Saturday, October 2, 2010
Yahoo Question and Answer are harassing many peace activists
What is the objective of the Jews?, Contemporary Jewish Quotes About non-Jews , Pre-Contemporary Jewish Quotes About non-Jews and Zionism Is Incompatible With Any Society clearly demonstrate Jewish targets, mindset and history! The following games of theirs make them insane!!
Israelis, Israeli supporters and Yahoo Question and Answer are harassing many peace activists
Iran arrests alleged nuclear cyberspace spies
- From: NewsCore
- October 03, 2010 1:17AM
IRAN has arrested several alleged nuclear spies amid speculation a powerful computer virus infected one of the country's main power plants.
Last month, the country denied its Bushehr nuclear station, which opened in August after 35 years of building delays, was badly affected by the Stuxnet worm.
The comments followed widespread suggestions that the super virus had spread through Iran's computerized industrial equipment, with some 30,000 IP addresses already suffering.
Intelligence minister Heydar Moslehi was quoted by Iran's Mehr news agency as saying his department was fully aware of the activities of "enemies' spy services." He did not, however, reveal exactly how many people were arrested.
Mr Moslehi said Iran discovered the "destructive activities of the arrogance (of Western powers) in cyberspace, and different ways to confront them have been designed and implemented".
He added, "I assure all citizens that the intelligence apparatus currently has complete supervision on cyberspace and will not allow any leak or destruction of our country's nuclear activities."
Experts believe the Stuxnet worm was designed to destroy or sabotage factories, power plants, refineries or other industrial installations. The advanced nature of the virus prompted suggestions it was almost certainly state-sponsored.
The nation’s nuclear ambitions are the source of much contention between Iran and the West, which suspects the Islamic republic seeks to develop atomic weapons under the guise of providing energy -- an allegation consistently denied by Iran.
For more: What is the objective of the Jews?
Contemporary Jewish Quotes About non-Jews , Pre-Contemporary Jewish Quotes About non-Jews and Zionism Is Incompatible With Any Society clearly demonstrate Jewish targets, mindset and history! The following games of theirs make them insane!!
Stuxnet is malware likely designed to infiltrate Iranian (60% of computers infected were in Iran) industrial computers which controlled numerous automated processes in factory production cycles. This virus has caused damage to many other parts of the world including USA, UK, Australia, … ! Many experts are saying it is an Israeli virus!!
Does this nation have any respect for world peace, stability, humanity, justice and fairness? Does this rogue state would like to destroy the world?
Does Iran or any other nation for that matter require permission from Israel and USA before developing any technology?
For more: Israeli Nuclear Terrorism
Kate Andersen Brower
September 26, 2010
Obama: Iranian leader's comments 'hateful'
US President Barack Obama reacts Mahmoud Ahmadinejad's suggestion that the US was behind the World Trade Centre attacks.
NEW YORK: US President Barack Obama has slammed Iranian President Mahmoud Ahmadinejad's September 11 conspiracy theory comments at the United Nations as ''offensive'' and ''hateful''.
In his first comments on the Iranian leader's statement that the 2001 terrorist attacks on America may have been orchestrated to bolster the US economy and ''save the Zionist regime'', Mr Obama told BBC Persian that ''for him to make a statement like that was inexcusable''.
President Ahmadinejad's statements do not serve the interests of the Iranian people, says Barack Obama. Photo: Reuters
US and European diplomats walked out of the UN General Assembly hall on Friday when Mr Ahmadinejad delivered his remarks about the September 11 attacks on New York and the Pentagon.
Envoys representing Australia, Canada, Costa Rica and New Zealand also left during the speech.
The interview with BBC Persian is part of Mr Obama's attempt to communicate directly with the Iranian people as the US and other nations increase pressure on Mr Ahmadinejad's government to comply with UN demands that it halt uranium enrichment.
