The US resolution required a two-thirds majority to pass. AFP
The US resolution required a two-thirds majority to pass. AFP
The US resolution required a two-thirds majority to pass. AFP
The US resolution required a two-thirds majority to pass. AFP

US fails in UN effort to censure Hamas for terrorism


  • English
  • Arabic

A US resolution that aimed to condemn Hamas for its firing of rockets at Israel was rejected at the United Nations on Thursday, with the motion failing to win the necessary two-thirds majority among those nations that voted.

It did, however, garner a simple majority, 87 votes to 58, which Israel cited as a victory that had nevertheless been unjustly “hijacked by a political move of procedure”. Some 32 countries abstained.

The resolution was presented by outgoing US ambassador to the UN Nikki Haley, who had appealed to members to use simple majority voting.

“Today could be a historic day at the United Nations, or it could just be another day,” she said before the vote. “The question is whether the UN sees terrorism as acceptable, only if it is directed against Israel.”

Arab countries presented the amendment asking that the US resolution require a two-thirds majority, an action that itself required a vote among members and it passed narrowly, 75 to 72, with 26 abstentions, effectively ending Ms Haley's chances of success.

So-called non-aligned nations, which are a majority in the assembly, customarily follow the Palestinians’ lead in such votes.

_______________

Read more:

US seeks to condemn Hamas by name in landmark UN resolution

The twin strategies of violence crippling Gaza

UN to vote on US measure condemning Hamas

_______________

The resolution asked UN members to “condemn Hamas for repeatedly firing rockets into Israel and for inciting violence, thereby putting civilians at risk”. Had it passed it would have been an unprecedented censure at the UN of the Palestinian militant group that controls Gaza.

After the vote the Palestinian ambassador to the UN Riyad Mansour said the US resolution was part of “cynical attempts” to subvert the battle for an independent state.

“We express our sincere and deepest gratitude to all member states who had stood on the side of justice,” he said of those who rejected Ms Haley's appeal.

“They have helped push back efforts to undermine our efforts for justice,” the Palestinian envoy added.

Ms Haley, in her post throughout Mr Trump’s tenure, said in October that she would be leaving the UN by the end of the year, in what was a surprise announcement. She has routinely railed against the UN’s treatment of Israel during her tenure, but no successor has yet been named.

Mission%3A%20Impossible%20-%20Dead%20Reckoning%20Part%20One
%3Cp%3E%3Cstrong%3EDirector%3A%3C%2Fstrong%3E%20Christopher%20McQuarrie%3Cbr%3E%3Cstrong%3EStars%3A%3C%2Fstrong%3E%20Tom%20Cruise%2C%20Hayley%20Atwell%2C%20Pom%20Klementieff%2C%20Simon%20Pegg%3Cbr%3E%3Cstrong%3ERating%3A%3C%2Fstrong%3E%204%2F5%3C%2Fp%3E%0A
Lexus LX700h specs

Engine: 3.4-litre twin-turbo V6 plus supplementary electric motor

Power: 464hp at 5,200rpm

Torque: 790Nm from 2,000-3,600rpm

Transmission: 10-speed auto

Fuel consumption: 11.7L/100km

On sale: Now

Price: From Dh590,000

Top tips to avoid cyber fraud

Microsoft’s ‘hacker-in-chief’ David Weston, creator of the tech company’s Windows Red Team, advises simple steps to help people avoid falling victim to cyber fraud:

1. Always get the latest operating system on your smartphone or desktop, as it will have the latest innovations. An outdated OS can erode away all investments made in securing your device or system.

2. After installing the latest OS version, keep it patched; this means repairing system vulnerabilities which are discovered after the infrastructure components are released in the market. The vast majority of attacks are based on out of date components – there are missing patches.

3. Multi-factor authentication is required. Move away from passwords as fast as possible, particularly for anything financial. Cybercriminals are targeting money through compromising the users’ identity – his username and password. So, get on the next level of security using fingertips or facial recognition.

4. Move your personal as well as professional data to the cloud, which has advanced threat detection mechanisms and analytics to spot any attempt. Even if you are hit by some ransomware, the chances of restoring the stolen data are higher because everything is backed up.

5. Make the right hardware selection and always refresh it. We are in a time where a number of security improvement processes are reliant on new processors and chip sets that come with embedded security features. Buy a new personal computer with a trusted computing module that has fingerprint or biometric cameras as additional measures of protection.

Ashes 2019 schedule

August 1-5: First Test, Edgbaston

August 14-18: Second Test, Lord's

August 22-26: Third Test, Headingley

September 4-8: Fourth Test, Old Trafford

September 12-16: Fifth Test, Oval

Wydad 2 Urawa 3

Wydad Nahiri 21’, Hajhouj 90'

Urawa Antonio 18’, 60’, Kashiwagi 26’