USA & Israel’s Secret attacks on Iran & Very Interesting Cyber-Attacks – My Comments

[All these explosions have the hallmarks of ongoing US and Israeli attacks on the Iranians. This has been going on for years. They've used all sorts of methods to mess up the Iranian nuclear weapons program including assassinating people. What I find most interesting though, are the accounts of cyber attacks. They claim the Iranians tried to poison the Jews in Israel by messing with their computers. How cool. I find these cyber attacks fascinating. Fascinating. I would like us to monitor all instances of cyber attacks where nations mess with other nations' computer systems and can trigger machines and processes that are negative. I think this is brilliant stuff. It has definite potential in the future. The Western world has incredible power in this regard that few know about, and it's something I read about, from a British source many years ago. People do NOT realise how powerful the USA and Europe is, with regard to their cyber and technical warfare capabilities. They can literally, and intentionally, "switch off" a Third World country and walk in or fly in, undetected and unopposed. Jan]

Early in the morning of June 26, Tehran was rocked by a huge explosion at the Parchin military complex 30 kilometers southeast of the Iranian capital. Some media outlets attributed the blast to Parchin’s role in the development of nuclear weapons, which was reaffirmed when Iran’s secret nuclear research archive was smuggled to Israel and exposed in 2018. The regime’s choice of Parchin as the site at which to conduct nuclear experiments was probably due to the fact that ammunition, explosives and solid rocket fuel were produced there.

The International Atomic Energy Agency (IAEA) had asked the Iranian authorities to allow its inspectors to tour Parchin as early as 2012, following information it had received about nuclear activity at the facility. Its request was rejected. The Iranians then demolished the buildings where the suspect activity had allegedly taken place and even razed the area around them.

In September 2015, after signing the Joint Comprehensive Plan of Action (JCPOA) nuclear agreement, Tehran finally allowed IAEA inspectors to tour the area and take soil samples. Despite the regime’s thorough sanitizing of the site, anthropogenic (human-processed) uranium particles were found that could only have been produced during “cold test” explosions of a nuclear device.

Subscribe to The JNS Daily Syndicate by email and never miss our top stories
Your email
Since then, as far as is known, there has been no nuclear activity at Parchin. It is therefore likely that the June 26 explosion was a detonation of explosives and/or solid rocket fuel. According to satellite photos and eyewitness testimony, the effects of the blast are spread over a half-mile area that is networked with many underground tunnels.

The area in question belongs to the Khojir plant, which produces solid fuel for Fajr rockets, cruise missiles and Iran’s 2,000-mile Sajil ballistic missile. An Iranian Defense Ministry spokesman minimized the significance of the incident and claimed that an industrial gas tank had exploded, and that there had been no casualties.

Five days later, another blast occurred, this time at a clinic at Sinai Athar Health Center in northern Tehran. This explosion, which completely destroyed the clinic, killed at least 19 people, most of them women. According to the Iranian authorities, the disaster was caused by oxygen balloon leakage.

The next day, a fire broke out at Iran’s main uranium enrichment plant at Natanz (the site targeted by the Stuxnet computer worm, first uncovered in 2010). As it had after the previous incidents, the regime understated the extent of the damage at Natanz. The spokesman for the Atomic Energy Organization of Iran, Behruz Kamalvandi, claimed a fire had broken out in an “industrial shed that was under construction” and said it had resulted in no casualties or environmental pollution.

American experts claim, however, that their satellite imagery identified the damaged structure as a workshop for the production of state-of-the-art uranium enrichment centrifuges. Contrary to Iran’s claim that nothing occurred at the site besides a fire, the photo of the damaged structure displayed by the Iranian Atomic Energy Agency shows rubble and a door off its hinges, indicating that the fire was likely accompanied by an explosion.

While the blast at the clinic was probably an accident, the other two incidents were generally assumed by the international media to have been committed by Israel and the United States, possibly as part of an ongoing cyberwar with Iran.

There are a number of reasons why this may well be the case: the failed Iranian cyberattack on Israel in April, which was intended to increase the amount of chlorine in Israel’s water supply with the object of poisoning or sickening Israeli civilians en masse (an attack to which Israel allegedly responded via a cyberattack on Iran’s Shahid Rajaee port ); Iran’s significant progress in developing uranium enrichment centrifuges and production of enriched uranium quantities in contravention of the 2015 nuclear agreement; and clashes between the United States and Iran in the Persian Gulf. It has also been speculated that the attacks are U.S. retaliation for the failure of the United Nations Security Council to extend the arms embargo on Iran.

Whatever the case, these incidents occurred at a particularly inopportune time for the Tehran regime, which is struggling to cope with an economic collapse and sharp currency devaluation due to U.S. sanctions; the coronavirus pandemic, which is taking a heavy toll on the Iranian people; and Iran’s military failures versus the IDF in Syria.


Leave a Reply

%d bloggers like this:
Skip to toolbar