Noam Chomsky: What the American Media Won't Tell You about Israel

[email protected] (Noam Chomsky)
December 15, 2012

noam

An old man in Gaza held a placard that read: “You take my water, burn my olive trees, destroy my house, take my job, steal my land, imprison my father, kill my mother, bombard my country, starve us all, humiliate us all, but I am to blame: I shot a rocket back.”

The old man's message provides the proper context for the latest episode in the savage punishment of Gaza. The crimes trace back to 1948, when hundreds of thousands of Palestinians fled from their homes in terror or were expelled to Gaza by conquering Israeli forces, who continued to truck Palestinians over the border for years after the official cease-fire.

The punishment took new forms when Israel conquered Gaza in 1967. From recent Israeli scholarship (primarily Avi Raz's “The Bride and the Dowry: Israel, Jordan, and the Palestinians in the Aftermath of the June 1967 War”), we learn that the government's goal was to drive the refugees into the Sinai Peninsula – and, if feasible, the rest of the population too.

Expulsions from Gaza were carried out under the direct orders of Gen. Yeshayahu Gavish, commander of the Israel Defense Forces Southern Command. Expulsions from the West Bank were far more extreme, and Israel resorted to devious means to prevent the return of those expelled, in direct violation of U.N. Security Council orders.

The reasons were made clear in internal discussions immediately after the war. Golda Meir, later prime minister, informed her Labor Party colleagues that Israel should keep the Gaza Strip while “getting rid of its Arabs.” Defense Minister Moshe Dayan and others agreed.

Prime Minister Levi Eshkol explained that those expelled could not be allowed to return because “we cannot increase the Arab population in Israel” – referring to the newly occupied territories, already considered part of Israel.

In accord with this conception, all of Israel's maps were changed, expunging the Green Line (the internationally recognized borders) – though publication of the maps was delayed to permit Abba Eban, an Israeli ambassador to the U.N., to attain what he called a “favorable impasse” at the General Assembly by concealing Israel's intentions.

The goals of expulsion may remain alive today, and might be a factor in contributing to Egypt's reluctance to open the border to free passage of people and goods barred by the U.S.-backed Israeli siege.

The current upsurge of U.S.-Israeli violence dates to January 2006, when Palestinians voted “the wrong way” in the first free election in the Arab world.

Israel and the U.S. reacted at once with harsh punishment of the miscreants, and preparation of a military coup to overthrow the elected government – the routine procedure. The punishment was radically intensified in 2007, when the coup attempt was beaten back and the elected Hamas government established full control over Gaza.

Ignoring immediate offers from Hamas for a truce after the 2006 election, Israel launched attacks that killed 660 Palestinians in 2006, most of whom were civilians (a third were minors). According to U.N. reports, 2,879 Palestinians were killed by Israeli fire from April 2006 through July 2012, along with several dozen Israelis killed by fire from Gaza.

A short-lived truce in 2008 was honored by Hamas until Israel broke it in November. Ignoring further truce offers, Israel launched the murderous Cast Lead operation in December.

So matters have continued, while the U.S. and Israel also continue to reject Hamas calls for a long-term truce and a political settlement for a two-state solution in accord with the international consensus that the U.S. has blocked since 1976 when the U.S. vetoed a Security Council resolution to this effect, brought by the major Arab states.

This week, Washington devoted every effort to blocking a Palestinian initiative to upgrade its status at the U.N. but failed, in virtual international isolation as usual. The reasons were revealing: Palestine might approach the International Criminal Court about Israel's U.S.-backed crimes.

One element of the unremitting torture of Gaza is Israel's “buffer zone” within Gaza, from which Palestinians are barred entry to almost half of Gaza's limited arable land.

From January 2012 to the launching of Israel's latest killing spree on Nov. 14, Operation Pillar of Defense, one Israeli was killed by fire from Gaza while 78 Palestinians were killed by Israeli fire.

The full story is naturally more complex, and uglier.

The first act of Operation Pillar of Defense was to murder Ahmed Jabari. Aluf Benn, editor of the newspaper Haaretz, describes him as Israel's “subcontractor” and “border guard” in Gaza, who enforced relative quiet there for more than five years.

The pretext for the assassination was that during these five years Jabari had been creating a Hamas military force, with missiles from Iran. A more credible reason was provided by Israeli peace activist Gershon Baskin, who had been involved in direct negotiations with Jabari for years, including plans for the eventual release of the captured Israeli soldier Gilad Shalit.

Baskin reports that hours before he was assassinated, Jabari “received the draft of a permanent truce agreement with Israel, which included mechanisms for maintaining the cease-fire in the case of a flare-up between Israel and the factions in the Gaza Strip.”

A truce was then in place, called by Hamas on Nov. 12. Israel apparently exploited the truce, Reuters reports, directing attention to the Syrian border in the hope that Hamas leaders would relax their guard and be easier to assassinate.

