The Passionate Attachment

America's entanglement with Israel

U.S. Defense Dept. paid Israel lobby’s think tank director $77,883 for one-day conference on Iran

with 11 comments

In his Truth in Testimony disclosure form submitted to the U.S. House of Representatives Homeland Security Committee before giving testimony to its “Iranian Terror Operations on American Soil” hearing, Dr. Matthew Levitt reveals that he had received a

Contract from U.S. Central Command and the U.S. Army Directed Studies Office for $77,883 to conduct a day long conference on Iran in January, 2010.

Levitt is the director of the Stein Program on Counterterrorism & Intelligence at the Washington Institute for Near East Policy, a think tank created by AIPAC, the American Israel Public Affairs Committee, to “do AIPAC’s work but appear independent.”

Not only can Israel get the Pentagon to swallow its anti-Iranian propaganda — it gets them to pay through the nose for it too.

Written by Maidhc Ó Cathail

October 31, 2011 at 8:49 am

Posted in Uncategorized

11 Responses

Subscribe to comments with RSS.

  1. $77,883 for one day
    Well here is something for free. I may work cheap, but it is definitely worth taking a look at.

    The Iran you will never see on American Television

    Rainbow Warrior

    November 1, 2011 at 8:00 pm

  2. […] lobby israélien 77 883 $ pour une journée de conférences sur l’Iran Par Maidhc Ó Cathail The Passionate Attachment (blog) 31 octobre 2011 traduit de l’anglais par Djazaïri Dans sa déclaration […]

  3. This website is apparently blocked by Baylor College of Medicine for being in violation of the following policy: BCM Policies and Procedures

    Table of Contents | Return to Section

    12.2.01 – Information And Communication: Security/Access Policies

    Date: 03/21/2001

    Acceptable Use Policy
    Last Update: 09/13/2004

    Applies to: Faculty, Staff, Residents & Clinical Postdoctoral Fellows, Postdoctoral Fellows, Students


    This college-wide policy describes the proper use of, and access to, all BCM computers, information systems and network resources. It also provides for the proper management of these resources.

    Access to computers, information systems and networks owned or operated by BCM imposes certain responsibilities and obligations on those granted such access. An individual user’s access must always be in furtherance of the user’s responsibilities, with common sense exceptions, such as during breaks and before or after working hours within the provisions of this policy or other applicable BCM policies, at BCM. Use by BCM personnel, or third parties granted access by BCM, should always be legal, ethical, academically honest and in accord with community or professional standards. No use of BCM computers, information systems and networks should be made that would subject the user or BCM to any legal action, or which would be generally perceived as improper or inappropriate. Use of BCM computers, information systems and networks must be consistent with the intellectual property rights of BCM, other BCM users and third parties. The rights of other Authorized Users to access BCM computers, information systems and networks must be respected, and each user should consider such others users’ rights and needs with respect to shared resources.


    1 Definitions

    1.1 Authorized Use– Authorized use of BCM Equipment is use consistent with the education, research and service missions of BCM and the policies and procedures of BCM.

    1.2 Authorized User – An authorized user is any individual who is part of the BCM community who has requested and been granted access to BCM Equipment.

    1.3 BCM Equipment — BCM Equipment includes computers, peripherals, software, information systems and network resources that are the property of BCM, including any Data Element that are stored on, transmitted by or accessed with such equipment.

    1.4 Data Element – A data element is an identifiable piece of data. Data Elements include, by way of example but not limited to, individual code residing in computers, files, electronic mail messages (email), mail folders, data downloaded from the Internet, images and web pages.

    1.5 Official E-mail — Electronic mail sent to Authorized Users on behalf of Baylor College of Medicine.

    2 Non-Private Nature of Data Elements

    2.1 BCM Equipment is intended to be used primarily to accomplish the missions of BCM. Therefore, all Data Elements stored on, transmitted by or accessed with BCM Equipment are the property of BCM, or are under the operational control and guardianship of BCM.

