The Most Revolutionary Act

Uncensored updates on world events, economics, the environment and medicine

The Most Revolutionary Act

What happens to a car when the company behind its software goes under?

A man stands next to a compact electric car, inside a white-painted facilityBetter Place founder and CEO Shai Agassi showing off a battery-swap station for electric taxis in Tokyo on April 26, 2010. Three years later, the company was done.

Matthew Macconnell

Imagine turning the key or pressing the start button of your car—and nothing happens. Not because the battery is dead or the engine is broken but because a server no longer answers. For a growing number of cars, that scenario isn’t hypothetical.

As vehicles become platforms for software and subscriptions, their longevity is increasingly tied to the survival of the companies behind their code. When those companies fail, the consequences ripple far beyond a bad app update and into the basic question of whether a car still functions as a car.

Over the years, automotive software has expanded from performing rudimentary engine management and onboard diagnostics to powering today’s interconnected, software-defined vehicles. Smartphone apps can now handle tasks like unlocking doors, flashing headlights, and preconditioning cabins—and some models won’t unlock at all unless a phone running the manufacturer’s app is within range.

However, for all the promised convenience of modern vehicle software, there’s a growing nostalgia for an era when a phone call to a mechanic could resolve most problems. Mechanical failures were often diagnosable and fixable, and cars typically returned to the road quickly. Software-defined vehicles complicate that model: When something goes wrong, a car can be rendered inoperable in a driveway—or stranded at the side of the road—waiting not for parts but a software technician.

It’s already happening

Take the example of Fisker. In May 2023, the California auto brand arrived in Britain with its Ocean Sport before filing for bankruptcy just one year later. Priced from £35,000 ($44,000)—although top-spec trims pushed the price to £60,000 ($75,000)—the all-electric Tesla Model Y rival featured tech including a partially retracting roof and a rotating BYD-like touchscreen. All cars also carried a six-year/62,000-mile (99,779 km) warranty, with the battery and powertrain covered for 10 years or 100,000 miles (160,934 km).

Before Fisker’s 2024 bankruptcy, just 419 Fisker Oceans made it into British driveways. One unfortunate buyer, a marketing manager from Southampton, experienced the worst of the brand’s teething troubles. After taking delivery, her Ocean was plagued by persistent software glitches. Following a call to Fisker, engineers were dispatched to collect the vehicle for repairs, but when the car was due to be collected, it refused to start. Mere days later, Fisker declared insolvency, leaving the Ocean stranded as a 5,500 lb (2,500 kg) driveway ornament for the next ten months with no solution in sight.

Preceding Fisker, there was Better Place. Founded in 2007, Better Place wasn’t a car manufacturer but an EV infrastructure and software company that promised to solve range anxiety through battery-swap stations. Its entire model relied on centralized servers, subscriptions, and proprietary software to authenticate vehicles and manage battery exchanges. The flagship car for this system was the Renault Fluence Z.E., an electric sedan sold primarily in Israel and Denmark.

Better Place filed for bankruptcy in May 2013 after burning through $850 million, leading to Renault closing the Fluence Z.E’s Turkish assembly line. Servers were shut down, battery-swap stations stopped operating, and backend software used for authentication, charging, and fleet management disappeared, leaving many cars bricked.

These cases highlight a broader shift in the auto industry, where long-term ownership is increasingly dependent not just on mechanical durability but on continued access to proprietary software and manufacturer support.

“When a modern car’s software misbehaves, you don’t fix it yourself—you call the manufacturer,” said Stuart Masson, founder and editor of The Car Expert. “They control the code. At that point, you’re not dealing with a traditional service department so much as an IT help desk.”

That dependence, Masson warned, becomes a critical failure mode when the manufacturer disappears. “Sooner or later, every owner risks a Fisker-style scenario, where the company is gone and there’s nothing you can do about it.”

While informal owner communities have begun attempting to reverse-engineer and distribute unofficial software updates, Masson is blunt about the risks. “You’re trusting that someone on the Internet actually knows what they’re doing,” he said. “If they don’t, the consequences might not be that Android Auto simply stops working but instead an airbag deploying at 70 mph.”

While buying a second-hand Fisker in the UK is a high-risk move, more established manufacturers generally have contingency plans if a critical software partner goes under. In practice, that usually means issuing recalls or pushing over-the-air fixes to affected vehicles. Warranty coverage should handle most issues for newer cars, but the story gets murkier on the used market.

Out of warranty

Take a decade-old Tesla Model S, for example: You might snag one at a bargain price, but there’s no guarantee Tesla will continue supporting it indefinitely. When a manufacturer drops software support, the car isn’t just at risk of breaking down—it becomes a potential cybersecurity liability. In a world where vehicles are increasingly defined by their code, running unsupported software is akin to leaving your router exposed to the Internet. You may have a functioning car today, but there’s no telling when—or how—it could stop running.

