Jump to content

LATEST NEWS

    Thousands attend annual parade honoring World War II hero John Basilone
    Fubar512
    By Fubar512,
      RARITAN BOROUGH (Somerset County)   John Basilone showed up to Raritan’s annual John Basilone Parade today.   That is, a record number of people saw John Seda — the actor who portrayed the World War II Congressional Medal of Honor winner in HBO’s miniseries "The Pacific" — attend the 29th edition of the parade honoring Raritan Borough’s favorite son.   "It was just an honor," said Seda, who grew up in Clifton. "I knew the connection that Basilone has with his family and friends from Raritan, New Jersey. I can only think that John, if he were here today, he’d be doing the same thing."   Despite overcast skies that began to drizzle as the parade came to a close, organizers said the estimated crowd of 10,000 spectators was an all-time high, thanks to the "The Pacific."   "That would be a record," said Herb Patullo, who has helped organize the parade since it was first held in 1981.   The miniseries, produced by Steven Spielberg and Tom Hanks, follows the lives of Gunnery Sgt. Basilone and two other U.S. Marines, Robert Leckie and Eugene Sledge, from their first battles in the Pacific theater to their return home.   The 39-year-old actor said he felt an unusually strong connection to the role, and was happy to attend the parade again for a second year. The 10-part series aired in March.   "Being raised in New Jersey myself, I felt this pride, you know," said Seda, who signed autographs and posed for pictures with fans. "How do you go about portraying someone like John Basilone? It’s not made up. You know, someone could look at his story and think it was Hollywood-made. It’s not. It really happened. So, I just tried to find the humanity in who he was and tried to work it from there."   The image of Basilone looms large over the borough and its 6,300 residents. A larger-than-life-sized bronze statue of Basilone was erected in 1948, an idealized image of the curly-haired hero standing bare-chested, a crucifix and dog tags hanging from his neck, his machine-gun in his hands and his gaze fixed on a world free of tyranny. A ceremony accompanied by a Marine Corps band was held at the foot of the statue following the parade.   Mayor Jo-AnnLiptak, said it was her own third-grade class at Raritan’s John F. Kennedy Elementary School that first proposed a parade in1980, presenting the idea to then-Mayor Steven DelRocco after a visit to the statue.   "The farther away we get from his actual life and his death, the more important it is to remember the extraordinary heroism that he exhibited that day," said Liptak.   Seda stood on a reviewing stand at the corner of West Somerset and Daughtry streets as ROTC drill teams, marching bands, Marine Corps motorcycle clubs and other veterans groups filed past him.   "Humbling is the word I’ve used so much, and I just can’t use it enough," he said.   Basilone won the Medal of Honor for his heroism as a Marine Corps Gunnery Sergeant during the Battle of Guadalcanal on Oct. 25 and 26, 1942. His heroic legacy was propelled to near mythic proportions when, after being deployed stateside to sell war bonds, the camera-shy Basilone insisted on going back into combat, only to be killed on the island of Iwo Jima on Feb. 19, 1945, at age 28.   Spectators included 92-year-old Ann Scarpone and her sister-in-law, Phyllis, 85, who grew up with Basilone and whose brother, Connie Scarpone, caddied with the hero-to-be at nearby Raritan Valley Country Club. They were among thousands of newborns to nonagenarians who lined West Somerset Street, waving flags and cheering the passing spectacle. Fire trucks and military vehicles, bagpipers, a vintage cannon that boomed every block or so, and even an aging Elvis impersonator, all marched in celebration of Gunnery Sergeant Basilone.   One of the younger marchers was LorinBrungard, 17, a senior on the Immaculata High School Color Guard in Somerville, who hopes to become a Marine Corps lawyer. Brungard, who lives in Bridgewater, was marching in her fourth Basilone parade.   "He’s, like, one of my biggest heroes," she said. "I watched the HBO series, "The Pacific," and I was just in tears."     Photo: Jason Drennan, 3, left, and his cousins Vincent Villalta, 5, and Dylan Villalta, 6, (who are brothers) right, look over Hogan, the riderless horse in the the annual parade honoring WWII Congressional Medal of Honor Winner John Basilone. Thomas White, right, of the Marine Corp Jersey Shore Marines handles Hogan   Source: http://www.nj.com/ne...tan_boroug.html

