Noam Chomsky: What the American Media Won't Tell You about Israel

[email protected] (Noam Chomsky)
December 15, 2012

noam

An old man in Gaza held a placard that read: “You take my water, burn my olive trees, destroy my house, take my job, steal my land, imprison my father, kill my mother, bombard my country, starve us all, humiliate us all, but I am to blame: I shot a rocket back.”

The old man's message provides the proper context for the latest episode in the savage punishment of Gaza. The crimes trace back to 1948, when hundreds of thousands of Palestinians fled from their homes in terror or were expelled to Gaza by conquering Israeli forces, who continued to truck Palestinians over the border for years after the official cease-fire.

The punishment took new forms when Israel conquered Gaza in 1967. From recent Israeli scholarship (primarily Avi Raz's “The Bride and the Dowry: Israel, Jordan, and the Palestinians in the Aftermath of the June 1967 War”), we learn that the government's goal was to drive the refugees into the Sinai Peninsula – and, if feasible, the rest of the population too.

Expulsions from Gaza were carried out under the direct orders of Gen. Yeshayahu Gavish, commander of the Israel Defense Forces Southern Command. Expulsions from the West Bank were far more extreme, and Israel resorted to devious means to prevent the return of those expelled, in direct violation of U.N. Security Council orders.

The reasons were made clear in internal discussions immediately after the war. Golda Meir, later prime minister, informed her Labor Party colleagues that Israel should keep the Gaza Strip while “getting rid of its Arabs.” Defense Minister Moshe Dayan and others agreed.

Prime Minister Levi Eshkol explained that those expelled could not be allowed to return because “we cannot increase the Arab population in Israel” – referring to the newly occupied territories, already considered part of Israel.

In accord with this conception, all of Israel's maps were changed, expunging the Green Line (the internationally recognized borders) – though publication of the maps was delayed to permit Abba Eban, an Israeli ambassador to the U.N., to attain what he called a “favorable impasse” at the General Assembly by concealing Israel's intentions.

The goals of expulsion may remain alive today, and might be a factor in contributing to Egypt's reluctance to open the border to free passage of people and goods barred by the U.S.-backed Israeli siege.

The current upsurge of U.S.-Israeli violence dates to January 2006, when Palestinians voted “the wrong way” in the first free election in the Arab world.

Israel and the U.S. reacted at once with harsh punishment of the miscreants, and preparation of a military coup to overthrow the elected government – the routine procedure. The punishment was radically intensified in 2007, when the coup attempt was beaten back and the elected Hamas government established full control over Gaza.

Ignoring immediate offers from Hamas for a truce after the 2006 election, Israel launched attacks that killed 660 Palestinians in 2006, most of whom were civilians (a third were minors). According to U.N. reports, 2,879 Palestinians were killed by Israeli fire from April 2006 through July 2012, along with several dozen Israelis killed by fire from Gaza.

A short-lived truce in 2008 was honored by Hamas until Israel broke it in November. Ignoring further truce offers, Israel launched the murderous Cast Lead operation in December.

So matters have continued, while the U.S. and Israel also continue to reject Hamas calls for a long-term truce and a political settlement for a two-state solution in accord with the international consensus that the U.S. has blocked since 1976 when the U.S. vetoed a Security Council resolution to this effect, brought by the major Arab states.

This week, Washington devoted every effort to blocking a Palestinian initiative to upgrade its status at the U.N. but failed, in virtual international isolation as usual. The reasons were revealing: Palestine might approach the International Criminal Court about Israel's U.S.-backed crimes.

One element of the unremitting torture of Gaza is Israel's “buffer zone” within Gaza, from which Palestinians are barred entry to almost half of Gaza's limited arable land.

From January 2012 to the launching of Israel's latest killing spree on Nov. 14, Operation Pillar of Defense, one Israeli was killed by fire from Gaza while 78 Palestinians were killed by Israeli fire.

The full story is naturally more complex, and uglier.

The first act of Operation Pillar of Defense was to murder Ahmed Jabari. Aluf Benn, editor of the newspaper Haaretz, describes him as Israel's “subcontractor” and “border guard” in Gaza, who enforced relative quiet there for more than five years.

