[Majorityrights News] KP interview with James Gilmore, former diplomat and insider from first Trump administration Posted by Guessedworker on Sunday, 05 January 2025 00:35.
[Majorityrights News] Trump will ‘arm Ukraine to the teeth’ if Putin won’t negotiate ceasefire Posted by Guessedworker on Tuesday, 12 November 2024 16:20.
[Majorityrights News] Alex Navalny, born 4th June, 1976; died at Yamalo-Nenets penitentiary 16th February, 2024 Posted by Guessedworker on Friday, 16 February 2024 23:43.
[Majorityrights Central] A couple of exchanges on the nature and meaning of Christianity’s origin Posted by Guessedworker on Tuesday, 25 July 2023 22:19.
[Majorityrights News] Is the Ukrainian counter-offensive for Bakhmut the counter-offensive for Ukraine? Posted by Guessedworker on Thursday, 18 May 2023 18:55.
Posted by DanielS on Saturday, 13 January 2018 02:10.
The New Observer, “The German government is currently preparing nearly one third of a million “family visas” for the immediate families of non-White invaders given “asylum” in that country—and this is just the start of the program of ‘family reunification,” 10 Jan 2018:
According to a report in the Bild newspaper, the Federal Foreign Office in Berlin is currently preparing at least 300,000 visas for “family members of refugees” living in Germany with subsidiary protection.
This is however only the start of the program, as currently, family reunification for refugees with “limited subsidiary protection” is suspended until mid-March 2018.
“Limited subsidiary protection” is only “temporary” asylum—in theory—whereas full subsidiary protection is for those who have been granted permanent asylum status.
There are currently far more invaders with “limited subsidiary protection” than those with full subsidiary protection, and if the rules are changed to allow the former group to bring their families as well, the number of “family visas” will swell into the millions.
The move to temporarily halt family reunification for those with “limited subsidiary protection” was made by Angela Merkel’s ruling Christian Democratic Union (CDU) party following the strong showing of the anti-invasion Alternative für Deutschland (AfD) party, as an attempt to dampen support for that group.
However, the Merkel government is in talks with its previous long-term coalition partner, the Socialist Party of Germany (SPD) to form a new government—and the topic of family reunification rights for those invaders with “limited subsidiary protection” is a major topic of discussions between the two parties.
The SPD has set it as a basic demand that those with temporary protection be given the right to “family reunification” and it seems likely that Merkel will give way on this demand in order to remain in power.
It has previously been well-established that those granted “limited subsidiary protection” always end up staying permanently anyway, as once they have been in Germany for five years, they qualify for permanent residence.
Posted by DanielS on Thursday, 11 January 2018 22:25.
Israel is facing a possible international criminal court war-crimes probe over its 2014 assault on Gaza, which killed more than 2,100 Palestinians, including over 500 children.
Posted by DanielS on Saturday, 06 January 2018 07:43.
What it’s like to argue with a bracket and why ‘American founding fathers constitutionalism’ is too complicated and flawed a premise to defend White nationalism.
When asked why she wanted to exclude certain people from White Nations…
Tara experiences what it’s like to argue with a virulent bracket and why defending White America (let alone White Nations generally, of course) on the basis of the U.S. Constitution, founding fathers, exceptionalism, etc., is not the best angle.
If you mean to defend White Nationalism, defend White Nationalism, not American Nationalism of the Founding fathers, their constitution and not I.Q., as Tara does. The intentions of the founding fathers, what their text say, matters of I.Q. and the accomplishments (or lack of certain kinds of misdeeds) of White Nations can provide rebuts to fallacious counter arguments, but are not effective as a premisary thesis for defending White Nationalism.
MR’s platform takes rather a premise of deep systemic, pervasive ecology and biodiversity ... to be deliberately coordinated among human and pervasive ecology; and to be distinguished from Hitler’s ‘ecology’ which was more like Darwinism and absent the sufficient human and humane aspect of praxis.
Perhaps we should let Tara find out the hard way - she has been warned (as Mancinblack noted). There are reasons to be critical of her: she has associated with some pretty bracketed individuals, such as the guy promoting the Jewish alternative payment set up (I’ll find the link a little later); in addition to going along with the fundamentally right wing and Jewish aligned platform that is the Alternative Right.
Posted by DanielS on Friday, 05 January 2018 07:06.
