THE INVINCIBLE JEWISH PEOPLE ARE CRIPPLING THE COMPUTERS OF THE IRANIAN FASCISTS

This is a fight for the survival of the Jewish people.

The one thing that makes the situation for Jews different to the 1930s is that today the Jewish people own a Homeland and that enables the genius of this people to operate.

It is really sad that this genius has to be spent in defence against a fascist enemy. It would be nice if it could be spent in developing computer systems which aid humanity. But make no mistake, the development of this worm, now being talked about in every radio and newspaper in the world, is defending the human race as never before.

The number one aim of all progressive people and certainly in opposition to antisemitism is to destroy the Fascist rulers of iran.

If they are seen as being powerless in the face of Jewish ingenuity then that is good, because that will give heart to the long suffering Iranian ordinary people, who are also under the jackboot of Ahmadinejad.

Ahmadinejad can strut around the United Nations in New York because the United Nations is filled with Islamic antisemites.

But we will see. Ahmadinejad represents a section of world capitalism which is particularly imbecile, being based on nothing more than having some good fortune to have had oil under its covers.

But you cannot run a Nuclear programme with access to computer technology, and here the Jewish people of Israeli are highly intelligent and advanced, Ahmadinejad and his fascist Brotherhood are dunces.

The recent DEBKAfile article gives the latest with all of its implications.

We can expect the cornered rats of the Ahmadinejad regime and its cohorts in Fatah, Hamas, Hizbullah and Syria to strike back if they can:

[Begin analysis by DEBKAfile here]

Cyber attack on Iran expands: Tehran threatens long-term war in reprisal
DEBKAfile Exclusive Report September 27, 2010, 6:13 PM (GMT+02:00)

Iran admitted Monday, Sept. 27 it was under full-scale cyber terror attack. The official IRNA news agency quoted Hamid Alipour, deputy head of Iran’s government Information Technology Company, as saying that the Stuxnet computer worm “is mutating and wreaking further havoc on computerized industrial equipment.”

Stuxnet was no normal worm, he said: “The attack is still ongoing and new versions of this virus are spreading.”

Revolutionary Guards deputy commander Hossein Salami declared his force had all the defensive structures for fighting a long-term war against “the biggest and most powerful enemies” and was ready to defend the revolution with more advanced weapons than the past.  He stressed that defense systems have been designed for all points of the country, and a special plan devised for the Bushehr nuclear power plant. debkafile’s military sources report that this indicates that the plant – and probably other nuclear facilities too – had been infected, although Iranian officials have insisted it has not, only the personal computers of its staff.

The Stuxnet spy worm has been created in line with the West’s electronic warfare against Iran,” said Mahmoud Liayi, secretary of the information technology council of the Industries Minister.

As for the origin of the Stuxnet attack, Hamid Alipour said: The hackers who enjoy “huge investments” from a series of foreign countries or organizations, designed the worm, which has affected at least 30,000 Iranian addresses, to exploit five different security vulnerabilities. This confirmed the impressions of Western experts that Stuxnet invaded Iran’s Supervisory Control and Data Acquisition systems through “zero-day” access.

Alipour added the malware, the first known worm to target large-scale systems and industrial complexes control systems, is also a serious threat to personal computers.

debkafile’s Iranian and intelligence sources report that these statements are preparing the ground for Tehran to go beyond condemning the states or intelligence bodies alleged to have sponsored the cyber attack on Iranian infrastructure and military industries and retaliate against them militarily. Iran is acting in the role of victim of unprovoked, full-scale, cyber terror aggression.

http://www.debka.com/

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s