Le Nombre De Personnes Obeses Augmente En Armenie

LE NOMBRE DE PERSONNES OBESES AUGMENTE EN ARMENIE

ARMENIE

Une personne sur trois dans le monde, soit environ 30 pour cent de
la population mondiale souffre d’obesite selon l’endocrinologue du
Centre medical Erevan Bamine Bagramian.

Bamine Bagramian a souligne que le nombre de personnes ayant des
problèmes d’obesite et les maladies qui en decoulent augmentent en
Armenie. Il y a differentes raisons qui causent l’obesite, mais le
plus souvent il s’agit d’une alimentation incorrecte. Elle a conseille
de manger plus frequemment au cours de la journee avec de petites
portions de repas.

lundi 4 novembre 2013, Stephane ©armenews.com

Garibashvili Named as Next PM

Garibashvili Named as Next PM

Civil Georgia, Tbilisi / 2 Nov.’13 / 15:40

PM Bidzina Ivanishvili (left) and Interior Minister Irakli
Garibashvili (right) at a celebration of Police Day on May 19, 2013.
Interior Ministry photo

31-year-old Interior Minister, Irakli Garibashvili, has been named as
next Prime Minister of Georgia to replace Bidzina Ivanishvili, who
will step down this month.

Ivanishvili announced about the nomination of Garibashvili, who is his
long-time close associate, after a meeting with GD coalition
leadership and GD parliamentary majority members on November 2.

Before becoming the youngest cabinet member in PM Ivanishvili’s
government in October, 2012, Garibashvili spent his entire eight-year
working career (not counting one-year internship at the parliamentary
committee for foreign affairs) with entities affiliated with
Ivanishvili and his family.

He was head of the billionaire’s charitable foundation Cartu before
entering politics together with Ivanishvili in October, 2011.
Garibashvili studied international relations and law at the Tbilisi
State University, before graduating University of Paris-I,
Panthéon-Sorbonne.

It is not yet decided who will replace Garibashvili on the post of the
interior minister, Ivanishvili and Garibashvili said.

The sitting cabinet, according to the new constitution, has to resign
after the inauguration of president-elect Giorgi Margvelashvili on
November 17; the new PM and the cabinet has to be formally named by GD
parliamentary majority and nominated by the new president and then
approved by the Parliament.

New PM will have much more powers at the expense of cutting those of
the president, according to the new constitution, which will go into
force after the inauguration of president-elect Margvelashvili.

Praising Garibashvili as a `very practical’, `very honest’ person and
`good manager’, Ivanishvili said that prime ministerial nominee was
accepted by GD coalition leadership and then by the GD parliamentary
majority members `unanimously’ and `with ovations’. He said that
anyone within the team had an opportunity to voice `dissent opinion’,
but there was not any.

`I am very glad that the right choice has been made,’ Ivanishvili said
and hailed Garibashvili for, as he put it, `transforming police, which
had its trust within public completely lost’ into the `European-type
of police’.

`This man,’ Ivanishvili said pointing at Garibashvili, `managed to do
a miracle in one year… He proved that he deserves to be the Prime
Minister.’

Ivanishvili also said: `The Georgian society can be proud of the
government I am leaving behind.’

Garibashvili, who was standing next to Ivanishvili, said: `I promise
everyone – to the population, you [referring to Ivanishvili], to the
government and the [GD] coalition, that I will spare no efforts to
successfully continue what you [referring to Ivanishvili] have started
and to continue your policy.’

http://www.civil.ge/eng/article.php?id=26653

The Invisible Cyber War

THE INVISIBLE CYBER WAR

31.10.2013

Yiannos Charalambides
Doctor of International Relations and European Studies

Introduction

The international system is still dominated by sovereign nation states
which constitute the main structural actors of the global system.
However, nation states are not the only players acting in the global
landscape. Markets or multinational colossi, even terrorist
organisations such as Al Qaeda also operate in the international field
(Charalambides, 2013, pp.71-77; Katzman, 2005 pp.4-5, 7-8; Bjelopera,
2011 pp. 36-37) with the purpose of changing the structure of the
international system. In this respect, these international actors
pursue to replace the dominant role that states retain in the
international arena (Charalambides, 2013, pp. 71-75, 45-52).
Technology constitutes one of the main constituent elements of power
and therefore what remains to be examined is the role that technology
can play in the international system in terms of the power game that
is evolving. (Charalambides, 2010, pp. 34-35; Ifestos and Platias,
1992, pp. 83-84; Morgenthau, 1978pp. 9-14; Dougherty and Pfaltzgraff
1992, p 115).

This article deals with the importance of technology in the current
era and particularly in the context of a new type of war, namely cyber
war. This type of war is relevant to structural changes occurring in
the international system, with technology playing its own significant
role (Charalambides, 2013 pp. 12-13).

The present analysis refers to the various types of wars and attempts
to give a definition regarding cyber warfare and explain how it works
in practice. In this respect, we examine the way that cyber war
affects the evolution of the international system and the resultant
structural changes as well as the significance that cyber war plays in
the international arena along with technology. In this reality, a
relevant question which is raised and that we must answer is the
following: whether the classical structural components of strength
such as military power, territory and population size, the morale of
the army and leadership are enough for a victorious outcome or whether
technology itself and/or in combination with other means may bring
dramatic changes regarding the component structure of wars and the
structure of the international system (Charalambides, 2010 Dougherty
and Pfaltzgraff 1992, p. 168; Gilpin 1981). So far, Great Powers seem
to be invincible. However, two relevant questions must be answered:
whether this hypothesis is correct and whether technology could
increase the possibilities of restoring the old legend of David who
defeated Goliath.

1. Various types of wars

In the current period, the international system suffers from various
types of wars.