According to Wolff book: Trump was shocked by presidential victory. He had run with anticipation of a loss to Hillary based on her “fake” media support which he could parlay into a “real” media empire by contrast; Bannon warned presidential victory would spotlight Trump’s Russian money laundering; Melania cried in stress over “botched plan gone right” which actually landed the presidency for Donald.
NewsWeek, “Trump Was Horrified When He Won the White House and Melania Cried, Book Claims”, 3 Jan 2018:
No one on Donald Trump’s presidential campaign team thought Trump would actually become president—and they didn’t really want him to either, according to excerpts from Michael Wolff’s book published Wednesday in New York magazine.
Now-President Trump, Vice President Mike Pence, Donald Trump Jr., campaign manager Kellyanne Conway and first lady Melania Trump were all reportedly left dumbfounded and afraid on the night of the election in 2016, the book claims. Shortly after 8 on election night, it became clear that Trump had a real shot of becoming president. Wolff wrote that Don Jr. said his father “looked as if he had seen a ghost. Melania was in tears—and not of joy.” Steve Bannon, who helped run the Trump campaign and helped Trump’s team through the transition, said he saw Trump morph from “a disbelieving Trump and then into a horrified Trump.”
A week before the election, Trump was sure he would lose the presidency. But still, according to Wolff’s book, he told Ailes that it was “bigger than I ever dreamed of. I don’t think about losing, because it isn’t losing. We’ve totally won.”
Then he actually won.
Wolff’s claims match various reporting on Trump’s election: He certainly wanted the fame that goes along with running a successful campaign, but critics theorized that he wasn’t quite as happy claiming the job of president. In February, The New York Times reported that Trump misses his access to “fans and supporters — an important source of feedback and validation.” The Associated Press wrote that Trump didn’t even want to live in the White House.
But Wolff’s new book claims Trump and his campaign never planned to win and never wanted to accept the job that comes along with a victory. So once he did take office, the West Wing was in disarray, with Bannon, Ivanka Trump and Jared Kushner all operating in a free-form environment. Bannon, especially, saw his role as creating the “soul” of the White House, according to Wolff. And Trump’s own behavior was credited as not befitting the White House.
“Nothing contributed to the chaos and dysfunction of the White House as much as Trump’s own behavior,” Wolff wrote. “The big deal of being president was just not apparent to him. Most victorious candidates, arriving in the White House from ordinary political life, could not help but be reminded of their transformed circumstances by their sudden elevation to a mansion with palacelike servants and security, a plane at constant readiness, and downstairs a retinue of courtiers and advisers. But this wasn’t that different from Trump’s former life in Trump Tower, which was actually more commodious and to his taste than the White House.”
Wolff’s book Fire and Fury: Inside the Trump White House is to be published by Henry Holt & Co. on January 9.
The Hill, “Bannon warned Russia probe would focus on money laundering: report”, 3 January 2018:
Former White House chief strategist Stephen Bannon warned that the special counsel investigation into whether the Trump campaign colluded with Russia would focus on money laundering, according to a book to be published next week.
The revelation is included in “Fire and Fury: Inside the Trump White House,” a new book by Michael Wolff. The Guardian, which has viewed a copy, published several stories on Wednesday about the book, which includes interviews with Bannon and President Trump.
Trump’s former campaign chairman Paul Manafort was charged with money laundering in an October indictment brought by special counsel Robert Mueller, as was his associate Richard Gates.
In Wolff’s book, Bannon identifies Weissmann, an attorney on Mueller’s team, as a “money-laundering guy.”
“You realize where this is going,” Bannon said in the book. “This is all about money laundering. Mueller chose Weissmann first and he is a money-laundering guy. Their path to fucking Trump goes right through Paul Manafort, Don Jr and Jared Kushner. … It’s as plain as a hair on your face.”
“They’re going to crack Don Junior like an egg on national TV,” Bannon said, referring to the president’s eldest son, Donald Trump Jr.
The former White House chief strategist also spoke about the 2016 meeting between Trump Jr. and a group of Russians, describing it as “treasonous.”
And Bannon in “Fire and Fury” mentioned connections between Trump’s son-in-law, Jared Kushner, and loans taken out from the German Deutsche Bank that have come under scrutiny in relation to the investigation.