''To have a President who makes outrageous, offensive statements like this does not serve the interests of the Iranian people, does not strengthen Iran's stature in the world community,'' Mr Obama said.
The US, Britain, China, France, Germany and Russia were united last week in telling Mr Ahmadinejad to comply with UN Security Council demands or remain under trade and financial sanctions. The council wants Iran to cease uranium enrichment and answer the International Atomic Energy Agency's questions about whether the effort is designed to achieve a weapons capability.
In his speech to the General Assembly on Friday, Mr Obama said while he was willing to negotiate, ''the Iranian government must demonstrate a clear and credible commitment, and confirm to the world the peaceful intent of its nuclear program''.
Mr Obama told BBC Persian that Mr Ahmadinejad's address ''defies not just common sense but basic sense - basic senses of decency that aren't unique to any particular country - they're common to the entire world''.
He drew a distinction between the Iranian people and their government, saying that when the September 11 attacks took place there was ''a natural sense of shared humanity and sympathy expressed within Iran''.
''It just shows once again sort of the difference between how the Iranian leadership and this regime operates and how I think the vast majority of the Iranian people who are respectful and thoughtful think about these issues,'' he said
Israeli Nuclear TerrorismDer digitale Erstschlag ist erfolgt
For more: Israeli Nuclear Terrorism
Does Iran or any other nation for that matter require permission from Israel and USA before developing any technology?
Further to Iran, American Game and Israeli Subordination and Israel and Palestine Talk for Peace While the Scared Obama Administration Rewards Israeli Terrorism! the whole world is suffering from Israeli terrorism.
This terrorist nation has unleashed viruses and it got the potential to start a nuclear war!
Naturally, the obvious question in the horizon, does this terrorist nation has any respect for the world peace, stability and humanity?
President Ahmadinejad interview with Fox News Network (Very badly edited) clearly demonstrate the fact that majority of the American media outlets are worse than drug addict and lacking manner.
Should anyone have any respect for fairness, notion of justice and free speech then please compare these Agenda Items and speeches and let us know who is right and wrong:
1. Agenda Items and Resolution of WORLD CONFERENCE AGAINST RACISM 2001
Source: Zaki Ameen and Israeli Slaves
The first strike was made digital (A Must Read Article)
Bushehr nuclear plant computer screen displaying software program attacked by Stuxnet worm ((UPI/Mohammad Kheirkhah)
Though the Stuxnet cyber-attack which likely targeted Iran’s nuclear facilities may’ve begun as early as 2009, computer security experts have only this month published their full analysis of one of the most sophisticated and powerful computers worms ever developed, and what industrial damage it may’ve done.
Stuxnet is malware likely designed to infiltrate Iranian (60% of computers infected were in Iran) industrial computers which controlled numerous automated processes in factory production cycles. The most likely target according to most experts consulted would be Iran’s Bushehr nuclear reactor complex, which last year was reported by Israeli media to have been sabotaged and faced extensive production delays. Since Bushehr is using Russian-supplied fuel not related to centrifuges or uranium enrichment, it seems unlikely they were the goal. But there clearly is some key industrial process likely targeted at Bushehr and the worm may’ve either destroyed equipment or corrupted a production cycle central to the reactor’s function.
By all accounts. the worm is so advanced, performs so many functions, and operates in such a complex fashion that it can only have been produced by the intelligence agency of a sovereign nation. We can imagine which nations would have the capacity to mount such an operation and the motivation to sabotage Iran’s nuclear program. The CIA and Mossad (or IDF military intelligence) spring to mind. My money is either on Israel and a shared operation mounted in some way by both countries.
IDF military intelligence has such a capability, Unit 8200, which analyzes intercepted communications and performs all manner of cyber-warfare tasks. A recent profile of the group described its operations in some detail though didn’t deal with the question of whether 8200 may’ve been involved in this attack. Forbes published this warm and fuzzy profile as well making 8200 out to be a real cool version of Silicon Valley.