    Gripens do half of 51 World Cup intercepts
    Erik
    By Erik,
      Gripens do half of 51 World Cup intercepts   DefenceWeb -- Written by Leon Engelbrecht Saturday, 25 September 2010 16:19   The South African Air Force's (SAAF) growing fleet of SAAB Gripen fighters conducted about half the 51 aircraft intercepts conducted during the June/July soccer world cup. The SAAF deployed 11 of the available 15 Gripen during the month-long tournament as well as 12 of 24 BAE Systems Hawk lead-in fighter trainers.   Also deployed on interception duties were 12 unarmed Pilatus PC7 Mk II Astra trainers, 14 AgustaWestland A109M and some Eurocopter BK117 light utility helicopters. Air Force director fighters, Brigadier General John Bayne, told a Gripen briefing at the SAAB chalet at Africa Aerospace & Defence 2010 exhibition that ends today that some 347 combat air patrols (CAP) were flown to secure all 64 games.   In a similar briefing in August, Major General Les Lombard, the General Officer Commanding te Air Force Command Post said with “that grouping of aircraft we could cater for various threats, be it from paragliders right up to the possibility of hijacked airliners.”   Bayne says some 2214 SAAF personnel were deployed for Operation Kgwele as the endeavour was known. Lombard noted it was the “largest air defence operation the SAAF has ever conducted. It was over an extended period of time and all 64 games were secured by air defence assets.” He added that it “is a massive operation securing the airspace of an entire country and you need the close cooperation of all the roleplayers... the Airports Company SA, the Department of Transport's Air Traffic Navigation Service (ATNS) an the police.   Lombard noted command-and-control required the establishment of six sector control centres (SCC): South Africa normally only has two. The permanent installations at the Lowveld Airspace Control Sector at Hoedspruit in Mpumalanga and the Bushveld Airspace Control Centre in Pretoria were augmented by two mobile sector control stations from 140 Squadron, deployed to Bloemfontein and Cape Town. “And there our resources came to an end. So with a lot of initiative and hard work from within the SAAF, two temporary sector control stations were created at Port Elizabeth and Durban with great cooperation from ATNS who supported us with facilities and allowed integration into their systems at those venues.   “The development of the sectors in a very short time and the close cooperation with the ATNS was really a winner. Then in terms of the sector control centres from where all the military aircraft was controlled, we had very lose coordination with the ATNS with regard to deploying the necessary sensors such as radars to develop an integrated air picture.   “We deployed four Tellumat-supported Umlindi radars from 140 Squadron, three tactical mobile radars (TMR) from 142 Squadron and integrated these with our static radars, ATNS and SAAF long range, which allowed us a very good tactical integration...,” Lombard said.   “In terms of radar sensor information, the CAF (chief of the air force, Lieutenant General Carlo Gagiano, who spoke before Lombard) alluded to the effectiveness of the Gripen radar, it was really marvellous to see the effectiveness of that and many low flying aircraft were considerably surprised by our ability to detect them in areas where they thought they could fly under radar coverage. The Gripen could pass on the data – via Link ZA – to the SCC so that intercepts could be vectored onto them. This opens up a whole new concept of operations within the SAAF and is something we will pursue down the line.   “We also had the ability to integrate the radars of the navy frigates and the SA Army Thutlhwa... ...these obviously are force multipliers … the frigates were just off the coast, to give us the coverage we so badly needed for low flying aircraft [at coastal venues].” In addition, said Lombard, the SA Army deployed 29 observation posts (OP's) at various venues and these were in direct communication with the SCC “in order to supply us with visual input of very low flying aircraft or aircraft with very low radar cross section. The SA Navy supplied five further OP's in the Cape area.   Bayne noted that the air defence system recorded detected 65 non-compliant aircraft, including airliners, which led to the 51 intercepts. Nine aircraft were diverted. Police waiting at airfields took unspecified action against 43 pilots. Bayne praised the availability of the SAAF's new fighter fleet, noting that seven Gripen and four Hawk were deployed to AFB Waterkloof to provide CAP over the northern matches (Polokwane, Pretoria, Nelspruit, Johannesburg, Rustenburg, Durban and Bloemfontein) and four of each to AFB Overberg to CAP Cape Town and Port Elizabeth.   For this purpose the Gripen were allocated 276 flying hours and the Hawks 279. Bayne says the five two-seat Gripen D were 98% reliable and the six single-seat Gripen C 89%. The Hawk was 98% reliable. At any given time 8.95 of the 11 Gripen were available and 11.6 of the Hawk. Maintainability was 89% for Gripen and 92% for Hawk. Bayne observed that the figures for Gripen would have been higher had it been an operation system. The platform, being acquired under Project Ukhozi, is still in the project phase.     DefenceWeb

