2015 November 01 Home // 2015 November 01

US sends special forces into Syria to act as human shields for terrorist groups

US sends special forces into Syria to act as human shields for terrorist groups

Editor’s note: who said that it’s ok for the United States military to send troops into a sovereign nation and support terrorist groups who want to destroy the government? Is this not a war crime and a crime against humanity?

Obama’s decision to send Special Forces into Syria is being widely viewed as a US military escalation in the country.

The troop dispatch also signals that the US trying to forestall Russian successes in wiping out Washington’s regime-change assets in Syria.

In short, the US Special Forces are being used as “human shields” to curb Russian air strikes against anti-government mercenaries, many of whom are instrumental in Washington’s regime-change objective in Syria.

First of all, we need to view a host of developments, including the hastily convened “peace talks” in Vienna, as a response by the US and its allies to the game-changing military intervention by Russia. That intervention, beginning on September 30, has not only dealt massive blows to militants, it has completely changed the balance of forces to give the Assad government the upper hand in the war against foreign-backed extremists. That, in turn, has sent the US-led powers trying to topple Damascus into disarray.

Read more http://www.hangthebankers.com/special-forces-syria-human-shields-terrorists/

You have a wifi silhouette

You have a wifi silhouette

Wifi Networks Can Now Identify Who You Are Through Walls

Who needs a peep hole when a wifi network will do? Researchers from MIT have developed technology that uses wireless signals to see your silhouette through a wall—and it can even tell you apart from other people, too.

There is, of course, an elephant in the room here that you wouldn’t even need RF-Capture to identify — and that’s privacy. First off, the team insists that any device using this kind of technology, such as a router that can tell when your relative has fallen, uses encryption from the get-go. “We [also] want to ensure that people do not use it for malicious purposes,” adds Katabi. “To that end, we are working along two fronts: first, we are designing blockers that can prevent someone from being tracked except by their own device. And, second, we need to have regulations that dictate how and when these devices can be used.

Privacy is always a chief concern.”