Firstly, classical wars in which the parties involved use conventional
or even nuclear military means. It is a war that erupts between two or
more states. Civil and/or religious wars -like the one ongoing in
Syria (CNN News, 2012; CNN News, 2012a; CNN News, 2012b) – are
included in the category of classical wars and usually induce such
structural changes within the states that affect international affairs
either in a regional or global level. Egypt constitutes an example
through which we can observe the consequences of an uprising which
brought about structural changes. Although Mubarak’s regime had been
constructed on a basis of deficient democracy, it succeeded to become
a stabilising factor in the regional and global system. Mubarak’s
regime worked hard to achieve the consolidation of stability and peace
with neighbouring Israel. When the regime fell, tensions erupted
across the border with Israel (CNN, 2011, Charalambides 2012, p. 6).
On June 24, 2012 the leader of the Muslim Brotherhood, Mohamed Morsi
was officially declared as the winner of the first free Egyptian
Presidential elections by a narrow margin over Ahmed Shafik. President
Morsi gained 51,7% of the vote, while Ahmed Shafik received 48, 2%
(CNN News, 2012c; BBC News, 2012). The political situation is volatile
and both the US and Israel are concerned about the political, social
and institutional role that the Muslim Brotherhood holds within the
new Egyptian political system. The question is whether the uprising of
the Egyptian people will lead to the establishment of a democratic
political system or whether the Muslim Brotherhood will attempt to
consolidate a political system, which would be based on and ruled by
Islamic Law. Egypt is suffering political instability and runs the
risk of a civil and religious war. Hence, the situation in Egypt
induced structural changes within the state and affected the stability
of the regional system.

Secondly, war on terrorism constitutes a sui generis type of war
between states and terrorist organisations such as Al Qaeda, whose
main aim is to alter the current structure of the international system
(Bin Laden, 2005; Almasmari, Jamjoom and Abedine, 2012).
Simultaneously, we are witnessing a perpetual conflict between two
types of Globalisation; Western and Islamist. Regarding the latter
there is no doubt that it aims at establishing a Global Caliphate
(Elsea, 2007, pp. 10-15; Lecker 2008, pp. 251-253). The mentioned
ongoing conflict also takes the form of a religious war.

Thirdly, war among states and markets led to the current economic
crisis. The markets attempt to play a dominant role in the
international system and are not invisible. Therefore a relevant
question should be asked: what is the market? A short definition
answering this question could be set as follows: it is a legal and
economic process through which the rules of supply and demand come
together to define and determine the market prices. The market is not
an abstract set of factors and actors functioning in the international
system. On the contrary, it is a vibrant organisation acting in the
international system and it is comprised of:

All types of companies, (small, medium, large) enterprises and any
other entities engaged in any commercial, economic or financial
activity as well as the individuals who lead and manage companies and
industries; namely owners, shareholders, managers and directors.
Productive powers (forces), which is the combination of means of
production and labour (tools, machinery, land and infrastructure), as
well as the human labour power (Marx 1955).
Capital and money are instruments used by entrepreneurs in order to
generate profit, wealth and growth. However, they are also used by
employees (civilians) and labour forces in general, as income (i.e.
salary, interest income, dividends etc), in order to cover their
consuming needs.
The banking sector, national, private and international banking
institutions and bankers that play a key role in local and global
financial affairs.
The Stock Exchange and stockbrokers.
International organisations, banks and groups of powerful countries
regulating political and economic affairs such as the G-20, the
International Monetary Fund, the Global Bank For Reconstruction And
Development, as well as the World Trade Organisation (WTO).
All persons who are directly or indirectly involved in the market,
such as lawyers, bankers, accountants, politicians, workers (labour
force) and consumers, trade and labour unions and their members,
politicians and political parties, ministers and governments. Most
often – political parties, politicians and governments – are
financially sponsored by the business world or civilians -namely
bankers, businessmen or ordinary voters.
Energy – Power providers and all the factors that the power supply
chain consists of. Both states and/or individuals provide conventional
or renewable sources of energy, engineers and equipment so that energy
arrives at the end-user destination (industrial units, households) and
thereby the brokers define the exchange price of energy goods.
Research centres, universities and other forms of innovation
providers, who can create new commodities or new ways of developing
and thus enhancing, the quality of the products.
Central Governments which are obliged to provide security and
stability to all entities performing economic and other activities in
the context of the state’s apparatus.
International and local financial and commercial laws and other
regulators through which we can measure and evaluate the level of
compliance between rules, laws, directives and regulations on the one
hand and the level of actual implementation on the other.
`Credit Rating Agencies’ which are authorised to evaluate and thus
upgrade or downgrade private banks and the banking sector in general.
In fact, they hold a key regulatory role in the global financial and
political system (Standard & Poor’s, Moody’s and Fitch Ratings). The
`Credit Rating Agencies’ are used by investors, issuers, investment
banks, broker-dealers and governments for security reasons in terms of
protecting their financial interests and thus reducing the risk of
their investment. In this respect, the `Credit Rating Agencies’ draw
up reports in which the credit risk is analyzed with the aim of
protecting the investors and increasing the efficiency of the market.
Due to the current economic crisis both the US and the EU (including
its Member States) put in question the credibility of the `Credit
Rating Agencies’. Markets constitute vibrant organisations where human
beings play, operate, act and react and thereby psychology is always
turned into a political and economic instrument which might be used by
the `Credit Rating Agencies’ to influence markets in favouring
`suspicious interests’. The time and the way a report is drawn up,
often set forth the economic and political situation of a state, its
banking sector, financial status and its sovereign debt, affect either
negatively or positively the market and the economy of state in
question, as well as the markets in general.
Currency value and exchange rates as decisive instruments of the
market and for financial transactions.

2. Definition of Cyber war

Beyond the types of wars mentioned above, another type of war is also
noteworthy. It is the cyber war, which is inherent to technological
development and is always used in the context of a wide range of wars.
The actors involved in such a war use high level technologies. Cyber
war is part of the wider electronic war and its technological
capabilities are exploited as indispensable instruments for the
victorious outcome of a classical, conventional or any other kind of
conflict. In attempting to define what `cyber warfare’ is, the U.S.
government security expert, Richard A. Clarke maintains:

`When the terms of `Cyber war’ are used in this book, they refer to
actions by a nation-state to penetrate another nation’s computers or
networks for the purposes of causing damage or disruption’ (Clarke
2010, p. 6).

