Добредојдовте
  • Users with e-mails at mail ·ru, aol ·com and gmx ·com to contact admins for registration.
  • Новорегистрираните членови повратниот одговор од форумот за активирање на сметката нека го побараат и во Junk на нивните пошти.
  • Сите регистрирани членови кои неучествуваат во дискусиите три месеци автоматски им се брише регистрацијата

 

Thread Rating:
  • 4 Vote(s) - 2.25 Average
  • 1
  • 2
  • 3
  • 4
  • 5
ДАЛИ ИЗРАЕЛ КЕ ГО НАПАДЕНЕ ИРАН ?
Author Message
ЈорданПетровски Online
ЈорданПетровски-ЦРНИ
*****

Posts: 17,148
Joined: Mar 2010
Reputation: 36
#1

Quote:Израел ќе го нападне Иран со 100 авиони

18 август 2010, 01:00

Без договор со САД, Израел ќе крене во напад на Иран, после мај идната година. Цел на нападот ќе бидат иранските нуклеарни постројки, а одлуката за испраќање борбени авиони на Иран засекогаш ќе го промени Блискиот Исток, пишува Џефри Голдберг, коментатор на месечникот Атлантик во последниот број.

[Image: images?q=tbn:ANd9GcR1Mvie6Is777SVeWpiO6f...rzjOwScs0=]

Во текстот под наслов 'Точка од која нема враќање', кој го напишал по брифинзи со водечки личности од израелскиот политички и воен естаблишмент, го разработил и сценариото по кое нападот ќе се одвива и кое, според него, има 50 отсто шанси да стане реално.

'Советникот за национална безбедност Узи Арад и министерот за одбрана Ехуд Барак ќе ги повикаат своите колеги во Белата куќа и ќе им кажат дека премиерот Бенџамин Нетанјаху штотуку наредил стотина авиони Ф-15 и Ф-16 да полетаат кон Иран, највероајтно преку Саудиска Арабија, а може и преку границата меѓу Сирија и Турција или директно низ водушниот простор на Ирак', пишува Голдберг.

'Авионите ќе ги бомбардираат постројките за обогатен ураниум во Натанзу, донеодамна скриената постројка во Комо, нуклеарниот истражувачки центар во Есфахан и можеби нуклеарниот реактор во Бушехру. Ерусалим ќе има право само на еден напад, по што авионите во низок лет ќе мора да се вратат назад, најверојатно преку Саудиска Арабија, каде можеби ќе дополнат гориво. Тие ќе мораат брзо назад зашто во меѓувреме Иран ќе му нареди на Хезболах напад врз Израел, па авионите ќе бидат потребни за борба против гранатирањето од либанската територија', пишува коментаторот.

Едeн израелски генерал на Голдберг му рекол дека проблем за нивните авиони нема да биде иранската противвоздушна одбрана, туку политичката ситуација по која Саудиска Арабија ќе биде виновна дека го овозможила нападот.

Како последица на сето ова, според Голдберг, можна е регионална војна во која ќе загинат илјадници луѓе. Цената на нафтата ќе се покачи до вртоглави висини, а Израел ќе се најде на удар на меѓународната заедница.

Меѓутоа, според Голдберг, во Израел го уверувале дека немаат избор – наспроти можноста Иран да создаде нуклеарна бомба, осудата на Израел изгледа мала жртва.

18-08-2010, 12:46 AM
Reply
basilius_2 Offline
Moderator
*****

Posts: 1,136
Joined: Dec 2009
Reputation: 17
#2

Najnova vest,Iranskata nuklearna programa dozivea udar od kompjuterski virus.Zasega nepoznati grupa na luge ja napadnale nuklearnata postrojka vo Busher,Iran i drugite instalacii,koristejki kompjuteri i im vmetnale virusi so sto gi razbolele centrifugite na nuklearnite postrojki.Imeno spored nekoi strucnjaci kodot na virusot "Ester" upatuva deka virusot e od Izraelsko proizvodstvo,no zasega ova se spekulacii.

23 September 2010 Last updated at 06:46 ET
Stuxnet worm 'targeted high-value Iranian assets'
By Jonathan Fildes Technology reporter, BBC News
Bushehr nuclear power plant Some have speculated the intended target was Iran's nuclear power plant

One of the most sophisticated pieces of malware ever detected was probably targeting "high value" infrastructure in Iran, experts have told the BBC.

Stuxnet's complexity suggests it could only have been written by a "nation state", some researchers have claimed.

It is believed to be the first-known worm designed to target real-world infrastructure such as power stations, water plants and industrial units.

It was first detected in June and has been intensely studied ever since.