This military unit performs a similar role in Israeli society to that of the Silicon Valley here. Since most Israelis serve in the army, this  is where the techno-geeks among them gravitate. And when they exit their military service with their advanced technical training, they not only create commerical technology start-ups, they also continue developing products for Israel’s security apparatus. Such an 8200 alumnus founded Carmel Ventures, an Israeli venture capital outfit which funded Yuval Tal’s Payoneer, a U.S. company providing prepaid debit cards to its customers, who happened to be two of the Mossad hitmen who “hit” Mahmoud al-Mabouh in Dubai.
Since I don’t claim to be a computer security expert, but feel that Stuxnet is a very important development not only in and of itself, but also for the impact it will have on the Iran nuclear debate, I’m going to quote at some length from the recent technical articles about it in industry publications. It’s really fascinating stuff even for a layperson. Let’s start with PCWorld:
Researchers studying the worm all agree that Stuxnet was built by a very sophisticated and capable attacker — possibly a nation state — and it was designed to destroy something big…some of the researchers who know Stuxnet best say that it may have been built to sabotage Iran’s nukes.
…Last week Ralph Langner, a well-respected expert on industrial systems security, published an analysis of the worm, which targets Siemens software systems, and suggested that it may have been used to sabotage Iran’s Bushehr nuclear reactor...Bushehr reportedly experienced delays last year, several months after Stuxnet is thought to have been created, and according to screen shots of the plant posted by UPI, it uses the Windows-based Siemens PLC software targeted by Stuxnet.
…One of the things that Langner discovered is that when Stuxnet finally identifies its target, it makes changes to a piece of Siemens code called Organizational Block 35. This Siemens component monitors critical factory operations — things that need a response within 100 milliseconds. By messing with Operational Block 35, Stuxnet could easily cause a refinery’s centrifuge to malfunction, but it could be used to hit other targets too, Byres said. “The only thing I can say is that it is something designed to go bang,” he said.
…This is not something that your run-of-the-mill hacker can pull off. Many security researchers think that it would take the resources of a nation state to accomplish.
It is common for such malware to exploit a single weakness to infect a computer or system, but Stuxnet uses four separate vulnerabilities, which is unheard of for such worms. It also uses two forged digital certificates, which further indicates the highly sophisticated nature of the attack. It is important to note that Israel’s high tech industry has made a specialty of developing digital certificates. As one of my readers who specializes in IT wrote:
Public and private key technology (the basis of certificates) is indeed an Israeli computer specialty. The Weizman Institute in fact is the premier research university for such things.
What better country to forge a digital certificate than one whose techno hackers specialize in creating them? When you know a technology you also know how to exploit its weaknesses.
CNET’s report amplifies on Langner’s findings:
“With the forensics we now have, it is evident and provable that Stuxnet is a directed sabotage attack involving heavy insider knowledge,” he wrote. “The attack combines an awful lot of skills–just think about the multiple zero-day vulnerabilities, the stolen certificates, etc. This was assembled by a highly qualified team of experts, involving some with specific control system expertise. This is not some hacker sitting in the basement of his parents’ house. To me, it seems that the resources needed to stage this attack point to a nation state.”
Computerworld’s report quotes Symantec experts who have studied the worm extensively:
The Stuxnet worm is a “groundbreaking” piece of malware so devious in its use of unpatched vulnerabilities, so sophisticated in its multipronged approach, that the security researchers who tore it apart believe it may be the work of state-backed professionals.
“It’s amazing, really, the resources that went into this worm,” said Liam O Murchu, manager of operations with Symantec’s security response team.
“I’d call it groundbreaking,” said Roel Schouwenberg, a senior antivirus researcher at Kaspersky Lab. In comparison, other notable attacks, like the one dubbed Aurora that hacked Google’s network and those of dozens of other major companies, were child’s play.