“Many teams, such as McLaren, who have F1 cars from the 1990s, require a 1990s-era laptop running an old Windows operating system, along with specialized interface hardware, for maintenance and to start the car,” Masson said. “We are up against time here, but it could be that brands like Tesla release its code, allowing people to use it. Who knows?”

The problem isn’t solely on the consumer; manufacturers shoulder a significant portion of the risk as well. One potential mitigation is standardization. Enter Catena-X, a collaborative data network connecting OEMs, suppliers, and IT vendors. By creating traceable digital records for parts and software—and standardizing data models and APIs for interoperability—Catena-X aims to make supply chains more resilient and software dependencies less catastrophic when a critical partner disappears.

When asked how OEMs can map software dependencies and mitigate vendor insolvency, Catena-X Managing Director Hanno Focken told Ars that “Catena-X supports software bills of materials and standardizes certain components to make software replaceable, plus a marketplace and open-source reference implementation helps OEMs find alternative vendors.”

The industry also shares responsibility in defining minimum operational lifespans for vehicle software. “As an association, Catena-X can facilitate shared industry commitments and consensus (e.g., data retention policies like a 10-year battery passport requirement), but it does not act as a regulator setting mandatory lifespans,” added Focken.

The lesson is clear: In today’s cars, the engine or electric motor isn’t always what keeps you moving—the software does. When that software vanishes with a bankrupt company, your car can go from daily driver to expensive paperweight overnight. And in the age of software-defined vehicles, owning a car increasingly means betting on the survival of its code. When that code dies, the driveway or highway—not the repair shop—becomes the final stop.

[…]

Via https://arstechnica.com/cars/2026/02/what-happens-to-a-car-when-the-company-behind-its-software-goes-under/

Pakistan: The Final Solution to Imran Khan

When a regime starts rationing a prisoner’s light, it is no longer governing — it is unraveling.

If credible reports are accurate that Imran Khan’s eyesight has catastrophically deteriorated in custody, this is not bureaucratic failure, nor medical misfortune. It is escalation. It is the continuation — by more brutal means — of a four-year campaign of relentless state persecution against the most popular, electrifying, and historically singular political figure Pakistan has produced in its 78-year existence. The dimming of his vision is not incidental. It is terror by design.

Custody is sovereign monopoly distilled. The state controls light, air, medicine, sleep, contact — the total architecture of human survival. Under such conditions, physical deterioration is not “neglect.” It is the exercise of power. When a regime commands every variable of a prisoner’s existence and that prisoner’s body breaks down, the state owns the outcome.

Field Marshal Asim Munir and the high command over which he presides do not operate as reluctant custodians. They operate as proprietors. Elections are pre-engineered, judges are corralled, media is disciplined, civilian governments are rearranged with barracks precision. “Stability” is invoked as a doctrine of supervision — a euphemism for perpetual military arbitration of politics. The generals present themselves as indispensable guardians of order.

Yet this supposedly omnipotent machinery has chosen to brutalize the body of its most formidable rival.

This is not incompetence. It is calculated persecution.

If the top brass can choreograph parliamentary arithmetic and manipulate electoral outcomes with surgical accuracy, they can ensure medical integrity. The targeting of Khan’s physical and mental health must therefore be understood as an extension of the same war that has filled prisons with tens of thousands of his supporters. The message is unmistakable: no sanctuary, no mercy, no limit.

And here lies the regime’s profound miscalculation. Imran Khan is no longer merely a political competitor. He has become a historical force. For tens of millions, he embodies rupture in a system long monopolized by dynastic patronage and praetorian oversight. His defiance has transformed him from politician into symbol; his incarceration has elevated him from symbol into legend. Each arrest, each humiliation, each confinement has fused biography into myth.

Pakistan’s rulers have manufactured the singular icon they sought to extinguish.

[…]

Via https://www.asia-pacificresearch.com/pakistan-final-solution-imran-khan/5633229

Epstein Files Expose Israeli Occupation of America

A shorter version of this article was published in last week’s American Free Press. -KB

MSM grudgingly admits Pizzagaters were on to something

On January 30, the US Department of Justice released what it called “3.5 million responsive pages” in compliance with the Epstein Files Transparency Act spearheaded by Rep. Thomas Massie. Though more than a month late, redacted in bizarrely non-compliant ways, and representing only about half of the Epstein files (the other half are still being illegally withheld) the DOJ document dump provided abundant, irrefutable evidence that the “antisemitic conspiracy theorists” have been right all along: The United States of America is occupied by a Jewish supremacist crime ring based in Israel.

