Generational Dynamics |
|
Forecasting America's Destiny ... and the World's | |
HOME WEB LOG COUNTRY WIKI COMMENT FORUM DOWNLOADS ABOUT | |
Prism revelation is already damaging national security
This morning's key headlines from GenerationalDynamics.com
With voting in Iran's presidential election set to begin on Friday, the leadership is seeking to avoid a repeat of the massive anti-government protests and charges of election fraud that followed the 2009 re-election of Mahmoud Ahmadinejad as president. The hardliners, led by Supreme Leader Ayatollah Ali Khamenei, have proclaiming the importance of everyone voting:
"Every vote that the people cast ... is primarily a vote of confidence for the Islamic Republic and for our electoral mechanism."
Everyone realizes that this campaign is something of a joke, because the real humiliation for Iran was the massive bloody violence that followed the election, when the police and the Revolutionary Guards started torturing, mutilating and slaughtering peaceful protesters. In fact, for over two years Iran has been the psychopathic Bashar al-Assad conduct the same kind of campaign on steroids in Syria.
So nobody doubts that the Islamic Republic is a failure when it has to kill, torture and mutilate peaceful protesters, and that the Ayatollah Ali Khamenei is a fool for claiming otherwise. In fact, two reform candidates from the 2009 election, Mir Hussein Mousavi and Mehdi Karroubi, are still under arrest. They are symbols of the massive failure of the Islamic Republic.
Iran is in a generational Awakening era, like America in the 1960s-70s, when there were massive anti-government protests and some police violence against them, though nowhere near the scale of the violence in Iran. Like America in the 1960s, there is a "generation gap" today in Iran, pitting the hardline survivors of the 1979 Great Islamic Revolution and the subsequent Iran/Iraq war versus the younger generations that grew up after the war. These generational confrontations usually end up with a climactic victory by the younger generation since, after all, the old generation dies off. (In America, the climactic victor was the resignation of President Richard Nixon in 1974.)
The voting campaign presents a dilemma for younger voters in Iran, who are torn between on the one hand protesting against leadership by boycotting the vote, and on the other hand voting for the reform candidate Hassan Rouhani, and hoping he'll win.
As I described in "23-May-13 World View -- Iran's Supreme Leader tries to defeat the younger generation", Khamenei has already arranged to disqualify the leading reformist candidates, but that strategy could conceivably backfire, as now there's only one reformist candidate left. CS Monitor and Foreign Policy
On Friday, voters in Iran's presidential election will have a choice of five hardline candidates, and only one who is considered "centrist" or "reformist." It's a question just how reformist he is, since he's a cleric who's close to Supreme Leader Ayatollah Ali Khamenei. But he's become very popular with young Iranians, and he's particularly critical of the economic policies of the last eight years.
All the other reformist candidates have been eliminated. Last month Khamenei arranged to have former president Ali Akbar Hashemi Rafsanjani, Esfandiar Rahim-Mashaei disqualified. Then earlier this week another reformist candidate, Mohammad Reza Aref, announced that he was withdrawing from the race, in order to avoid drawing votes away from Rouhani.
So with all these other candidates eliminated, Rouhani's poll results have surged, while all the hardline votes are split among the five remaining candidates. Rouhani is still unlikely to win the election, but victory by Rouhani would be a victory for the younger generation, and a defeat for Khamenei. Al Monitor and BBC
The traitorous act of Edward Snowden in revealing the top secret Prism program is already damaging national security. Jihadist and terrorist web sites are prominently displaying the information exposed by Snowden, and are instructing terrorists how to use alternate communications channels that can't be trace by the NSA. Jihadists are recommending that terrorists use Linux rather than Windows, and are providing technical information on protecting jihadist information. Previous revelations of top secrets include the admission of responsibility for the Stuxnet virus that slows Iran's nuclear program, and the Obama administration's bragging revelation of the details of the death of Osama bin Laden. All of these revelations have damaged America's security. Bill Gertz / Free Beacon
Last week's stunning victory by the Syrian army combined with Hezbollah in Qusair is threatening to give the regime of Syria's president Bashar al-Assad a victory in the civil war, now in its third year. The regime's firepower was overwhelming, and the regime's forces adopted a new technique: They used heavy weapons to level row after row of building, essentially leveling the entire town, providing no cover for the rebels. Thousands of rebel fighters and civilians were killed in Qusair, and only a few hundred escaped, fleeing in desperation. It's now clear that the rebels are close to defeat, and will have to develop a new strategy. One activist is calling for greater use of suicide bombings in Alawite neighborhoods, where the civilians typically are strong supporters of al-Assad. "We should take the battles to the heart of Alawite neighborhoods," he said. Daily Star (Beirut)
(Comments: For reader comments, questions and discussion, see the 13-Jun-13 World View -- Reform candidate Rouhani advances in Iran's presidential polls thread of the Generational Dynamics forum. Comments may be
posted anonymously.)
(13-Jun-2013)
Permanent Link
Receive daily World View columns by e-mail
Donate to Generational Dynamics via PayPal
Web Log Summary - 2016
Web Log Summary - 2015
Web Log Summary - 2014
Web Log Summary - 2013
Web Log Summary - 2012
Web Log Summary - 2011
Web Log Summary - 2010
Web Log Summary - 2009
Web Log Summary - 2008
Web Log Summary - 2007
Web Log Summary - 2006
Web Log Summary - 2005
Web Log Summary - 2004
Web Log - December, 2016
Web Log - November, 2016
Web Log - October, 2016
Web Log - September, 2016
Web Log - August, 2016
Web Log - July, 2016
Web Log - June, 2016
Web Log - May, 2016
Web Log - April, 2016
Web Log - March, 2016
Web Log - February, 2016
Web Log - January, 2016
Web Log - December, 2015
Web Log - November, 2015
Web Log - October, 2015
Web Log - September, 2015
Web Log - August, 2015
Web Log - July, 2015
Web Log - June, 2015
Web Log - May, 2015
Web Log - April, 2015
Web Log - March, 2015
Web Log - February, 2015
Web Log - January, 2015
Web Log - December, 2014
Web Log - November, 2014
Web Log - October, 2014
Web Log - September, 2014
Web Log - August, 2014
Web Log - July, 2014
Web Log - June, 2014
Web Log - May, 2014
Web Log - April, 2014
Web Log - March, 2014
Web Log - February, 2014
Web Log - January, 2014
Web Log - December, 2013
Web Log - November, 2013
Web Log - October, 2013
Web Log - September, 2013
Web Log - August, 2013
Web Log - July, 2013
Web Log - June, 2013
Web Log - May, 2013
Web Log - April, 2013
Web Log - March, 2013
Web Log - February, 2013
Web Log - January, 2013
Web Log - December, 2012
Web Log - November, 2012
Web Log - October, 2012
Web Log - September, 2012
Web Log - August, 2012
Web Log - July, 2012
Web Log - June, 2012
Web Log - May, 2012
Web Log - April, 2012
Web Log - March, 2012
Web Log - February, 2012
Web Log - January, 2012
Web Log - December, 2011
Web Log - November, 2011
Web Log - October, 2011
Web Log - September, 2011
Web Log - August, 2011
Web Log - July, 2011
Web Log - June, 2011
Web Log - May, 2011
Web Log - April, 2011
Web Log - March, 2011
Web Log - February, 2011
Web Log - January, 2011
Web Log - December, 2010
Web Log - November, 2010
Web Log - October, 2010
Web Log - September, 2010
Web Log - August, 2010
Web Log - July, 2010
Web Log - June, 2010
Web Log - May, 2010
Web Log - April, 2010
Web Log - March, 2010
Web Log - February, 2010
Web Log - January, 2010
Web Log - December, 2009
Web Log - November, 2009
Web Log - October, 2009
Web Log - September, 2009
Web Log - August, 2009
Web Log - July, 2009
Web Log - June, 2009
Web Log - May, 2009
Web Log - April, 2009
Web Log - March, 2009
Web Log - February, 2009
Web Log - January, 2009
Web Log - December, 2008
Web Log - November, 2008
Web Log - October, 2008
Web Log - September, 2008
Web Log - August, 2008
Web Log - July, 2008
Web Log - June, 2008
Web Log - May, 2008
Web Log - April, 2008
Web Log - March, 2008
Web Log - February, 2008
Web Log - January, 2008
Web Log - December, 2007
Web Log - November, 2007
Web Log - October, 2007
Web Log - September, 2007
Web Log - August, 2007
Web Log - July, 2007
Web Log - June, 2007
Web Log - May, 2007
Web Log - April, 2007
Web Log - March, 2007
Web Log - February, 2007
Web Log - January, 2007
Web Log - December, 2006
Web Log - November, 2006
Web Log - October, 2006
Web Log - September, 2006
Web Log - August, 2006
Web Log - July, 2006
Web Log - June, 2006
Web Log - May, 2006
Web Log - April, 2006
Web Log - March, 2006
Web Log - February, 2006
Web Log - January, 2006
Web Log - December, 2005
Web Log - November, 2005
Web Log - October, 2005
Web Log - September, 2005
Web Log - August, 2005
Web Log - July, 2005
Web Log - June, 2005
Web Log - May, 2005
Web Log - April, 2005
Web Log - March, 2005
Web Log - February, 2005
Web Log - January, 2005
Web Log - December, 2004
Web Log - November, 2004
Web Log - October, 2004
Web Log - September, 2004
Web Log - August, 2004
Web Log - July, 2004
Web Log - June, 2004