Additional Resources
Top Commentators:
- Elliott Abrams
- Fouad Ajami
- Shlomo Avineri
- Benny Avni
- Alan Dershowitz
- Jackson Diehl
- Dore Gold
- Daniel Gordis
- Tom Gross
- Jonathan Halevy
- David Ignatius
- Pinchas Inbari
- Jeff Jacoby
- Efraim Karsh
- Mordechai Kedar
- Charles Krauthammer
- Emily Landau
- David Makovsky
- Aaron David Miller
- Benny Morris
- Jacques Neriah
- Marty Peretz
- Melanie Phillips
- Daniel Pipes
- Harold Rhode
- Gary Rosenblatt
- Jennifer Rubin
- David Schenkar
- Shimon Shapira
- Jonathan Spyer
- Gerald Steinberg
- Bret Stephens
- Amir Taheri
- Josh Teitelbaum
- Khaled Abu Toameh
- Jonathan Tobin
- Michael Totten
- Michael Young
- Mort Zuckerman
Think Tanks:
- American Enterprise Institute
- Brookings Institution
- Center for Security Policy
- Council on Foreign Relations
- Heritage Foundation
- Hudson Institute
- Institute for Contemporary Affairs
- Institute for Counter-Terrorism
- Institute for Global Jewish Affairs
- Institute for National Security Studies
- Institute for Science and Intl. Security
- Intelligence and Terrorism Information Center
- Investigative Project
- Jerusalem Center for Public Affairs
- RAND Corporation
- Saban Center for Middle East Policy
- Shalem Center
- Washington Institute for Near East Policy
Media:
- CAMERA
- Daily Alert
- Jewish Political Studies Review
- MEMRI
- NGO Monitor
- Palestinian Media Watch
- The Israel Project
- YouTube
Government:
Back
(Yahoo News) Kim Zetter and Huib Modderkolk - How did the U.S. and Israel get their Stuxnet malware onto computer systems at Iran's highly secured uranium-enrichment plant? An Iranian engineer recruited by the Dutch intelligence agency AIVD at the behest of the CIA and the Israeli intelligence agency, the Mossad, provided critical data that helped the U.S. developers target their code to the systems at Natanz, according to four intelligence sources. The Iranian then slipped Stuxnet onto those systems using a USB flash drive. 2019-09-03 00:00:00Full Article
Dutch Mole Aided the U.S.-Israeli Stuxnet Cyberattack on Iran
(Yahoo News) Kim Zetter and Huib Modderkolk - How did the U.S. and Israel get their Stuxnet malware onto computer systems at Iran's highly secured uranium-enrichment plant? An Iranian engineer recruited by the Dutch intelligence agency AIVD at the behest of the CIA and the Israeli intelligence agency, the Mossad, provided critical data that helped the U.S. developers target their code to the systems at Natanz, according to four intelligence sources. The Iranian then slipped Stuxnet onto those systems using a USB flash drive. 2019-09-03 00:00:00Full Article
Search Daily Alert
Search:
|