Israeli sinks to even greater depths of depravity. Israeli drones lure Palestinians with crying chil... 21:39 Apr 18 0 comments Israel Continues to Shoot Itself in the Foot 20:25 Dec 16 0 comments Is the Gaza-Israel Fighting “A False Flag”? They Let it Happen? Their Objective Is “to Wipe Gaza Off... 00:48 Oct 21 1 comments Israel Confesses War Crime 23:49 Oct 10 0 comments Ukraine and West prepare media space for their potential false flag attack on Zaporozhye NPP 23:34 Jun 26 1 comments more >>Blog Feeds
Anti-EmpireNorth Korea Increases Aid to Russia, Mos... Tue Nov 19, 2024 12:29 | Marko Marjanovi? Trump Assembles a War Cabinet Sat Nov 16, 2024 10:29 | Marko Marjanovi? Slavgrinder Ramps Up Into Overdrive Tue Nov 12, 2024 10:29 | Marko Marjanovi? ?Existential? Culling to Continue on Com... Mon Nov 11, 2024 10:28 | Marko Marjanovi? US to Deploy Military Contractors to Ukr... Sun Nov 10, 2024 02:37 | Field Empty
Human Rights in IrelandPromoting Human Rights in Ireland
Lockdown Skeptics
Revealed: The Hidden Pfizer Report That Shows Heart Conditions in the Vaccinated Getting Worse Over ... Wed Dec 11, 2024 09:00 | Nick Hunt
The Curious Links Between the Backers of the Assisted Dying Bill Wed Dec 11, 2024 07:00 | Charlotte Gill
News Round-Up Wed Dec 11, 2024 01:11 | Richard Eldred
Pensioner Convicted of Incitement for Posting Negatively About Migrants in the Latest Politically Ch... Tue Dec 10, 2024 19:00 | Eugyppius
Storm Darragh Leaves U.K. Solar Farm in Pieces Tue Dec 10, 2024 17:00 | Richard Eldred
Voltaire NetworkVoltaire, international editionVoltaire, International Newsletter N?111 Fri Dec 06, 2024 12:25 | en Attempted coup d'?tat in South Korea Fri Dec 06, 2024 12:17 | en What is changing in the Middle East , by Thierry Meyssan Tue Dec 03, 2024 07:08 | en Voltaire, International Newsletter N?110 Fri Nov 29, 2024 15:01 | en Verbal ceasefire in Lebanon Fri Nov 29, 2024 14:52 | en |
DDoS Attack: Website Monitoring Military and CIA Planes through Shannon
national |
anti-war / imperialism |
feature
Monday January 12, 2009 13:09 by shannonwatch webmaster
Well organised, repeated attempts to shut down ShannonWatch.org
Shannonwatch.org, a website set up in December 2008 to document US military traffic and rendition flights through Shannon Airport has become the victim of organised international attacks. The attacks which started on January 8th are being repeated, and efforts to keep the website live are currently proving difficult. The website managers are determined that they will not be silenced however, and will continue in one form or another to publish information on military and suspect CIA flights through Shannon.
Related Links:
The attacks on ShannonWatch.org indicate that a concerted effort is under way to stop the dissemination of information about US activities in Shannon. According to the Internet Service Provider (ISP) that hosts the website, the ongoing distributed denial-of-service (DDoS) attacks are far more sophisticated and determined than most such attacks. Efforts to make websites unavailable are not unusual, but a spokesperson for the ISP said this was “the second serious one [they have seen] in ten years”. The attacks involve thousands of hits per second, first on the nameserver, then on the server hosting the website, with uploads of hundreds of megabytes designed to bring the entire system down.
|
View Comments Titles Only
save preference
Comments (19 of 19)
Jump To Comment: 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1SO WHY DONT THEY BOMB LITTLE ROCK IN PINE WOOD THAT ARE MAKING THE WHITE PHOSPHOUROUS?I AGREE WHAT THEY ARE DOING IN PALESTINE IS HORRENDOUS AND ILLEGAL!CAN THE ARABS FORM AN ORDERLY QUE??ATTACK THE SOURCE??!
LEAVE SHANNON OUT OF THIS!
Hackerangriff auf Shannonwatch-Website
Systematische Hacker-Attacken haben die Shannon-Beobachtungs-Website
(www.shannonwatch.org) lahmgelegt. Inzwischen ist sie jedoch wieder in Betrieb.
http://de.indymedia.org/2009/01/239423.shtml
Vielen Dank!
