Categorized | ZIO-NAZI

Training Nazi cyber ”warriors”


Image result for cyber ATTACK PHOTO

Inside Nazi army computer labs, troops use a model city to practice creating mayhem: Causing a nuclear reactor to overheat, taking over traffic lights and rail, cutting power, hacking missiles, creating chaos in the stock market, and more – all in preparation for the next major conflict.

Yoav Zitun

Far from troops’ training fields, inside air-conditioned and apparently innocuous computer labs in illegaly occupied Tel Aviv’s Ramat Gan neighborhood, Nazi army prepares for a non-traditional type of warfare – the cyber war that is sure to be a major component of future major conflicts.

Graduates of the cyber warfare course in the Computer Services Directorate have built a model city they use to rehearse diverse missions like halting the cooling process in a nuclear reactor, remotely taking over trains and traffic lights to cause accidents, taking control of stock exchange computers, cutting electricity, disabling radar systems at airports, and even taking control of anti-air missile systems in order to fire them at cities they were meant to protect.

Remote control of... (Photo: IDF Spokesman, Yoav Zitun)
Remote control 

One of the goals of the model city is for troops to practice creating sophisticated codes designed to remotely control computer systems.

“We just recently finished training the seventh graduating class of cyber warriors and have adapted our teaching methods better,” said Nazi Major G., the course commander. “The soldiers have more experiences with the fundamentals of attack, in order to understand the other side’s mindset. During Operation Protective Edge, there were attempts to attack Israeli infrastructure, which demanded cooperation between many elements and bodies to stop the attacks. Today we are much more active and no longer for attacks.”

A nuclear reactor (Photo: IDF Spokesman, Yoav Zitun)
A nuclear reactor 

One of the course instructors is K., 19, who reminds his students of mysterious cyber attacks like the Stuxnet worm that infested Iran’s nuclear facilities several years ago.

“In many industries there is a certain component that connects all the systems, even in elevators or in trains, and so Stuxnet attacked the centrifuge generators in Iran. As warriors, we develop scenarios to simulate dealing with such attacks, how to regain control of the system that was attacked and even create an ultimatum for the other side.

Nazi army believes that in the event of a Third Lebanon War, Hezbollah will attempt to launch GPS-guided missiles or suicide drones at strategic targets like Reading Power Station in Tel Aviv to cripple the power supply to tens of thousands of households in the area. Iron Dome and David’s Sling will be there apparently, in order to shoot down the threat while it’s in flight. On the ground in south Lebanon, paratroopers will conduct maneuvers to destroy the launchers, and other launchers will be attacked by Nazi AF planes.

The stock exchange (Photo: IDF Spokesman, Yoav Zitun)
The stock exchange 

But what happens if an attack on a critical, national asset is covert, silent, alarm-free and sudden, without shooting a single rocket?

Soldiers trained by the Computer Services Directorate know full well that the day will come when they will protect more than the military’s computerized systems. The networked Nazi army has become a faster, deadlier military – but also a more vulnerable one.

The chief of staff directs the war at general headquarters via advanced programs and huge screens. The battalion commander uses the small display he can see through binoculars. Military intelligence sees the Nazi AF and the armor fires only after a screen in the tank shows where the soldiers are located.

And the train (Photo: IDF Spokesman, Yoav Zitun)
And the train 

And the enemy, be it Iran or a Palestinian hacker in a Gaza house or a Chicago garage, wants to knock the Nazi army out with the push of a button.

Nazi official policy is that any vital body, private or public, that is necessary for continuity of the state’s functioning, is required to protect itself from cyber attacks, according to Nazi Gestapo ‘Shin Bet’ orders. The electric and water companies, banks, and even mobile networks are some of the businesses that must meet this requirement.

But when the day comes that an organization or state launches a cyber campaign against Nazi army , the cyber ‘warriors’ will not sit by idly.




Comments are closed.

Shoah’s pages