"The fact that we see so many more infections in Iran than anywhere else in the world makes us think this threat was targeted at Iran and that there was something in Iran that was of very, very high value to whomever wrote it," Liam O'Murchu of security firm Symantec, who has tracked the worm since it was first detected, told BBC News.
Continue reading the main story
Related stories

* Spies 'infiltrate US power grid'
* Can governments win a cyber-war?

Some have speculated that it could have been aimed at disrupting Iran's delayed Bushehr nuclear power plant or the uranium enrichment plant at Natanz.

However, Mr O'Murchu and others, such as security expert Bruce Schneier, have said that there was currently not enough evidence to draw conclusions about what its intended target was or who had written it.

Initial research by Symantec showed that nearly 60% of all infections were in Iran. That figure still stands, said Mr O'Murchu, although India and Indonesia have also seen relatively high infection rates.
'Rare package'

Stuxnet was first detected in June by a security firm based in Belarus, but may have been circulating since 2009.

Unlike most viruses, the worm targets systems that are traditionally not connected to the internet for security reasons.

Instead it infects Windows machines via USB keys - commonly used to move files around - infected with malware.

Once it has infected a machine on a firm's internal network, it seeks out a specific configuration of industrial control software made by Siemens.
Siemens factory The worm searches out industrial systems made by Siemens

Once hijacked, the code can reprogram so-called PLC (programmable logic control) software to give attached industrial machinery new instructions.

"[PLCs] turn on and off motors, monitor temperature, turn on coolers if a gauge goes over a certain temperature," said Mr O'Murchu.

"Those have never been attacked before that we have seen."

If it does not find the specific configuration, the virus remains relatively benign.

However, the worm has also raised eyebrows because of the complexity of the code used and the fact that it bundled so many different techniques into one payload.

"There are a lot of new, unknown techniques being used that we have never seen before," he said These include tricks to hide itself on PLCs and USB sticks as well as up to six different methods that allowed it to spread.

In addition, it exploited several previously unknown and unpatched vulnerabilities in Windows, known as zero-day exploits.

"It is rare to see an attack using one zero-day exploit," Mikko Hypponen, chief research officer at security firm F-Secure, told BBC News. "Stuxnet used not one, not two, but four."

He said cybercriminals and "everyday hackers" valued zero-day exploits and would not "waste" them by bundling so many together.

Microsoft has so far patched two of the flaws.
'Nation state'

Mr O'Murchu agreed and said that his analysis suggested that whoever had created the worm had put a "huge effort" into it.

"It is a very big project, it is very well planned, it is very well funded," he said. "It has an incredible amount of code just to infect those machines."
Continue reading the main story
“Start Quote

There have been no instances where production operations have been influenced or where a plant has failed”

End Quote Siemen's spokesperson

His analysis is backed up by other research done by security firms and computer experts.

"With the forensics we now have it is evident and provable that Stuxnet is a directed sabotage attack involving heavy insider knowledge," said Ralph Langner, an industrial computer expert in an analysis he published on the web.

"This is not some hacker sitting in the basement of his parents' house. To me, it seems that the resources needed to stage this attack point to a nation state," he wrote.

Mr Langner, who declined to be interviewed by the BBC, has drawn a lot of attention for suggesting that Stuxnet could have been targeting the Bushehr nuclear plant.

In particular, he has highlighted a photograph reportedly taken inside the plant that suggests it used the targeted control systems, although they were "not properly licensed and configured".

Mr O'Murchu said no firm conclusions could be drawn.

However, he hopes that will change when he releases his analysis at a conference in Vancouver next week.

"We are not familiar with what configurations are used in different industries," he said.

Instead, he hopes that other experts will be able to pore over their research and pinpoint the exact configuration needed and where that is used.
'Limited success'

A spokesperson for Siemens, the maker of the targeted systems, said it would not comment on "speculations about the target of the virus".

He said that Iran's nuclear power plant had been built with help from a Russian contractor and that Siemens was not involved.

"Siemens was neither involved in the reconstruction of Bushehr or any nuclear plant construction in Iran, nor delivered any software or control system," he said. "Siemens left the country nearly 30 years ago."

Siemens said that it was only aware of 15 infections that had made their way on to control systems in factories, mostly in Germany. Symantec's geographical analysis of the worm's spread also looked at infected PCs.

"There have been no instances where production operations have been influenced or where a plant has failed," the Siemens spokesperson said. "The virus has been removed in all the cases known to us."

He also said that according to global security standards, Microsoft software "may not be used to operate critical processes in plants".

