Hezbollah, Lebanon, March 14

Hariri Tribunal Reports Tell a Different Story than CBC Account

I spent an hour or so this morning going through previous reports by the United Nations International Independent Investigation Commission (UNIIIC), in order to see how the historical record tallies with Neil Macdonald’s report about the Hariri investigation for CBC.

As you’ll recall, Macdonald makes the following basic points in his piece:

  • The UNIIIC did not begin analyzing telecommunications data until late 2007, because Serge Brammertz (the successor to Detlev Mehlis) refused to authorize this kind of work.
  • When they finally got around to looking at phone records, the investigators happened upon the “earth-shattering” discovery of the so-called “red network”: the group of phones carried by Hariri’s hit squad.
  • As they soon discovered, however, a young Lebanese police captain named Wissam Eid had already discovered this network and the networks behind it as early as the spring of 2006, and submitted a report to the UNIIIC that detailed his findings. Eid’s work pointed to Hizbullah’s complicity in the crime.
  • This report was put into a drawer and did not resurface until the end of 2007, at which point the UNIIIC established contact with Eid. A month later, Eid was dead.

So far so good?

Now, let’s go back to the reports that were issued by the UNIIIC between 2005 and 2007 (a period during which, according to Macdonald’s sources, no telecommunications analysis was carried out by the investigating commission). What we find is a drastically different account of the work that was taking place, and not just under Detlev Mehlis (generally portrayed as an effective investigator) but also under his successor Serge Brammertz (who comes off as timid and incompetent in Macdonald’s account).

The following excerpts are taken from the first eight UNIIIC reports, which cover the tenures of Mehlis and Brammertz. Have a look and let me know what you think:

UNIIIC Report #1 (Mehlis, 22 Oct 2005)

144. Investigations by both the ISF and Military Intelligence have led to six pre-paid calling cards, which telephone records demonstrate were instrumental in the planning of the assassination. Beginning at approximately 1100 hrs on 14 February 2005, cell site records show that cellular telephones utilizing these six calling cards were located in the area stretching from the Nejmeh Square to the St. George Hotel, within a few-block radius and made numerous calls with each other and only with each other. The phones were situated so that they covered every route linking the Parliament to Kuraytem Palace: that is, cellsite records demonstrate that these telephones were placed to cover any route that Hariri would have taken that day. One of the cellphones located near the Parliament made four calls with the other telephone lines at 1253 hrs — the time that Mr. Hariri’s convoy left the Nejmeh Square . The calls — and all usage on the cards — terminated at 1253 hrs on 14 February, a few minutes before the blast. The lines have all been inactive since.

145. Further investigation has revealed that these six lines — along with two others — were put into circulation on the 4 January 2005, after calling number 1456 activated them. They were all activated at the same location in northern Lebanon between Terbol and Menyeh. Since they were first purchased in early January 2005, until the time of the explosion, the lines only had calls with each other. In that time period, until the assassination, there appears to be a correlation between their location and Hariri’s movements, suggesting that they might have been used to follow Hariri’s movements in that time period.

UNIIIC Report #2 (Mehlis, 12 Dec 2005)

65. As previously noted (see S/2005/662, para. 192), telephone analysis has been a central aspect of the present investigation. Since October 2005, the Commission has concentrated on organizing the telephone data received into manageable databases so that it can be more easily accessible for future analysis. That process has involved compiling over 400,000 records from 195 different files (based on requests for telecommunications data) into one central database. Another database contains over 97 million telecommunications records of all the calls in Lebanon between 7 and 21 February 2005. Those two databases will permit a standardized search of any relevant telephone number and its contacts in an efficient manner which will facilitate future telephone analysis projects.

73. The Commission has not had time, in the short period available since the end of October 2005, to investigate meaningfully the following issues that were raised in the previous report: … Identification, location and further contacts related to the ring of prepaid telephone cards, including eight significant telephone numbers and 10 mobile telephones, which are believed to have been used to organize surveillance of Mr. Hariri and carry out the assassination (see S/2005/662, paras. 121 and 148-152).