In December, federal prosecutors subpoenaed Deutsche Bank for records tied to Kushner’s family’s real estate business, Kushner Companies.
“It goes through Deutsche Bank and all the Kushner shit,” Bannon said of the probe. “The Kushner shit is greasy. They’re going to go right through that. They’re going to roll those two guys up and say play me or trade me.”
Business Insider, “I know why Steve Bannon let Michael Wolff into the White House”, 4 Jan 2018:
- Michael Wolff’s new book, “The Fire and the Fury,” is rocking the Trump White House, and it hasn’t even been released yet.
- It has the president turning on former adviser Steve Bannon. This is in part because Bannon helped Wolff gain incredible access to the White House.
- Why? Add this to the long list of ego-driven media mistakes made by the administration - a costly one at that.
- What Bannon didn’t count on was that Wolff isn’t a soldier in his army.
I feel like I write this all the time, but the White House is in chaos.
The Trump administration is being thrown by the forthcoming publication of Michael Wolff’s book “The Fire and The Fury: Inside the Trump White House.”
The excerpts, until now jealously guarded at select media outlets like New York Magazine and NBC for weeks, tell of a shockingly incompetent president and the in-over-their-heads aides who openly disrespect him. It is chaos, and someone let Wolff take a front seat and watch it all.
That person, by all accounts, was former White House adviser Stever Bannon. While Trump may have known that the biographer of his idol, Rupert Murdoch, was on site, it was Bannon who ensured Wolff had access.
Why? Consider it one part self-aggrandizement, another part a desire for acceptance, and wholly and completely a continuation of Bannon’s desperate search for ideological allies.
Posted by DanielS on Thursday, 04 January 2018 14:31.
JTA, “Neo-Nazi who co-runs Daily Stormer has Jewish relatives on both sides of family”, 3 Jan 2018:
Andrew “Weev” Auernheimer
(JTA) — The mother of a neo-Nazi who co-runs the white supremacist website Daily Stormer and said Jewish children “deserve to die” has Jewish relatives on both sides of his family.
Andrew “Weev” Auernheimer’s mother, Alyse, confirmed to Newsweek magazine in an article published Wednesday that her son comes from a “large, mixed race family” with Native American heritage, and that he has Jewish lineage “on both sides of his family.” His Jewish heritage was first reported by Gawker in 2012 when he volunteered the information to a reporter, but this is the first time a family member has confirmed his background.
Auernheimer, who runs the technical side of the Daily Stormer, with its more well-known editor Andrew Anglin, is believed to be in Ukraine, where he has lived since serving jail time in the United States on a computer hacking charge. He has been estranged from his mother for over a decade, she told Newsweek.
“Weev” Auernheimer works for both Daily Stormer and TRS.
Auernheimer, 32, on the podcast Radical Agenda last month said Jews were to blame for the Daily Stormer website losing its dot-com status, causing it to jump from domain to domain in recent months.
“If you don’t let us dissent peacefully, then our only option is to murder you. To kill your children. To kill your whole families,” he said in an interview. “There is only one thing absent free speech that we can do to express our dissent and that’s to slaughter you like dogs, and you’re gonna have it coming and your children will deserve to die.”
While normal WN have been intent on denying a supremacist message in favor of a separatist message, Weev sent this missive everywhere from China to the University of Massachusetts at Amherst
Podcast host Christopher Cantwell, who is under house arrest in Virginia on two felony charges for allegedly using tear gas and pepper spray at the Charlottesville rally in August, tried to walk back the statements, saying that killing Jews “is certainly an undesirable option I’ll state for the FBI agents and prosecutors who are listening to this show.”
Auernheimer also said that the retaliation against the Jews should focus on the “top” Jews, “the most Jewish Jews.”
Related, Weev added in that show that he just wants Jews to convert to Christianity. He has in mind a special new denomination of Christianity which would conform to “natural order.”
The Paleoconservative deal…
Mancinblack remarked, “Oy vey Maria. Weev should go poke a polar bear with a crucifix. I’d pay good money for the film rights.”
Posted by DanielS on Thursday, 04 January 2018 06:25.
It was quite picky on its target. It went through several checks and when those checks failed, it would not implement the attack. It was obviously probing for a very specific target…you have to put this in context - this was the most sophisticated piece of malware that we have ever seen. So, its kind of strange that someone makes this huge effort to hit one specific target…well, that must be quite a significant target:
Whoever was behind Stuxnet hasn’t admitted they were behind it.