It is not the first time that malware has been found that affects critical infrastructure, although most incidents occur accidentally, said Mr O'Murchu, when a virus intended to infect another system accidentally wreaked havoc with real-world systems.

In 2009 the US government admitted that software had been found that could shut down the nation's power grid.

And Mr Hypponen said that he was aware of an attack - launched by infected USB sticks - against the military systems of a Nato country.

"Whether the attacker was successful, we don't know," he said.

Mr O'Murchu will present his paper on Stuxnet at Virus Bulletin 2010 in Vancouver on 29 September. Researchers from Kaspersky Labs will also unveil new findings at the same event.

http://www.bbc.co.uk/news/technology-11388018
25-11-2010, 03:18 PM
Reply
basilius_2 Offline
Moderator
*****

Posts: 1,136
Joined: Dec 2009
Reputation: 17
#3

http://www.theglobeandmail.com/news/tech...le1809574/

Virus
The Stuxnet worm at war in Iran
INGRID PERITZ
MONTREAL— From Tuesday's Globe and Mail
Published Monday, Nov. 22, 2010 11:35PM EST
Last updated Wednesday, Nov. 24, 2010 4:56PM EST
78 comments

The intrigue and mystery read like the stuff of a spy novel, updated for the digital age.

There’s theories of state-sponsored sabotage, coded biblical messages, and a real computer worm called Stuxnet.

Security experts around the globe have unearthed evidence that Stuxnet was able to penetrate industrial plants in Iran and may have been deliberately crafted to destabilize that country’s controversial nuclear-enrichment operations.

Interactive
Anatomy of a cyber crime

The next world war will likely happen in cyber space. And we all know that the best way to win a war, any war, is to avoid it in the first place. —Hamadoun Touré, secretary general of the United Nations’ International Telecommunications Union

Download this media file
PDF Document
How the Stuxnet virus works

Download this file (.pdf)

Recent days have brought escalating suggestions of a covert cyber-operation.

On Monday, diplomats and nuclear inspectors disclosed that Tehran’s nuclear program has been beset by major technical woes that have forced thousands of uranium-enriching centrifuges to shut down, with the worm in question cited as a main suspect.

The intrigue has intensified by intimations, yet unproven, that authorship of the worm might lie in Israel, which regards Iran’s nuclear ambitions as a mortal threat.

Stuxnet was first detected in June and appeared to have infiltrated industrial systems in countries such as India, Indonesia and Iran. But nuclear analysts and computer-security experts now say they believe the worm was configured in such a way that could specifically make Iran’s centrifuges spin out of control.

German computer-security expert Ralph Langner said last week the worm contained two “digital warheads” designed to strike at both the Bushehr nuclear power plant and the Natanz uranium-enrichment site in Iran.

Strategically, such an attack could destroy centrifuge facilities that are unknown to international nuclear inspectors, he said.

While both the target and source for the digital assault are still uncertain, experts say the notion of trying to attack a state through cyber-sabotage isn’t far-fetched.

“There’s an arms race in cyberspace,” said Ron Deibert, director of the Canadian Centre for Global Security Studies at the Munk School of Global Affairs in Toronto. “Governments are competing against each other within this space. Part of that implies the development of techniques, such as these, that target advanced industrial control systems through computer worms.”

For now, Prof. Deibert said, it remains an open question whether a government is behind this particular offensive.

But that hasn’t stopped the speculation.

Mr. Langner discovered a file inside the computer code that could point to Israel’s paternity. The file’s name, Myrtus, is said to be an allusion to the Hebrew word for Esther, a biblical figure regarded as the saviour of the Jews during the time of Persian domination. The Old Testament’s Book of Esther tells the story of the Jews’ success in thwarting a Persian plot to kill them.

A series of numbers found in the program is also feeding guesswork. The seemingly random sequence – 19790509 – could be a reference to May 9, 1979. That’s the day a prominent Iranian Jew, Habib Elghanian, was executed by Tehran after being charged with “corruption” and “contacts with Israel and Zionism.”

Israel certainly has the motivation to destabilize Iran, whose nuclear program is seen as a threat to Israel’s existence. The United States has also been fingered as having the sophistication and capability to spring such a cyber-attack.

But experts caution about getting bogged down in Dan Brown-like conspiracies about hidden codes, and say the Myrtus and other references might be red herrings to throw off detection of the true authors.

“If you’re the Mossad doing this, are you going to include a Hebrew biblical reference to a piece of software that you’re using to attack your mortal enemy?” asked Rafal Rohozinski, CEO of The SecDev Group in Ottawa. “We can say that the Israelis would have good reason to do it, we could say that it would have been in the interests of the Americans, but to say that this has their fingerprints on it, and could only be mustered with their kind of resources, is not true at all.”