UNIIIC Report #4 (Brammertz, 10 June 2006)

51. Communications analysis is a major task, with the collection of up to 5 billion records by the Commission currently under way. All must be sifted, sorted, collated and analysed. This work is painstaking in its depth, with any linkage established almost exponentially generating further linkages. The Commission has devoted a project team of analysts and investigators to this task and is acquiring specialized software and hardware to accommodate the project requirements. Such traffic analysis work requires focus. Hence, the Commission is concentrating on the immediacy of the Hariri case and closely associated links with the operation and other relevant issues, and the results of this work are continuously integrated into the broader case components.

52. The traffic and intercept analysis has expanded beyond the immediate utilization of the six subscriber identity module (SIM) cards, referred to in the Commission’s previous reports, on the day of the attack. Complex linkages, associated calls and geographic locations of a broader time period are being scrutinized and added to the overall investigation findings. The communications currently under analysis also have an international dimension, although the Commission is not in a position to make final conclusions about the significance of such calls at this stage.

UNIIIC Report #5: (Brammertz, 25 Sept 2006)

39. The Commission has devoted considerable resources to the analysis and investigation of the communications traffic aspects of the case. This topic has yielded important results, and enables the Commission to establish links that otherwise would not be evident. Much of the work is reactive in nature. However, some of the analytical work is also proactive and speculative, and builds upon known facts and develops investigation themes. It has elicited a number of leads and continues to provide the Commission with better understanding of the communications linkages relevant to the crimes.

40. The links that are being established through the communications work demonstrate a complex network of telecommunications traffic between a large number of relevant individuals, sometimes through intermediary telephone numbers or locations and sometimes directly. A series of investigation leads has been developed as a result of these analyses, which the Commission regards as a priority. Much painstaking work is required to track down each individual connection or link and exempt it from the enquiries or continue with it as a working lead. Similarly, the Commission understands better the preparatory aspects of the attack through its communications analysis; this work remains ongoing in conjunction with timeline analyses, and is one of a number of areas where comparative analysis with the 14 other cases is being pursued. For example, knowledge of the activities of the six subscriber identity module (SIM) card holders who are alleged to have been part of the bombing team, both geographically and in communications terms, has become clearer and more detailed.

41. The Commission has also developed direct and indirect linkages between significant individuals in disparate groups that are relevant from an investigative perspective. Explanations for these linkages are in some cases not immediately apparent, and the Commission is working to understand their relevance to the crime itself, to those potentially linked to it and to other individuals.

42. The international dimension of the communications analysis continues to provide investigative leads, as the Commission develops its knowledge of the complexities of international call routing and receives responses to its requests from States where telephone call traffic has been traced. To date the Commission has engaged 17 States in this aspect of its work, and has received considerable assistance and responses from a number of them.

43. The relevant communications links emanating from within Lebanon or outside the country of those individuals whom the Commission wishes to interview and/or continues to investigate are being systematically reviewed, and the results are providing further investigative leads.

UNIIIC Report #6 (Brammertz, 12 Dec 2006)

43. The Commission has conducted seven interviews in connection with the alleged bombing team and their use of six telephones to communicate on the day of the attack and in the days leading up to it. These interviews have provided new leads that are currently being pursued and will lead to more interviews in the next reporting period. Analysis of the use of other associated subscriber identity module (SIM) cards is also ongoing.

44. The location of the telephones when used and the purposes for which some of the linking numbers were used have revealed the high degree of security-aware behaviour exhibited by the individuals under investigation. Some persons used multiple mobile cellular telephones during a short period of time or registered telephones using aliases. While such compartmentalization of telephone usage makes analysis more complex, it helps to provide an understanding of the modus operandi of the perpetrators.

45. During the reporting period, communications traffic analysis has continued in support of the other investigative projects. This work consists of preparation for interviews of key persons and preparing specific reports on communications between selected individuals. For the purpose of preparation of interviews, data relating to the different telephones used by the interviewee during a certain period of interest are gathered and organized into an exploitable electronic format. The analysis then focuses on the personal contacts and communications links of the interviewee, the use of intermediaries and the frequency, timing, type, duration and location of the calls, as well as international call activity.

UNIIIC Report #7 (Brammertz, 15 Mar 2007)

34. The Commission’s analysis of communications traffic continues in order to support and validate different points arising from the investigations. Much work has been done to support the interviews conducted, in order that respective communications contact with other persons of interest to the case can be discussed with witnesses. Patterns of communications traffic, including frequencies and timings of calls, and linkages and clear associations to others, are all developed and elicit investigation leads.