In addition, the Economist wrote that cyberspace constitutes `the
fifth domain of warfare’ (in addition to land, sea, air and space)
(Economist 2010) and William J. Lynn, U.S. Deputy Secretary of
Defense, underlines that “as a doctrinal matter, the Pentagon has
formally recognized cyberspace as a new domain in warfare. . . [which]
has become just as critical to military operations as land, sea, air,
and space’ (Lynn 2010, p.97-98).

These are some short definitions of cyber war. However, one could
assert that cyber war cannot be precisely defined. Pursuant to a study
requested by the Subcommittee on Security and Defence and issued by
the European Parliament:

`There is no common definition of what might constitute `cyber
warfare’. The 2007 attacks on Estonia, the 2008 attacks on Georgia,
the deployment of Stunxet, or the ongoing high level cyber-espionage
were all called cyber war at some point. Even cyber attacks that most
likely have nothing to do with conflicts between states, such as
`hacktivism’, or cyber attacks in the wake of the 2010 WikiLeaks
affair, or in support of the February – March 2011 Arab revolts have
been called cyber war, implying in effect that the concept of warfare
is not limited anymore to mere nation – states. In the absence of a
common definition, most of the EU Member States and the Commission
have studiously avoided using the term cyber warfare in official
documents and often prefer neutral such as `cyber espionage’, `cyber
attack’ or `cyber defence” (European Parliament, 2012, p. 9) .

2.1 Various levels of cyber war

According to the so-called AF-SAB model there are three levels of
military cyber attacks:

The First Level of military cyber attacks is the `network wars’ or
“system administrator versus system administrator’. This includes
mobile malicious logic, Trojan attacks, basic phishing attempts,
common exploits, website defacement and other common headaches falling
within this category’. This category of attacks is the least serious,
including `purported state-sponsored espionage attacks on the
government such as the `Moonlight Maze’ and `Titan Rain’ campaign’.
These attacks can be addressed by proper network security precautions’
(European Parliament, 2012, p. 7). `Titan Rain’ was a sophisticated
and cyber espionage attack which `began in 2003 against the US and led
to the wide-scale breach of classified US government and military
systems, with loss of 10-12 terabytes of information’ (European
Parliament, 2012, p.52). This attack and others had been organised and
performed by non-state Chinese hackers. Over a four year period, they
launched similar attacks on government systems and EU member states
and EU institutions. Albeit the attackers were not directly associated
with the Chinese State, they probably cooperated with the Chinese
Security Service as they were under an official command also having
connections with high level political leadership.

The Second Level cyber attacks fall under `cyber – adjunct to kinetic
combat’. The operator attempts to achieve a `kinetic effect’ in
conjunction to a conventional attack, such as an air strike.
Therefore, the operator uses malicious logic to defuse an air defence
network. This example exemplifies level 2 cyber attacks (European
Parliament, 2012, pp. 7-8). The 2008 cyber attacks on Georgia also
fall under this category. These attacks had been combined with
military conventional operations and therefore had a kinetic effect.
During the war on Georgia, the Russians defaced websites whilst they
also launched attacks on critical energy infrastructures. Another
relevant case of Level 2 cyber war practice was the one between Syria
and Israel in 2007, when the Israelis used the American cyber-weapon,
named `Senior Suter’, in order to defuse the Syrian Antiaircraft
Network and successfully launched their airstrikes against Syria and
precisely hit supposed nuclear facilities on the ground.

The last and Third Level is `malicious manipulation’, which
specialists consider as the most dangerous attacks. These attacks:
`are the ones to be feared, they are covert, they are planned, they
are orchestrated and they can use widespread havoc and disruption
without the victims realizing their problems are cyber related’.

According to a study issued by the services of the European
Parliament, `Level 3 attacks also conceal a wide range of possible
behaviour – this can include the simple manipulation of a spreadsheet,
to Stuxnet and similar purported limited attacks on critical
infrastructure, to mass -casualty attacks on an entire nation’s
critical infrastructure or even the misrouting of the internet itself’
(European Parliament 2012, p. 8).

It is of utmost importance to underline that with a reference to
`Stuxnet’ we mean a `cyber missile’ which had been `directed squarely
at the Iranian nuclear program by targeting its uranium enrichment
capability’ (European Parliament p. 52, The Economist, 2010). As the
report of the European Parliament maintains: `There has been clear
evidence that Stuxnet was successful in damaging and delaying the
Iranian enrichment program'(European Parliament, 2012, p. 52, Farwell
and Rohozinski 2011, pp. 23-40). This attack was not the first one
which used the invisible `weapon’ of high technology. As Thomas Reed
underlines, an advisor to President Ronald Reagan alleged that the CIA
used a logistic bomb in 1982 to destroy a Soviet pipeline and he adds:

`It was programmed to go haywire, to reset pump speeds and valve
settings to produce pressures far beyond those acceptable to the
pipeline joints and welds. The result was the most monumental
non-nuclear explosion and fire ever seen from space’ (Reed, 2004, p.
269).

