Generational Dynamics |
|
Forecasting America's Destiny ... and the World's | |
HOME WEB LOG COUNTRY WIKI COMMENT FORUM DOWNLOADS ABOUT | |
Britons are being trained by al-Qaeda for terrorist attacks
If you read Thursday's Tehran Times, then you'll read that the U.S. has launched a cyber war against Iran in response to president Mahmoud Ahmadinejad's recent speech at the U.N. where he blamed 9/11 on Americans. And you'll read that Iran's computer systems have such remarkably high security, they are impenetrable.
That may be nothing but spin. On Wednesday, Iran announced a three-month delay, from October until January, of the startup of the Bushehr nuclear power plant, according to VOA.
No reason was given for the delay. Although Iran denies it, some people suspect that the Stuxnet virus is the cause of the delay.
As we reported recently in "27-Sep-10 News -- Iran's nuclear plant attacked by Stuxnet computer virus," Iran has already admitted that the virus has spread to some of the Windows computers at the Bushehr plant, but that the major systems at the plant had not been damaged.
According to Debka, which has contacts within Israeli intelligence, Iran is hiding a far more desperate situation:
Looking beyond Iran's predicament, [one expert] wondered whether the people responsible for planting Stuxnet in Iran - and apparently continuing to offload information from its sensitive systems - have the technology for stopping its rampage. "My impression," he said, "is that somebody outside Iran has partial control at least on its spread. Can this body stop malworm in its tracks or kill it? We don't have that information at present, he said. ...
While Tehran has given out several conflicting figures on the systems and networks struck by the malworm - 30,000 to 45,000 industrial units - debkafile's sources cite security experts as putting the figure much higher, in the region of millions. If this is true, then this cyber weapon attack on Iran would be the greatest ever."
In other words, some foreign government, who launched the Stuxnet attack, may be either downloading sensitive information or actually controlling parts of the reactor.
The Debka report appears to be based on fact, augmented by some speculation. But if the figures stated turn out to be true, then this will be a world-changing event, not only because of its success, but because of the thousands of imitators it will spawn.
American drone strikes in Pakistan's tribal regions have killed a number of Britons -- Muslims with British passports -- who have been in al-Qaeda training camps, preparing for "Mumbai style" terrorist attacks back in Britain. Telegraph
The acrimony between France and the EU government in Brussels got worse on Wednesday after the European Commission in Brussels sent an ultimatim to France to permit Roma Gypsies to have unfettered freedom of movement around the EU. France was given an October 15 deadline to remedy the problem. Guardian
The suicide rate for the Boomer generation has been increasing significantly. Rutgers University
Women's rights activists in Iran have delivered a petition with 5,000 signatures to the Iranian parliament demanding that the practice of polygamy be banned. This is interesting because Iran is in a generational Awakening era, and women's issues always become more important during such eras. (For example, consider the 'women's lib' movement in America in the 1960s.) Polygamy has an important social purpose when war kills off much of the male population, leaving behind a surplus of unattached women. During Awakening eras, the new generation of young men and women reject their parents' views of sexuality and women. Eurasia Review
(Comments: For reader comments, questions and discussion,
see the 30-Sep-10 News -- Iran denies Stuxnet delayed nuclear plant opening
thread of the Generational Dynamics forum. Comments may
be posted anonymously.)