    TADS Options Purchase of CF5 Fighters
    Erik
    By Erik,
      Tactical Air Defense Services Acquires Option to Purchase Canadian CF-5 Fighter Jets   TADS-USA -- 23/09/2010   CARSON CITY, Nev., Sep 23, 2010 (GlobeNewswire via COMTEX) -- Tactical Air Defense Services, Inc., an Aerospace/Defense Services contractor that offers tactical aviation services, aerial refueling, aircraft maintenance, disaster relief services, and other Aerospace/Defense services to the United States and foreign militaries and agencies, is pleased to announce that it is has acquired the exclusive contractual right to purchase six Canadian CF-5 Fighter Jets and related assets (the "CAD Assets") from Crown Asset Distribution, Minister of Public Works and Government Services, Canada.   The CAD Assets have a market value of greater than $69 million, and include:   -- 6 CF-5 Aircraft -- Spare Parts Lots -- 45 General Electric J85-15 Jet Engines   The total cost to TADF to purchase, import and refurbish the CAD Assets, including the acquisition cost of the contractual right to purchase the CAD Assets, is less than $6 million. The CF-5 aircraft is the Canadair licensed version of the American Northrop F-5 Freedom Fighter aircraft built primarily for the Canadian Armed Forces. The CF-5 is a low-cost, low-maintenance, and extremely versatile fighter jet that can be used to provide a tactical support role, as a light attack strike fighter and a reconnaissance platform, and for dissimilar air combat training, lead-in tactical fighter training, and in an adversary role, in support of tactical aviation contracts.   TADF intends to use the CAD Assets to capture new tactical aviation service contracts and maintenance contracts, with the U.S. Department of Defense and foreign militaries:   -- CF-5 Aircraft: -- CF-5 Aircraft: Support existing TADS/Tac-Air tactical aviation service contracts -- Capture new tactical aviation service contracts -- Minimum of 200 hours per aircraft per year -- Hourly rate to government of approximately $7,500 per flight hour -- CF-5 Parts: -- Support TADS CF-5 aircraft for 20 years -- Surplus sold in conjunction with international aircraft maintenance contracts -- Manufacturing template for CF-5 parts supply business to ensure ongoing supply -- CF-5 Engines: -- Support TADS CF-5 aircraft for 20 years -- Surplus sold either as whole units or in parts   TADF is currently pursuing a collateralized loan of $6 million secured by the CAD Assets with an over-collateralization ratio of greater than ten times. TADF believes but cannot guarantee that it will receive the funds necessary to purchase all of the CAD Assets.   Alexis C. Korybut, Chief Executive Officer of TADF, stated, "We are very pleased that after more than a year of working on this very important transaction, we have finally accomplished what may prove to be a watershed event for TADF. The acquisition of the CF-5 Fighter Jets will enable TADF to bid on larger and more profitable tactical aviation contracts and aircraft maintenance contracts, and the sale of surplus spare parts and engines may provide a significant source of income to TADF for years to come, in addition to materially increasing the assets on our balance sheet."   Make sure you are first to receive timely information on Tactical Air Defense Services when it hits the newswire. Sign up for TADF's email news alert system today at: http://ir.stockpr.co...sa/email-alerts   Further information about TADS is available on our website: www.tads-usa.com.   Forward Looking Statement Disclosure   This release contains forward-looking statements within the meaning of Section 27A of the Securities Act of 1933 and Section 21E of the Securities Act of 1934 that are based upon current expectations or beliefs, as well as a number of assumptions about future events. Although we believe that the expectations and assumptions upon which they are based are reasonable, we can give no assurance that such expectations and assumptions will prove to have been correct. Some of these uncertainties include, without limitation, the company's ability to perform under existing contracts or to procure future contracts. The reader is cautioned not to put undue reliance on these forward-looking statements, as these statements are subject to numerous factors and uncertainties, including without limitation, successful implementation of our business strategy and competition, any of which may cause actual results to differ materially from those described in the statements. We undertake no obligation and do not intend to update, revise or otherwise publicly release any revisions to these forward-looking statements to reflect events or circumstances after the date hereof or to reflect the occurrence of any unanticipated events. Although we believe that our expectations are based on reasonable assumptions, we can give no assurance that our expectations will materialize. Many factors could cause actual results to differ materially from our forward-looking statements.       SOURCE: Tactical Air Defense Services, Inc.