Throughout these years, Gaza has been kept on a level of bare survival, imprisoned by land, sea and air. On the eve of the latest attack, the U.N. reported that 40 percent of essential drugs and more than half of essential medical items were out of stock.

In November one of the first in a series of hideous photos sent from Gaza showed a doctor holding the charred corpse of a murdered child. That one had a personal resonance. The doctor is the director and head of surgery at Khan Yunis hospital, which I had visited a few weeks earlier.

In writing about the trip I reported his passionate appeal for desperately needed medicine and surgical equipment. These are among the crimes of the U.S.-Israeli siege, and of Egyptian complicity.

The casualty rates from the November episode were about average: more than 160 Palestinian dead, including many children, and six Israelis.

Among the dead were three journalists. The official Israeli justification was that “The targets are people who have relevance to terror activity.” Reporting the “execution” in The New York Times, the reporter David Carr observed that “it has come to this: Killing members of the news media can be justified by a phrase as amorphous as ‘relevance to terror activity.' ”

The massive destruction was all in Gaza. Israel used advanced U.S. military equipment and relied on U.S. diplomatic support, including the usual U.S. intervention efforts to block a Security Council call for a cease-fire.

With each such exploit, Israel's global image erodes. The photos and videos of terror and devastation, and the character of the conflict, leave few remaining shreds of credibility to the self-declared “most moral army in the world,” at least among people whose eyes are open.

The pretexts for the assault were also the usual ones. We can put aside the predictable declarations of the perpetrators in Israel and Washington. But even decent people ask what Israel should do when attacked by a barrage of missiles. It's a fair question, and there are straightforward answers.

One response would be to observe international law, which allows the use of force without Security Council authorization in exactly one case: in self-defense after informing the Security Council of an armed attack, until the Council acts, in accord with the U.N. Charter, Article 51.

Israel is well familiar with that Charter provision, which it invoked at the outbreak of the June 1967 war. But, of course, Israel's appeal went nowhere when it was quickly ascertained that Israel had launched the attack. Israel did not follow this course in November, knowing what would be revealed in a Security Council debate.

Another narrow response would be to agree to a truce, as appeared quite possible before the operation was launched on Nov. 14.

There are more far-reaching responses. By coincidence, one is discussed in the current issue of the journal National Interest. Asia scholars Raffaello Pantucci and Alexandros Petersen describe China's reaction after rioting in western Xinjiang province, “in which mobs of Uighurs marched around the city beating hapless Han (Chinese) to death.”

Chinese president Hu Jintao quickly flew to the province to take charge; senior leaders in the security establishment were fired; and a wide range of development projects were undertaken to address underlying causes of the unrest.

In Gaza, too, a civilized reaction is possible. The U.S. and Israel could end the merciless, unremitting assault, open the borders and provide for reconstruction – and if it were imaginable, reparations for decades of violence and repression.

The cease-fire agreement stated that the measures to implement the end of the siege and the targeting of residents in border areas “shall be dealt with after 24 hours from the start of the cease-fire.”

There is no sign of steps in this direction. Nor is there any indication of a U.S.-Israeli willingness to rescind their separation of Gaza from the West Bank in violation of the Oslo Accords, to end the illegal settlement and development programs in the West Bank that are designed to undermine a political settlement, or in any other way to abandon the rejectionism of the past decades.

Someday, and it must be soon, the world will respond to the plea issued by the distinguished Gazan human-rights lawyer Raji Sourani while the bombs were once again raining down on defenseless civilians in Gaza: “We demand justice and accountability. We dream of a normal life, in freedom and dignity.”

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
July 11,2020

Citing the current dismal aviation scenario, Air India is terminating the services of trainee cabin crew and cabin crew by withdrawing the offer of employment of those who were under training.

As per sources, the new crew and trainee pilots might reduce contracts from five years to one year. Sources said Air India is terminating 1,200 crew and employees who are more than 55-yr-old including 190 trainee pilots.

In a letter reviewed by IANS, Air India has informed an applicant who had been selected as cabin crew in August 2019 subject to successful completion of training.

"On behalf of Air India we would like to thank you for the interest shown by you in joining our organization. However, in view of the current aviation scenario, it would not be possible for Air India to impart any further training to you for engaging your services," the company said.

"In view of the above reasons, which are beyond the control of the company, it has been decided to discontinue your training arrangements and dispense with the offer of engagement with immediate effect. The bank guarantee furnished by you at the time of joining is returned herewith," Air India told the cabin crew.

"Once again on behalf of Air India we thank you for your cooperation and trust that you will appreciate the circumstances under which we are constrained to discontinue the training arrangements," the carrier said.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
January 3,2020

Giving each and every app access to personal information stored on Android smartphones such as your contacts, call history, SMS and photos may put you in trouble as bad actors can easily use these access to spy on you, send spam messages and make calls anywhere at your expense or even sign you up for a premium "service", researchers from cybersecurity firm Kaspersky have warned.