The documents show that when then-United States Attorney for the Southern District of Florida Alex Acosta gave convicted sex criminal Jeffrey Epstein a sweetheart plea deal in 2008 because Epstein “belonged to intelligence,” he was referring to Israeli intelligence. According to FBI files, Acosta’s source was Alan Dershowitz, Epstein’s lawyer, who himself represented Israeli intelligence.

Epstein should have gone to prison for years or decades, as would any other criminal convicted of the same charges. But the notorious sex trafficker got a work-release wrist slap. Since when can a foreign intelligence agency tell a US Attorney not to do his job?

The latest document dump confirms that Epstein, who was groomed as a sexual blackmailer by Les Wexner’s MEGA group of billionaire Mossad spies, was “trained as a spy by (Israel’s former military intelligence chief and Prime Minister) Ehud Barak,” who visited Epstein’s New York mansion on dozens of occasions. Barak and Epstein teamed up not only to blackmail American political, economic, and cultural leaders, but also to funnel huge sums of money to politicians in various nations—bribes in return for those politicians following Israel’s orders.

The new document dump reveals that Epstein worked with Israel to support their Ukrainian asset Zelensky, and to try to overthrow Russia’s Vladimir Putin and replace him with an Israeli stooge named Ilya Ponomatov. Epstein, we also learn, was involved in the overthrow of Libya’s Gaddafi. The Mossad blackmailer helped cultivate Israel’s relations with separatists in the imaginary nation of “Somaliland” (which only Israel recognizes). He brokered Israel’s ties with India’s Prime Minister Modi, and maintained close relationships with top UK leaders including Tony Blair and Peter “love the torture video” Mandelson.

These and other revelations prove that Epstein was not just a sexual blackmailer. Since his job was to establish compromising personal relationships with the world’s most powerful people, Epstein was also used by Israel as a high-level international power broker. “I represent the Rothschilds,” Epstein wrote to Peter Thiel, referring to the banking dynasty that created Israel.

The DOJ files show how Israeli/Rothschild agent Epstein lured his blackmail targets into a cesspool of depravity. The files contain many references to torturing, raping, and murdering children. FBI files cite testimony that Epstein’s crime ring would “birth babies for black market use.” Those who thought Pizzagate was an unproven conspiracy theory may be surprised to learn that the Epstein emails include more than 900 references to “pizza” as a likely code for child sex slaves. There are also 673 suspicious references to “ice cream” and countless uses of “grape soda” presumably referring to black prostitutes or sex slaves. Mainstream media are twisting themselves into contortions trying to insist that even though most of these food code words are obviously what they seem–code words for child sex slaves–though possibly a few could be interpreted as references to actual food! New York Magazine opines:

Admittedly, some of the pizza-related material seems pretty weird. An April 2018 message from a redacted sender says, “lets go for pizza and grape soda again. No one else can understand. Go kno.” Cryptic! Some of it is scrutable: “Go kno” appears to be a rendering of go know, an English derivative of the Yiddish expression geh vays, which is roughly equivalent to “go figure.” The claim that “no one else can understand,” on the other hand, is a creepy element that echoes Donald Trump’s allusion to “wonderful secrets” in his infamous letter on the occasion of Epstein’s 50th birthday….

“Pizza and grape soda” belongs to the latter category, and it appears frequently in Epstein’s emails and texts. In a 2018 exchange with his urologist, Harry Fisch (who erroneously appears in Epstein’s contacts as “Harry Fish”), the two seem to discuss refilling Epstein’s prescription for erectile-dysfunction medication. Fisch later texts, “After you use them, wash your hands and lets [sic] go get pizza and grape soda.” This proposal seems odd. There are many things you can do after your Viagra kicks in, and getting a slice with your doctor is not near the top of the list…

…Remember when only unreasonable people thought like this? The idea that pizza could be a code word for illicit sexual activities was laughable in 2016, when the so-called Pizzagate conspiracy captured the imaginations of what might charitably be called the internet’s most enthusiastic users…At the time, the assumption that pizza was code for sex with children seemed obviously arbitrary and extravagant, a violation of the principle that the simplest explanation is usually the right one. This heuristic, Occam’s razor, is often a handy way to differentiate ideas and people we should take seriously from ones we can safely dismiss — people who are frustrated that they’ve misplaced their keys tend to be more credible than those who think their keys have been stolen. Except with this Epstein pizza thing, the somebody-stole-my-keys contingent seems to have been suddenly, disastrously vindicated…

…Occam’s razor has comparatively little to tell us about grape soda. Fisch and Epstein refer to “pizza and grape soda” so often, and so often together — seemingly never just grape soda and rarely just pizza — that the whole thing starts to look like a shibboleth…The mystery deepens when you notice that Fisch often follows references to pizza and grape soda with an emoji depicting an African American…

The sender’s name has been redacted, and the identity of “Brice” is unclear, but a former New Zealand Army chef named Brice Gordon co-managed Epstein’s New Mexico ranch and was interviewed by the FBI in 2007. Red Hook is an unincorporated town in the U.S. Virgin Islands — the least-populated such place, according to the 2020 census, consisting mostly of marinas. There is, as it turns out, a pizza restaurant there. But why would someone need Epstein’s permission to have a “quick pizza meal” to which the financier was not invited? It’s enough to drive a sensible person to speculation.