2.2 American superiority

It is evident why the US is considered the champion state in
cyber-warfare and cyber-defence. Beyond the cases mentioned above, in
1991, during the First Iraqi War, the US impressed the international
community with its advanced skills of cyber-war. Years later, in 2010,
NATO – led by US – was the first organisation that realised the
necessity to address the `new threats’ stemming from cyber-attacks.
This necessity became more obvious after the 2007 attack on Estonia,
which entailed web – vandalism. In particular, over a three week
period the attackers caused disruption to Estonian public services and
banking sector. The attackers were probably Russian hackers and the
attack was a strong shock for the international community. It was an
episode that alarmed relevant stakeholders and led NATO to rethink and
take pertinent decisions regarding its defensive strategic concept. At
the Lisbon Summit in November 2010, NATO established the Cyber Defence
Management Authority (CDMA), with the competence to coordinate and
shape strategic decision-making on cyber-defence within the Alliance
(European Parliament, 2012, p. 26, NATO 2010a). However, China and
Russia are also involved in all levels of cyber-war, as they have no
other alternative than to respond to the requirements of the
contemporary era, in order to serve and protect their national
interests by undertaking all kinds of preventive measures. In fact
they not only defend themselves, but also follow an aggressive policy.
In this respect, one should view cyber-attacks through the lens of
political practices. Hereupon, we may underline that quantitative
analysis of cyber-war cannot be focused exclusively on the three
aforementioned levels, but also on the civilian, commercial, economic,
administrative, banking or military sectors which the cyber-attacks
usually target. In this respect, such a cyber trade-economic war is
currently underway between China and the US. Pursuant to a
congressional report titled `China-US Trade Issues’, Wayne M. Morrison
maintains:

“Many U.S. analysts and policymakers contend that the Chinese
government is a major source of cyber-economic espionage against U.S.
firms. For example, Representative Mike Rogers, chairman of the House
Permanent Select Committee on Intelligence, stated at an October 4,
2011, hearing that attributing this espionage isn’t easy, but talk to
any private sector cyber analyst, and they will tell you there is
little doubt that this is a massive campaign being conducted by the
Chinese government. I don’t believe that there is a precedent in
history for such a massive and sustained intelligence effort by a
government to blatantly steal commercial data and intellectual
property. China’s economic espionage has reached an intolerable level
and I believe that the United States and our allies in Europe and Asia
have an obligation to confront Beijing and demand that they put a stop
to this piracy’.

According to a report by the U.S. Office of the Director of National
Intelligence (DNI): `Chinese actors are the world’s most active and
persistent perpetrators of economic espionage. U.S. private sector
firms and cyber security specialists have reported an onslaught of
computer network intrusions that have originated in China, but the IC
(Intelligence Community) cannot confirm who was responsible.’ The
report goes on to warn that `China will continue to be driven by its
longstanding policy of ‘catching up fast and surpassing’ Western
powers. The growing interrelationships between Chinese and U.S
companies – such as the employment of Chinese-national technical
experts at U.S. facilities and outsourcing U.S. production and R&D to
facilities in China – will offer Chinese government agencies and
businesses increasing opportunities to collect sensitive US economic
information’ (Morrison 2012, p. 33).

2.3 China, Russia and hackers’ army

China and Russia hold a privileged position in the list of the main
global cyber powers, with a huge army of hackers operating
particularly against US interests. Most of the hackers have no
official relations with the Chinese or Russian governments. However it
is a commonly known `secret’ that the Chinese government has tacitly
approved the hackers’ attacks. The Chinese concept on Cyber-warfare,
titled `Integrated Network Electronic Warfare’, is similar to the US
Network Electronic Warfare. In this context civilian sources (People’s
of war) are mobilised in order to attempt operating at a strategic
level of conflict, namely `information warfare’. This information
warfare is divided in three categories: Media warfare, Psychological
warfare and Legal warfare (European Parliament, p. 55). The Chinese
have a very strong system of defensive and offensive capabilities,
whilst there is a real army, the `Patriot Hackers’ which are
responsible for the attacks against western governments and interests.
The `Red Hacker Alliance’ is the largest club of attackers, numbering
400,000 members. The Pentagon had to take special measures in order to
prevent their attacks (European Parliament, 2012, p. 57).

Along the same lines, Russia is concentrated on the means and measures
that it should take in order to protect its civil society,
military/governmental infrastructures and apparatus from US hackers.
In terms of `soft and smart power’ the US pursues to influence the
Russian public opinion and furthermore the decision making process
(Nye, 1991; Nye 2004, pp. 2, 34-35, 44-45; 2006; Crocker et al, 2007,
p.13; Etheridge, 2009). This is a strategy named `reflexive control’.
In accordance with this concept `one enemy transmits the reasons and
bases for making decisions to the other’ (Thomas 2004). This is a
strategic method through which the US influences certain public
opinions that are under the pressure of authoritarian regimes, and
pushes them to revolt. Iran and the Arab Spring constitute evident
cases of this strategic method used by the US cyber-war services. All
relevant information, reasons and data which can influence the
procedure of the decisions taken by repressed public opinions are
promoted through the cyberspace. Certainly, the result of this method,
inherent to a `smart power’ strategic concept, is not always positive.
Beyond the influence that the US may exert over foreign public
opinions, there are other factors acting in a society and within an
authoritarian political system. These factors affect the procedure of
the decision making. Such a strategic goal becomes easier when the
foreign public opinion is ready to adopt a propaganda promoted through
the internet. The success or failure of this policy also depends on
the skills of the intelligence services of the state being under the
US attack. The key issue is whether they successfully react against
such a `cyber war game’. Therefore, the Russian information doctrine
focuses on protecting the public opinion and the Russian `spiritual
renewal’ by establishing segments of `information psychological’ and
`information technical means’ (Bikkenin, 2003).

3. A landmark case

The `WikiLeaks case’, widely known as `Cablegate’ – the publication of
thousands of top secret US documents – shows the electronically
sophisticated character of the new era; an era where technology
constitutes a primary instrument for the secret services and for any
other skilled person or organisation. The publication of numerous top
secret documents (251,287 diplomatic cables) shed light on dimming
aspects of secret diplomacy and illustrated how diplomats comment and
evaluate each other behind the scenes (WikiLeaks 2012). On August 20,
2010, the Swedish prosecutor issued an arrest warrant against the
founder of WikiLeaks, Julian Assange amid two accusations. One
concerns the allegation of rape and the other of molestation. Assange
denied the charges arguing that he was a victim of a smear campaign.
The Swedish Authority requested his extradition from Britain where
Assange found shelter in the embassy of Ecuador. Assange applied for
asylum and the Ecuadorian Authorities on August 16, 2012 took a
positive decision triggering a diplomatic episode with Britain. The
Foreign Minister of Ecuador stated that his country granted asylum to
Assange `because he will be politically persecuted if extradited’
(Lai, 2012). The British government was clear about its intention of
arresting and extraditing him to Sweden. Assange feared he would be
sent by the Swedish Authorities to the US where he might face the
death penalty. The US Authorities accused him of publishing top secret
cables (official US documents), putting the country’s security at
risk. On August 14, 2012, in an effort to explain the upcoming
positive decision – which would be issued two days later – the
Ecuadorian President Rafael Correa stated:

`The process in Sweden needs to be reviewed, you have to consider the
possibility of extradition to the United States, if there’s a secret
tribunal there, if there’s any risk of a death penalty. It requires a
large amount of information, an analysis of international law to make
an informed, absolutely responsible and sovereign decision’ (Correa,
2012, cited in CNN Wire Staff 2012).