35. In relation to the six mobile cellular telephone SIM cards allegedly used by the team that executed the operation on the day of 14 February 2005, the Commission has developed further information of interest relating to associated earlier operations, including possible surveillance and reconnaissance activity, possible practice-runs or earlier attempts to kill Rafik Hariri, and other actions undertaken by the team. New areas of interest have emerged from this analysis and are currently being examined.

36. The Commission has also undertaken an investigative project examining the role of the persons using the six SIM cards and activities that can be inferred from their use. This exercise is supported by the Commission’s existing communications traffic analysis projects in relation to the cards. The objective is fourfold: first, to reaffirm the validity of the hypothesis that the cards could indeed have been used by the bomb team to execute its task; second, to establish whether other modes of communication must have been used between the members of the team, and also perhaps with other individuals, in order for the attack to take place; third, to allow the Commission to establish a better understanding of how the crime was committed on 14 February; and finally, to understand further what other activity the bomb team undertook, and what locations it travelled to and why, in the days leading up to the attack.

37. Such extensive analysis enables the Commission to reach a better understanding of the bomb team, its role in the crime and its other activities. This in turn creates further investigative leads geographically and temporally, and pointing to the activities of individuals outside the immediate bombing team the Commission believes were using the six SIM cards.

38. This detailed examination of the activities of the six SIM cards has resulted in a number of significant elements for ongoing investigation. These include, but are not limited to: potential identification of the role of each participant in the preparation, planning, surveillance and actual attack; the bombing team’s anticipation of Hariri’s activities and movements; and possible earlier attempts on Hariri’s life.

39. One working hypothesis is that the bomb team had to ensure that Hariri was indeed dead after the explosion in order for the video claim of responsibility to be delivered and to have resonance with its intended audience. It is possible that the team, and those commissioning the crime, could not afford to deliver a claim of responsibility to the global media if Hariri had survived the attack. Thus, the Commission is exploring the hypothesis that one member of the team, or an associate, was tasked with confirming the death of the principal target as soon as possible and may have contacted someone waiting for the news. Based on existing information, the time frame for this activity would have been within approximately 45 minutes of the explosion.

40. This in turn led to the series of events related to the taped claim of responsibility and the subsequent telephone calls made to media outlets. The Commission is examining the hypothesis that one or more members of the bomb team was responsible for delivering the tape and making the subsequent telephone calls to the media. Other variations on this hypothesis are being explored to establish the numbers of perpetrators who may have been involved on the day of the attack.

UNIIIC Report #8 (Brammertz, 12 Jul 2007)

41. The Commission has consolidated its sizeable holdings of call records, communications data and analyses related to specific time periods, institutions and individuals of relevance to the Hariri investigation. Since its inception, the Commission has acquired more than 5 billion records of telephone calls and text messages sent through cellular phones in Lebanon, as well as communications data from a number of other countries. The Commission has also acquired a very large number of detailed subscriber call records. Since 2005, the Commission has issued more than 300 requests for assistance to support its communications analysis related to the Hariri investigation.

42. The Commission’s communications analysis provides valuable input to the investigations in establishing links between individuals, analysing the behaviour and activity of a number of persons of interest to the investigations and analysing call patterns for specific numbers, times and locations. It is also a very valuable resource in preparing for witness interviews. Given the proven investigative value and potential of communications analysis, the Commission has recently sought outside expertise to help exploit its communications data holdings and analysis. The Commission has also recently acquired new hardware and software, which will allow it to conduct more comprehensive data searches.

43. On the basis of the consolidation exercise, the Commission has confirmed and advanced its earlier conclusions that individuals using six mobile cellular telephone SIM cards acted in a coordinated manner to conduct surveillance on Rafik Hariri in the weeks prior to his assassination. A detailed analysis of the use of these cards on the day of the assassination indicates that these individuals played a critical role in the planning and execution of the attack itself, as demonstrated by their movements and call patterns. The Commission has established the origins of the SIM cards and is finalizing its understanding of the circumstances around the sale of the cards and a number of handsets to the individuals who made use of them in the surveillance of Rafik Hariri. A number of interviews were held during the reporting period to advance this line of inquiry.

46. The Commission has also been focusing on establishing horizontal and vertical links between individuals linked to the crime scene and those who may have been involved in the preparation of the attack or may have had prior knowledge of the attack through the analysis of telephone communications. Several telephone numbers have been identified and scrutinized as a result of this line of inquiry.

**

So, what do you think? Does this look like the work of an investigating commission that was not engaged in telecommunications analysis? When I asked Mr. Macdonald about the discrepancies between the statements of his sources and the first Mehlis report, he insisted that all of the telecommunications work done before late 2007 was performed by the Lebanese police and not by the UN Commission. He added that the UNIIIC was “generally aware” of the work being done by the Lebanese, but that “actual telecomms analysis by the commission itself, as I reported, was not authorized until late 2007.”

As others have already noted, this simply does not add up, and the above survey of the UNIIIC reports confirms the contradictions in the CBC account. Even if we accept the testimony of Mr. Macdonald’s sources and assume for a moment that all of the discussions in the UNIIIC reports about communications analysis prior to late 2007 were just made up, how does this explain the suggestion that the discovery of the red network by the UNIIIC was “earth-shattering”? After all, they had already discussed this network in eight different reports from 2005-2007! And the network was not just discussed under Mehlis. Brammertz devotes pages to the discussion of how the UNIIIC was trying to develop its lead vis-à-vis the red network.

But let’s also assume, just to give Mr. Macdonald’s sources the benefit of the doubt, that it was not the UNIIIC that was investigating the communications traffic, but rather the Lebanese police. How does one then explain how the UNIIIC became privy to the work that the Lebanese were doing (so as to be able to mention it in the eight reports between 2005-07), unless of course the UN was working in close cooperation with the Lebanese and not, as Mr. Macdonald’s sources suggest, in isolation from them?

I will endeavor to get a response from CBC about these questions. Stay tuned.

**

Update 1: Buried in the comment section of the last post is this gem from RedLeb, who basically says exactly what I said in this post (and much more), but more succinctly. I reproduce his comment in full below:

“It is not enough for Macdonald to say that ‘Mehlis was aware of the ISF’s early telecomms work’. Macdonald’s report, especially the video, emphatically makes the claim that the commission only identified the Red team late in Brammertz’s tenure, and only after much prodding.

However, the commission’s reports are clear that the Red team was identified at the initial stages of the investigation and that signal analysis was a key technique used by the commission.

This contradiction with the documented historical record undercuts the report’s credibility. It is obviously trying to sell you something. And what I think what it is selling is the linkage between the Red team and HA.

The Red team stands out in any signal analysis. It is a closed network, located at the scene of the crime, and ceased to exist immediately after the assassination. By focusing on the slam dunk part of the Eid’s analysis, we are asked to adopt the further linkage of the Red Team to HA.

What is that linkage? Did someone on the Yellow team call the Hospital and then someone at the Hospital call a government issued HA phone line?

How about if an Israeli agent calls someone at AUH, and then someone at AUH calls AUB? Can I then claim the Dean of AUB is an Israeli spy?

And this whole ‘mathematical genius’ spin. It just sounds like a way to cater to the Leb ego so as to distract our suspicions. Tell me Eid used some special software. Tell me he set up a database. Hell, tell me wrote a computer algorithm to do signal analysis. I will believe you. But a super-mathematical genius who could ‘intuit mathematical patterns’? No. Just… no.

I speculate that the attack on Wissam Hassan is to undermine the ISF’s work on Israeli spies and Israel’s penetration of the Lebanese telecom network. At Nahass’s conference this week, Wissam Hassan was specifically named as helping out in the investigation of Israel compromising HA phone lines. By labelling him an HA accomplice, the whole Israel angle can be explained away.

The attack on Bellemare and Brammertz are interesting. Whoever fed Macdonald his information must have felt the indictments are not going to come out, or will fail to name HA members. Thus the report serves to indict HA in the media, regardless of the path the STL takes. The whole ‘Getting Away with Murder’ angle is that HA did it, we know they did it, but here’s why the STL won’t indict them. Is someone nervous?

I think the only factual we get out of the whole report was from Bellemare’s press release in which he stated he is working on the draft of the indictment. So we know that’s coming sooner than later.”

wordpress stats

Discussion

233 thoughts on “Hariri Tribunal Reports Tell a Different Story than CBC Account

  1. Anon,

    To be honest, I tried to sit through the HN speech, but I can’t get through it. I also sat through the Charbel Nahhas speech, and all I got was non-sense.