Here they analyze in greater details the particular ways in which Stuxnet operates and the technical ambition and complexity required to create it:
Once within a network — initially delivered via an infected USB device — Stuxnet used the EoP [elevation of privilege] vulnerabilities to gain administrative access to other PCs, sought out systems running the WinCC and PCS 7 SCADA management programs, hijacked them by exploiting either the print spooler or MS08-067 bugs, then tried the default Siemens passwords to commandeer the SCADA software.
They could then reprogram the so-called PLC (programmable logic control) software to give machinery new instructions.
On top of all that, the attack code seemed legitimate because the people behind Stuxnet had stolen at least two signed digital certificates.
“The organization and sophistication to execute the entire package is extremely impressive,” said Schouwenberg. “Whoever is behind this was on a mission to get into whatever company or companies they were targeting.”
O Murchu seconded that. “There are so many different types of execution needs that it’s clear this is a team of people with varied backgrounds, from the rootkit side to the database side to writing exploits,” he said.
The malware, which weighed in a nearly half a megabyte — an astounding size, said Schouwenberg — was written in multiple languages, including C, C++ and other object-oriented languages, O Murchu added.
“And from the SCADA side of things, which is a very specialized area, they would have needed the actual physical hardware for testing, and [they would have had to] know how the specific factory floor works,” said O Murchu.
“Someone had to sit down and say, ‘I want to be able to control something on the factory floor, I want it to spread quietly, I need to have several zero-days,’” O Murchu continued. “And then pull together all these resources. It was a big, big project.”
…Put all that together, and the picture is “scary,” said O Murchu.
So scary, so thorough was the reconnaissance, so complex the job, so sneaky the attack, that both O Murchu or Schouwenberg believe it couldn’t be the work of even an advanced cybercrime gang.
“I don’t think it was a private group,” said O Murchu. “They weren’t just after information, so a competitor is out. They wanted to reprogram the PLCs and operate the machinery in a way unintended by the real operators. That points to something more than industrial espionage.”
The necessary resources, and the money to finance the attack, puts it out the realm of a private hacking team, O Murchu said.
“This threat was specifically targeting Iran,” he continued. “It’s unique in that it was able to control machinery in the real world.”
“All the different circumstances, from the multiple zero-days to stolen certificates to its distribution, the most plausible scenario is a nation-state-backed group,” said Schouwenberg
Symantec has also published a more technically detailed analysis of Stuxnet for the more adept among you.
Let’s step back and ask a few questions. While Stuxnet and other types of sabotage may’ve delayed Iran’s nuclear production and research, do we really believe that Iran’s scientists are so simple and naive that they would create only a single track for their work? Do we really believe this will cause any more than a temporary delay for them in developing their nuclear technology? No matter how damaging the worm is, no matter how impressive the technical achievement that brought it forth, it’s at best a stop-gap measure. As such, it doesn’t get at the root issue or the root way to resolve the problem which, once again like a broken record, I proclaim to anyone who will listen is a negotiated diplomatic solution.
Whatever Iran is trying to do cannot be stopped except by negotiation or war, leading to toppling the regime and replacing it with a West-compliant one (and good luck with that).
In regards to the latter option, if Israel deliberately used cyber-sabotage in order to mess with the minds and facilities of Iranian scientists, they may’ve coupled such an operation with a more deliberate one to bomb the facilities later. Such a two-pronged approach would make more sense from a military-intelligence perspective than simply messing up the production schedule of Bushehr for a year. But again, what do I know, I’m only speculating. Educated speculation by someone who has studied such minds at work for some time–but speculation nonetheless.
Paul Woodward, as usual, was one of the first bloggers to note a connection between Stuxnet and a possible U.S. or Israeli attack on Iran.
Related posts brought to you by Yet Another Related Posts Plugin.
This entry was posted on Wednesday, September 22nd, 2010 at 10:40 PM and is filed under Mideast Peace, Politics & Society. You can follow any responses to this entry through the RSS 2.0 feed. You can leave a response, or trackback from your own site.