    2.2 BCM reserves the right to access or examine Data Elements when required. However, BCM will only access individual Data Elements in response to a specific incident. This may include, but is not limited to, potential violations of this policy, unauthorized access to BCM Equipment or system problems that require access to Data Elements.

    2.3 BCM may employ mechanisms to track access to BCM Equipment by Authorized Users and third parties, and access by Authorized Users to non-BCM locations. BCM also may access or examine the material or non-BCM locations accessed by Authorized Users.

    2.4 Viewing, copying, altering or destroying Data Elements without explicit permission of the owner of the Data Element or by authorized administrators is prohibited.

    2.5 Persons authorized by BCM to access Data Elements shall treat those Data Elements as confidential and shall not disclose them except as required to fulfill their job responsibilities or as directed by an Executive or Senior Vice President or the Vice President for Information Technology.

    3 Access to Resources

    3.1 BCM (not its employees, faculty or students) owns, leases or licenses all BCM Equipment; therefore, BCM may revoke or suspend access privileges.

    3.2 BCM assigns individual accounts to Authorized Users. The Authorized User is responsible for all activity conducted under the authority of his or her assigned individual account.

    3.3 An Authorized User cannot be required to give access to his or her individual account to another individual. Using, or attempting to use, an account assigned to another Authorized User is prohibited.

    3.4 A user must have authorization to access a particular Data Element. Accessing, copying, altering or destroying Data Elements without authorization is prohibited.

    3.4.1 The Authorized User of an individual account defines the authorization rights to the Data Elements in that individual account except as noted below: Authorization rights must comply with government regulations, legal and contractual obligations, and policies of BCM. Certain Data Elements may be required to be present in an individual account as part of the system software. The system administrator defines authorization rights to these Data Elements.

    3.5 An individual account on the BCM system will be terminated should the user cease to be an Authorized User. At the discretion of BCM, All Data Elements associated with such terminated account may be deleted.

    3.6 Access privileges will be reviewed periodically and when an Authorized User moves into a different position.

    4 Prohibited system activities

    The following activities are specifically prohibited:

    4.1 Attempting to circumvent or subvert any system or network security measure.

    4.2 Attempting to decode or intercept access control mechanisms such as passwords.

    4.3 Allowing another party to use an Authorized User’s individual account.

    4.4 Using or attempting to use an account assigned to another Authorized User.

    4.5 Possessing, on BCM premises, tools and/or software packages designed to circumvent security, decode access control mechanism or locate deficiencies in a system security.

    4.6 Monitoring of system or network traffic.

    4.7 Attempting to degrade the performance of a system or network or to deprive Authorized Users of access to resources.

    4.8 Creating or propagating computer viruses.

    4.9 Excessive user consumption of network resources e.g. through the use of bandwidth intensive Internet applications such as PointCast, MP3 players, streaming video, etc. unrelated to work if such utilization contributes even unintentionally to network disruption or degradation of service.

    4.10 Intentionally destroying or damaging BCM Equipment.

    4.11 Exploiting or attempting to exploit vulnerabilities in system or network security.

    4.12 Violating state or federal laws, including but not limited to, copyright laws, computer crime statutes and anti-bulk mail statutes (commonly called anti-SPAM laws).

    4.13 Making unauthorized copies of software or Data Elements licensed to BCM or any BCM personnel.

    4.14 Communicating any credit card number or other financial account numbers or information without the explicit approval of the owner.

    4.15 Effecting or receiving unauthorized electronic transfer of funds.

    4.16 Except within the scope of legitimate responsibilities at the College, using BCM Equipment to transmit, display or print material that contains profane language, or panders to bigotry, racism or sexism, or promotes or facilitates any form of illegal discrimination

    5 Use of the Internet

    5.1 There is no guarantee of the privacy and confidentiality of information sent or received via the Internet. Sensitive material transferred over the Internet may be at risk of detection or theft by third parties. Consequently, the Internet should not be used to convey confidential or privileged information. Users should exercise caution and care when transferring and accessing data of any type and in any form.

    5.2 Just as BCM tracks Internet usage for security purposes, most Internet services, especially Web sites, track users who visit their site. Likewise, third parties may track individual users’ movements within the Internet. Authorized Users are BCM personnel and their communications using BCM Equipment should be conducted in a professional and responsible manner at all times

    5.3 Personal use of BCM Equipment for Internet Usage during breaks and before or after working hours is to be confined to those allowed legal Web sites that will not cause potential liability to BCM.

    5.4 Disallowed Web sites include those with pornographic, racial, or sexual content; gambling sites; illegal music libraries and movies and any site that promotes or facilitates any form of illegal activity or violates any BCM policy.

    6 Use of BCM Equipment

    6.1 BCM Equipment is to be used for the official purposes of BCM, which are education, research and service. BCM Equipment may not be used to provide or sell personal business services or products.

    6.2 Authorized Users of a particular host or network will abide by the resource usage rules established by the administrators of that machine and shall not attempt to circumvent those rules.

    6.3 Authorized Users shall not implement services or programs that have the potential of adversely affecting the ability of other Authorized Users to use BCM Equipment.

    6.4 Authorized Users shall not implement or use programs, applications or techniques that have the potential of exposing confidential Data Elements or allowing unauthorized individuals to acquire access to BCM Equipment. The unauthorized use of peer-to-peer programs, web sites that allow remote control of BCM Equipment and instant messenger programs is prohibited.

    7 Electronic Mail

    7.1 Authorized Users shall not send electronic mail that can reasonably be expected to cause, directly or indirectly, excessive strain on any computing facilities, or unwarranted or unsolicited interference with others’ use of email or email systems. Such uses include, but are not limited to, the use of email services to: (i) send or forward email chain letters; (ii) “spam,” that is, to exploit listservers or similar broadcast systems for purposes beyond their intended scope to amplify the widespread distribution of unsolicited email; and (iii) “letter-bomb,” that is, to resend the same email repeatedly to one or more recipients to interfere with the recipient’s use of email

    7.2 Authorized Users must cease electronic mail correspondence with any address when requested to do so by the owner of that address. This section does not apply to official mail sent on behalf of BCM.

    7.3 All electronic mail sent from BCM Equipment must contain the BCM electronic mail address of the sender.

    7.4 Forging or tampering with the header information or text of an electronic mail message to make that electronic mail message seem to originate from someone other than the sender is prohibited.

    8 Data Security/Integrity

    8.1 The ability to download Data Elements comes with a risk of having electronic viruses downloaded as well. To eliminate the potential of viral infection, all Data Elements should be scanned for viruses before being used or introduced on a system or network.

    9 Copyrights

    9.1 It is BCM’s policy to strictly comply with copyright laws.

    9.2 Authorized Users may not copy, duplicate, install, electronically forward, distribute or use copyrighted works including but not limited to software, images, data, sounds (including music) and multimedia works which infringe on the copyright of another. Improper copying may include, but is not limited to, electronic copying, downloading or transferring and printing copyrighted works via the Internet. The prohibitions of this section do not apply to the acceptable fair use of copyrighted material. The BCM copyright policy provides additional guidance about copyrights usage of copyrighted material pursuant to the “acceptable fair use” exception.

    9.3 All work done utilizing BCM Equipment shall be subject to the Patents and Inventions Policy (Section 20.08.01) and the Copyrights Policy (Section 20.8.03) of the Policies and Procedures manual.

    10 Exceptions

    10.1 Designated system administrators and information security officers who are employed or under contract to BCM are authorized to possess the necessary tools and undertake the necessary procedures required by the responsibilities of their jobs.

    10.2 The President or his designees must authorize any activities that are at variance with the above policy and procedure.

    11 Violations

    11.1 Violations of this policy will not be condoned by BCM.

    11.2 Violations of this policy will result in a formal investigation by the BCM Computer Security Response Team.

    11.3 Authorized Users must report any evidence of violation of this policy to the BCM Computer Security Response Team at 713-798-3532 or, which is the designated entity for this purpose.