    I am trying to understand the gist of HN’s counter-narrative. Precisely in the terms you’re expressing.

    Is the charge that the database was altered. Or that it was altered at the correct time over a period of however many months Hariri was being tracked. And how did the Israelis know which towers to use? Did the Israelis pick the numbers to embed in the database based on prior knowledge on which cell phones are used by HA? If so, why did the phones stop being used immediately after the assassination? Or did they embed fake numbers in the database, and then associate those numbers temporarily to HA phones, before disabling them? I mean if those phones belonged to HA, and the Israelis embedded that data into the database prior to HA uncovering this secret, wouldn’t one expect the continued usage of these phones? (Since HA wouldn’t have anticipated the nefarious embedding of this data?).

    Posted by Gabriel | November 30, 2010, 10:58 pm
  2. Gabriel,

    HNA knows exactly who those persons implicated in the various color networks uncovered by Eid are. HNA can easily produce a refutation by telling us what his men were doing. If Israelis implanted all this data in the phone records(an extremely unlikely scenario) of these phones that belonged to hizbis then the phones should have been kept and produced as evidence because they would still have the actual data in their flash memory that could be retrieved and compared to the database in question. Destroying or making the phones disappear is further proof of Hizb’s involvement.

    No need to listen to further distortions neither from Nahhas nor from Hizb sources.

    In my first comment in this thread, I stated an innocent party would not do what Hizb is doing. I restate what I said here.

    Posted by anonymous | November 30, 2010, 11:29 pm
  3. BV,

    Though I agree with you completely on the lack of accountability we have had one ex-PM resign twice. Omar Karami. First time in ~1993 when the USD = 3,000 LBP and people started burning tires in the streets. Second time in 2005 after Hariri assassination and people started burning tires in the streets.

    I guess PM Karami does not like the smell of burning tires. As someone who breathes the air in Lebanon daily, I thank him for that.

    That said, Mr. Karami is probably the exception that proves the rule.

    Johnny

    Posted by Johnny | December 1, 2010, 2:47 am
  4. Wikileaks goes Lebanon – it was to be expected…

    http://www.al-akhbar.com/ar/node/216356

    According to Lebanese opposition daily al-Akhbar, Wikileaks will publish tomorrow a report from a meting between Bellemare and Sison, former US ambassador to Lebanon. In the meeting, Bellemare reportedly asked for more assistance from the US.

    Posted by Umm iDriss | December 1, 2010, 6:01 am
  5. Breaking news:

    Israel’s main cellular provider, had its main computer core crash today. Their whole service is down, from text messaging to voice calls.

    Time until fix is unknown at the moment.

    How could we possibly manipulate the Lebanese telecom system if we can’t keep our own online? Or perhaps this is a sign of an HA counter-attack?

    G

    Posted by G | December 1, 2010, 9:21 am
  6. I read a good excerpt from a book @ the following link that I would like to share. I sure hope its not Iraq 2.0 in Lebanon because its clear that there is a side itching to duke it out with the hizbis.

    http://www.currentintelligence.net/features/2010/12/1/aftermath-lebanon-may-2008.html

    Posted by tamer k. | December 1, 2010, 1:04 pm
  7. Sounds like Israelis are a lot like us (Arabs) when it comes to stop signs…There must be something to this common semitic ancestry…hehehe.

    Omar Karami’s resignation was political. Both times. It would not have happened had Syria not demanded it for their own reasons at the time.
    To think that he resigned because the people were unhappy with him is quite naive.

    Posted by Bad Vilbel | December 1, 2010, 2:01 pm
  8. tamer k,
    I am always bewildered when I read in the popular press the fear that Lebanon might be “Iraqizes” when in fact it was Iraq that had been “Lebanonized” The Lebanese Christians have historically played the role of the Iraqi Sunnis while the Lebanese Moslems in general and the Shia in particular have been the Iraqi Shia.
    The Lebanese civil war brought about a realignment of power between the religions that has been a bitter pill to swallow by the Maronites who still think that the President is a central figure when in reality the post has been stripped of all its executive powers.
    The same is true in Iraq, the Sunnis are finding it difficult to play second fiddle so to speak.