`WikiLeaks’ cast a shadow on the US security system and humiliated the
American secret services. It is in fact a landmark case which
illustrates both the importance that technology plays in international
affairs and the new types of wars which noiselessly occur not only
among states, but also between states and non-state actors. In this
case we observe the way technology pulverises the gap of strength
existing between a Great Power and a private organisation of
electronic media.

Conclusions

Technology constitutes a structural component factor of strength used
by states in order to serve their national interests in the context of
a trade/economic cyber war, like those underway between the US and
China or the US and Russia, without excluding that other countries
will also get involved. This is a conflict among the Titans of the
international system with the US playing the role of Zeus.
Furthermore, technology and cyber war are also used in the frame of
conventional wars and the war on terror. In fact, it is a combination
of an economic/commercial and cyber war upon which the new era is
reflected. It illustrates how complicated international relations are
in the contemporary period. It is evident that there are “two or three
types of wars”, one existing within the other, without the need to use
the traditional, classical military means. Particularly, the Army uses
cyber mechanisms as an indispensable tool for espionage purposes in
the frame of a wider strategic plan with the aim of promoting and
protecting national interests. In parallel, the tools and weapons of
cyber war are also used in conventional wars. Advanced technology is
always of outmost importance for the international actors in order to
win a victory.

The international system is already in a new era in which structural
changes occur and power coexists with technological development and
capacities. An invisible cyber war, among Great Powers, such as the
US, Russia and China is underway. Certainly, other countries, apart
from Great Powers, are already involved in a cyber war for which new
types of armies have been formed. Hackers now play the role of `modern
soldiers’, thus evincing the eminent importance that technology holds
as an indispensable factor of national strength (Dougherty and
Pfaltzgraff 1992, p. 116). In this reality, the structure and methods
of wars tend to change along with the structure of the international
system where the state still holds its dominant role. However, markets
and terrorist organisations such as Al Qaeda spare no efforts to
replace the states’ dominant position. Through the lens of the
`WikeLeaks case’ we observe a new political phenomenon stemming from
technology and reflecting the growing significance of technology and
the changes occurring in the international system where an electronic
media non-governmental organisation got involved in a cyber war with
the US. The US defeat until this moment is obvious. This incident
brings to mind the well known story of David and Goliath. And thus
history repeats itself by using other means. At that time, it was the
sling and stones, nowadays it is technology.

May, 2013

REFERENCES

Almasmari, H, Jamjoom M and Abedine S (2012) Yemen: Al Qaeda affiliate
behind blast that killed 101 soldiers. CNN. May 22. Available from:

BBC News (2012) Muslim Brotherhood’s Morsi declared Egypt president,
June 24. Available from:
Bjelopera, P. J. (2011) American Jihadist Terrorism: Combating a
Complex Threat.Congressional Research Service. November 15. Available
from:
Bin Laden, O. (2005) Interview Message to the World, Verso, October 21, 2001.
Blanchard, C. (2007) `Al Qaeda: Statements and Evolving Ideology’. CRS
Report for Congress. July 9. Available
from:
Centre for Defence Information. Operation “Enduring Freedom”.
Washington. Available
from:
CNN News (2012) Breaking News. The speech that President Assad
addresses the Syrian Parliament. 3 June.
CNN News (2012a) Kofi Annan resigns as envoy to Syria. Available from:

CNN News (2012b) A reportage on the TV (CNN International) which
transmitted the message sent by the Syrian rebels of the `Syrian
Liberate Army’. The rebels called upon Turkey to military intervene
CNN News (2012c) Muslim Brotherhood’s Morsi declared Egypt’s new
president. June 24. Available
from:
Correa, R. (2012) Cited in CNN wire staff. Ecuador: Decision on
WikiLeaks founder’s asylum request coming. August 14. Available
form:
Charalambides, Y. (2011) Cyprus Issue: Diplomatic Plots, top secret
documents and testimonies from 1950 to 2010, Strategic deficits and
options. Athens: Piotita.
Charalambides, Y. (2013) The Third World War, Global Titans and Sworn
Soldiers. ERPIC, Nicosia.
Clarke, R A. (2010) Cyber War. The Next Threat to National Security
and What to Do About. As imprint of HarperCollins Publishers.
Crocker, A., Hampson, O. and Aall P. (2007) Leashing the Dogs of War:
Conflict Management in a Divided World. US Institute of Peace Press.
Dougherty, J. and Pfaltzgraff R. (1992) Contending Theories of
International Relations: A Comprehensive Survey. Athens: Papazisis
Publications, vol. 1.
Economist (2010) `Cyberwar: War in the Fifth Domain’. 1 July.
Available From:
European Parliament (2012) External Representation of the Euro Area.
Directorate General for International Policies Policy A: Economic and
Scientific Policy. A Study issued from the European Parliament.
Authors: Alessandro Giovannini,
Daniel Gros, Paul Ivan, Piotr Maciej Kacznski, Iego Valiante.
Available from:
Elsea, Jeniffer K. (2007) Treatment of `Battlefield Detainees’ in the
War on Terrorism.Updated January 23, 2007. CRA Report for Congress,
order code RL 31367. Available from:

Etheridge, E. (2009) How ‘Soft Power’ Got ‘Smart’. The New York Times.
January 14. Available
from:
Farwell, J and Rohozinski R (2011). `Stunxnet and the Future of Cyber
War’. Survival, Vol. 53(1), 2011.
Gilpin, R. (1981) War and Change in World Politics, Cambridge
University Press, New York.
Ifestos, P. and Platias A., (1992) Greek Preventive Strategy.
Published by Papazisis, Athens.
Karl, M. (1955) The Poverty of Philosophy. Answer to the Philosophy of
Poverty by M. Proudhon. Progress Publishers. First Publication in
Paris and Brussels 1847. Available from:

Katzman, K. (2005) Al Qaeda: Profile and Threat Assessment. – CRS
Report for Congress. Received through the CRS Web. August 17.
Available from: ()
Lai, A. (2012) Timeline: Julian Assange’s extradition battle. CNN.
August 16. Available
from:
Lecker, M. (2008) “The `Constitution of Medina’: Muhammad’s First
Legal Document”.Journal of Islamic Studies 19 (2): 251-253,
DOI:10.1093/jis/etn021. Available from:

Lynn, W. J. III (2010) `Defending a New Domain: The Pentagon’s
Cyberstrategy’. Foreign Affairs, Sept/Oct. 2010.
Morgenthau, H. (1978) Politics among Nations: The Struggle for Power
and Peace. New York: Knopf.
Morisson, M. W. (2012) China-U.S. Trade Issues China-U.S. Trade
Issues. Congressional Research Service. May 21. Available
from:
NATO (2011) Defending against cyber attacks. NATO Homepage. Available
from:
Nye, J. (1991) Bound to Lead: The Changing Nature of American Power.
US: Basic Books
Nye, J. (2004) Soft Power: The Means to Success to World Politics,
U.S: Public Affairs
Nye, J. (2006) In Mideast, the Goal is “Smart Power”. Boston Globe.
August 19. Available
from:
Reed, T. (2004) At the Abyss: An Insider’s History of the Cold War.
New York, Press.
Tomas, T. (2004) `Comparing US, Russia and Chinese Information
Cooperation Concepts’. Foreign Military Studies Office, February.
Available from:

The Economist, (2010) A cyber-missile aimed at Iran? 24 September.
Available from:
worm.
Wikileaks (2012) Secret US Embassy Cables. Available from:

“21st CENTURY”, N 1, 2013

http://www.noravank.am/eng/articles/detail.php?ELEMENT_ID=12390
http://articles.cnn.com/2012-05-22/middleeast/world_meast_yemen-violence_1_al-qaeda-al-sharia-president-saleh?_s=PM:MIDDLEEAST
http://www.bbc.co.uk/news/world-18571580
http://www.fas.org/sgp/crs/terror/R41416.pdf
http://www.fas.org/sgp/crs/terror/RL32759.pdf
http://www.cdi.org/program/issue/index.cfm?ProgramID=39&issueid=48
http://security.blogs.cnn.com/2012/08/02/kofi-annan-resigns-as-envoy-to-syria/
http://edition.cnn.com/2012/06/24/world/africa/egypt-politics/index.html?hpt=hp_t1
http://www.cnn.com/2012/08/14/world/americas/ecuador-assange/index.html
http://www.economist.com/node/16478792
http://www.europarl.europa.eu/studies
http://www.fas.org/sgp/crs/terror/RL31367.pdf
http://opinionator.blogs.nytimes.com/2009/01/14/how-soft-power-got-smart/
http://www.marxists.org/archive/marx/works/download/pdf/Poverty-Philosophy.pdf
http://www.fas.org/sgp/crs/terror/RL33038.pdf
http://www.cnn.com/2012/08/16/world/europe/assange-extradition-timeline/index.html?iid=article_sidebar
http://jis.oxfordjournals.org/content/19/2/251
http://www.fas.org/sgp/crs/row/RL33536.pdf
http://www.nato.int/cps/en/natolive/topics_49193.htm
http://www.boston.com/news/globe/editorial_opinion/oped/articles/2006/08/19/in_mideast_the_goal_is_smart_power/
http://www.dodccrp.org/events/2004_CCTS/CD/papers/064.pdf.
http://www.economist.com/blogs/babbage/2010/09/stuxnet
http://wikileaks.org/cablegate.html#

State funded system in medical sphere does not work – opposition MP

State funded system in medical sphere does not work – opposition MP

14:20 / 01.11.2013

NA’s Healthcare, Maternity and Childhood Affairs and Budget Affairs
Standing Committees discussed today at the NA the healthcare issues.

Speaking at the sitting Healthcare minister Derenik Dumanyan presented
the 2014 state budget allocations and programs and stated that the
system reforms will continue addressed toward increase of system’s
efficiency as well as more effective usage of means. The minister said
as compared with the previous year additional 10 million drams will be
allocated for directing them to provinces.

MP from the opposition Armenian National Congress party Lyudmila
Sargsyan described the minister’s speech as very `nice’ but said she
has a lot of facts that the state funded system is not working in the
system. `When people apply for state-funded system they are being
rejected being explained that the budget means are exhausted,’ she
said.

Nyut.am

Présentation du musée de tapis qui se tiendra à Chouchi au Karabagh

KARABAGH
Présentation du musée de tapis qui se tiendra à Chouchi au Karabagh

Une présentation du Musée des Tapis a eu lieu au Centre des Arts de la
deuxième plus grande ville de la République du Haut-Karabagh (NKR),
Chouchi.

Le musée a été initiée par Vardan Astsatryan qui est maintenant
conseiller au président de la République du Haut Karabagh.

La collection du musée comprendra quelque 250 tapis créés par des
tisseurs de l’Artsakh dans la période du 17 au 19ème siècle.

Le but du musée est de préserver les tapis traditionnels de l’Artsakh
et de s’opposer à la politique azérie d’appropriation de la culture
arménienne.

Le Centre des Arts de Chouchi a été fondée en 2012 par le philanthrope
de Moscou Karo Sarkissian.

Le musée est soutenu par le ministère de la culture du Karabagh.

dimanche 3 novembre 2013,
Stéphane ©armenews.com

Vartkes Yeghiayan médaillé par le Pape

Honneur
Vartkes Yeghiayan médaillé par le Pape

Le célèbre avocat de Glendale, Cal, USA, a récemment été honoré par
l’unique médaille papale (Cavaleri) des mains de Mgr Raphaêl Minassian
du diocèse d’Erevan.

La médaille avait été décernée par le Pape Benoît XVI en
reconnaissance pour le travail et les efforts accomplis par Vartkes
Yeghiayan à obtenir une indemnisation pour les descendants des
victimes du génocide arménien.

Vartkes Yeghiayan est un avocat arméno-américain spécialisé en droit
international, connu pour le lancement de plusieurs actions en justice
contre des compagnies d’assurance, dont la New York Life dans une
affaire qui a duré quatre ans. En Janvier 2004, le New York Life a
accepté de régler le différent en payant 20 millions de dollars aux
plaignants. Depuis Yeghiayan, avec ses confrères Mark Geragos et Brian
Kabateck, ont intenté des poursuites contre d’autres compagnies
d’assurance, dont AXA , qui a accepté de régler en 2005 17,5 millions
de dollars.

dimanche 3 novembre 2013,
Jean Eckian ©armenews.com
‘442

http://www.armenews.com/article.php3?id_article

Armenia: The Ideology Of Integration

ARMENIA: THE IDEOLOGY OF INTEGRATION

Vestnik Kavkaza, Russia
Nov 1 2013

1 November 2013 – 11:38am

David Stepanyan, Yerevan. Exclusively to Vestnik Kavkaza

Yerevan hosted the international conference of the CSTO: the CSTO and
Security of Eurasia. The coordinator of the CSTO Analysis Association
which includes 25 information analysis and sociological structures,
Igor Panarin, says that the association pays serious attention to the
ideological content of the CSTO activity. The U.S., the UK, and other
allies in NATO spend huge resources on propaganda of their ideology,
including on the territory of the CIS. And the problem of similar
instruments becomes a priority for the CSTO. Panarin states that
young people from countries which are members of the organization will
be annually gathered and informed of the problems and challenges in
the security sphere, which the CSTO faces. The first forum will take
place in Yekaterinburg in early 2014. This year Russian analysts will
travel to Yerevan to hold several meetings with students of leading
Armenian universities. Therefore, according to Panarin, along with
providing security and defense of the members, the CSTO intends to
improve the ideological component of its work seriously.

The chairman of the social organization Integration and Development,
Aram Safaryan, says that 82% of the Armenian population think that
the main ally and friend of the republic is Russia, believing that
the main guarantor of their security is the CSTO. In October a public
opinion poll was conducted to detect the preferences of the Armenians
toward Russia and the European Union. 67% of Armenians think that
cooperation with Russia is priority. The results dispelled myths
spread by organizations sponsored by the West about “pro-European
attitudes of the Armenians.” The expert states that the Armenians
see benefits in integration with Russia in key segments of economy.

According to him, discussions over the Customs Union will take
opening of the Abkhaz railway to a higher level. “We have to achieve a
serious economic growth in the nearest future, and Russia, Belarus,
and Kazakhstan are our only market which enables doing this,”
Safaryan thinks.

According to preliminary calculations of Russian and Armenian experts
who conducted a survey on reasonability of joining the CU in Armenia,
membership in the group will give 4-4.5% growth of GDP annually.

According to official statistics, 220 thousand labour migrants
transferred from Russia to Armenia $1.45 billion which surpass the
whole Armenian export. And after signing the agreement on the common
economic space, Moscow will elicit quotas and licenses for Armenian
labour migrants.

The head of the Noravank Fund, Gagik Arutyunyan, thinks that socialist
ideology in integration processes in Eurasia should be implemented. He
says that Armenia tries to forget its socialist past, forgetting about
all advantages of the USSR. At the same time, China successfully use
the formula which combines socialism, liberalism, and conservatism.

http://vestnikkavkaza.net/articles/politics/47096.html

AYF Meets With IFM-SEI And YES Leaderships

AYF MEETS WITH IFM-SEI AND YES LEADERSHIPS

October 18, 2013

On October 14, representatives from AYFEurope chapters met with the
leaderships of theInternational Falcon Movement-Socialist Educational
International(IFM-SEI) and the Young European Socialists (YES),
at the latter’s premises in Brussels, Belgium.

AYF is a member of the above mentioned organizations.

The discussion with the IFM-SEI leadership went around the possibility
of upgrading the AYF membership status and the cooperation of the
two organizations in various activities. The AYF delegation expressed
its readiness to host one of the future IFM-SEI meetings in Yerevan,
Armenia.

Moreover the sides discussed about how children from Artsakh
(Mountainous Karabakh) could take part in Falcon’s annual summer
camps. This could serve as a fine opportunity for Artsakh’s children
to travel, meet new people, and speak about the history, culture and
people of Artsakh.

Both delegations agreed to keep working on the issues touched in the
meeting and to fortify their cooperation.

AYF is IFM’s largest partner in the wider region.

Later on the same day, the AYF delegation met with the leadership
of the Young European Socialists. The topics of the discussion were
the deepening of the bilateral relations and the upgrading of AYF
membership status. Again, the AYF delegation expressed its readiness
to host one of the YES meetings in Yerevan, Armenia.

The YES representatives expressed their wish for the AYF to be more
active in the activities of the organization considering that the
AYF has a socialist direction and advocates for democratic values.

In both meetings, the AYF delegation passed over a folder with
information about the organization as well as booklets about the
Armenian Genocide and issues related to Artsakh.

The atmosphere in both meetings was cordial.

ARF Youth Office

http://www.arfd.info/2013/10/18/ayf-meets-with-ifm-sei-and-yes-leaderships/

Armenian MPs Comment On Readmission Agreement

ARMENIAN MPS COMMENT ON READMISSION AGREEMENT

20:07 ~U 01.11.13

The Agreement on Readmission, which was discussed along with the
Visa Facilitation Agreement, caused panic in the Armenian Diaspora,
among Armenian national illegally staying abroad.

Naira Zohrabyan, Chairwoman of the Standing Committee on European
Integration, Parliament of Armenia, received calls from Armenian
national staying in France and Belgium.

“Armenian nationals illegally staying abroad misperceive the Agreement
on Readmission. They think that they will be deported after the
agreement has been ratified. I believe that we have to raise public
awareness of the Visa Facilitation Agreement as well,” Zohrabyan said.

The Standing Committee on European Integration and the Standing
Committee on Foreign Relations plan to hold hearings on the Armenia-EU
relations.

Tevan Poghosyan of the Heritage parliamentary group told Tert.am
that Armenia has had readmission agreements with 13 European states,
and only 32 people have been deported to Armenia.

“Secondly, even if they want to deport Armenians, it will not be done
under the Agreement on Readmission. Laws allow the authorities to
deport Armenian nationals without any problems, while the Agreement
on Readmission will regulate the process,” Poghosyan said.

Armenian News – Tert.am

Darchinyan Ready For Donaire: I Will Come And Demolish Him, I Am Com

DARCHINYAN READY FOR DONAIRE: I WILL COME AND DEMOLISH HIM, I AM COMING TO DESTROY HIM

18:43, 1 November, 2013

YEREVAN, NOVEMBER 1, ARMENPRESS. Former world champion Vic “The Raging
Bull” Darchinyan (39-5-1, 28 KOs) of Armenia is eager and ready for
his rematch against former world champion Nonito “Filipino Flash”
Donaire (31-2, 20 KOs). Darchinyan will get his shot at redemption
when he takes on Donaire next Saturday November 9 the American Bank
Center in Corpus Christy, Texas as part of a big HBO Boxing After
Dark tripleheader.

“This is an important fight for me. I am training well. I will be
in the best shape,” Darchinyan promised when Fightnews.com caught
up with him at the Glendale Fight Club in Glendale, California,
Armenpress reports. The 2000 Armenian Olympian turned pro shortly
after the Olympics and launched his pro career in Australia.

He has been training in Glendale for the last two months. “Everything
is good, I am very happy with my training. We have 9 more days. This
is the moment,” Darchinyan said about his training camp.

He has been sparring with 2012 Mexican Olympian Oscar Valdez in
preparation for Donaire. “Sparring with that kid Oscar is very similar
to Donaire. I think he is faster than Donaire,” Darchinyan said.

It was six years ago, when then undefeated Vic Darchinyan was
defending his IBF flyweight title for a seventh time against a
young and inexperienced challenger in Nonito Donaire. However a
monster left hook by Donaire to the jaw of Darchinyan floored him,
resulting in a fifth round knockout which received “Knockout” and
“Upset of the Year” honors.

“I didn’t know who he was six years ago,” said Darchinyan. “I made
him. No one ever heard of him. He was the number eight or nine
contender. Everyone knows if he didn’t get me with the left hook,
I would knock him out. I was coming out for a big punch. Everyone
thinks he is a big deal.”

Since the loss to Donaire, the “Raging Bull” moved up in weight then
went on to win another world title one year later when he knocked
out Dmitry Krilov for the IBF super flyweight title and three months
later became the unified super flyweight champion when he scored
another brutal knockout over Cristian Mijares winning the WBA & WBC
super flyweight titles. After conquering the super flyweight division
Darchinyan then moved up to participate in the Showtime Bantamweight
tournament in which he lost a close decision at the hands of Abner
Mares and then scored a technical decision win over former world
champion Yonnhy Perez.

“It was my first loss and after that I became undisputed champion
I proved to everyone that it was my mistake in the Donaire fight,”
Darchinyan explained.

The veteran hard hitting southpaw continued his run for a shot at
a world title but came up short in losing decisions to WBA super
bantamweight champion Anselmo Moreno in December of 2011 and Japan’s
undefeated WBC bantamweight champion Shinsuke Yamanaka last year.

Darchinyan wasn’t done yet, however, as his experience and toughness
was the difference when he won a dominating unanimous decision
over previously unbeaten prospect Luis Orlando Del Valle. After his
promotional contract with promoter Gary Shaw had expired after the
fight with Del Valle, the Armenian pondered his options and future
where he signed with Top Rank as well as managerial contract with
Frank Espinoza. Darchinyan is coming off a fourth round knockout over
Javier Gallo in his Top Rank debut in May.

“I talked to Frank because I know with Gary Shaw I had nothing going.

I would never fight Donaire. I became number one contender at 122 for
the WBC so I talked with Frank and signed with him. I know what he
is about. So I told Frank to please talk to Top Rank and put a fight
with Donaire,” Darchinyan said. “I waited for this fight six years and
Gary Shaw couldn’t put it, thanks to Top Rank they gave me a rematch.”

Darchinyan-Donaire will be a ten round featherweight bout. Now just
over a week away from the rematch, Darchinyan is in the final phases
of his training camp as he is anxious to get back in the ring with
the man that handed him his first loss and knockout.

“I am still looking for the knockout. This time I won’t be silly
with one punch. This time I will use my skill. I know he is scared
and chicken.

I am coming to prove it. I have been in with him, I know how scared
he is of my punches. I will come and demolish him. I am coming to
destroy him. I made him. I am coming to break him,” Darchinyan said.

“Mentally I am ready for this fight. I am coming to send him to
retirement. It is going to be a great fight. I will be ready. I am
coming to destroy him. I am coming to beat the 2012 Fighter of the
Year. I want to prove to everyone he is no one,” Darchinyan concluded.

http://armenpress.am/eng/news/738637/darchinyan-ready-for-donaire-i-will-come-and-demolish-him-i-am-coming-to-destroy-him.html