    F/A18 Hornets Join Australian Aerospace Service Support List
    Erik
    By Erik,
      F/A18 Hornets Join Australian Aerospace Service Support List   Defence Professionals -- 26/09/2010   Leading Australian defence contractor, Australian Aerospace Limited, has welcomed the addition of the F/A18 Hornet fighter to the inventory of Royal Australian Air Force (RAAF) combat aircraft which the company supports through maintenance and service agreements with the Australian Defence Force (ADF).   The company has successfully teamed with the world’s largest tyre manufacturer, Michelin, to win a Defence Materiel Organisation (DMO) contract to manufacture and supply tyres for the F/A18 (Classic) Hornets, and the AP-3C Orion patrol and reconnaissance aircraft.   Australian Aerospace, which already provides Through-Life-Support to the Orion fleet under its P3 Program, and Michelin Australia, have signed a five-year Deed of Agreement for the supply of tyres and the management of tyre inventories for the FA/18s and P3s. In addition to supplying new tyres, the partners will also be responsible for retread-overhaul, inventory management and tyre storage, distribution and disposal.   Welcoming the Agreement, Dr Jens Goennemann, Chief Executive Officer Australian Aerospace said: “Winning the P3 tyres business is a natural extension of the Through-Life-Support services that Australian Aerospace provides the DMO under the AP-3C Orion Platform Systems Support Contract. However, the addition of the FA/18 Hornets is an exciting and welcome addition to our customer support base.”   As well as the F/A18s and P3 Orions, Australian Aerospace also supports the C-130J Hercules transport aircraft, the new Airbus A330-based KC-30 MRTT multi-role tanker-transports and, until recently, the now retired Caribou medium transports. Currently it is assembling and delivering 22 Tiger ARH armed reconnaissance helicopters to the Australian Army and 46 MRH90 multi-role helicopters to the Army and Navy.   Mr Rob Hunter, Vice President Fixed Wing / Operations Australian Aerospace said the Deed of Agreement also had scope to include future Australian Defence Force weapons systems.   “Our teaming with Michelin Australia is an excellent example of how, having identified an opportunity, our P3 Program team then went out and found the right partner to deliver an accountable and effective solution to Defence,” he said. “As a result, Australian Aerospace brings to the table its proven defence contract management, supply chain and authorised maintenance organisation skills, and Michelin contributes new product and retread capabilities and specialised tyre storage and distribution systems”.   Mr Hunter said the Deed of Agreement also provided for multiple extensions of the contract and he had no doubt that Australian Aerospace’s long-demonstrated good service delivery to the ADF would ensure that it would ultimately prove to be a life-of-type arrangement for both the F/A18 Hornets and the P3 Orions.     Defence Professionals

    MiG-27 crashes in India, pilot survives
    Erik
    By Erik,
      MiG-27 crashes in India, pilot survives   RIA Novosti. Sergei Subbotin -- 10:15 24/09/2010   A MiG-27 Flogger ground attack aircraft of the Indian Air Force (IAF) has crashed in the country's east, the third crash of a plane of this type in India this year, a spokesman for the Indian Army Eastern Command said.   The crash took place at 08:25 am local time (02:25 GMT) some 40 kilometers (25 miles) east of the Kalaikunda air base in West Bengal state.   "The pilot managed to eject and is unharmed. The crash did not cause casualties or destruction on the ground," Mahesh Upasani said, adding that investigation into the crash was under way.   An MiG-27 aircraft crashed in West Bengal in February near the Hashimara military base, killing the pilot and causing all MiG-27 flights to be suspended for a short period of time.   Another MiG-27 plane crashed into a village in the region in July during a routine training flight, killing a local resident and injuring 10 others.   The MiG-27 aircraft was originally built in the former Soviet Union in the mid-1970s before it was licensed to be produced in India.   India has about 150 MiG-27 planes, known as the Bahadhur (Brave) in the IAF.   According to the military, a current upgrade program will keep the MiG-27 operational for another 10 years.       NEW DELHI, September 24           RIA Novosti

