NATO Makes Libya Safe For . . . Al Qaeda

Hey, way to go Obama, Mission Accomplished!

Al-Qaeda flag flies high on top of Benghazi courthouse

The black flag of al-Qaeda has been put on top of a courthouse in the Libyan city of Benghazi, further raising concerns that the country could turn into a Muslim extremist entity.

“There is no God but Allah” was written in Arabic on the flag raised above the streets of Benghazi, considered the heart of the Libyan revolutionaries who toppled Muammar Gaddafi’s regime.

See also:
Flying proudly over the birthplace of Libya’s revolution, the flag of Al Qaeda
Libya: Al Qaeda flag flown above Benghazi courthouse
Islamists fly Al Qaeda flag in Libya
Libya: Flying Al Qaeda Flag, Rumored To Be Imposing Shariah Law
Al-Qaida plants its flag — literally — in Libya
Al Qaeda flag atop Benghazi courthouse fuels Libyan Islamisation fears
Libya: Is al-Qaeda the Main Threat in the Aftermath of the Revolution?
Anti-Qaddafi Forces Flew al-Qaeda Flag During Siege of Sirte
What have NATO and Obama wrought in Libya?
Libya’s turmoil, al-Qaida presence ‘no surprise,’ says White House [VIDEO]

How did we ever get from hunting down al Qaeda all over the world to providing them with air support and handing them control of countries?

/I suspect the will not turn out well for the West

Beyond Stuxnet

Looks like someone, and I’m guessing it’s not the Anonymous script kiddies, is getting ready to open a serious can of cyberwarfare whoop ass on someone.

W32.Duqu: The Precursor to the Next Stuxnet

On October 14, 2011, a research lab with strong international connections alerted us to a sample that appeared to be very similar to Stuxnet. They named the threat “Duqu” [dyü-kyü] because it creates files with the file name prefix “~DQ”. The research lab provided us with samples recovered from computer systems located in Europe, as well as a detailed report with their initial findings, including analysis comparing the threat to Stuxnet, which we were able to confirm. Parts of Duqu are nearly identical to Stuxnet, but with a completely different purpose.

Duqu is essentially the precursor to a future Stuxnet-like attack. The threat was written by the same authors (or those that have access to the Stuxnet source code) and appears to have been created since the last Stuxnet file was recovered. Duqu’s purpose is to gather intelligence data and assets from entities, such as industrial control system manufacturers, in order to more easily conduct a future attack against another third party. The attackers are looking for information such as design documents that could help them mount a future attack on an industrial control facility.

Duqu does not contain any code related to industrial control systems and is primarily a remote access Trojan (RAT). The threat does not self-replicate. Our telemetry shows the threat was highly targeted toward a limited number of organizations for their specific assets. However, it’s possible that other attacks are being conducted against other organizations in a similar manner with currently undetected variants.

See also:
Son of Stuxnet Found in the Wild on Systems in Europe
Duqu May Have Targeted Certificate Authorities for Encryption Keys
Stuxnet Clone ‘Duqu’: The Hydrogen Bomb of Cyberwarfare?
“Son of Stuxnet” Virus Uncovered
New virus a cyber ‘attack in the making’
Cyberattack forecast after spy virus found
Stuxnet successor on the loose?
Brace for “son of Stuxnet” — Duqu spies on SCADA
Duqu: Son of Stuxnet?
Symantec, McAfee differ on Duqu threat
Who’s behind worm Duqu, ‘son of Stuxnet’?
Stuxnet-based cyber espionage virus targets European firms
Key European Nuclear Firms Attacked By Variation On Stuxnet Virus

A couple of conclusions come to mind. First, the fact that Duqu is based on Stuxnet and the Stuxnet source code has never been released makes it a sure bet that the authors are one in the same, namely Israel and/or the United States, Second, the fact that Duqu is clandestinely collecting information from European manufacturers of industrial control system software, specifically software that controls nuclear facilities, strongly suggests that the eventual primary target of the apparent pending cyberattack will, once again, be Iran’s nuclear program.

/in other words, Duqu is setting up a cyberassault that will hopefully finish, once and for all, the job that Stuxnet so effectively started, halting Iran’s quest for a nuclear weapon in its tracks without having to bomb the [expletive deleted] out of their nuclear facilities

Is America A Great Country Or What?

The United States is $14 trillion in debt, about to default, with an economy that’s on the verge of collapsing, and what are we spending money on?

‘US paying salaries for jailed Palestinian terrorists’

The Palestinian Authority spends more than $5 million a month paying salaries to terrorists sitting in Israeli prisons, according to a Palestinian Media Watch report presented to congressmen in Washington on Tuesday.

According to the report, written by Itamar Marcus and Nan Jacques Zilberdik, such payments contravene US law, which prohibits funding of any person who “engages in, or has engaged in terrorist activity.

Read the report:

Palestinian Authority glorification
of terrorists and paying salaries
to terrorists with US money

See also:
U.S. Pays Salaries to Palestinian Terrorists
U.S. Pays Salaries to Palestinian Terrorists
U.S. Pays Salaries to Palestinian Terrorists
‘US paying salaries for jailed Palestinian terrorists’
JPost on PMW report: PA paying salaries to imprisoned terrorists with US money
PA to pay salaries to all terrorists in Israeli prisons
Palestinian Media Watch
Palestinian Media Watch

Why are we still giving any money to the Palestinian Authority, especially now that they’ve teamed up with Hamas and seeing as how they’re both sworn to Israel’s destruction? Why are we supporting the enemy of our closest alliy in the region?

/FUBAR