    11.3.1 Violations may result in a range of disciplinary actions including informal warning, formal warning, temporary or permanent suspension of access to BCM Equipment, suspension or dismissal from the user’s position with BCM or criminal prosecution.

    11.3.2 Persons accused of violations may use the applicable BCM grievance procedure.

    12 Authority and Responsibility for Information Security

    12.1 The President of BCM has delegated responsibility to the Vice President for Information Technology for overseeing the BCM Information Security Program.

    12.2 The Vice President for Information Technology has designated the Baylor Computer Security Response Team (BCSRT) as the entity within BCM to administer the Information Security Program.

    12.3 BCSRT is responsible for the following functions:

    12.3.1 Investigating and tracking all security incidents involving BCM systems and coordinate any response to such incidents.

    12.3.2 Periodically reviewing and modifying the BCM Information Technology security policies and procedures

    12.3.3 Providing a central clearinghouse for the dissemination of security information and providing a location for people to make inquiries about security.

    12.3.4 Researching security technologies and integrating them into BCM systems.


    13.1 Authorized Users shall take all reasonable care to ensure that unauthorized Users cannot view or access information, including but not limited to reports and information displayed on video monitors. Log off computer devices when away from work areas or when task are completed and properly secure or destroy any printed reports or other paper files.



    November 1, 2011 at 9:20 pm

  4. Telling the truth is not a very profitable enterprise — at least not in the current circumstances.

    Thank you for those videos. They are priceless!

    Maidhc Ó Cathail

    November 2, 2011 at 2:32 am

  5. It might have something to do with their president, Paul Klotman. Previously, he was chair of the Samuel Bronfman Department of Medicine of the Mount Sinai School of Medicine. The bootlegging Bronfmans are among those who have a lot to fear from exposure by websites like this one, and thus work with groups like the ADL to smear and, if possible, censor what they consider to be “dangerous extremism.”

    Maidhc Ó Cathail

    November 2, 2011 at 3:13 am

  6. I would have to say censorship as well. Have to hide the truth from the public where possible.

    Rainbow Warrior

    November 2, 2011 at 5:55 am

  7. Well there always two sides to every story. Most people do no know or even see anything good about Iran even though they have accomplished much. It should be noted they also do it without the IMF, World Bank or other Western or European Banking systems as well.
    Then again Libya also did extremely well, without those entities as well.
    Glad you enjoyed the vids. I enjoyed hunting them down.
    There is also one on Libya as well. absolutely amazing what Gaddafi accomplished over the years. It too was beautiful. At least I have the memories of what was. The Israeli Lobby nor Israel liked Gaddafi either.

    So sad we live in a world where endless wars destroy the beauty of countries.
    Take care and keep up the great work you do. If not for bloggers many would never know the truth about many things.
    Your story would never be in the main stream media. Nor would mine.
    I did up the on Libya because of going to he main stream media and most people thought Libyans lived in the Dark ages. Terribly misinformed they are.

    Rainbow Warrior

    November 2, 2011 at 6:12 am

  8. […] 77 883 $ pour une journée de conférences sur l’Iran Par Maidhc Ó Cathail The Passionate Attachment  (blog) 31 octobre 2011 traduit de l’anglais par Djazaïri Dans sa déclaration […]

  9. […] support for terrorism, part with its nuclear weapons program, or respect human rights.” Instead, Dr. Levitt recommended applying the sticks of diplomatic pressure, pressing regional bodies to expel Iranian […]

  10. […] for terrorism, part with its nuclear weapons program, or respect human rights.” Instead, Dr. Levitt recommended applying the sticks of diplomatic pressure, pressing regional bodies to expel Iranian […]

  11. […] support for terrorism, part with its nuclear weapons program, or respect human rights.” Instead, Dr. Levitt recommended applying the sticks of diplomatic pressure, pressing regional bodies to expel Iranian […]

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

%d bloggers like this: