses To Release Secret Obama Directive On Cybersecurity (Infowars, Nov 21, 2012):

Order may allow military takeover of internet

The National Security Agency has refused to release details of a secret presidential directive which experts believe could allow the military and intelligence agencies to operate on the networks of private companies, such as Google and Facebook.

As we reported last week, an article in the Washington Post, cited several US officials saying that Obama signed off on the secret cybersecurity order, believed to widely expand NSA’s spying authorities, in mid-October.

“The new directive is the most extensive White House effort to date to wrestle with what constitutes an “offensive” and a “defensive” action in the rapidly evolving world of cyberwar and cyberterrorism.” the report states.

In response to the move, lawyers with the Electronic Privacy Information Center (EPIC) filed a Freedom of Information Act (FOIA) request (PDF) demanding that the Obama administration make public the text of the directive.

Continue reading »

Tags: , , , , , , , , , , , , , , , , , ,

Nov 20

- Anonymous leaks personal information of 5,000 Israeli officials (RT, Nov 18, 2012):

Internet hacktivist group Anonymous has declared cyberwar on Israel, posting personal data of five thousand Israeli officials online.

­The group used their Anonpaste.me site to address a message to the Israeli government before linking to the page with names, ID numbers and personal emails of 5,000 officials.

The message said: “It has come to our attention that the Israeli government has ignored repeated warnings about the abuse of human rights, shutting down the internet in Israel and mistreating its own citizens and those of its neighboring countries.”


(Screenshot from anonpaste.me)

The group also said “Israeli Gov. this is/will turn into a cyberwar.”

Earlier, the group hacked over 700 hundred Israeli websites, including the Bank of Jerusalem, the Israeli Defence Ministry, the IDF blog, the President’s official website and many others.

Most of the sites remain down. Continue reading »

Tags: , , , , , , ,

Aug 03

From the article:

Their (AC/DC) songs were among the loud music played to detainees at the Guantanamo Bay prison facility in preparation for interrogations, the Associated Press reported in October 20009, citing the National Security Archive in Washington.

Let’s just say the US or Israel is really behind this cyber attack.

What would happen if Iran would do the same to us or Israel?


- Iran Nuclear Plants Hit By Virus Playing AC/DC, Website Says (Bloomberg, July 25, 2012)

Iran’s nuclear facilities have suffered a cyber attack that shut down computers and played music from the rock band AC/DC, the F-Secure Security Labs website said.

A new worm targeted Iran’s nuclear program, closing down the “automation network” at the Natanz and Fordo facilities, the Internet security site reported, citing an e-mail it said was sent by a scientist inside Iran’s Atomic Energy Organization.

The virus also prompted several of the computers on site to play the song “Thunderstruck” by AC/DC at full volume in the middle of the night, according to the e-mail, part of which is published in English on the website.

Continue reading »

Tags: , , , , , , , , , , , ,

Jun 20

See also:

- Flame Steals Data Even When Computers Are Not Connected To The Internet

- Flame Virus Developed By U.S. Government

- Kaspersky At Cyber Security Conference: ‘It’s Not Cyber War, It’s Cyber Terrorism And I’m Afraid It’s Just The Beginning Of The Game … I’m Afraid It Will Be The End Of The World As We Know It’

- Kaspersky Lab: Flame And Stuxnet Virus Share Common Origin

- Obama Ordered The Stuxnet Attack On Iran’s Nuclear Facilities – And Yes: This Is An Act Of War!

- President Obama Ordered Stuxnet Attacks On Iran Nuclear Facilities

- US And Israel Created Stuxnet, Lost Control Of It

- Flame Super-Virus Threatening To Cripple Entire Nations Has ‘Hallmarks Of The NSA’


- Israel, US collaborated in creation of ‘Flame’ virus to slow Iran’s nuke efforts, report says (FOX News, June 19, 2012):

Israel and the United States collaborated in the development of the powerful computer virus dubbed the “Flame,” which briefly affected Iran’s key oil industry, an official with knowledge of the effort said.

The Washington Post reports that the massive piece of malware, which collected critical intelligence information from Iran, was created with the aim of slowing the country’s suspected nuclear weapon development.