17 Responses to “Security Experts: Possible Israeli Cyber Attack Sabotaged Iran’s Bushehr Reactor”
Friday, September 3, 2010
The complete guide to killing non-Jews
Projection of the West Bank Final Status Map presented by Israel, Camp David, July 2000 and the Western media kept it secret.
I believe the 9/11 had something to do with this ‘genuine’ offer.
Israel Does Not Want Peace.
LATEST UPDATE — August 30 2010: Max Blumenthal reports from a conference supporting the rabbi (older updates at bottom.)
The ultra-fundamentalist Od Yosef Hai yeshiva in the West Bank settlement of Yitzhar is infamous for its involvement in settler violence against Palestinians. Memorably, one of the students fired a homemade “Kassam” rocket at the neighboring village of Burin in June 2008. This morning, Maariv reports that the Yeshiva’s dean has just published on the proscribed dos and don’ts (mainly the former) regarding the killing of gentiles. Here are some choice excerpts.
“In any situation in which a non-Jew’s presence endangers Jewish lives, the non-Jew may be killed even if he is a righteous Gentile and not at all guilty for the situation that has been created…When a non-Jew assists a murderer of Jews and causes the death of one, he may be killed, and in any case where a non-Jew’s presence causes danger to Jews, the non-Jew may be killed…The [Din Rodef] dispensation applies even when the pursuer is not threatening to kill directly, but only indirectly…Even a civilian who assists combat fighters is considered a pursuer and may be killed. Anyone who assists the army of the wicked in any way is strengthening murderers and is considered a pursuer. A civilian who encourages the war gives the king and his soldiers the strength to continue. Therefore, any citizen of the state that opposes us who encourages the combat soldiers or expresses satisfaction over their actions is considered a pursuer and may be killed. Also, anyone who weakens our own state by word or similar action is considered a pursuer…Hindrances—babies are found many times in this situation. They block the way to rescue by their presence and do so completely by force. Nevertheless, they may be killed because their presence aids murder. There is justification for killing babies if it is clear that they will grow up to harm us, and in such a situation they may be harmed deliberately, and not only during combat with adults.”…In a chapter entitled “Deliberate harm to innocents,” the book explains that war is directled mainly against the pursuers, but those who belong to the enemy nation are also considered the enemy because they are assisting murderers.
A full translation of the Maariv article can be read after the jump.
The complete guide to killing non-Jews
Roi Sharon, Maariv, November 9 2009 [page 2 with front page teaser]
When is it permissible to kill non-Jews? The book Torat ha-Melekh [The King’s Teaching], which was just published, was written by Rabbi Yitzhak Shapira, the dean of the Od Yosef Hai yeshiva in the community of Yitzhar near Nablus, together with another rabbi from the yeshiva, Yossi Elitzur. The book contains no fewer than 230 pages on the laws concerning the killing of non-Jews, a kind of guide for anyone who ponders the question of if and when it is permissible to take the life of a non-Jew.
Although the book is not being distributed by the leading book companies, it has already received warm recommendations from right-wing elements, including recommendations from important rabbis such as Yitzhak Ginsburg, Dov Lior and Yaakov Yosef, that were printed at the beginning of the book. The book is being distributed via the Internet and through the yeshiva, and at this stage the introductory price is NIS 30 per copy. At the memorial ceremony that was held over the weekend in Jerusalem for Rabbi Meir Kahane, who was killed nineteen years ago, copies of the book were sold.
Throughout the book, the authors deal with in-depth theoretical questions in Jewish religious law regarding the killing of non-Jews. The words “Arabs” and “Palestinians” are not mentioned even indirectly, and the authors are careful to avoid making explicit statements in favor of an individual taking the law into his own hands. The book includes hundreds of sources from the Bible and religious law. The book includes quotes from Rabbi Abraham Isaac Kook, one of the fathers of religious Zionism, and from Rabbi Shaul Yisraeli, one of the deans of the Mercaz Harav Yeshiva, the stronghold of national-religious Zionism that is located in Jerusalem.
