Local Editor | |
Hezbollah responded Monday to the doubts raised by some parts over the document that was displayed during Hezbollah Secretary General Sayyed Hasan Nasrallah’s conference Saturday, revealing the transfer of computers to the occupied territories. Hezbollah’s response was accompanied by three documents. The first was related to “an exemption request of indirect taxes submitted by a diplomatic mission member.” It was released by the department of customs and VAT in “the State of Israel”, and was filled up by one of the directors in a team of truce supervisors related to the United Nations (UNTSO) in the occupied Al-Quds, Miho Hiros, and was certified by the Israeli authorities in charge. The exemption is for load number 29148, which the request revealed its content. The second document was related to the manifest of items, which reveals that load number 29148 belongs to the United Nations International Independent Investigation Commission (UNIIIC). As for the third document, it included a list of load number 29148’s content… it had: 77 desktops and their peripherals, 20 laptops, 57 computer screens, 25 wireless devices, 1 network auxiliary, 2 repeaters. In its response, Hezbollah emphasized the importance of paying attention to the “all loaded in container number 290530/6 barcode-fill 29148” phrase at the end if the table. Regarding Israel’s benefit from the computer transfer, considering its objective out of this entire issue, its level of authority and the international umbrella that Israel enjoys, in addition to the entity’s high technical capability of having direct control over the computers, Hezbollah proposed the following assumptions: First: copying all the information in the computer. It should be noted that security and judicial apparatuses as well as other official and private organizations in Lebanon, added data to the IIC’s computers, pertaining information about the Lebanese society, for example: a. Information directly related to the investigations: suspects, witnesses testimonies, investigation’s course and plans, the committee’s framework, considered as well as ignored assumptions, genetic and laboratory tests results. b. The data presented to the inquiry committee in Lebanon include: communication information since year 2002 until the day of transferring the computers; information on all the communication networks in Lebanon; cars in Lebanon; identity programs and check lists; photos and identity cards programs; subscribers for water and electricity; the Lebanese’s fingerprints; students, professors, and schools in Lebanon; employees in various sections; security and judicial files from the archive of Lebanese institutions; and the list is endless… Second: Checking the deleted data. Third: installing softwares or viruses that would permit damaging programs, data, or some electronic sections in the computers or their peripherals, and taking control over the network and equipments that would be connected to the computers in the future. Hezbollah further clarified that such issues would help achieve the following: 1- Taking direct advantage of all the available archive for military and security goals related to the Israeli enemy in Lebanon, which would help in exposing Lebanon to the enemy. 2- Possessing all the data on the inquiry. 3- Following up the investigations process. 4- Possessing information on the investigators. 5- Deviating the investigations or affecting them. 6- Making up scenarios that are based on the given data and that help the enemy in achieving his goal. |
River to Sea Uprooted Palestinian
No comments:
Post a Comment