The Worm.Win32.Flame threat, or “Flame” for short, was likely built by the same nation-state responsible for the Stuxnet virus that targeted Iran’s nuclear power plant in 2010. Many suspect Stuxnet was the work of Israeli intelligence.

Continue reading »

Tags: , , , , , , , , , , , , ,

Jun 12

Related info:

- Kaspersky Lab: Flame And Stuxnet Virus Share Common Origin

- Kaspersky At Cyber Security Conference: ‘It’s Not Cyber War, It’s Cyber Terrorism And I’m Afraid It’s Just The Beginning Of The Game … I’m Afraid It Will Be The End Of The World As We Know It’

- Obama Ordered The Stuxnet Attack On Iran’s Nuclear Facilities – And Yes: This Is An Act Of War!

- President Obama Ordered Stuxnet Attacks On Iran Nuclear Facilities

- US And Israel Created Stuxnet, Lost Control Of It

- Flame Super-Virus Threatening To Cripple Entire Nations Has ‘Hallmarks Of The NSA’


- Flame virus, most sophisticated malicious code ever seen, was developed by U.S. government (Natural News, June 12, 2012):

Anyone who has spent longer than a day on a computer knows how dangerous to your hard drive malware and other malicious code can be. Most of us have fallen victim to one or the other and have cursed the day the hacker who developed it was born.

Now, according to reports, some of the most sophisticated malicious code ever developed is a product of the United States government, leaving more than a few tech experts and analysts concerned that maybe now, Washington has become a bigger info-terrorist than some of the country’s worst enemies.

Continue reading »

Tags: , , , , , , , , , , , , ,

Jun 12

Related info:

- Flame Virus Developed By U.S. Government

- Kaspersky Lab: Flame And Stuxnet Virus Share Common Origin

- Obama Ordered The Stuxnet Attack On Iran’s Nuclear Facilities – And Yes: This Is An Act Of War!

- President Obama Ordered Stuxnet Attacks On Iran Nuclear Facilities

- US And Israel Created Stuxnet, Lost Control Of It

- Flame Super-Virus Threatening To Cripple Entire Nations Has ‘Hallmarks Of The NSA’


- Nations must talk to halt “cyber terrorism”: Kaspersky (Reuters, June 6, 2012):

Eugene Kaspersky, whose lab discovered the Flame virus that has attacked computers in Iran and elsewhere in the Middle East, said on Wednesday only a global effort could stop a new era of “cyber terrorism”.

It’s not cyber war, it’s cyber terrorism and I’m afraid it’s just the beginning of the game … I’m afraid it will be the end of the world as we know it,” Kaspersky told reporters at a cyber security conference in Tel Aviv.

“I’m scared, believe me,” he said.

News of the Flame virus surfaced last week. Researchers said technical evidence suggests it was built for the same nation or nations that commissioned the Stuxnet worm that attacked Iran’s nuclear programme in 2010.

In recent months U.S. officials have become more open about the work of the United States and Israel on Stuxnet, which targeted Iran’s Natanz nuclear enrichment facility.

Continue reading »

Tags: , , , , , , , , , , , , , ,

Jun 12

Related info:

- Flame Virus Developed By U.S. Government

- Kaspersky At Cyber Security Conference: ‘It’s Not Cyber War, It’s Cyber Terrorism And I’m Afraid It’s Just The Beginning Of The Game … I’m Afraid It Will Be The End Of The World As We Know It’

- Obama Ordered The Stuxnet Attack On Iran’s Nuclear Facilities – And Yes: This Is An Act Of War!

- President Obama Ordered Stuxnet Attacks On Iran Nuclear Facilities

- US And Israel Created Stuxnet, Lost Control Of It

- Flame Super-Virus Threatening To Cripple Entire Nations Has ‘Hallmarks Of The NSA’


- Diving Into Flame, Researchers Find A Link To Stuxnet (threatpost, June 11, 2012):

Researchers digging through the code of the recently discovered Flame worm say they have come across a wealth of evidence that suggests Flame and the now-famous Stuxnet worm share a common origin.