Even after the cyberweapon had penetrated computers all over the world, no one was willing to admit that it was loose, or talk about the dangers that it posed.
Stuxnet first surfaced with a Belarusian security company servicing Iran.
“Had you ever seen anything quite so sophisticated before?”
“Not with this kind of ‘zero-day’ capacity…......... it was the first time in my practice.”
... a third kind of hactivist is sponsored by state governments…
It went beyond our worst fears… our worst nightmares ..and this continued the more we analyzed….
The first time we opened up Stuxnet there was just bad things everywhere.
Just to give you some context, we can go through and understand every line of code for the average threat in minutes… and here we are one month into this threat and we are just beginning to discover what we call its payload, or its whole purpose…
When looking at the Stuxnet code, its twenty times the size of the average piece of code but contains almost no bugs inside of it, which is extremely rare, code always has bugs inside of it. It’s dense and everything does something or does something right in order to conduct its attack.
One of the things that surprised us was that Stuxnet utilized what is called a zero day exploit.
...its a piece of code allows it to spread without you having to do anything…
A zero day is an exploit which nobody knows about except for the attacker; so there’s no protection against it, there’s been no patch released.
There’s been zero days protection against it. That’s what attackers value because they know 100 percent that if they have this zero day that they can get in whenever they want
They’re actually very valuable - you can sell them for hundreds of thousands of dollars.
Then we became worried because immediately we discovered we had more zero days, and again, these zero days are extremely rare.
Inside Stuxnet we had four zero days, and for the entire rest of the year we only saw twelve zero days used.
It blows everything else out of the water ..we’ve never seen this before and never seen it since, either.
Seeing one in a malware you could understand because the malware offers a means to make money, they’re stealing people’s credit cards so its worth their while to use it, but seeing four zero days…could be worth half a million dollars right there in one piece of malware ..this is not your ordinary criminal gang doing this, this is someone bigger.
It’s definitely not traditional crime. Not hacktivists.
It was evident early on, just given the sophistication of this malware that there must have been a nation state involved - at least one nation state involved in the development.
However, there were “breadcrumbs” left…they had to have some human assets steal certificates, which they did, traceable from two companies in close proximity in a business park in Taiwan.
Eventually we were able to see that Iran was the number one infected country in the world.
That immediately raised our eyebrows.
...we’d never seen a threat before where it was predominantly in Iran.
So we began to follow what was going on in the geopolitical world, what was happening in the general news.
At that time there were actually multiple explosions of pipelines going in and out of Iran.
And we noticed that there had been assassinations of nuclear scientists
More breadcrumbs showed that Stuxnet was targeting Siemans progammable logic controllers.
The PLC is like a very small computer attached to physical equipment like pumps, like valves, like motors.
So, this little box is running a digital program and the actions of this program turns that motor on, off, or sets the specific speed.
They control things like power plants, power grids… things in factories… in critical infrastructure ...critical infrastructure is everywhere around us ...transportation, telecommunication, financial services, health care..
So the payload of Stuxnet was designed to attack some very important part of our world.
The payload was going to be very important..
We knew that Stuxnet could have very dire consequences.
Stuxnet caused the centrifuges (of Iranian nuclear reactors) to spin much faster (than programmed for, to the point where they would explode).
Posted by DanielS on Tuesday, 02 January 2018 07:28.
A kiss and a medal for Jack Posobiec
Mission
Per JP 1-02, Information Operations is “the integrated employment, during military operations, of information-related capabilities in concert with other lines of operation to influence, disrupt, corrupt, or usurp the decision making of adversaries and potential adversaries while protecting our own.”
The question is: Is their mission virtually one and the same as Israel’s at this point? .... The crew of the USS Liberty might have hoped not.
Center for International Maritime Security, Current Operations, Cyber War
CIMSEC, “Navy Information Warfare — What is it?”, 13 Sept 2016:
By Richard Mosier
U.S. Navy Information Dominance Warfare Officer Breast Insignia
United States Navy Information Dominance Warfare Officer warfare pin breast insignia is two-and-three-quarter inches by one-and-one-eighth inches, gold matte metal pin showing a background of ocean waves, a crossed Naval officer’s sword and lightning bolt, a fouled anchor, and a globe.