The book opens with a prohibition against killing non-Jews and justifies it, among other things, on the grounds of preventing hostility and any desecration of God’s name. But very quickly, the authors move from prohibition to permission, to the various dispensations for harming non-Jews, with the central reason being their obligation to uphold the seven Noahide laws, which every human being on earth must follow. Among these commandments are prohibitions on theft, bloodshed and idolatry. [The seven Noahide laws prohibit idolatry, murder, theft, illicit sexual relations, blasphemy and eating the flesh of a live animal, and require societies to institute just laws and law courts]
“When we approach a non-Jew who has violated the seven Noahide laws and kill him out of concern for upholding these seven laws, no prohibition has been violated,” states the book, which emphasizes that killing is forbidden unless it is done in obedience to a court ruling. But later on, the authors limit the prohibition, noting that it applies only to a “proper system that deals with non-Jews who violate the seven Noahide commandments.”
The book includes another conclusion that explains when a non-Jew may be killed even if he is not an enemy of the Jews. “In any situation in which a non-Jew’s presence endangers Jewish lives, the non-Jew may be killed even if he is a righteous Gentile and not at all guilty for the situation that has been created,” the authors state. “When a non-Jew assists a murderer of Jews and causes the death of one, he may be killed, and in any case where a non-Jew’s presence causes danger to Jews, the non-Jew may be killed.”
One of the dispensations for killing non-Jews, according to religious law, applies in a case of din rodef [the law of the “pursuer,” according to which one who is pursuing another with murderous intent may be killed extrajudicially] even when the pursuer is a civilian. “The dispensation applies even when the pursuer is not threatening to kill directly, but only indirectly,” the book states. “Even a civilian who assists combat fighters is considered a pursuer and may be killed. Anyone who assists the army of the wicked in any way is strengthening murderers and is considered a pursuer. A civilian who encourages the war gives the king and his soldiers the strength to continue. Therefore, any citizen of the state that opposes us who encourages the combat soldiers or expresses satisfaction over their actions is considered a pursuer and may be killed. Also, anyone who weakens our own state by word or similar action is considered a pursuer.”
Rabbis Shapira and Elitzur determine that children may also be harmed because they are “hindrances.” The rabbis write as follows: “Hindrances—babies are found many times in this situation. They block the way to rescue by their presence and do so completely by force. Nevertheless, they may be killed because their presence aids murder. There is justification for killing babies if it is clear that they will grow up to harm us, and in such a situation they may be harmed deliberately, and not only during combat with adults.”
In addition, the children of the leader may be harmed in order to apply pressure to him. If attacking the children of a wicked ruler will influence him not to behave wickedly, they may be harmed. “It is better to kill the pursuers than to kill others,” the authors state.
In a chapter entitled “Deliberate harm to innocents,” the book explains that war is directly mainly against the pursuers, but those who belong to the enemy nation are also considered the enemy because they are assisting murderers.
Retaliation also has a place and purpose in this book by Rabbis Shapira and Elitzur. “In order to defeat the enemy, we must behave toward them in a spirit of retaliation and measure for measure,” they state. “Retaliation is absolutely necessary in order to render such wickedness not worthwhile. Therefore, sometimes we do cruel deeds in order to create the proper balance of terror.”
In one of the footnotes, the two rabbis write in such a way that appears to permit individuals to act on their own, outside of any decision by the government or the army.
“A decision by the nation is not necessary to permit shedding the blood of the evil kingdom,” the rabbis write. “Even individuals from the nation being attacked may harm them.”