Researchers from Kaspersky Lab say that a critical module that the Flame worm used to spread is identical to a module used by Stuxnet.a, an early variant of the Stuxnet worm that began circulating in 2009, more than a year before a later variant of the worm was discovered by antivirus researchers at the Belarussian firm VirusBlokAda. The claims are the most direct, to date, that link the Flame malware, which attacked Iranian oil facilities, with Stuxnet, which is believed to have targeted Iran’s uranium-enrichment facility at Natanz. If true, they suggest a widespread and multi-year campaign of offensive cyber attacks against multiple targets within that country.

According to the Kaspersky researchers, early versions of Stuxnet were, in fact, created out of components that were part of what they refer to as the “Flame platform”. But they believe development of the two malicious programs diverged after 2009, suggesting that two different development teams may have been working independently for a single entity to create malware with specific objectives, according to Kaspersky researchers, writing on the company’s blog, Securelist.

Continue reading »

Tags: , , , , , , , , , ,

Jun 02

See also:

- US To Classify Major Cyber-Attacks As Acts Of War


- Obama Ordered The “Code Stux” (ZeroHedge, May 31, 2012):

When Iran’s nuclear facilities were publicly crippled in 2011 by what then was considered a revolutionary computer virus which destroys physical equipment, many immediately assumed the virus originated in Israel for obvious reasons. They were wrong. In what can be described as the first presidentially-mandated and condoned act of cyberwarfare, one circumventing the War Powers Act of course, the NYT informs us that the order to physically impair Iranian sovereignty came from none other than the Nobel Peace prize winning president: Barack Obama.

From the NYT:

From his first months in office, President Obama secretly ordered increasingly sophisticated attacks on the computer systems that run Iran’s main nuclear enrichment facilities, significantly expanding America’s first sustained use of cyberweapons, according to participants in the program.

Mr. Obama decided to accelerate the attacks – begun in the Bush administration and code-named Olympic Games – even after an element of the program accidentally became public in the summer of 2010 because of a programming error that allowed it to escape Iran’s Natanz plant and sent it around the world on the Internet. Computer security experts who began studying the worm, which had been developed by the United States and Israel, gave it a name: Stuxnet.

At a tense meeting in the White House Situation Room within days of the worm’s “escape,” Mr. Obama, Vice President Joseph R. Biden Jr. and the director of the Central Intelligence Agency at the time, Leon E. Panetta, considered whether America’s most ambitious attempt to slow the progress of Iran’s nuclear efforts had been fatally compromised.

“Should we shut this thing down?” Mr. Obama asked, according to members of the president’s national security team who were in the room.

Told it was unclear how much the Iranians knew about the code, and offered evidence that it was still causing havoc, Mr. Obama decided that the cyberattacks should proceed. In the following weeks, the Natanz plant was hit by a newer version of the computer worm, and then another after that. The last of that series of attacks, a few weeks after Stuxnet was detected around the world, temporarily took out nearly 1,000 of the 5,000 centrifuges Iran had spinning at the time to purify uranium.

This account of the American and Israeli effort to undermine the Iranian nuclear program is based on interviews over the past 18 months with current and former American, European and Israeli officials involved in the program, as well as a range of outside experts. None would allow their names to be used because the effort remains highly classified, and parts of it continue to this day.

For those confused – yes: this is an act of war. A New Normal war.

It appears to be the first time the United States has repeatedly used cyberweapons to cripple another country’s infrastructure, achieving, with computer code, what until then could be accomplished only by bombing a country or sending in agents to plant explosives. The code itself is 50 times as big as the typical computer worm, Carey Nachenberg, a vice president of Symantec, one of the many groups that have dissected the code, said at a symposium at Stanford University in April. Those forensic investigations into the inner workings of the code, while picking apart how it worked, came to no conclusions about who was responsible.

And still America continues to wage war, subverting the constitution, without any Congressional approval, and without even telling the population what is really happening. Because it is “for its own good.

A similar process is now under way to figure out the origins of another cyberweapon called Flame that was recently discovered to have attacked the computers of Iranian officials, sweeping up information from those machines. But the computer code appears to be at least five years old, and American officials say that it was not part of Olympic Games. They have declined to say whether the United States was responsible for the Flame attack.

The “New Normal Gulf of Tonkin“: Continue reading »

Tags: , , , , , , , , , , ,