Either way, the malware has been described as first-of-its-kind for the way it jumps from Windows-based computers to systems that control industrial equipment.

“Whether it’s a 16-year-old pimply kid in Murmansk or the best brains of the Mossad – the fact is, it did do something interesting,” Mr. Rohozinski added.

For its part, Iran has acknowledged that Stuxnet did infect computers in its nuclear program, including some used by workers at the Bushehr plant. Last month, Tehran announced it had arrested a number of “nuclear spies.”

Experts have given credence to the idea that Tehran’s nuclear program could be vulnerable to technological skulduggery. U.S. cyber-security expert Scott Borg said last year that a computer worm could be inserted through a contaminated USB memory stick to disable sensitive sites such as Iran’s uranium enrichment plants. “Israel can definitely be assumed to have advanced cyber-attack capabilities,” he added.

And, in fact, Stuxnet is believed to have infected Iranian facilities through a USB memory stick.

“There’s strong circumstantial evidence that Iran was the object of the attack,” Mr. Rohozinski said. And while there are still many unanswered questions in this bit of industrial intrigue, he’s not surprised by the fascination around it.

“This is the stuff that John le Carré novels were written about.”
(This post was last modified: 25-11-2010, 03:41 PM by basilius_2.)
25-11-2010, 03:40 PM
Reply
montehristo Offline
Неверан Тома
*****

Posts: 1,490
Joined: Aug 2010
Reputation: 30
#4

Quote:
The Mysterious "Laptop Documents". Using Fake Intelligence to Justify a Pre-emptive Nuclear War on Iran


By Michel Chossudovsky

URL of this article: http://www.globalresearch.ca/index.php?c...&aid=22085

Global Research, November 24, 2010


The UN Security Council on June 9 2010 adopted the imposition of a fourth round of sweeping sanctions against The Islamic Republic of Iran. UNSC Resolution 1929 includes an expanded arms embargo as well as "tougher financial controls":

“[Resolution 1929 (June 9, 2010)] Decides that all States shall prevent the direct or indirect supply, sale or transfer to Iran, from or through their territories or by their nationals or individuals subject to their jurisdiction, or using their flag vessels or aircraft, and whether or not originating in their territories, of any battle tanks, armoured combat vehicles, large calibre artillery systems, combat aircraft, attack helicopters, warships, missiles or missile systems .... , decides further that all States shall prevent the provision to Iran by their nationals or from or through their territories of technical training, financial resources or services, advice, other services or assistance related to the supply, sale, transfer, provision, manufacture, maintenance or use of such arms and related materiel, and, in this context, calls upon all States to exercise vigilance and restraint over the supply, sale, transfer, provision, manufacture and use of all other arms and related materiel;" (Security Council Imposes Additional Sanctions on Iran, Voting 12 in Favour to 2 Against, with 1 Abstention, Includes complete text of UNSC Resolution 1929, UN News, June 9, 2010, emphasis added, )

Both the Russian Federation and the People's Republic of China caved in to US pressures and voted in favor of UNSC Resolution 1929. In November, following a decree issed by president Dmitry Medvedev, Moscow announced the cancellation of its military cooperation agreement with Iran pertaining to the S300 air defense system.

Without Russian military aid, Iran is a "sitting duck". Its air defence system depends on continued Russian military cooperation.

These developments strike at the very heart of the structure of military alliances. They prevent Russia and China to sell both strategic and conventional weapons and military technology to their de facto ally: Iran. In fact, that was one of major objectives of Resolution 1929, which Washington is intent upon enforcing.

Fake Intelligence

UNSC Resolution 1929 is based on a fundamental falsehood. It upholds the notion that Iran is an upcoming nuclear power and a threat to global security. It also provides a green light to the US-NATO-Israel military alliance to threaten Iran with a pre-emptive punitive nuclear attack, using the UN Security Council as rubber stamp.

The US stance in the UN Security Council, has in part based on alleged intelligence documents which provide "evidence" of Iran's nuclear weapons program.

In November 2005, the New York Times published a report by William J. Broad and David E. Sanger entitled "Relying on Computer, U.S. Seeks to Prove Iran's Nuclear Aims". Washington's allegations, reported in the NYT hinged upon documents "obtained from a stolen Iranian computer by an unknown source and given to US intelligence in 2004". (See Gareth Porter, Exclusive Report: Evidence of Iran Nuclear Weapons Program May Be Fraudulent, Global Research, November 18, 2010, emphasis added).

