Tag Archives: Kuwait

Executive Cyber Intelligence Bi-Weekly Report by INSS-CSFI

ISRAEL  Israel well prepared against cyber-attacks   Israel Birthday occurred with no real damage, save for a few minor sites whose webpages were defaced, old credit cards number no longer available, and email accounts containing old passwords from last year. … Continue reading

Posted in Uncategorized | Tagged , , , , , , , , | 1 Comment

Nuclear Proliferation in the Middle East

(Updated April 2013) Intelligence Report  While the immediate focus of international attention has been on stopping Iran from obtaining the ability to build nuclear weapons, an equally worrisome development is that the Iranian drive to obtain a nuclear bomb has … Continue reading

Posted in Uncategorized | Tagged , , , , , , , , , , , , , , , , | Leave a comment

Most wanted Terrorists By FBI

  OMAR SHAFIK HAMMAMI JEHAD SERWAN MOSTAFA ADAM YAHIYE GADAHN ABDUL RAHMAN YASIN ALI ATWA JABER A. ELBANEH HUSAYN MUHAMMAD AL-UMARI ADNAN G. EL SHUKRIJUMAH FAOUZI MOHAMAD AYOUB IBRAHIM SALIH MOHAMMED AL-YACOUB HAKIMULLAH MEHSUD MUHAMMAD AHMED AL-MUNAWAR JAMEL AHMED MOHAMMED … Continue reading

Posted in Uncategorized | Tagged , , , , , , , , , , , , | Leave a comment

Kuwait decides to ratify GCC security agreement

  Media Report   Kuwait which had been refusing to be part of a GCC internal security pact on grounds that it infringed on its Constitution, has decided to ratify it even as critics say the pact aims to curb … Continue reading

Posted in Uncategorized | Tagged , , , , , , , | Leave a comment

Human Rights Of Beduins in Kuwait

    More than 100,000 Bidun who have lived in Kuwait for generations are denied citizenship and basic civil and political rights. Authorities have violently dispersed Bidun demonstrations and prosecuted protesters, saying only “Kuwaiti citizens” have the right to protest. … Continue reading

Posted in Uncategorized | Tagged , , , , , , , | Leave a comment

Role of Social Media In Promoting Syrian Rebels

Intelligence Study The Syrian rebels and their support networks use social media for a variety of purposes including self-promotion, fundraising, directing attacks, and exchanging tactics. While the rebels would still be able to operate in the absence of social media, … Continue reading

Posted in Uncategorized | Tagged , , , , , , , | Leave a comment