From the mainstream media’s perspective, the problem is not that we are ruled by genocidal Israeli-Mossad-empowered Jewish supremacist psychopathic billionaire perverts. It is that someone might notice that we are ruled by genocidal Israeli-Mossad-empowered Jewish supremacist psychopathic billionaire perverts. That would mean that the “antisemitic conspiracy theorists” were right all along. Oy vey! Double-plus ungood!

Though the mainstream media professes to hate racism, they are covering up Epstein’s virulent racism against non-Jews. The emails are full of disparaging references to “goys,” a term for non-Jews that roughly parallels other racial slurs including the N-word. Epstein and his supremacist cronies loved to degrade non-Jewish children and teens, but never targeted their fellow “chosen people.”

For many Americans, the most disturbing revelations in Epstein files involve President Donald J. Trump. Prior to the files’ release, we already knew that Trump flew on Epstein’s jet at least eight times, was referred to by Epstein as his “best friend,” sent a birthday drawing to Epstein depicting a barely pubescent naked girl alluding to their “secret,” and has been accused of raping 13-year-old “Katie Johnson” in 1994 at an Epstein party and then threatening to kill the girl and her family. The first Epstein dump also contained FBI witness reports that Trump was present when a baby was drowned in Lake Michigan, and was implicated in the rape and murder of a certain Dusty Rhea Duke in 2000.

The new Epstein files release includes FBI witness reports that Trump was involved in murdering three girls who were buried at Mar-a-Lago and threatening the witness with a similar fate. Witnesses also told the FBI that Trump auctioned underage girls from his swimsuit contests, measuring their vulvas and rating them for tightness. Trump is also accused of forcing oral sex and other abuses against 13 and 14 year old girls.

Meanwhile the mainstream media chant in unison: “President Trump has not been accused of wrongdoing.” Will they change their tune, and suddenly discover the FBI files, if and when Trump stops following Israel’s orders?

[…]

Via https://kevinbarrett.substack.com/p/epstein-files-expose-israeli-occupation

AI Fakery Attacks Whitney Webb (and Indie Journalists)

The Muslim Father of Comparative Religion Who Measured the Earth’s Circumference

Episode 11 – Master Muslim Scholar al-Biruni

Islamic Golden Age (2017)

By Eamon Gearon

Film Review

Al-Biruni was a Persian scholar born  in Uzbekistan in 973 AD. Educated in Islamic theory and the Greek sciences  jurisprudence, astronomy, medicine and math, he knew seven languages, including Sanskrit and wrote treatises on physics, math, anthropology, history, geography, astronomy and religious studies (Hinduisim, Buddhism, Zoroastrianism, Judaism, Christianity and Islam).

Known as the father of comparative religion, he maintained every religion had the same same core moral values, including the polytheistic religions of the Hindus and ancient Greeks.

Published in 1000 AD his first major work, The Remaining Traces of Past Civilizations or Chronology of Ancient Nations, is regarded a better historical account of the history of the Jews than most Hebrew sources.

He’s best known for History of India, a foundational text on the history and culture of India. The book describes the Hindu religion in detail, as well as Hindu investigation into math, science and astrology.

Studying and writing during a period that in which east Persia, Afghanistan, India and Central Asia were extremely unstable, the newly formed Kwarazmian Empire (an ethnically Turkish empire that adopted Persian language and culture) employed him at age 40 as court astrologer. Of the 150 titles he published, only 22 survived, some with highly complex calculations and tables.

Using trigonometry and a nearby mountain, he arrived at a more accurate measurement of the earth’s circumference than the Greek mathematician Eratosthenes (296-195 BC). 

fkurniawansyah: July 2016

Among his other accomplishments:

  • Documenting with mathematical measurements that the planets travel around the sun in elliptical orbits.
  • A textbook of pharmacology describing 1,000 different drugs in five different language.
  • A scientific text on gems, listing the density and specific gravity of more than 100 precious stones.

https://www.kanopy.com/en/pukeariki/watch/video/5756987/5757009

Beijing Moves to Contain Mossad’s Expanding Reach in Iran

Nadia Helmy

Israeli intelligence operations inside Iran have alarmed Beijing, which saw them as a new model of intelligence warfare, prompting deeper technological, security, and strategic cooperation with Tehran.