Defining a warfare area’s mission and function is the foundation for all activities required to conduct mission area analysis to determine requirements, develop doctrine and tactics, and structure, train, and equip the fleet to accomplish the mission.
Within the U.S. Navy, the terms Information Warfare (IW), Information Operations (IO), and Information Operations Warfare are widely used but not well defined. Nor are they linked to provide coherent definitions from joint and service perspectives that are essential to successful communication regarding IW’s relationship to other warfare areas and supporting activities. The result is confusion, a lack of progress in structuring, training, and equipping the U.S. Navy to perform this emerging predominant warfare area
The following are examples of how these terms mean different things to different groups:
Reference: Station Hypo, 14 Jul 16, “CWOBC, a Community’s Course“: “The Cryptologic Warfare Officer Basic Course (CWOBC) formerly known as the Information Warfare Basic Course (IWBC) is an entry level course for all officers, regardless of commission source, who are coming into the Cryptologic Warfare Officer (CWO) community. Six weeks in length with an average annual throughput of 154, the course focuses on Signal Intelligence (SIGINT), Electronic Warfare (EW), Cyber Operations, as well as security fundamentals and community history.” Inasmuch as the content of the basic course remained the same, the terms “Information Warfare” and “Cryptologic Warfare” appear to mean the same thing for this group.
50828-N-PU674-005 PENSACOLA, Fla. (Aug. 28, 2015) Officers attending the Information Professional Basic Course at Center for Information Dominance Unit Corry Station listen to Rear Adm. Daniel J. MacDonnell, commander of Information Dominance Corps Reserve Command (IDCRC) and Reserve deputy commander of Navy Information Dominance Forces (NAVIDFOR). Macdonnell spoke with them about career opportunities in the Information Dominance Corps and active and reserve integration.
PENSACOLA, Fla. (Aug. 28, 2015) Officers attending the Information Professional Basic Course at Center for Information Dominance Unit Corry Station listen to Rear Adm. Daniel J. MacDonnell, commander of Information Dominance Corps Reserve Command (IDCRC) and Reserve deputy commander of Navy Information Dominance Forces (NAVIDFOR). Macdonnell spoke with them about career opportunities in the Information Dominance Corps and active and reserve integration.
Reference the BUPERS Information Warfare Community Management web page. It only addresses Information Professionals (1820), Cryptologic Warfare Specialists (1810), Cyber Warfare Engineers (1840), Intelligence Officers (1830), and Oceanography Specialists (1800), implying that together this aggregation of legacy support specialties constitutes Information Warfare. All of these are restricted line designators that by definition exercise command only over organizations that perform these specialties. There are no unrestricted line designators for specializing in and exercising Information Operations Warfare Commander (IWC) functions described in Naval Warfare Publication NWP 3-56 below.
Reference: NAVADMIN 023/16, DTG 021815 Feb 16, Subject: Information Dominance Corps Re-designated Information Warfare Community. The message states Information Warfare’s mission is: “providing sufficient overmatch in command and control, understanding the battlespace and adversaries, and projecting power through and across all domains.” This description of the Information Warfare mission is substantially different from the definition of Information Operations defined by Secretary of Defense, adopted by the JCS, and reflected in Naval Warfare Publications.
The Secretary of Defense defines Information Operations in DOD Directive 3600.1, dated May 2, 2013, as: “The integrated employment, during military operations, of information-related capabilities in concert with other lines of operation to influence, disrupt, corrupt, or usurp the decision making of adversaries and potential adversaries while protecting our own.” This definition was incorporated in Joint Pub 1-02 and Naval Warfare Publications.
Naval Warfare Publication (NWP) 3-13 Information Operations, Feb 2014, defines Information Operations as: “the integrated employment, during military operations, of information-related capabilities in concert with other lines of operation to influence, disrupt, corrupt, or usurp the decision making of adversaries and potential adversaries while protecting our own.” Paragraph 1-3 states: “Evolving joint and Navy doctrine has refined IO as a discrete warfare area, not just a supporting function or enabling capability, and the IE [information environment] as a valuable and contested part of the battlespace.”
160123-N-PU674-018 PENSACOLA, Fla. (Jan. 23, 2016) Information warfare Sailors from the Center for Information Dominance Unit Corry Station mentor high school students during CyberThon, an event designed to develop the future cybersecurity workforce. Hosted by the Blue Angels Chapter of the Armed Forces Communications and Electronics Association, CyberThon challenged the students to play the role of newly hired information technology professionals tasked with defending their company’s network.