The pretext for the assassination was that during these five years Jabari had been creating a Hamas military force, with missiles from Iran. A more credible reason was provided by Israeli peace activist Gershon Baskin, who had been involved in direct negotiations with Jabari for years, including plans for the eventual release of the captured Israeli soldier Gilad Shalit.

Baskin reports that hours before he was assassinated, Jabari “received the draft of a permanent truce agreement with Israel, which included mechanisms for maintaining the cease-fire in the case of a flare-up between Israel and the factions in the Gaza Strip.”

A truce was then in place, called by Hamas on Nov. 12. Israel apparently exploited the truce, Reuters reports, directing attention to the Syrian border in the hope that Hamas leaders would relax their guard and be easier to assassinate.

Throughout these years, Gaza has been kept on a level of bare survival, imprisoned by land, sea and air. On the eve of the latest attack, the U.N. reported that 40 percent of essential drugs and more than half of essential medical items were out of stock.

In November one of the first in a series of hideous photos sent from Gaza showed a doctor holding the charred corpse of a murdered child. That one had a personal resonance. The doctor is the director and head of surgery at Khan Yunis hospital, which I had visited a few weeks earlier.

In writing about the trip I reported his passionate appeal for desperately needed medicine and surgical equipment. These are among the crimes of the U.S.-Israeli siege, and of Egyptian complicity.

The casualty rates from the November episode were about average: more than 160 Palestinian dead, including many children, and six Israelis.

Among the dead were three journalists. The official Israeli justification was that “The targets are people who have relevance to terror activity.” Reporting the “execution” in The New York Times, the reporter David Carr observed that “it has come to this: Killing members of the news media can be justified by a phrase as amorphous as ‘relevance to terror activity.' ”

The massive destruction was all in Gaza. Israel used advanced U.S. military equipment and relied on U.S. diplomatic support, including the usual U.S. intervention efforts to block a Security Council call for a cease-fire.

With each such exploit, Israel's global image erodes. The photos and videos of terror and devastation, and the character of the conflict, leave few remaining shreds of credibility to the self-declared “most moral army in the world,” at least among people whose eyes are open.

The pretexts for the assault were also the usual ones. We can put aside the predictable declarations of the perpetrators in Israel and Washington. But even decent people ask what Israel should do when attacked by a barrage of missiles. It's a fair question, and there are straightforward answers.

One response would be to observe international law, which allows the use of force without Security Council authorization in exactly one case: in self-defense after informing the Security Council of an armed attack, until the Council acts, in accord with the U.N. Charter, Article 51.

Israel is well familiar with that Charter provision, which it invoked at the outbreak of the June 1967 war. But, of course, Israel's appeal went nowhere when it was quickly ascertained that Israel had launched the attack. Israel did not follow this course in November, knowing what would be revealed in a Security Council debate.

Another narrow response would be to agree to a truce, as appeared quite possible before the operation was launched on Nov. 14.

There are more far-reaching responses. By coincidence, one is discussed in the current issue of the journal National Interest. Asia scholars Raffaello Pantucci and Alexandros Petersen describe China's reaction after rioting in western Xinjiang province, “in which mobs of Uighurs marched around the city beating hapless Han (Chinese) to death.”

Chinese president Hu Jintao quickly flew to the province to take charge; senior leaders in the security establishment were fired; and a wide range of development projects were undertaken to address underlying causes of the unrest.

In Gaza, too, a civilized reaction is possible. The U.S. and Israel could end the merciless, unremitting assault, open the borders and provide for reconstruction – and if it were imaginable, reparations for decades of violence and repression.

The cease-fire agreement stated that the measures to implement the end of the siege and the targeting of residents in border areas “shall be dealt with after 24 hours from the start of the cease-fire.”

There is no sign of steps in this direction. Nor is there any indication of a U.S.-Israeli willingness to rescind their separation of Gaza from the West Bank in violation of the Oslo Accords, to end the illegal settlement and development programs in the West Bank that are designed to undermine a political settlement, or in any other way to abandon the rejectionism of the past decades.

Someday, and it must be soon, the world will respond to the plea issued by the distinguished Gazan human-rights lawyer Raji Sourani while the bombs were once again raining down on defenseless civilians in Gaza: “We demand justice and accountability. We dream of a normal life, in freedom and dignity.”

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
February 27,2020

Feb 27: With the window to submit comments on India's proposed personal data protection law closing on Tuesday, a period of anxious wait for final version of the Bill started for social media firms.