Unlike books of religious law that are published by yeshivas, this time the rabbis added a chapter containing the book’s conclusions. Each of the six chapters is summarized into main points of several lines, which state, among other things: “In religious law, we have found that non-Jews are generally suspected of shedding Jewish blood, and in war, this suspicion becomes a great deal stronger. One must consider killing even babies, who have not violated the seven Noahide laws, because of the future danger that will be caused if they are allowed to grow up to be as wicked as their parents.”
Even though the authors are careful, as stated, to use the term “non-Jews,” there are certainly those who could interpret the nationality of the “non-Jews” who are liable to endanger the Jewish people. This is strengthened by the leaflet “The Jewish Voice,” which is published on the Internet from Yitzhar, which comments on the book: “It is superfluous to note that nowhere in the book is it written that the statements are directly only to the ancient non-Jews.” The leaflet’s editors did not omit a stinging remark directed at the GSS, who will certainly take the trouble to get themselves a copy. “The editors suggest to the GSS that they award the prize for Israel’s security to the authors,” the leaflet states, “who gave the detectives the option of reading the summarized conclusions without any need for in-depth study of the entire book.”
One student of the Od Yosef Hai yeshiva in Yitzhar explained, from his point of view, where Rabbis Shapira and Elitzur got the courage to speak so freely on a subject such as the killing of non-Jews. “The rabbis aren’t afraid of prosecution because in that case, Maimonides [Rabbi Moses ben Maimon, 1135–1204] and Nahmanides [Rabbi Moses ben Nahman, 1194–1270] would have to stand trial too, and anyway, this is research on religious law,” the yeshiva student said. “In a Jewish state, nobody sits in jail for studying Torah.”
- November 12 2009 – Glenn Greenwald has a good comparative analysis of Muslim, Christian and Jewish fundamentalist terror and Jim Sleeper blasts critics of the Ft. Hood massacre who choose to ignore Jewish fundamentalist terror.
- November 13, 2009 – JJ Goldberg points out that you can’t tell all Rabbis by the company they keep, Richard Silverstein sees the connection between this publication and the Jewish terrorist Jack Teitel and MJ Rosenberg blasts Krauthammer for selectively attaching religion to terrorism.
- November 14, 2009 – Ori Nir provides a useful catalog of Jewish terrorist activity 1978. I would argue that the he should have included the many incidents over the past few years, some of which have resulted in loss of life, that settlers have used the ”Price Tag“ tactic — violent attacks on Palestinians aimed at to deterring the IDF. This is is terrorism in the narrow definition of the term.
- November 15, 2009 – Brig. Gen. Avichai Rontzki, IDF Chief Rabbi and a resident of the West Bank settlement of Itamar told settler soldiers last Thursday that ’troops who show mercy to enemy will be damned.’ Lara Friedman provides a comprehensive backgrounder on Ronztki and his fundamentalist influence on the IDF. Richard Silverstein draws parallels in religious motivation between recently apprehended settler terrorist Jack Teitel and Nidal Malik Hasan, the instigator of the Ft. Hood massacre.
- November 16, 2009 – Avrum Burg on how this kind of Judaism inspires murder: “”Just go to a synagogue on Sabbath eve. Go in and pick up the weekly Parasha [Torah portion] commentary pages, read them and you will see that Teitel is not alone. Teitel is just one of an entire plantation of bad weed. Some of those pages are actually financed by the state, through the Ministry of Religious Affairs. The racist lore, as taught by the rabbis of Hebron and Bet El, is everywhere. In the end, someone gets up and does the deed. We tend to ignore this, but horrible things happen there. It is in the air. I know those people. Some of them are my relatives. They do terrible things and we fail to notice.”
- November 19, 2009 – Haaretz’s Akiva Eldar, based on Yesh Din data, reveals that the Rabbi’s Yeshiva is funded by the Israeli government.
- December 6 2009 — Rabbi Elitzur and Ode Yosef Hai Yeshiva lead preparations for terrorizing West Bank Palestinians.
- December 15 2009 — Haaretz uncovers US federal tax exemptions for American charities funding the rabbi.