PENSACOLA, Fla. (Jan. 23, 2016) Information warfare Sailors from the Center for Information Dominance Unit Corry Station mentor high school students during CyberThon, an event designed to develop the future cybersecurity workforce. Hosted by the Blue Angels Chapter of the Armed Forces Communications and Electronics Association, CyberThon challenged the students to play the role of newly hired information technology professionals tasked with defending their company’s network.
Naval Warfare Publication (NWP) 3-56, subject: Composite Warfare Commander, Feb 2010, Paragraph 3.7 identifies twenty-three typical functions assigned to the “Information Operations Warfare Commander (IWC)” that are summarized below:
Planning IO, EW, Military Deception, Operations Security, PSYOP, and Spectrum Usage.
Developing, coordinating, and practicing preplanned responses for counter-surveillance, counter-influence, and counter-targeting in response to changes in the tactical situation.
Recommending the EMCON profile and coordinating with ASWC to manage acoustic emissions in response to changes in the tactical situation.
Controlling ES and EA assets, and coordinating employment of ES and cryptologic sensors.
Conducting computer Network Defense (CND) and COMSEC monitoring.
Posted by DanielS on Monday, 01 January 2018 06:43.
Middle East Monitor, “Palestinians discuss development of gas field with Shell”
In February of 2017, The Palestinian Investment Fund (PIF) announced that it has been discussing the development of Gaza Marine Gas Field with Shell, Anadolu has reported.
Gaza Marine is about 30km off the coast of the Gaza Strip in the eastern Mediterranean; it is estimated to contain about 28 million cubic metres of gas.
British Gas bought the concession from the Palestinian Authority in 1999 but the development of the project has been on hold due to Israeli obstacles. Preventing the development of the project is part of the internationally-backed Israeli siege of the Gaza Strip. Shell bought the British Gas stake in Gaza Marine recently, and it is now the main developer of the field.
The Director of the PIF, Mohamed Mustafa, told Anadolu that the current discussions with Shell concentrate on accelerating the development of the project. He noted that there had been a study to connect a pipeline from the field to the sole electricity plant in Gaza. “The most important thing, though, is that we get Israel’s permission for this pipeline because it crosses its land,” he explained.
According to Offshore-technology.com, Shell holds a 90 per cent interest in the field. The stake will reduce to 60 per cent if the PIF and Consolidated Contractors Company (CCC) decide to exercise their options. PIF and CCC would subsequently hold 30 per cent and 10 per cent interests respectively.
The PIF is a sovereign Palestinian fund with capital of $800 million.
Significant reserves of natural gas were found offshore from the Gaza Strip. As of early 2015, Gaza’s natural gas was still underwater and the same for almost all of the Levantine gas.[1]
History
The Palestinians signed a memorandum of intent on November 8, 1999 with British Gas and a company linked to the Palestinian Authority, the Consolidated Contractors Company, giving them rights to explore the area.[2][3] The discovered natural gas reserve was calculated to have 35 BCM, larger than Israel’s Yam Tethys maritime gas field.[3] It was found in two small gas fields dubbed Gaza Marine 1 and Gaza Marine 2.
In 1999, Israeli Prime Minister Ehud Barak set aside exploration of Gaza’s offshore resources for a future Palestinian state, with no prior consultation with Israel stipulated.[2] According to Michael Schwartz, Barak deployed the Israeli navy in Gaza’s coastal waters to impede the implementation of the terms of the modest contract between the Palestinian Authority and British Gas (BG) to develop Gaza’s Mediterranean gas resources.[1] Israel demanded that the Gaza gas be piped to facilities on its territory, and at a price below the prevailing market level[4] and that Israel also control all the (relatively modest) revenues destined for the Palestinians — to prevent the money from being used to “fund terror.” In Schwartz’s view, with this Israeli action the Oslo Accords were officially doomed, because by declaring Palestinian control over gas revenues unacceptable, the Israeli government committed itself to not accepting even the most limited kind of Palestinian budgetary autonomy, let alone full sovereignty. In Schwartz’s view, since no Palestinian government or organization would agree to this, a future filled with armed conflict was assured.[1]