This comes even as global Internet companies have called on the government for improved transparency related to intermediary Guidelines (Amendment) Rules and allay fears about the prospect of increased surveillance and prompting a fragmentation of the Internet in India that would harm users.

As per the proposed amendments, an intermediary having over 50 lakh users in the country will have to be incorporated in India with a permanent registered office and address.

When required by lawful order, the intermediary shall, within 72 hours of communication, provide such information or assistance as asked for by any government agency or assistance concerning security of the state or cybersecurity.

This means that the government could pull down information provided by platforms such as Wikipedia, potentially hampering its functioning in India.

In the open letter to IT Minister Ravi Shankar Prasad, leading browser and software development platform like Mozilla, Microsoft-owned GitHub and Cloudflare earlier called for improved transparency by allowing the public an opportunity to see a final version of these amendments prior to their enactment.

According to a Business Insider report, Indian users may lose access to Wikipedia if the new intermediary rules for internet and social media companies are approved.

Since the rules would require the website to take down content deemed illegal by the government, it would require Wikipedia to show different content for different countries.

Anusha Alikhan, senior communications director for Wikimedia told Business Insider that the platform is built though languages and not geographies. Therefore, removing content from one country, while it is still visible to other country users may not work for the company’s model.

India is one of Wikipedia’s largest markets. Over 771 million Indian users accessed the site in just November 2019.

Also read: Explained: What is the Personal Data Protection Bill and why you should care

The Personal Data Protection Bill, 2019, which was introduced in Lok Sabha in the winter session last year, was referred to a Joint Parliamentary Committee (JPC) of both the Houses.

The government last month decided to seek views and suggestions on the Bill from individuals and associations and bodies concerned and the last date for submitting the comments was on Tuesday.

Prasad, while introducing the Personal Data Protection Bill, 2019, in the Lok Sabha on December 11, announced that the draft Bill empowers the government to ask companies including Facebook, Google and others for anonymised personal data and non-personal data.

There was a buzz when the Bill's latest version was introduced in the Lok Sabha, especially the provision seeking to allow the use of personal and non-personal data of users in some cases, especially when national security is involved.

Several legal experts red-flagged the issue and said the provision will give the government unaccounted access to personal data of users in the country.

In their submission to the JPC, several organisations also flagged that the power to collect non-personal and anonymised data by the government without notice and consent should not form part of the Bill because of issues regarding effective anonymisation and potential abuse.

"Clauses 35 and 36 of the Bill provide unbridled access to personal data to the Central Government by giving it powers to exempt its agencies from the application of the Bill on the basis of various broad worded grounds," SFLC.in, a New Delhi-based not-for-profit legal services organisation, commented.

The Software Alliance, also known as BSA, a trade group which includes tech giants such as Microsoft, IBM and Adobe, among others said that the current version of the privacy bill pose substantial challenges, including the sweeping new powers for the government to acquire non-personal data, restrictions on data transfers, and local storage requirements.

"We urge the Joint Parliamentary Committee, as it considers revisions to the Bill, to eliminate provisions concerning non-personal data from the Personal Data Protection Bill and to remove the data localisation requirements and restrictions on international data flows," said Venkatesh Krishnamoorthy, Country Manager-India, BSA.

The Personal Data Protection (PDP) Bill, 2019 draws its origins from the Justice B.N. Srikrishna Committee on data privacy, which produced a draft of legislation that was made public in 2018 ("the Srikrishna Bill").

The mandatory requirement for storing a mirror copy of all personal data in India as per Section 40 of the Srikrishna Bill has been done away with in the PDP Bill, 2019, meaning that companies like Facebook and Twitter would be able to store data of Indian users abroad if they so wish.

But the bill prohibits processing of sensitive personal data and critical personal data outside India.

What is more, what constitutes critical data has not been clearly defined.

As per the proposals, social media companies will have to modify their application as they are required to have a system in place by which a user can verify themselves.

So legal experts believe that some system to upload identification documents should be there and something like the Twitter blue tick mark should be there to identify verified accounts.

"The 2019 Bill introduces a new category of data fiduciaries called social media intermediaries ('SMIs'). SMIs are a subcategory of significant data fiduciaries ('SDFs') and will be notified by the Central government after due consultation with the DPA, or the Data Protection Authority. Clause 26(4) of the Bill defines SMIs as intermediaries who primarily or solely enable online interaction between two or more users," SFLC.in said.

"On a plain reading of the definition, online platforms like Facebook, Twitter, YouTube, TikTok, ShareChat and WhatsApp are likely to be notified as SMIs under the Bill," it added.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
January 10,2020

Indian enterprises were flooded with a whopping 14.6 crore malware threats in 2019 - a growth of 48 per cent (year-on-year) compared to 2018, a new report said on Friday.

Manufacturing, BFSI (banking, financial services and insurance), education, healthcare, IT/ITES, and the government were the most at-risk industries in the country, said the report from Seqrite, the enterprise arm of Pune-based IT security firm Quick Heal Technologies.

Interestingly, almost a quarter (23 per cent) of the threats were identified through 'Signatureless behaviour-based' detection by Seqrite, indicating how a growing number of cybercriminals were deploying new or previously unknown threat vectors to compromise enterprise security.

"With the latest Seqrite annual threat report, we want to empower CIOs, CISOs, business leaders and all key public stakeholders with the insights they need to combat the growing complexity of the threat landscape," said Sanjay Katkar, Joint Managing Director and CTO, Quick Heal Technologies.

The most prominent trend was the drastic increase in the volume, intensity, and sophistication of cyber-attack campaigns targeting Indian enterprises in 2019.

The rapid integration of IoT devices, BYOD (bring your own device), and third-party APIs into enterprise networks has created newer security vulnerabilities that might go unnoticed until a major breach occurs.

Threat researchers at Seqrite observed several large-scale advanced persistent threats (APT) attacks deployed against organisations in the government sector.

"The entry of nation-states and organised cybercrime cells into the fray is expected to add more complication to this situation and will require Indian government bodies and corporate enterprises to shore up their cyber defence strategies in 2020 and beyond," the report noted.

More alarming, however, was the continued lack of security awareness amongst enterprises and government organisations.

"Unsecured Remote Desktop Protocol (RDP) and Server Message Block (SMB) protocols continued to be targeted through brute-force attacks," said the report.

Spear phishing attack campaigns leveraging Office exploits and infected macros were also used extensively by cybercriminals to gain access to enterprise networks and steal critical data.

"India's digital journey depends on ensuring robust cybersecurity for all stakeholders within the enterprise ecosystem," said Katkar.

The sharp spike should be a cause of concern for CIOs and CISOs in the country, especially given the growing digital penetration within their enterprise networks.

"With network vulnerabilities and potential entry points increasing at a rapid pace, threat actors are expected to leverage artificial intelligence (AI) capabilities to power their malware campaigns in the future to capitalise on newer attack vectors," the report added.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
July 4,2020

Twitter has joined efforts to do away with racially loaded terms such as master, slave and blacklist from its coding language in the wake of the death of African-American George Floyd and ensuing Black Lives Matter protests.

The project started even before the current movement for racial justice escalated following the death of 46-year-old George Floyd in police custody in May.

The use of terms such as "master" and "slave" in programming language originated decades ago. While "master" is used to refer to the primary version of a code, "slave" refers to the replicas. Similarly, the term "Blacklist" is used to refer to items which are meant to be automatically denied.

The efforts to change these terms in favour of more inclusive language at Twitter were initiated by Regynald Augustin and Kevin Oliver and the microblogging platform is now backing their efforts.

"Inclusive language plays a critical role in fostering an environment where everyone belongs. At Twitter, the language we have been using in our code does not reflect our values as a company or represent the people we serve. We want to change that. #WordsMatter," Twitter's engineering team said in a post on Thursday.

As per the recommendations from the team, the term "whitelist" could be replaced by "allowlist" and "blacklist" by "denylist".

Similarly, "master/slave" could be replaced by "leader/follower", "primary/replica" or "primary/standby".

Twitter, however, is not the first to start a project to bring inclusivity in programming language.

According to a report in CNET, the team behind the Drupal online publishing software started using "primary/replica" in place of "master/slave" as early as in 2014.

The use of the terms "master/slave" was also dropped by developers of the Python programming language in 2018.

Now similar efforts are underway at Microsoft's Github and LinkedIn divisions as well, said the report.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.