    It is true that the Lebanese civil war was essentially a war between two religions while the Iraqi “civil war” has been a fight between two sects of the same religion but that is a minor difference. The major reason for both struggles is as a result of exploitation by one group and its refusal to accept the new realities.

    Posted by ghassan karam | December 1, 2010, 2:29 pm
  9. @G.

    You may be correct that Cellcom’s problems could be due to sabotage although, that possibility has only been mentioned in 2 English articles (from Globes and Arutz Sheva) quoting the beleaguered CEO, Amos Shapira.

    If it turns out that Cellcom has been hacked, do you think the news will be reported? Conceivably, that outcome could be considered a national security issue and embargoed by Israel’s military censor.

    Posted by lally | December 1, 2010, 4:02 pm
  10. Tsk Tsk Tsk.

    Yes. Keep the Hizb armed to save us all from the “Crazy” Sunnis.

    Tamer, you (and the article link you posted) have your logic backwards.

    You don’t keep crazy Sunnis at bay by shoving Crazy Shias down their throats.

    GK:

    While there may be some disgruntled Sunnis egging on the Crazy Sunnis in Iraq, I don’t think you can attribute the actions of the Salafists in Iraq to theological differences with the Shia, or to a loss in their power base. Saddam may have been harsh with the Shia, but he was harsher still with the Crazy Sunnis.

    Global Jihad Inc didn’t set up shop in Iraq to put the Baath back in the throne. It’s there to foil America’s adventures in the region.

    Posted by Gabriel | December 1, 2010, 5:02 pm
  11. anon:

    I can understand why, for idealogical reasons, a hard-core fan base of HA would swallow the drivel they are fed.

    But why would someone like Nahhas join the fray?

    Posted by Gabriel | December 1, 2010, 5:19 pm
  12. Gabriel@212

    Not only has Nahhas joined the fray, he is the person responsible for presenting evidence convincing enough to the International Telecommunications Union to enable passage of a measure condemning Israel’s interference.

    One can pretend that people at that level of involvement in the telecomm sector are a bunch of antisemites who don’t require solid evidence in order to vote “Yea”. Or conversely, one can assume that security of networks is a genuine area of concern and that Nahhas’ revelations to the gathered assembly of super tech types was convincing.

    Of course Lebanese & Israelis & Americans who share a common enemy are free to dismiss all of the evidence surrounding this issue (which also includes former UNIFIL commander Pellegrini’s complaints of the same nature, BTW).

    No doubt, Nahhas and Pellegrini are Nasrallah’s dupes, too.

    Carry on.

    Posted by lally | December 1, 2010, 6:01 pm
  13. @G

    Update from Arutz Sheva’s News Briefs:

    “Cellcom Failure Due to ‘Bug 2010’

    Reported: 20:42 PM – Dec/01/10
    Follow Israel news briefs on and

    Cellcom’s network problems apparently occurred due to “bug 2010”.

    It’s electronic cards ran on old hardware from the ’90s using software written in the ’80s, when no one thought beyond the year 2010.”

    ?

    Posted by lally | December 1, 2010, 6:16 pm
  14. Lally:

    Excuse my ignorance. I don’t have access to Nahas’s biography beyond a little Wikipedia entry. Apparently he’s a phD. An economist. A social anthropologist. And throw into that mix, head of the Civil Engineering Department in some university or another in Lebanon (12 years no less). A Lebanese Leonardo Da Vinci if you will.

    Who were the telecom experts who assessed the evidence presented by Nahas? And did they provide answers to the questions I layed out in Post#201. If so, what are the answers. If not, why not?

    And finally, I am not aware of any charges made by Pellegrini vis-a-vis the planting of fake information implicating HA. Can you send me a link for an article with him opining on the topic?

    Much appreciated,

    Posted by Gabriel | December 1, 2010, 6:24 pm
  15. Lally:

    P.S. The charge of Israeli spy infiltration into the telecomm sector is quite separate from the charge that evidence was doctored, or could be doctored in a convincing enough way. Please don’t conflate the two charges.

    From the interview with Nahas, I heard a lot about the former charge, and very little of a technical nature to address the latter.

    Posted by Gabriel | December 1, 2010, 6:40 pm
  16. So now you piqued my interest in the ITU.