Chinese military experts and intelligence agencies increasingly describe Mossad’s deep infiltration into Iran as opening a “Pandora’s box” of global security risks.

From Beijing’s perspective, Israeli and US intelligence operations – particularly those expanding after 2015 and accelerating through 2025–2026 – mark the evolution of a new battlespace. Mossad’s ability to embed agents, compromise sensitive databases, disable radar networks, and facilitate precision strikes from inside Iranian territory is interpreted as a shift toward what Chinese analysts call ‘Informationized and Intelligent’ Warfare.

This represents the convergence of cyber sabotage, internal recruitment, technological penetration, and operational coordination – a hybrid model in which intelligence operations hollow out defensive infrastructure before kinetic action begins.

For China, the implications extend well beyond Iran.

Intelligence warfare as a precursor 

Within Chinese security discourse, Israel’s operations in Iran are frequently cited as evidence that intelligence warfare now precedes kinetic engagement.

Military expert Fu Qianshao, a former analyst in the Chinese Air Force, characterized Mossad’s success in planting agents and disabling Iranian radar and air defense systems from within as a “new pattern of intelligence warfare.” The June 2025 Israeli strikes on the Islamic Republic, which reportedly faced minimal resistance due to compromised systems, reinforced this assessment.

Fu argued that such tactics transcend traditional battlefield engagement. Instead of confronting air defenses externally, Mossad undermined them internally – neutralizing deterrence before aircraft entered contested airspace.

Another Chinese military expert, Yan Wei, echoed this concern, emphasizing that the penetration of sensitive Iranian facilities exposed structural weaknesses rather than merely technological gaps. Legal safeguards and routine security protocols, he suggested, are insufficient against intelligence operations that exploit bureaucratic vulnerabilities and internal access points.

Professor Li Li, a Chinese expert on West Asian affairs, has pointed to Israeli cyber operations targeting research centers and infrastructure as evidence of intelligence warfare functioning as a force multiplier. Unlike conventional attacks, these operations blur the line between espionage and sabotage, complicating retaliation.

Tian Wenlin, director of the Institute of Middle Eastern Studies at Renmin University, warned that sustained intelligence incursions could pressure Tehran to accelerate its nuclear capabilities as a defensive countermeasure.

Structural vulnerabilities and strategic lessons

Chinese analysts have argued that Mossad’s operations revealed structural vulnerabilities within Iranian security and administrative systems. In commentary across Chinese military and policy platforms, the breaches have been cited as evidence of weaknesses in digital infrastructure and internal safeguards.

The breaches exposed weaknesses in internal vetting, digital security, and inter-agency coordination. In Beijing, the episode was read as a warning – a reminder that intelligence warfare can exploit administrative seams as effectively as battlefield vulnerabilities.

If a state with extensive security institutions can face such penetration, similar methods could target strategic infrastructure elsewhere, including trade and energy corridors linked to the Belt and Road Initiative (BRI).

The key takeaway in Chinese policy circles is preventative. Sovereignty in the digital era depends as much on system integrity as on military capability.

Iran’s role in Belt and Road

China’s engagement with Iran rests on long-term strategic planning.

Iran occupies a central geographic position linking East Asia to West Asia and onward to Europe. Maritime routes through the Strait of Hormuz and Bab al-Mandab remain essential to Chinese energy security and commercial flows.

Instability inside Iran would ripple across these corridors. For Beijing, disruptions would not be confined to regional politics; they would directly affect supply chains and infrastructure investments embedded within the BRI.

Chinese officials have therefore consistently reiterated support for Iran’s sovereignty while opposing what they describe as unilateral pressure.

Activating counterintelligence coordination

As reports of Israeli intelligence penetration intensified through 2025 and into early 2026, Beijing deepened its counterintelligence coordination with Tehran. Chinese security institutions moved from monitoring Mossad’s methods to analyzing their structural implications, treating Iran’s experience as a live operational case.

Beginning in January 2026, cooperation reportedly expanded to include joint assessments of infiltration pathways, digital vulnerabilities, and administrative access points exploited by foreign intelligence services. The breaches were understood not as isolated incidents but as indicators of systemic exposure requiring institutional response.

Through the Ninth Bureau of the Chinese Ministry of State Security, China began implementing a comprehensive strategy in January 2026 to dismantle Israeli and US spy networks in Iran. As China strengthens Iran’s digital sovereignty, Beijing is urging Tehran to abandon western software and replace it with secure, encrypted Chinese systems that are difficult to penetrate, essentially building a digital “Great Wall.”

