Excerpts From Two DEBKAfile Special Reports!



after clomid





0 cialis comment currently reply

mber 28, 2010


Begin Excerpt 1 from DEBKAfile Special Report

Br its

cheap antibiotics online

declare war on Stuxnet. Americans say: Use it on North Korea

DEBKAfile Special Report

November 25, 2010, 1:36 PM (GMT+02:00)

The Stuxnet virus which has crippled Iran’s nuclear program has suddenly become the object of a British MI6 Secret Service campaign to convince the British and American public that it is the enemy of the West and sold on the black market to terrorists, DEBKAfile’s intelligence sources report. Thursday morning, Nov.

how do antibiotics affect birth control pills

25, Sky TV news led with a story claiming Stuxnet could attack any physical target dependent on computers. An unnamed Information Technology expert was quoted as saying enigmatically: “We have hard evidence that the virus is in the hands of bad guys – we can’t say any more than that but these people are highly motivated and highly skilled with a lot of money behind them.”

No one in the broadcast identified the “bad guys,” disclosed where they operated or when they sold the virus to terrorists. Neither were their targets specified, even by a row of computer and cyber-terrorism experts who appeared later on British television, all emphasizing how dangerous the virus was.

Our intelligence sources note that none of the British reporters and experts found it necessary to mention that wherever Stuxnet was discovered outside Iran, such as India, China and Indonesia, it was dormant.

search for phone number

female viagra

Computer experts in those countries recommended leaving it in place as it was harmless for computer programs and did not interfere with their operations. The fact is that the only place Stuxnet is alive and harmful is Iran – a fact ignored in the British reports.

add comment effects levitra side

Indeed, for the first time in the six months since Stuxnet partially disabled Iran’s nuclear reactor at Bushehr, Iran has found its first Western sympathizer, one who is willing to help defeat the malignant virus.

DEBKAfile’s sources note that the British campaign against Stuxnet was launched two days after Yukiya Amano, Director of the International Atomic Energy Agency, the IAEA, reported that Iran had briefly shut down its uranium enrichment plant in Natanz, apparently because of a Stuxnet assault on thousands of centrifuges. According to our Iranian sources, the plant had to be closed for six days, from Novem

best cialis levitra viagra which

ber 16-22.

cipro 500

Our sources also reported that the virus raided Iranian military computer systems, forcing the cancellation of parts of its large-scale air defense drill in the second week of November. Some of the systems used in the exercise started emitting wildly inaccurate data.

The Hate Stuxnet campaign London launched Thursday carried three messages to Tehran:

1. We were not complicit in the malworm’s invasion of your systems.

2. We share your view that Stuxnet is very dangerous and must be fought and are prepared to cooperate in a joint program to destroy it.

3. Britain will not line up behind the United States’ position in the nuclear talks to be resumed on Dec. 5 between Iran and the Six Powers (the five Permanent UN Security Council members + Germany). It will take a different position.

In the United States, meanwhile, DEBKAfile’s Washington sources report that Stuxnet’s reappearance against Iran’s nuclear program is hailed. A number of American IT experts and journals specializing in cyber war have maintained of late that if the malworm is so successful against Iran, why not use it to disable North Korea’s nuclear program, especially the 2,000 centrifuges revealed on Nov. 20 to be operating at a new enrichment facility?

The popular American publication WIRED carried a headline on Monday, November 22, asking, “Could Stuxnet Mess With North Korea’s New Uranium Plant?” The article noted that some of the equipment North Korea was using for uranium enrichment was identical to Iranian apparatus and therefore perfect targets for the use of Stuxnet by American cyber experts.

Begin Excerpt 2 from DEBKAfile Special Report

Stuxnet knocks Natanz out for a week, hits Iran’s air defense exercise

DEBKAfile Special Report

November 24, 2010, 9:02 AM (GMT+2:00)

Despite Iranian claims in October that their nuclear systems were cleansed of the Stuxnet virus, DEBKAfile’s intelligence and Iranian sources confirm that the invasive malworm is still making trouble.

22373 nexium usa

It shut down uranium enrichment at Natanz for a week from Nov.

body bro good levitra stuff up whats yea yea

diflucan cost

16 to 22 over breakdowns caused by mysterious power fluctuations in the operation of the centrifuge machines enriching uranium at Natanz.

The shutdown was reported by the director of the International Atomic Energy Agency Yukiya Amano to the IAEA board in Vienna on Tuesday, Nov.

2737 aid amerimedrx celebrex com nexium

female viagra cocktail


Rapid changes in the spinning speed of the thousands of centrifuges enriching uranium to weapons-grade can cause them to blow apart suddenly without the monitors detecting any malfunction. The Iranian operators first tried replacing the P1 and P2 centrifuges used at Natanz with the more advanced IR1 type, but got the same effect.

They finally decided to shut the plant down until computer security experts purged it of the malworm.

But then, when work was resumed Monday, about 5,000 of the 8,000 machines were found to be out of commission and the remaining 2,500-3,000 partially on the blink.

Tuesday, Ali Akbar Salehi, Director of Iran’s Nuclear Energy Commission tried to put a good face on the disaster. “Fortunately the nuclear Stuxnet virus has faced a dead end,” he said. However, the IAEA report and Western intelligence confirm that the virus has gathered itself for a fresh onslaught on Iran’s vital facilities.

According to an exclusive report reaching DEBKAfile, Stuxnet is also in the process of raiding Iran’s military systems, sowing damage and disorder in its wake.

On Nov. 17, in the middle of a massive air defense exercise, Iranian military sources reported six foreign aircraft had intruded the airspace over the practice sites and were put to flight by

blinklist com levitrai

Iranian fighters. The next day, a different set of military sources claimed a misunderstanding; there had been no intrusions. Iranian fighters had simulated an enemy raid which too had been repulsed.

DEBKAfile’s military sources disclose there was no “misunderstanding.” The foreign intruders had shown up on the exercise’s radar screens, but when the fighter jets scrambled to intercept them, they found empty sky, meaning the radar instruments had lied.

The military command accordingly decided to give up on using the exercise as a stage for unveiling new and highly sophisticated weaponry, including a homemade radar system, for fear that they too may have been infected by the ubiquitous Stuxnet worm.

FAIR USE NOTICE: This site contains copyrighted material the use of which has not always been specifically authorized by the copyright owner.

nolvadex tablets

We are making such material available in our efforts to advance understanding of environmental, political, human rights, economic, democracy, scientific, and social justice issues, etc. We believe this constitutes a ‘fair use’ of any such copyrighted material as provided for in section 107 of the US Copyright Law.

doxycycline cat

In accordance with Title 17 U.S.C. Section 107, the material on this site is distributed without profit to those who have expressed a prior interest in receiving the included information for research and educational purposes.

buy zithromax non-prescription

For more detailed information go to:


You may use material originated by this site. However, if you wish to use any quoted copyrighted material from this site, which did not originate at this site, for purposes of your own that go beyond ‘fair use’, you must obtain permission from the copyright owner from which we extracted it.

Comments are closed.