Peace activists have raised concerns that Ireland may be facilitating
the transport of White Phosphorous through Shannon Airport, following
the landing of an unusual US military cargo plane at Shannon.
"The plane landed at Shannon on January 8th, and stayed for a number
of days. We noticed that it has unusual modifications at the back,
which may be for specialised loading equipment for the cargo bay" said
a spokesman for the group, ShannonWatch.
The plane, a C-130 Hercules is based at Little Rock Air Force base, in
Arkansas, a short distance from the Pine Bluff Arsenal White
Phosphorous facility, which is the only active producer of White
Phosphorous for the US military.
"We are not sure what was on this plane, but without any inspections
by the Gardai, we can not be sure what it is carrying, and given the
horrific injuries to civilians in Fallujah and Gaza caused by this
stuff, we should make sure that it is not passing through here, as its
use is in fact a war crime, and banned by the Geneva Convention, as it
burns through skin right down to the bone, and sets fire to buildings
that it lands on. It cannot be extinguished with water."
The use of White Phosphorous as a weapon is illegal under chemical
weapons conventions.
It has been used in Fallujah in Iraq, and also in Gaza, where,
according to news reports, the batch numbers on the canisters show it
to originate from the Arkansas factory. "The US military had claimed
that White Phosphorous was used in Fallujah just as marker flares and
for smoke screens. The IDF may claim the same thing about Gaza, but in
both cases, human rights organisations found that it had killed or
injured civilians.
Contact:
[email protected]
[email protected]
Times online has story from two days ago re WP used in Gaza here;s the
link and two excerpts.
http://www.timesonline.co.uk/tol/news/world/middle_east...8.ece
The 1980 Geneva treaty says that white phosphorus should not be used
as a weapon of war in civilian areas, but there is no blanket ban on
its use as a smokescreen or for illumination. It produces a thick
white smoke when exposed to oxygen, but can cause severe burns and
melt flesh to the bone if it comes into contact with skin.
The lot number – PB-91J011-002A – visible in a photograph published by
The Times last week indicates that the shells being used by the IDF
were assembled in September 1991 at Pine Bluff arsenal in America,
where all US white phosphorus munitions are reportedly made. The
contractors are Chamberlain Manufacturing [metal parts only], General
Dynamics, and Ordnance and Tactical Systems.
Delighted to see that Shannonwatch.org has been up again all day today. Keep up the good work!
By the way:
“Never believe anything until it has been officially denied”
Claud Cockburn
This is not the first time the Irish Department of Transport has denied knowledge of arms traffic to Israel via Shannon. In April 2006, the Irish Independent reported the false denial of transport of three Apache helicopters through the airport, as below:
US moved helicopters to Israel via Shannon
Saturday April 08 2006
Tom McEnaney
Deputy Business Editor
THE United States used Shannon airport to transport Apache attack helicopters for use by Israel.
The helicopters have been used in the past for targeted assassinations of militants.
...
In February a cargo plane carrying three Boeing Apache helicopters, the type used by both the American and Israeli forces, landed at Shannon, where it stayed overnight before taking off for Israel.
When contacted last month both the Department of Transport, which is responsible for foreign civilian flights, and the Department of Foreign Affairs, which is responsible for foreign military flights, denied any knowledge of the flight.
This week, when presented with the serial numbers of the cargo planes and of the helicopters, they conceded the flights had taken place and said that they have launched an inquiry.
...
Please read the whole report here:
http://tinyurl.com/8lonyr
America flouted law by flying bombs to Israel through Britain
By JASON LEWIS
Last updated at 22:00 07 October 2006
The US Government flouted British and international law to fly bunker-busting bombs through UK airports to bolster Israeli raids on Lebanon.
Washington failed to tell Britain it was flying the weapons in and out of Prestwick in Scotland - potentially putting lives and the airport at risk.
...
The two Boeing 747s, owned by US freight airline Kalitta Air, landed at Prestwick on July 21 and 23 from San Antonio, Texas. They were refuelled and the crew changed before they flew on to Tel Aviv.
Kalitta Air regularly works for the US Air Mobility Command - part of the US Air Force - to ship munitions for operations around the world.
Documents released under the Freedom of Information Act show that an investigation by the Civil Aviation Authority (CAA) revealed that the aircraft missions did not have appropriate clearance.
...