These documents included "a series of drawings of a missile re-entry vehicle" which allegedly could accommodate an Iranian produced nuclear weapon.

"In mid-July, senior American intelligence officials called the leaders of the international atomic inspection agency to the top of a skyscraper overlooking the Danube in Vienna and unveiled the contents of what they said was a stolen Iranian laptop computer.

The Americans flashed on a screen and spread over a conference table selections from more than a thousand pages of Iranian computer simulations and accounts of experiments, saying they showed a long effort to design a nuclear warhead, according to a half-dozen European and American participants in the meeting.

The documents, the Americans acknowledged from the start, do not prove that Iran has an atomic bomb. They presented them as the strongest evidence yet that, despite Iran's insistence that its nuclear program is peaceful, the country is trying to develop a compact warhead to fit atop its Shahab missile, which can reach Israel and other countries in the Middle East."(William J. Broad and David E. Sanger Relying on Computer, U.S. Seeks to Prove Iran's Nuclear Aims - New York Times, November 13, 2005)

These "secret documents" were subsequently submitted by the US State Department to the International Atomic Energy Agency IAEA, with a view to demonstrating that Iran was developing a nuclear weapons program.

While their authenticity has been questioned on several occasions, a recent article by investigative reporter Gareth Porter confirms unequivocally that the mysterious laptop documents are fake. The drawings contained in the documents do not pertain to the Shahab missile but to an obsolete North Korean missile system which was decommissioned by Iran in the mid-1990s.

How stupid! The drawings presented by US State Department officials pertained to the "Wrong Missile Warhead":

In July 2005, ... Robert Joseph, US undersecretary of state for arms control and international security, made a formal presentation on the purported Iranian nuclear weapons program documents to the agency's leading officials in Vienna. Joseph flashed excerpts from the documents on the screen, giving special attention to the series of technical drawings or "schematics" showing 18 different ways of fitting an unidentified payload into the re-entry vehicle or "warhead" of Iran's medium-range ballistic missile, the Shahab-3.

When IAEA analysts were allowed to study the documents, however, they discovered that those schematics were based on a re-entry vehicle that the analysts knew had already been abandoned by the Iranian military in favor of a new, improved design. The warhead shown in the schematics had the familiar "dunce cap" shape of the original North Korean No Dong missile, which Iran had acquired in the mid-1990s. ...

The laptop documents had depicted the wrong re-entry vehicle being redesigned. ... (Gareth Porter, op cit )

Who was behind the production of fake intelligence? Gareth Porter's suggests that Israel's Mossad has been a source of fake intelligence regarding Iran's alleged nuclear weapons program:

The origin of the laptop documents may never be proven conclusively, but the accumulated evidence points to Israel as the source. As early as 1995, the head of the Israel Defense Forces' military intelligence research and assessment division, Yaakov Amidror, tried unsuccessfully to persuade his American counterparts that Iran was planning to "go nuclear." By 2003-2004, Mossad's reporting on the Iranian nuclear program was viewed by high-ranking CIA officials as an effort to pressure the Bush administration into considering military action against Iran's nuclear sites, according to Israeli sources cited by a pro-Israeli news service." (Ibid)

Lies and Fabrications to Justify a Military Agenda

The laptop documents were essential to sustaining America's position in the UN Security Council.

We are dealing with a clear case of fake intelligence comparable to that presented by Colin Powell in February 2003 on Iraq's alleged weapons of mass destruction. The fake intelligence presented to the UN Security Council was used as a justification for the March 2003 invasion of Iraq.

"The evidence, or lack thereof, speaks for itself. In the months leading up to the war in Iraq, the Bush administration produced hundreds of pages of intelligence for members of Congress and for the United Nations that showed how Iraq’s President Saddam Hussein possessed tons of chemical and biological weapons and was actively pursuing a nuclear weapons program.

The intelligence information, gathered by the CIA and the Defense Intelligence Agency, a Department of Defense agency that gathers foreign military intelligence for the Pentagon, was used by the Bush administration to convince the public that Iraq posed a threat to the world." (See Jason Leopold, Powell Denies Intelligence Failure In Buildup To War, But Evidence Doesn’t Hold Up, Global Research, 10 June 2003)




Iran's Shahab Missile system


The US has once again used fake intelligence to build a justification to wage war.

The position of the US in the UN Security Council falls flat. The important question is whether Russia and China will revise their stance in the United Nations Security Council pertaining to the Iran's sanctions regime?

Will the US antiwar movement confront Washington's plans to wage a pre-emptive nuclear war against Iran based on fake intelligence?
An inch today is tomorrow’s mile.
30-11-2010, 02:38 PM
Reply