The objective extended beyond immediate breach containment. It centered on insulating critical infrastructure that underpins Belt and Road trade corridors from sustained intelligence disruption.

China also promoted integration of its BeiDou navigation system as an alternative to western GPS platforms, reducing exposure to signal interference and enhancing guidance independence for missile and drone systems. Radar upgrades, including platforms such as the YLC-8B, reportedly strengthened detection capabilities, including against stealth aircraft.

Advanced air defense systems, including the HQ-9B, further reinforced airspace monitoring capacity. Cooperation has also extended to missile infrastructure components and technical systems supporting deterrence resilience.

Space-based surveillance capabilities, linked to Chinese satellite networks, reportedly enhanced monitoring capacity and reconnaissance support.

Embedding Iran within a broader security architecture

Beyond bilateral coordination, Beijing has sought to situate Iran within broader multilateral security mechanisms through the Shanghai Cooperation Organization (SCO).

The SCO’s formal security architecture centers on its Regional Anti-Terrorist Structure (RATS), headquartered in Tashkent, which coordinates intelligence sharing and counterterrorism cooperation among member states. Although originally designed to address extremist threats, the framework provides institutional channels for information exchange on cross-border security risks.

Chinese policy commentary has increasingly framed the SCO as more than a counterterrorism platform. In the context of intelligence penetration and covert destabilization campaigns, Beijing has emphasized the organization’s potential as a vehicle for deeper security coordination and collective resilience against external interference.

While the SCO does not publicly maintain a mandate targeting specific intelligence services, its expanding cooperation mechanisms – particularly after Iran’s accession as a full member in 2023 – have strengthened Tehran’s integration into a broader Eurasian security network.

Embedding Iran within this framework serves both operational and political functions: it distributes counterintelligence awareness multilaterally and signals that intelligence pressure on Tehran resonates beyond bilateral relations.

Economic reinforcement and long-term commitments

Security coordination forms only one layer of Beijing’s approach. Economic integration provides another.

China remains Iran’s largest trading partner. Iranian exports to China – largely energy – have approached $22 billion annually, while imports from China stand at roughly $15 billion. The 25-year comprehensive cooperation agreement between the two countries envisions long-term Chinese investment in Iranian oil, gas, infrastructure, and industrial sectors, with projected figures often cited in the $300–$400 billion range over time.

In parallel, Beijing has employed alternative financing mechanisms designed to reduce exposure to sanctions pressure. Barter arrangements linking oil exports to infrastructure development projects, including transportation networks and industrial facilities, allow transactions to continue outside traditional financial channels.

Economic continuity reinforces strategic stability. Trade flows and infrastructure commitments create buffers that help absorb the impact of sustained political and intelligence pressure.

Diplomatic positioning and strategic restraint

China has consistently voiced diplomatic support for Iran in international forums, emphasizing principles of sovereignty, non-interference, and opposition to unilateral coercive measures. Beijing has criticized strikes on Iranian facilities and warned against escalation that could destabilize regional trade routes.

At the same time, Chinese officials avoid language that commits China to direct military defense of Tehran. The posture is deliberate. China strengthens institutional resilience, supports technological substitution, deepens economic integration, and expands diplomatic backing – while preserving distance from open confrontation with Israel or the US. Strategic caution remains central to Beijing’s calculus.

A layered response in a hybrid battlespace

Israeli intelligence operations inside Iran are widely interpreted in Chinese commentary as illustrative of how modern conflict unfolds. Intelligence warfare – combining cyber access, human networks, administrative penetration, and precision enablement – reshapes the strategic environment before conventional escalation becomes visible.

Beijing’s response reflects this assessment. Digital insulation, navigation substitution, radar modernization, satellite-supported monitoring, multilateral coordination through the SCO, and long-term economic engagement form a layered counterstrategy.

In this framework, resilience takes precedence over retaliation. The objective is to reinforce systems rather than escalate confrontation.

China’s engagement in Iran, therefore, carries dual significance. It reinforces a strategic partner facing sustained intelligence pressure while refining Beijing’s own understanding of hybrid conflict and systemic vulnerability.

The contest unfolding is structural. Sovereignty in this environment depends on hardened infrastructure, secure networks, and institutional coordination as much as on military platforms.

Containment, insulation, and calibration define Beijing’s approach – a measured effort to limit intelligence penetration while maintaining broader strategic balance.

[…]

Via https://libya360.wordpress.com/2026/02/17/beijing-moves-to-contain-mossads-expanding-reach-in-iran/

Putin aide urges retaliation to ‘Western piracy’

Putin aide urges retaliation to ‘Western piracy’

RT

Russia’s response to “Western piracy” targeting its maritime trade should be forceful and not limited to diplomatic means, an aide to President Vladimir Putin has said.