The Department for Transport document says: "There was no record of any application being received by the CAA for such an exception and consequently the conditions that would have been applied to safeguard persons and property at Prestwick were not in place."
...
Please read the whole report on the Mail online website here:
http://tinyurl.com/8rya9h
So much for the Irish Department of Transport's statement of this week that it has not received any requests in respect of any flight to Israel. No request does not mean no bombs.
We are pleased to report that www.shannonwatch.org is up and running again. The attacks continue but the website is now hosted on a platform that we hope can deal with them.
We will continue to publish new information on Shannon’s complicity in war and human rights abuse at shannonwatch.org. But as was highlighted in a previous post we will also replicate the important content on myspace, Facebook, http://shannonwatch.blogspot.com/ and other blogs. This will make it virtually impossible to silence us.
Shannonwatch.org is largely about making sense of data gathered on military traffic and possible rendition flights through a quiet, out-of-the-way “civilian” Irish airport. But someone, somewhere, is clearly unhappy about this sense making, and about the pieces of the Shannon war-complicity puzzle being put together. This makes us even more determined to continue our quest for accountability and justice, however. We cannot forget that as the hits reign down on shannonwatch.org, the bombs reign down on the people of Gaza. Shannon may be complicit in that bombing, and if it is, we have a sad, dishonourable mark on our collective Irish conscience. And given the history of ministerial corruption, repeated denials over complicity in rendition, ongoing propaganda about the importance of our special friendship with the US, we have every reason to consider the possibility that it is happening.
Guantanamo Bay, the illegal Iraqi occupation, Afghanistan, the abhorrent bombing and shelling of innocent Palestinian civilians in Gaza … these are all linked to what shannonwatch.org is about. We challenge the notion that militarization and torture are part of the solution to the threats facing the world today. And we will continue to do so.
And please see this on the Herald.ie website:
Officials deny use of airport by US military
By Senan Hogan
Tuesday January 13 2009
The Government has denied claims by anti-war activists that Shannon Airport is being used to transport US military equipment to aid Israel's offensive.
The Department of Transport said airlines carrying weapons or bombs must seek permission to land in Ireland or over-fly Irish airspace and no such permission has been sought for Israel-bound flights.
However, anti-war activists claim there has been increased activity at Shannon Airport in recent days and added that a new website logging details of US war planes at the hub has been mysteriously shut down.
virus
The Shannonwatch.org site, which only went live last month, was repeatedly attacked by a sophisticated virus which has crippled its server.
Limerick-based anti-war activist John Lannon said: "We know that the US has military contracts with Israel and we have to consider that it could be possible that Shannon is being used to transport military equipment for the war against Gaza."
A spokeswoman for the Department of Transport said: "There have been no recent requests to the Department of Transport in respect of a flight to Israel.''
...
Please read full text here:
http://tinyurl.com/87rrkf
Of course, the people at the Department of Transport must be very naive if they think that "no permission" = "no transit".
As stated above, Kalitta Air landed in Shannon on 20 and again on 22 December. And it has been reported that Kalitta transported laser-guided bombs through Prestwick without the appropriate clearance, for the Israeli bombing of Lebanon in 2006: http://uk-airport-news.info/prestwick-airport-news-281106.htm
So no permission proves nothing!
Would the government please implement a policy that directs customs officials to search Kalitta Air flights and USAF cargo aircraft for undeclared bombs?
Please see the Irish Examiner p. 4 today for the following article:
Hacking campaign appears to target Shannon flights website
by Noel Baker
An Irish internet service provider has contacted Interpol over a large international hacking campaign apparently targeting a website which monitors US military flights in and out of Shannon.
...
Yesterday, the manager of Web World, David Geoghegan, confirmed a "very well coordinated" attack had affected a number of websites, including the shannonwatch site, and affected thousands of customers. "This is a coordinated attack and it has been going on for the past five days," said Mr Geoghegan, who said he had no affiliation with the shannonwatch.org site.
"in 10 years of doing (web) hosting this is the second time I have seen this and it is much more effective than the last one."
... adding that it was difficult to pinpoint who was beihind the attacks as they were originating from internet provider (IP) addresses from around the world, including north and south America.
"We have emailed Interpol this afternoon with the IP addreses," he said ...
We are still trying new ways to get the website back up.
In the meantime, some of us are replicating some of the content on blogs etc.
Not all of the content can be posted in current format across all forums, but we'll be re-formatting stuff.