But one can restrict access to such information as Android lets you configure app permissions. 

Giving an app any of these permissions generally means that from now on it can obtain information of this type and upload it to the Cloud without asking your explicit consent for whatever it intends to do with your data.

Therefore, security researchers recommend one should think twice before granting permissions to apps, especially if they are not needed for the app to work. 

For example, most games have no need to access your contacts or camera, messengers do not really need to know your location, and some trendy filter for the camera can probably survive without your call history, Kaspersky said. 

While decision to give permission is yours, the fewer access you hand out, the more intact your data will be.

Here's what you should know to protect your data.

SMS: An app with permission to send and receive SMS, MMS, and WAP (Wireless Application Protocol) push messages, as well as view messages in the smartphone memory will be able to read all of your SMS correspondence, including messages with one-time codes for online banking and confirming transactions.

Using this permission, the app can also send spam messages in your name (and at your expense) to all your friends. Or sign you up for a premium "service." You can see and conrol which apps have these rights by going to the settings of your phone.

Calendar: With permission to view, delete, modify, and add events in the calendar, prying eyes can find out what you have done and what you are doing today and in the future. Spyware loves this permission.

Camera: Permission to access the camera is necessary for the app to take photos and record video. But apps with this permission can take a photo or record a video at any moment and without warning. Attackers armed with embarrassing images and other dirt on you can make life a misery, according to Kaspersky.

Contacts: With permission to read, change, and add contacts in your address book, and access the list of accounts registered in the smartphone, an app can send your entire address book to its server. Even legitimate services have been found to abuse this permission, never mind scammers and spammers, for whom it is a windfall.

This permission also grants access to the list of app accounts on the device, including Google, Facebook, and many other services.

Phone: Giving access to your phone means permission to view and modify call history, obtain your phone number, cellular network data, and the status of outgoing calls, add voicemail, access IP telephony services, view numbers being called with the ability to end the call or redirect it to another number and call any number.

This permission basically lets the app do anything it likes with voice communication. It can find out who you called and when or prevent you from making calls (to a particular number or in general) by constantly terminating calls. 

It can eavesdrop on your conversations or, of course, make calls anywhere at your expense, including to pay-through-the-nose numbers, Kaspersky warned.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
January 22,2020

New Delhi, Jan 22: "Don't get into a trap. Your security is in your hands," the Border Security Force (BSF) has said issuing its social media rules for its officers and men. It has directed them not to use 42 mobile applications and show caution while using Facebook, Twitter and WhatsApp.

"Be cautious while using social media," said the BSF in a circular issued recently.

"Before using WhatsApp, Facebook, Twitter and other social media platforms, one needs to keep in mind that you are border guarding force and Central Civil Services (Conduct) Rules rule duly are applicable," it said.

It further pointed out that by commenting/writing about or forwarding unverified reports and rumours one violates laws of land.

"Several times unverified reports would be presented in way that they are absolutely true and start believing it. Seeing such post always use your commonsense and never get into the trap (sic.)," it state adding that the anti-national elements uses social media to propagate their agenda to cause unrest in India.

A picture clicked by Border Security Force personnel and posted on a social media platform remains there for always. Therefore, one should use officially approved pictures about any incident or untoward incidents related to Border Security Force, stated the circular. It pointed that unauthorised persons should not engage into taking pictures of the incidents.

It also highlighted how through social media, a few BSF personnel have fallen into trap of espionage racket carried out by enemy countries.

"Our security and respect is in our hands. Always think twice whether you are doing correct by accepting friendship requests from unknown persons, especially women and girls," it cautioned the troopers and officers.

It also highlighted that while going on leave and joining back the force, always follow the rules and regulations laid out for safety and security. "This is for your own safety," it stressed in the end.

The BSF has also issued a list of 42 mobile applications that needs to be completely avoided by serving BSF officers and jawans.

They are MI store, Weibo, Wechat, Shareit, Truecaller, UC News, UC Browser, Beautyplus, NewsDog, Viva Video - QU video Inc, Parallel Space, Apus Browser, Perfect Corp, Virus Cleaner - HI Security Lab, CM browser, MI Community, DU recorder, Vault Hide - No mobile Security, Youcam Makeup, Cachecleaner DU Apps Studio, DU battery saver, DU privacy, 360 security, DU Browser,Clean master - Cheeta Mobile, Baidu Translate, Wonder Camera - Bindu Inc, ES Ifle Explorer, Photo Wonder, QQ international , QQ music, QQ Mail, AA player, QQ News Feed, Wesync, QQ security Center, Selfie City, Mail Master, Mi Video Call -Xaomi and QQ launcher.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.