Nikolay Patrushev, a veteran national security official who heads a naval policymaking body, called for stronger action against Western moves targeting vessels described as part of an alleged Russian ‘shadow fleet’.

Attempts to paralyze Russian foreign trade will only intensify, Patrushev warned in an interview with Argumenty i Fakty published on Tuesday.

“Unless we push back forcefully, soon the English, the French, and even the Balts will get brazen enough to try and block our nation’s access to at least the Atlantic,” he said.

“The Europeans are in essence making steps to impose a naval blockade, deliberately pushing towards a military escalation, testing the limits of our patience and provoking our retaliation. If the situation is not resolved peacefully, the Navy will be breaking and lifting the blockade,” Patrushev said.

“Let’s not forget that plenty of vessels sail the seas under European flags. We may get curious about what they are shipping and where,” he added.

Patrushev expressed skepticism that tensions could ease, saying “there is little hope that the West has an ounce of respect for diplomacy and the law.” He argued that “the old practice of ‘gunboat diplomacy’ is being revived,” citing US operations targeting Venezuela and Iran.

Washington has used warships to target suspected drug smuggling boats off Venezuela and intercept outgoing oil tankers, including one sailing under a Russian flag. The Pentagon is now concentrating assets in the Middle East as President Donald Trump pressures Iran to accept restrictions on its missile deterrence against Israel.

In today’s world, the Russian Navy is “a geopolitical tool that combines might with flexibility and is suitable for both peacetime and armed conflicts,” Patrushev said. Its strength is needed to protect Russia’s “ability to export oil, grain and fertilizers, and the normal functioning of the state.”
[…]

Indonesia To Send First 1,000 Troops To Gaza By April For ‘Stabilization Force’

via AFP

Zero Hedge

Indonesia is readying 1,000 troops to be deployed in Gaza as early as April as part of the UN-mandated International Stabilization Force, an army spokesperson said on Monday.

A total of 8,000 Indonesian soldiers will be ready for deployment by June, while the final decision will be made by Indonesian President Prabowo Subianto. “The departure schedule remains entirely subject to the political decisions of the state and applicable international mechanisms,” the spokesman said in a text message to news agency Reuters.

Indonesian Army Chief of Staff Maruli Simanjuntak previously estimated that between 5,000 and 8,000 military personnel could be deployed, with final numbers “still being negotiated”.

On Saturday, Indonesia’s foreign ministry said that its military’s participation in Gaza as part of the peace plan devised by US President Donald Trump should not be interpreted as a normalization of political relations with Israel.

“Indonesia consistently rejects all attempts at demographic change or the forced displacement or relocation of the Palestinian people in any form,” the ministry said.

The deployment, which has a non-combatant, humanitarian mandate, could only be carried out with the consent of the Palestinian Authority, the ministry said.

“Indonesian troops will not be involved in combat operations or any action leading to direct confrontation with any armed group, the statement said. Indonesian troops would also have no mandate to demilitarize any party, it added.

However the mandate of the stabilization force includes ensuring “the process of demilitarizing the Gaza Strip” and “the permanent decommissioning of weapons from non-state armed groups”. The resolution authorizes the force to “use all necessary measures to carry out its mandate”.

$5bn to rebuild Gaza 

Indonesia confirmed last week that President Prabowo Subianto will attend the inaugural leaders’ meeting of Trump’s “Board of Peace”, whose members have pledged $5bn toward “rebuilding war-ravaged Gaza”.

Indonesian foreign ministry said that Prabowo would use the forum on 19 February to advocate for the protection of Palestinians and push for a sustainable peace based on a two-state solution, which envisions the establishment of an independent Palestinian state.

Prabowo is also expected to sign a tariff agreement with the United States during the trip, the government said. “We are just preparing ourselves in case an agreement is reached and we have to send peacekeeping forces,” Prabowo told journalists.

The president also said he will seek to negotiate the board’s reported $1bn membership fee. Indonesia’s foreign ministry said that its troops’ participation in Gaza would not be aimed at imposing peace, but would instead focus on humanitarian objectives.

Indonesia is one of the largest contributors to UN peacekeeping operations globally, with more than 2,700 personnel deployed in missions across Africa and the Middle East.

Indonesia’s largest deployment is with the United Nations Interim Force is in Lebanon. Public support for Palestine is strong in Indonesia, where mass demonstrations have taken place against Israel’s genocide in Gaza.

On August 3, thousands of Indonesians gathered at Jakarta’s National Monument, waving Palestinian flags and holding placards demanding justice for Gaza.

Indonesia, the world’s largest Muslim-majority country, has consistently called for an end to Israeli genocide in Gaza and has pushed for a two-state solution through international forums. Its government has also provided humanitarian aid, medical support and diplomatic backing for Palestinian institutions.