You can find ShannonWatch Dotorg on Facebook
and shannonwatch on Myspace
as well as a blog format at
http://www.shannonwatch.blogspot.com/
And there is also a YouTube channel which we will create video content for.
For users of indymedia, the Shannonwatch.org site will probably be the best resource, but Facebook, Myspace etc, will introduce the campaign to some people who may not have heard of indymedia.ie
The print edition of the Irish Examiner today has a report on a denial of service attack on shannonwatch.org. The attack is described as sophisticated and seems very targetted.
Anyone know more about this, or ways to get around these tactics?
The site - link at foot of Tim's post - is still showing as unfindable.
They'll do whatever people let them get away with - keep on resisting the war & rendition flights! Best wishes to you all.
The attack hits on shannonwatch.org are continuing unabated. Nonetheless we are confident of having the site up and running again in the near future.
Thanks to our ISP for their ongoing efforts to get us live again. And thanks to the many people who sent messages of support to us.
We won't be silenced!
Website still not working.
There were massive Cyber attacks launched against Estonia when it joined NATO, and against Georgia during the Russian assault last year. Government servers were brought down as well as banks. (most likely the work of the Kremlin)
The US military also has Electronic Warfare units and plenty of capability (as do the British, Israelis etc).
Obviously you guys are doing some good work that they are worried about what you are publishing.
Like I said on another item elsewhere, this is now war.
So much for free speech.
This is the activity of fascists.
Perhaps not the same kind or intensity, as they have managed to re-direct to another site.
STOP THE WAR WEBSITE AND EMAIL ATTACKED
Stop the war has suffered a serious attack on its internet
site, which has been hacked, we assume by supporters of
Israel's attacks on Gaza. Our website is down and our usual
email address not functioning.
We have set up a temporary email address for you to contact
Stop the War: [email protected]
We expect to restore normal service soon.
When this happened to me I set up a server to monitor the attacks myself, maybe you could do the same and see if you can spot anything interesting. Heres what i got when i did it:
OrgName: DINSA, Ministry of Defence OrgID: DMD-16 Address: DINSA, HQ DCSA Address: H4, Copenacre City: Corsham StateProv: Wiltshire PostalCode: SN13 9NR Country: GB NetRange: 25.0.0.0 - 25.255.255.255 CIDR: 25.0.0.0/8 NetName: RSRE-EXP NetHandle: NET-25-0-0-0-1 Parent: NetType: Direct Assignment NameServer: NS1.CS.UCL.AC.UK NameServer: RELAY.MOD.UK Comment: RegDate: 1985-01-28 Updated: 2005-09-06 OrgTechHandle: HOSTM796-ARIN OrgTechName: Hostmaster OrgTechPhone: +44 (0) 1225 813426 OrgTechEmail: [email protected]
OrgName: Department of Social Security of UK OrgID: DSSU Address: Naming and Addressing Authority c/o DITA Address: Government Buildings - GZI Address: Moorland Road Address: Lytham St. Annes, Lancashire FY8 3ZZ City: StateProv: PostalCode: Country: GB NetRange: 51.0.0.0 - 51.255.255.255 CIDR: 51.0.0.0/8 NetName: ITSANET NetHandle: NET-51-0-0-0-1 Parent: NetType: Direct Assignment Comment: RegDate: 1991-09-16 Updated: 1999-04-13
OrgName: DoD Network Information Center OrgID: DNIC Address: 3990 E. Broad Street City: Columbus StateProv: OH PostalCode: 43218 Country: US NetRange: 164.202.0.0 - 164.206.255.255 CIDR: 164.202.0.0/15, 164.204.0.0/15, 164.206.0.0/16 NetName: NETBLK-STDN3 NetHandle: NET-164-202-0-0-1 Parent: NET-164-0-0-0-0 NetType: Direct Allocation Comment: DISA, Joint Interoperability Comment: Director, JITC Comment: Fort Huachuca, AZ 85635-7020 US RegDate: 1993-07-08 Updated: 1999-01-05 RTechHandle: MIL-HSTMST-ARIN RTechName: Network DoD RTechPhone: +1-800-365-3642 RTechEmail: [email protected] OrgTechHandle: MIL-HSTMST-ARIN OrgTechName: Network DoD OrgTechPhone: +1-800-365-3642 OrgTechEmail: [email protected]
Of course that doesn't mean that those organizations were responsible or even involved, but it was interesting to see that they passed by :p
I've just checked the site and it is not loading.
Good luck with it, it's a very worthy project.
Mark.