    See list of Member States

    http://www.itu.int/cgi-bin/htsh/mm/scripts/mm.list?_search=ITUstates&_languageid=1

    From the Daily Star:

    http://www.dailystar.com.lb/article.asp?edition_id=1&categ_id=2&article_id=120803#axzz16u3OWO00

    “Nahhas said that out of 124 members, 57 members abstained from voting while 43 voted in favor and 23 opposed the decision.”

    The decision I am assuming is the one condemning Israel.

    Do you know what “technical” information was presented? And why did 57 member states abstain? Who are the 43 that voted for the motion? And is it highly unlikely that this decision was politicised?

    Finally, you seem to now be a proponent of a UN organisation sifting through technical data (which I assume was presented to the ITU).

    Why is HA reluctant to submit their evidence to the STL, which I understand is also a UN organisation? Or why not at least ask them to refer back to the technical opinions of the experts at the ITU (if in fact detailed technical information was presented).

    Posted by Gabriel | December 1, 2010, 7:01 pm
  17. I think it’s fairly reasonable to assume that Israel has tried (and possibly succeeded) in infiltrating the Lebanese telecom for “intelligence gathering” purposes. Most countries at war partake in that kind of activity (illegal as it may be). Americans and Germans intercepted each other’s communications during WW2, and so on.

    That, in and of itself, it not related to the network of cells identified in the Hariri investigation, and so on.

    It’s one thing to attempt to eavesdrop on your enemy. It’s another all together to assume one has the ability to falsify all manner of phone records simply because they’re able to eavesdrop.

    Posted by Bad Vilbel | December 1, 2010, 7:31 pm
  18. Lally:

    While waiting for my last post to be moderated, it seems the vote was by secret ballot.

    43: Favor
    23: Against
    57: Abstain

    Given that the OIC alone has 57 members, it seems Lebanon couldn’t even convince many people.

    Compare that with some “anti-Israeli” resolutions passed by the same United Nations. I take here a sample:

    1322: 14 For, 1 Abstain (guess who)
    1435: 14 For, 1 Abstain (guess who again)
    1073: 14 For, 1 Abstain (guess who once again).

    I think it’s clear the Arab states have done quite well in having Security Council resolutions passed.

    In contrast, by and large, Nahhas did quite a poor job getting approval for his motion against Israel. (34% versus 18%).

    Finally a note on language. It would not be “anti-Semitic” for the OIC to vote en bloc against Israel. Perhaps “Anti-Zionist”. Either way, the vote appears to be Nationally based, and not Technically based. Perhaps a better measure would be to solicit the opinion of leading technical experts, and have them vote on the whether the technical evidence presented is convincing enough or not.

    Posted by Gabriel | December 1, 2010, 9:02 pm
  19. Gabriel,

    Nahhas has other than ideological reasons for joining the fray. You know who he is, I assume. Simply, he is in the fray for political reasons – sounds like a non-statement, right? Other than that I wouldn’t say much.

    On the other hand we are not discussing an issue of competition among hi-techies and low techies. In the end it is an investigation issue which may rely on some revelations made by hi tech.

    Anyone who puts forward the premise that an outside agent (be it Israel, The US or others) implanted a false database into the phone records must be classified among the bottom low of the low-techies, as he or she would be devoid of the most basic requirements of common sense. Because he or she would in this case not know what the talk is all about. At the cost of repetition I say again eavesdropping and implanting data into databases of phone providers are like night and day. That is besides the remaining perplexing question as to why an investigator should be given such an extensive database (presumably distorted according to HNA followers) and then get assassinated? To me the whole affair of Mr. Nahhas is nothing but another distortion attempt at obstructing justice.

    I also repeat what I said previously paraphrased somewhat. I would rather have Nahhas and his comrades in the opposite camp and not as allies. Who needs a burden and a baggage as an ally?

    Hezb can put to rest this whole debate by telling us what those men of Hezb were up to at the times of the calls. Tell us why those phones disappeared? Do not lecture us on hi tech issues. The issue is extremely low tech.

    Any one who is interested in the ins and outs of hi technology should take proper training in the field and satisfy his or her curiosity. But let the investigators do their job unless he or she prefers to go into law. It is a matter of choice.

    Posted by anonymous | December 1, 2010, 9:05 pm
  20. Anon.