In November, Indonesia’s defense minister announced that its military had trained 20,000 troops for healthcare and construction efforts in Gaza. Jakarta has also provided humanitarian aid, including the delivery of 10,000 tonnes of rice in August last year, and has launched a long-term cultivation initiative in Sumatra and Kalimantan to support Palestinian food security.

[…]

Via https://www.zerohedge.com/geopolitical/indonesia-send-first-1000-troops-gaza-april-stabilization-force

AI overlords of the world hacked: Fallout from the massive Palantir breach

AI overlords of the world hacked: Fallout from the massive Palantir breach

Palantir Technologies has been hacked, according to well-known blogger Kim Dotcom. The company develops software for intelligence and big data analysis.

Palantir (named after the magical ‘seeing stones’ from ‘The Lord of the Rings’) doesn’t engage in surveillance in the conventional sense using spies, cameras, or bugs. Instead, it develops software that is sold to government agencies, military organizations, and large corporations.

Clients (like the CIA or the German police) upload all their data, and Palantir (its primary platforms are Gotham for military purposes and Foundry for business) then utilizes AI to transform this chaotic information into a coherent picture.

Essentially, it creates a ‘digital twin’ of reality, revealing connections that analysts could have never recognized on their own: for example, that a terrorist had called the cousin of someone who recently transferred money to a suspicious account.

The claims about wiretapping Trump and Musk are likely untrue or highly exaggerated. However, there’s no doubt that Palantir serves as a massive surveillance mechanism for monitoring America’s adversaries (and not only). It is an “operating system for war and intelligence,” providing agencies with a supercomputer that can see everything. But it’s the agencies themselves that feed this computer with data.

Even if the hack is a hoax or only partially true, such a sensational story benefits various parties. It tarnishes the reputations of both Palantir and the CIA. The company was already at odds with human rights activists globally. In Europe, particularly in Germany and Switzerland, there’s growing hesitation to purchase the software out of fear that sensitive data would end up with a US intelligence agency.

Russia and China – which, according to Dotcom, will receive the data – may capitalize on the story. Finally, Kim Dotcom is a longstanding enemy of the American justice system (he faces piracy charges in the US), so any story that casts a shadow on the US establishment is profitable for him.

The most valuable data concerns Palantir’s developments for Ukraine. Should any documentation concerning the development of nuclear or biological weapons fall into Moscow’s hands, it could provide invaluable insights into Kiev’s ability to create a ‘dirty nuclear bomb’ or biological agents.

This would eliminate uncertainties and allow for the formulation of preemptive protective measures. Furthermore, disclosing the source codes or AI architecture employed by Israel in Gaza and adapted for use by the Ukrainian army would enable the development of more effective electronic warfare systems capable of deceiving those very algorithms.

[…]

Via https://www.rt.com/news/632680-ai-overlords-of-world-hacked/

Saudi Arabia condemns Israel’s seizure of West Bank land

Israeli soldiers stand as military bulldozers demolish three Palestinian houses in Shuqba village, west of Ramallah, in the occupied West Bank on January 21, 2026. (Photo by AFP)

Press TV

Saudi Arabia has strongly condemned Israel’s recent decision to seize more land from Palestinians in the occupied West Bank, emphasizing that the move would plunge the region into instability. 

In a statement released on Monday, the Saudi Ministry of Foreign Affairs warned that the move would “undermine efforts to achieve peace and stability in the region.”

The Ministry emphasized that the Kingdom of Saudi Arabia condemns “the Israeli occupation authorities’ decision to rename the West Bank as ‘State Lands,’ affiliated with the occupation authorities, as part of plans aimed at imposing a new legal and administrative reality in the occupied West Bank.”

It reiterated that “Israel holds no sovereignty over the occupied Palestinian territories,” and such measures are a “serious violation of international law” that undermines the “two-state solution.”

Other regional countries, including Qatar, Egypt, and Jordan, have also described the move as illegal under international law and a threat to the “two-state solution.”

Israel recently approved a series of sweeping measures in the occupied West Bank, which Palestinians say constitute a blatant breach of the Oslo Accords and amount to a de facto annexation of Palestinian land.

The policy, announced by Israel’s extremist finance minister Bezalel Smotrich and minister of military affairs Israel Katz, significantly alters governance in the West Bank, opening the way for expanded settlements, land seizures and the erosion of Palestinian civil rights.

The measures lift longstanding legal restrictions on Israeli settlers, accelerate settlement expansion, and extend Israeli military and “civil” authority into areas that were previously under partial Palestinian control.

[…]

Via https://www.presstv.ir/Detail/2026/02/16/764184/Saudi-Arabia-West-Bank-Palestine-Israel