A scandal around Britam Defense implicates the US and Britain in preparing a large-scale provocation in Syria.
The news about the security breach of the military contractor Britam Defense was not reported by any Western media outlet. Instead it was shared through blogs, communities of hackers and social platforms.
When it comes to the international matters, RedHotRussia is more interested in the opinions of Russian netizens about them, than in the veracity of the information itself.
Anyway, I will first recap the news itself, afterwards translate an article from “Komsomolskaya Pravda” to show how it was presented in one of Russia’s major newspapers and finally translate the comments of Russian netizens.
A German hacker went fishing around the servers of Britam Defense – a private military contractor, which provides such services as securing of oil production and transportation.
The hacker found a relatively insecure email server in Malaysia, and uncovered a whole host of documents from Britam Defence.
One particular email was of special interest. In it Dave Goulding reminded his fellow co-founder Phil Dougherty about an offer made by Washington via a group of Qataris: to transport what seemed to be a Soviet era chemical weapon into Syria, using sub contracted Russian speaking Ukrainian mercenaries.
We’ve got a new offer. It’s about Syria again. Qataris propose an attractive deal and swear that the idea is approved by Washington.
We’ll have to deliver a CW to Homs, a Soviet origin g-shell from Libya similar to those that Assad should have.
They want us to deploy our Ukrainian personnel that should speak Russian and make a video record.
Frankly, I don’t think it’s a good idea but the sums proposed are enormous. Your opinion?
The fans of conspiracies and hackers started discussing whether the documents were genuine or fake.
Eventually, the community of hackers came to conclusion that the whole case was either genuine or VERY elaborate hoax with thorough attention to little details.
Without trying to understand all of the technical details, I will relay the widely circulating opinion of one software systems administrator (going on Reddit under the nickname of KungFu Spider) who checked the mail.
OK, last post – the plot thickens!!!
After looking at the email headers (see below), I have to admit that the email does indeed look genuine.
The email was sent from “126.96.36.199″ which is a BT Wholesale ADSL IP address.
From there it was then relayed via “smtp.clients.netdns.net [188.8.131.52]“
Finally it was delivered to a local mailbox on that server.
I hate to admit it, but all these facts check out. So with Mythbusters objectivity I have to call this one plausible.
I just really hope I don’t get a visit from the plods for this ill advised sleuthing.
This content was brought to you by Intellihub.com