(30-Sep-2010)
Permanent Link
Receive daily World View columns by e-mail
Donate to Generational Dynamics via PayPal
Web Log Summary - 2016
Web Log Summary - 2015
Web Log Summary - 2014
Web Log Summary - 2013
Web Log Summary - 2012
Web Log Summary - 2011
Web Log Summary - 2010
Web Log Summary - 2009
Web Log Summary - 2008
Web Log Summary - 2007
Web Log Summary - 2006
Web Log Summary - 2005
Web Log Summary - 2004
Web Log - December, 2016
Web Log - November, 2016
Web Log - October, 2016
Web Log - September, 2016
Web Log - August, 2016
Web Log - July, 2016
Web Log - June, 2016
Web Log - May, 2016
Web Log - April, 2016
Web Log - March, 2016
Web Log - February, 2016
Web Log - January, 2016
Web Log - December, 2015
Web Log - November, 2015
Web Log - October, 2015
Web Log - September, 2015
Web Log - August, 2015
Web Log - July, 2015
Web Log - June, 2015
Web Log - May, 2015
Web Log - April, 2015
Web Log - March, 2015
Web Log - February, 2015
Web Log - January, 2015
Web Log - December, 2014
Web Log - November, 2014
Web Log - October, 2014
Web Log - September, 2014
Web Log - August, 2014
Web Log - July, 2014
Web Log - June, 2014
Web Log - May, 2014
Web Log - April, 2014
Web Log - March, 2014
Web Log - February, 2014
Web Log - January, 2014
Web Log - December, 2013
Web Log - November, 2013
Web Log - October, 2013
Web Log - September, 2013
Web Log - August, 2013
Web Log - July, 2013
Web Log - June, 2013
Web Log - May, 2013
Web Log - April, 2013
Web Log - March, 2013
Web Log - February, 2013
Web Log - January, 2013
Web Log - December, 2012
Web Log - November, 2012
Web Log - October, 2012
Web Log - September, 2012
Web Log - August, 2012
Web Log - July, 2012
Web Log - June, 2012
Web Log - May, 2012
Web Log - April, 2012
Web Log - March, 2012
Web Log - February, 2012
Web Log - January, 2012
Web Log - December, 2011
Web Log - November, 2011
Web Log - October, 2011
Web Log - September, 2011
Web Log - August, 2011
Web Log - July, 2011
Web Log - June, 2011
Web Log - May, 2011
Web Log - April, 2011
Web Log - March, 2011
Web Log - February, 2011
Web Log - January, 2011
Web Log - December, 2010
Web Log - November, 2010
Web Log - October, 2010
Web Log - September, 2010
Web Log - August, 2010
Web Log - July, 2010
Web Log - June, 2010
Web Log - May, 2010
Web Log - April, 2010
Web Log - March, 2010
Web Log - February, 2010
Web Log - January, 2010
Web Log - December, 2009
Web Log - November, 2009
Web Log - October, 2009
Web Log - September, 2009
Web Log - August, 2009
Web Log - July, 2009
Web Log - June, 2009
Web Log - May, 2009
Web Log - April, 2009
Web Log - March, 2009
Web Log - February, 2009
Web Log - January, 2009
Web Log - December, 2008
Web Log - November, 2008
Web Log - October, 2008
Web Log - September, 2008
Web Log - August, 2008
Web Log - July, 2008
Web Log - June, 2008
Web Log - May, 2008
Web Log - April, 2008
Web Log - March, 2008
Web Log - February, 2008
Web Log - January, 2008
Web Log - December, 2007
Web Log - November, 2007
Web Log - October, 2007
Web Log - September, 2007
Web Log - August, 2007
Web Log - July, 2007
Web Log - June, 2007
Web Log - May, 2007
Web Log - April, 2007
Web Log - March, 2007
Web Log - February, 2007
Web Log - January, 2007
Web Log - December, 2006
Web Log - November, 2006
Web Log - October, 2006
Web Log - September, 2006
Web Log - August, 2006
Web Log - July, 2006
Web Log - June, 2006
Web Log - May, 2006
Web Log - April, 2006
Web Log - March, 2006
Web Log - February, 2006
Web Log - January, 2006
Web Log - December, 2005
Web Log - November, 2005
Web Log - October, 2005
Web Log - September, 2005
Web Log - August, 2005
Web Log - July, 2005
Web Log - June, 2005
Web Log - May, 2005
Web Log - April, 2005
Web Log - March, 2005
Web Log - February, 2005
Web Log - January, 2005
Web Log - December, 2004
Web Log - November, 2004
Web Log - October, 2004
Web Log - September, 2004
Web Log - August, 2004
Web Log - July, 2004
Web Log - June, 2004