    No. I don’t really follow day to day politics in Lebanon. Who is he? I am assuming with a name like Charbel, and backing HA, that he’s with the FPM?

    Posted by Gabriel | December 1, 2010, 9:11 pm
  21. Gabriel,

    That is what he became (FPM) after having been communist in all his previous incarnations, with all due repect to all the ‘comrades’.

    Posted by anonymous | December 1, 2010, 9:47 pm
  22. Lally;

    I was kidding…Cellcom’s problem is one of incompetence, but I am sure their CEO would just LOVE it if he could claim it was an HA/Iran attack..

    You see, it all boils down to the compensation Cellcom will have to pay it’s customers (over 3.5 million of them)!

    But if it’s a terror attack…then by Israeli law they won’t be responsible and won’t pay a dime! We are talking big money here.

    As for Israel meddling in the Lebanese system – Well, I have to agree with BV. The ability and will to eavesdrop (which is obvious given the state of war between Israel & Syria, Lebanon) is completely different, and a world apart from the ability to ‘falsify’ whole communication systems.
    So the evidence of one does not logically prove the other, doesn’t even strongly indicate it. Though I do understand how in the Lebanese “court of public opinion” this can be viewed as strong evidence.

    G

    Posted by G | December 1, 2010, 11:43 pm
  23. *Breaking news on WikiLeaks*

    Turkey official has claimed Israel is behind the Wikileak publication with the target of harming Turkey-US relations:

    http://www.hurriyetdailynews.com/n.php?n=akp-hints-israel-as-8220behind-the-wikileaks-conspiracy8221-2010-12-01

    Wheh, this time it took quite some time before the ‘Israel did it’ conspiracy to surface. Maybe this indicates Israel is being gradually accepted into the region! :)

    Posted by G | December 1, 2010, 11:55 pm
  24. It would be fun to have LeboLeaks.

    Posted by IHTDA | December 2, 2010, 3:20 am
  25. wikileaks about lebanon given to al akhbar for those who are interested!

    http://al-akhbar.com/ar/taxonomy/term/19370

    Posted by tamer k. | December 2, 2010, 10:22 am
  26. Anon:

    I don’t know if I completely buy the sensibility argument. (Not that I disagree with the overall analysis you provided).

    I am picking on Nahas because at least, on paper, I don’t see the idealogical link to HA.

    And given his biography, he seems intelligent.

    So I can accept that for political reasons, he may sway one way or the other. But there are “Nahas”es I know. Highly educated. Highly capable. They are not pro-HA idealogically. But they repeat the talking point of HA/Nahas, and appear on the surface to be convinced by it.

    I don’t expect that they would regurgitate those positions for political reasons. They are friends/family.

    I suppose you can say that I am rather perplexed more so than anything else. And perhaps a little curious as to the thought process that takes them from making highly intelligable arguments to being people who reflexively stick to a position.

    Posted by Gabriel | December 2, 2010, 1:18 pm
  27. Tamer, thanks for the link.
    I’m impressed with the level of professionalism of the lebo politicians. Really!
    If these are all what M14 have discussed, then HA’s & co allegations that M14 guys are the Americans spies/puppets/… Doesn’t fit in the picture these leaked documents portray.

    Posted by IHTDA | December 2, 2010, 1:51 pm
  28. IHDTA,

    Clearly, these documents are falsified by the Israelis to make M14 look like professionals! You should know better!

    Seriously though, sarcasm aside. I sort of skimmed the docs. Anything interesting in there? Seemed mostly like boilerplate stuff. Any revelations that I missed?

    Posted by Bad Vilbel | December 2, 2010, 2:26 pm
  29. FLC has some great ones up:

    http://friday-lunch-club.blogspot.com/

    Will try to get around to discussing them soon enough.

    Posted by Qifa Nabki | December 2, 2010, 2:27 pm
  30. Some pretty interesting stuff there QN! Thanks for the link.

    Posted by Bad Vilbel | December 2, 2010, 2:52 pm
  31. There’s a new post up that discusses the Murr Wikileaks cable.

    Posted by Qifa Nabki | December 2, 2010, 3:46 pm

Are you just gonna stand there and not respond?

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

Browse archives

wordpress stats plugin
Follow

Get every new post delivered to your Inbox.

Join 1,841 other followers

%d bloggers like this: