US 'backed plan to launch chemical weapon attack on Syria, blame it on Assad govt'

Critical Thinker

Senior Member.
This story that was published Jan 30 2013 is now making the rounds of the conspiracy circuit. I am doubtful of its authenticity, but would like to enlist the sleuthing skills of the Metabunk debunkers.

http://in.news.yahoo.com/us-backed-plan-launch-chemical-weapon-attack-syria-045648224.html

"US 'backed plan to launch chemical weapon attack on Syria, blame it on Assad govt': Report

London, Jan 30 (ANI): The Obama administration gave green signal to a chemical weapons attack plan in Syria that could be blamed on President Bashar al Assad's regime and in turn, spur international military action in the devastated country, leaked documents have shown.
A new report, that contains an email exchange between two senior officials at British-based contractor Britam Defence, showed a scheme 'approved by Washington'.
As per the scheme 'Qatar would fund rebel forces in Syria to use chemical weapons,' the Daily Mail reports.
Barack Obama made it clear to Syrian president Bashar al-Assad last month that the U.S. would not tolerate Syria using chemical weapons against its own people.
According to Infowars.com, the December 25 email was sent from Britam's Business Development Director David Goulding to company founder Philip Doughty.
The emails were released by a Malaysian hacker who also obtained senior executives resumes and copies of passports via an unprotected company server, according to Cyber War News.
According to the paper, the U.S. State Department has declined to comment on the matter. "
 
I found this and I have no idea how creditable it is. It is Syrian linked, but I'm not sure to who. "Secular peoples' is not a lot of help, I tend to think one branch of the anti government forces. I could be wrong.

Some comments are interesting--Why are they using a Malaysian server? There seems to be a lack of encryption. Poor safeguards. Things that to be trigger a red flag. The 'false flag' comments worry me also.

http://handsoffsyria.blogspot.com/2013/01/britam-defence-leak.html


UPDATE: BritAm leak fraud confirmed
01/29/2013 by syriancommando
It was pointed out to me in a tweet that there were in fact TWO emails posted in the BritAm leak. One on “Iranian issue”. A quick inspect reveals fraud.
Within the Iranian issue email the header contains the following:

with ESMTP id nWRHL2NRVdAP for ;;
Thu, 16 Oct 2012 23:57:18 +0800 (SGT)
Received: from smtp.clients.netdns.net (smtp.clients.netdns.net [202.157.148.149])
by titanium.netdns.net (Postfix) with ESMTP id 27D5F523A0E
for ;; Thu, 16 Oct 2012 23:57:18 +0800 (SGT)

And within the Syrian email, the header contained the following:

with ESMTP id nWRHL2NRVdAP for ;;
Mon, 24 Dec 2012 23:57:18 +0800 (SGT)
Received: from smtp.clients.netdns.net (smtp.clients.netdns.net [202.157.148.149])
by titanium.netdns.net (Postfix) with ESMTP id 27D5F523A0E
for ;; Mon, 24 Dec 2012 23:57:18 +0800 (SGT)

The date is different, as one would expect but the TIME is exactly the same. This means that one or both of these emails has been edited from the email database. The forgery is clear, it’s time to burn this Trojan horse. Whoever made this leak purposely left this sign of fraud behind, in order to later point it out and use it as a platform to attack ALL leaks unfavourable to the US and to try and claim that a chemical weapon attack cannot possibly be a false flag.
Nice try.
UPDATE 1: Note that in both emails the date is modified throughout, but the time is left intact. Such attention to detail implies its not just a fraud, but a deliberate fraud. This turns the magic on the magician: why create this two level false flag when there is no intention to carry out a chemical weapon false flag? This highly sophisticated cyber warfare operation should indicate the stakes at play: what is the prize behind the sacrifice of a mercenary organisation like BritAm?
Content from External Source
 
I found this and I have no idea how creditable it is. It is Syrian linked, but I'm not sure to who. "Secular peoples' is not a lot of help, I tend to think one branch of the anti government forces. I could be wrong.

Some comments are interesting--Why are they using a Malaysian server? There seems to be a lack of encryption. Poor safeguards. Things that to be trigger a red flag. The 'false flag' comments worry me also.

http://handsoffsyria.blogspot.com/2013/01/britam-defence-leak.html


UPDATE: BritAm leak fraud confirmed
01/29/2013 by syriancommando
It was pointed out to me in a tweet that there were in fact TWO emails posted in the BritAm leak. One on “Iranian issue”. A quick inspect reveals fraud.
Within the Iranian issue email the header contains the following:

with ESMTP id nWRHL2NRVdAP for ;;
Thu, 16 Oct 2012 23:57:18 +0800 (SGT)
Received: from smtp.clients.netdns.net (smtp.clients.netdns.net [202.157.148.149])
by titanium.netdns.net (Postfix) with ESMTP id 27D5F523A0E
for ;; Thu, 16 Oct 2012 23:57:18 +0800 (SGT)

And within the Syrian email, the header contained the following:

with ESMTP id nWRHL2NRVdAP for ;;
Mon, 24 Dec 2012 23:57:18 +0800 (SGT)
Received: from smtp.clients.netdns.net (smtp.clients.netdns.net [202.157.148.149])
by titanium.netdns.net (Postfix) with ESMTP id 27D5F523A0E
for ;; Mon, 24 Dec 2012 23:57:18 +0800 (SGT)

The date is different, as one would expect but the TIME is exactly the same. This means that one or both of these emails has been edited from the email database. The forgery is clear, it’s time to burn this Trojan horse. Whoever made this leak purposely left this sign of fraud behind, in order to later point it out and use it as a platform to attack ALL leaks unfavourable to the US and to try and claim that a chemical weapon attack cannot possibly be a false flag.
Nice try.
UPDATE 1: Note that in both emails the date is modified throughout, but the time is left intact. Such attention to detail implies its not just a fraud, but a deliberate fraud. This turns the magic on the magician: why create this two level false flag when there is no intention to carry out a chemical weapon false flag? This highly sophisticated cyber warfare operation should indicate the stakes at play: what is the prize behind the sacrifice of a mercenary organisation like BritAm?
Content from External Source
 
This story that was published Jan 30 2013 is now making the rounds of the conspiracy circuit. I am doubtful of its authenticity, but would like to enlist the sleuthing skills of the Metabunk debunkers.

http://in.news.yahoo.com/us-backed-plan-launch-chemical-weapon-attack-syria-045648224.html

Yes there has been a lot of activity on this. Early claims that Assad Gov used Sarin, then turned into it was the rebels.

So what makes you doubt the authenticity?

It all fits with the Obama/Obomber rhetoric and fits in with another coup as per PNAC... You'll be doubting the authenticity of the Police State America next.
 
Yes there has been a lot of activity on this. Early claims that Assad Gov used Sarin, then turned into it was the rebels.

So what makes you doubt the authenticity?

It all fits with the Obama/Obomber rhetoric and fits in with another coup as per PNAC... You'll be doubting the authenticity of the Police State America next.


I get enough news in my diet that if this story had legs, something more than a reference in an email between 2 employees from British-based contractor Britam Defence, that was to have been hacked into by a Malaysian hacker, that the scheme was 'approved from Washington'. Often enough people jump to a conclusion that is not fully supported by the evidence, and oft times the evidence is later called into question. I brought it up here so that the topic could be explored.

Just look at the thread on here about:
https://www.metabunk.org/threads/14...liever-accused-of-sending-Ricin-to-Pres-Obama , that story was not as it seemed at first blush.
 
Last edited by a moderator:
It is clear that Britam Defence was hacked but were they victim to the hackers creating those e-mails? They do read like a fantasy story that Sorcha Faal would be proud of. :)


Inestigators suspect that Iran may be involved in an attempt to smear the West by hacking a British security company and faking a plot in which the firm was asked to deploy chemical weapons in Syria. False emails created as part of the sophisticated cyberattack claimed the plot had been sanctioned by Washington and indicated a desire to frame Bashar al-Assad, the Syrian president. If Assad used chemical weapons against his own people, it would potentially trigger military retaliation by America and Britain. The hacking of Britam Defence, a company run by former SAS chiefs with many Middle Eastern clients, is being investigated by cybercrime and counterterrorism specialists at Scotland Yard. The security services are also believed to be studying the breach.

http://www.thesundaytimes.co.uk/sto/news/uk_news/National/article1206917.ece

Computer security experts called in by Britam have proved that the emails relating to Syria and Iran were fabricated, the report said. “They are 100% false,” said Simon Lalor, Britam’s chief executive. “From a technical point of view, the emails are fabricated. Who wrote the content is another question.” He estimated that the company had been “used as a vehicle to create tension and embarrassment for those with a political motivation." The hacking is being investigated by cybercrime and counterterrorism specialists at Scotland Yard, likely in collaboration with the security services. Iran's possible involvement in the cyber attack is also being probed. A network of pro-Assad hackers and online activists called the Syrian Electronic Army (SEA) have also been named on technology websites as possible suspects, the Sunday Times said.

http://www.ynetnews.com/articles/0,7340,L-4340208,00.html
 
Back
Top