The beginning of the XXI century is the time France and the USA started to reshape the African borders, as well as to redistribute the resources of the Black Continent in their favor. A deputy head of US State Department said the African oil has become a sphere of strategic interests for the United States. There are eight thousand barrels of newly proven oil reserves in the world. Africa, a hungry continent considered to be poor, makes up for seven thousands of them. It boasts rich gas resources equal to 14, 65 trillion cubic meters or 7, 9% of world storage.
On January 14, 2013 Switzerland asked the United Nations Security Council to refer Syria to the International Criminal Court (ICC), which prosecutes people for genocide and war crimes. It had applied great effort to make 54 more states join the move , including five members of United Nations Security Council (Great Britain, France, Australia, Korea, and Luxemburg). Though the major part of other Security Council members abstained from putting their signatures on the letter, it was more of a ruse on their part because they had called for the referral before. Continue reading →
Family: Israel sentences Hamas MP to 30 months 1/27/2013 – RAMALLAH (Ma’an) — Hamas lawmaker Hassan Yousef was sentenced to 30 months in Israeli jail after serving several administrative detention terms, his family said on Sunday. Israel’s Ofer military court handed down the sentence on Thursday. Yousef is appealing the sentence and another court session will be held on Tuesday, relatives said….
On November 22, 2012, the Los Angeles Times published an alarming piece of news entitled “Cyber Corps program trains spies for the digital age”. The “cyber-warriors” who are headed for organizations such as the CIA, NSC, FBI, the Pentagon and so on, are trained to stalk, “rifle through trash, sneak a tracking device on cars and plant false information on Facebook [emphasis added]. They also are taught to write computer viruses, hack digital networks, crack passwords, plant listening devices and mine data from broken cellphones and flash drives.” Continue reading →