    Worlds first (expert claimed) known cyber super weapon
    Atreides
    By Atreides,
      Interesting. If true this is awesome, killing their nuke program without the loss of human life.   Stuxnet malware is 'weapon' out to destroy ... Iran's Bushehr nuclear plant?   Cyber security experts say they have identified the world's first known cyber super weapon designed specifically to destroy a real-world target – a factory, a refinery, or just maybe a nuclear power plant.   The cyber worm, called Stuxnet, has been the object of intense study since its detection in June. As more has become known about it, alarm about its capabilities and purpose have grown. Some top cyber security experts now say Stuxnet's arrival heralds something blindingly new: a cyber weapon created to cross from the digital realm to the physical world – to destroy something.   At least one expert who has extensively studied the malicious software, or malware, suggests Stuxnet may have already attacked its target – and that it may have been Iran's Bushehr nuclear power plant, which much of the world condemns as a nuclear weapons threat.   The appearance of Stuxnet created a ripple of amazement among computer security experts. Too large, too encrypted, too complex to be immediately understood, it employed amazing new tricks, like taking control of a computer system without the user taking any action or clicking any button other than inserting an infected memory stick. Experts say it took a massive expenditure of time, money, and software engineering talent to identify and exploit such vulnerabilities in industrial control software systems.   Unlike most malware, Stuxnet is not intended to help someone make money or steal proprietary data. Industrial control systems experts now have concluded, after nearly four months spent reverse engineering Stuxnet, that the world faces a new breed of malware that could become a template for attackers wishing to launch digital strikes at physical targets worldwide. Internet link not required.   "Until a few days ago, people did not believe a directed attack like this was possible," Ralph Langner, a German cyber-security researcher, told the Monitor in an interview. He was slated to present his findings at a conference of industrial control system security experts Tuesday in Rockville, Md. "What Stuxnet represents is a future in which people with the funds will be able to buy an attack like this on the black market. This is now a valid concern."   A gradual dawning of Stuxnet's purpose   It is a realization that has emerged only gradually.   Stuxnet surfaced in June and, by July, was identified as a hypersophisticated piece of malware probably created by a team working for a nation state, say cyber security experts. Its name is derived from some of the filenames in the malware. It is the first malware known to target and infiltrate industrial supervisory control and data acquisition (SCADA) software used to run chemical plants and factories as well as electric power plants and transmission systems worldwide. That much the experts discovered right away.   But what was the motive of the people who created it? Was Stuxnet intended to steal industrial secrets – pressure, temperature, valve, or other settings –and communicate that proprietary data over the Internet to cyber thieves?   By August, researchers had found something more disturbing: Stuxnet appeared to be able to take control of the automated factory control systems it had infected – and do whatever it was programmed to do with them. That was mischievous and dangerous.   But it gets worse. Since reverse engineering chunks of Stuxnet's massive code, senior US cyber security experts confirm what Mr. Langner, the German researcher, told the Monitor: Stuxnet is essentially a precision, military-grade cyber missile deployed early last year to seek out and destroy one real-world target of high importance – a target still unknown.   "Stuxnet is a 100-percent-directed cyber attack aimed at destroying an industrial process in the physical world," says Langner, who last week became the first to publicly detail Stuxnet's destructive purpose and its authors' malicious intent. "This is not about espionage, as some have said. This is a 100 percent sabotage attack."   A guided cyber missile   On his website, Langner lays out the Stuxnet code he has dissected. He shows step by step how Stuxnet operates as a guided cyber missile. Three top US industrial control system security experts, each of whom has also independently reverse-engineered portions of Stuxnet, confirmed his findings to the Monitor.   "His technical analysis is good," says a senior US researcher who has analyzed Stuxnet, who asked for anonymity because he is not allowed to speak to the press. "We're also tearing [stuxnet] apart and are seeing some of the same things."   Other experts who have not themselves reverse-engineered Stuxnet but are familiar with the findings of those who have concur with Langner's analysis.   "What we're seeing with Stuxnet is the first view of something new that doesn't need outside guidance by a human – but can still take control of your infrastructure," says Michael Assante, former chief of industrial control systems cyber security research at the US Department of Energy's Idaho National Laboratory. "This is the first direct example of weaponized software, highly customized and designed to find a particular target."   "I'd agree with the classification of this as a weapon," Jonathan Pollet, CEO of Red Tiger Security and an industrial control system security expert, says in an e-mail.   One researcher's findingsLangner's research, outlined on his website Monday, reveals a key step in the Stuxnet attack that other researchers agree illustrates its destructive purpose. That step, which Langner calls "fingerprinting," qualifies Stuxnet as a targeted weapon, he says.   Langner zeroes in on Stuxnet's ability to "fingerprint" the computer system it infiltrates to determine whether it is the precise machine the attack-ware is looking to destroy. If not, it leaves the industrial computer alone. It is this digital fingerprinting of the control systems that shows Stuxnet to be not spyware, but rather attackware meant to destroy, Langner says.   Stuxnet's ability to autonomously and without human assistance discriminate among industrial computer systems is telling. It means, says Langner, that it is looking for one specific place and time to attack one specific factory or power plant in the entire world.   "Stuxnet is the key for a very specific lock – in fact, there is only one lock in the world that it will open," Langner says in an interview. "The whole attack is not at all about stealing data but about manipulation of a specific industrial process at a specific moment in time. This is not generic. It is about destroying that process."   So far, Stuxnet has infected at least 45,000 industrial control systems around the world, without blowing them up – although some victims in North America have experienced some serious computer problems, Eric Byres, a Canadian expert, told the Monitor. Most of the victim computers, however, are in Iran, Pakistan, India, and Indonesia. Some systems have been hit in Germany, Canada, and the US, too. Once a system is infected, Stuxnet simply sits and waits – checking every five seconds to see if its exact parameters are met on the system. When they are, Stuxnet is programmed to activate a sequence that will cause the industrial process to self-destruct, Langner says.   Langner's analysis also shows, step by step, what happens after Stuxnet finds its target. Once Stuxnet identifies the critical function running on a programmable logic controller, or PLC, made by Siemens, the giant industrial controls company, the malware takes control. One of the last codes Stuxnet sends is an enigmatic “DEADF007.” Then the fireworks begin, although the precise function being overridden is not known, Langner says. It may be that the maximum safety setting for RPMs on a turbine is overridden, or that lubrication is shut off, or some other vital function shut down. Whatever it is, Stuxnet overrides it, Langner’s analysis shows.   "After the original code [on the PLC] is no longer executed, we can expect that something will blow up soon," Langner writes in his analysis. "Something big."   For those worried about a future cyber attack that takes control of critical computerized infrastructure – in a nuclear power plant, for instance – Stuxnet is a big, loud warning shot across the bow, especially for the utility industry and government overseers of the US power grid.   "The implications of Stuxnet are very large, a lot larger than some thought at first," says Mr. Assante, who until recently was security chief for the North American Electric Reliability Corp. "Stuxnet is a directed attack. It's the type of threat we've been worried about for a long time. It means we have to move more quickly with our defenses – much more quickly."   Has Stuxnet already hit its target?It might be too late for Stuxnet's target, Langner says. He suggests it has already been hit – and destroyed or heavily damaged. But Stuxnet reveals no overt clues within its code to what it is after.   A geographical distribution of computers hit by Stuxnet, which Microsoft produced in July, found Iran to be the apparent epicenter of the Stuxnet infections. That suggests that any enemy of Iran with advanced cyber war capability might be involved, Langner says. The US is acknowledged to have that ability, and Israel is also reported to have a formidable offensive cyber-war-fighting capability.   Could Stuxnet's target be Iran's Bushehr nuclear power plant, a facility much of the world condemns as a nuclear weapons threat?   Langner is quick to note that his views on Stuxnet's target is speculation based on suggestive threads he has seen in the media. Still, he suspects that the Bushehr plant may already have been wrecked by Stuxnet. Bushehr's expected startup in late August has been delayed, he notes, for unknown reasons. (One Iranian official blamed the delay on hot weather.)   But if Stuxnet is so targeted, why did it spread to all those countries? Stuxnet might have been spread by the USB memory sticks used by a Russian contractor while building the Bushehr nuclear plant, Langner offers. The same contractor has jobs in several countries where the attackware has been uncovered.   "This will all eventually come out and Stuxnet's target will be known," Langner says. "If Bushehr wasn't the target and it starts up in a few months, well, I was wrong. But somewhere out there, Stuxnet has found its target. We can be fairly certain of that."   Link

Portal by DevFuse · Based on IP.Board Portal by IPS


×

Important Information

By using this site, you agree to our Terms of Use, Privacy Policy, and We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue..