كيف وصلت عبقرية المخابرات المصرية الى تركيبة الصاروخ الاسرائيلى حيتس؟

لا دور للمخابرات المصرية في العملية

تحياتي لكم جميعا،
النقطة الاساسية اللتي اود طرحها هو اين دور المخابرات المصرية من الموضوع برمته من ناحية الرصد وجمع المعلومات والتحليل والمتابعة والتخطيط والتنفيذ ؟؟ الامر كله بسبب خطأ اسرائيلي 100% ولم تلعب المخابرات المصرية دورا بأي شيء بل وجدت الموضوع جاهزا عندها بالقاهرة وبعد ذلك تعاملت معه او لم تتعامل هذا شأن آخر وتصور يا اخي لو ان مركز شركة البرامج في عاصمة اخرى مثلا او تعامل الاسرائيليون مع شركة مقرها خارج العالم العربي هل كان سيعرف المصريين بذلك المشروع ويتصرفون ؟؟ فكروا بالامر بعقل وهدوء وعقلانية ان الامر اشبه بخطة عسكرية سرية يجدها بالشارع عميل للدولة المستهدفة ،لاتزعلو لكن هذه هي الحقيقة .
اما النقطة الثانية فهي قولك صرف اسرائيل مئات المليارات من الدولارات على البرنامج هل تعرف مئات المليارات من الدولارات مبلغ خرافي لامنطقي نهائيا وهو ضخم جدا جدا حتى لو قسمته على 10 او 15 سنة فيعني 25 مليار دولار سنويا كمتوسط وهذا شيء غير معقول مهما ضغطت الميزانية او تلقت اسرائيل مساعدات.
مشرفنا العزيز رأيك يهمني اذا امكن تعليق او رد .
 
اللهم انه مجهودا وبذلا ودعوة للعلم لا تضيع يارب اجر فاعليه وارزقهم به الدرجاتالعلا واصلح لهم دنياهم وأخرتهم
اللهم اغفر له ولوالديه ما تقدم من ذنبهم وما تأخروقِهم عذاب القبر وعذابالنارو أدخلهم الفردوس الأعلى مع الأنبياء والشهداء والصالحين واجعلدعاءهم مستجاب في الدنيا والآخرة اللـهمآميـن
 
دايما للامام ياابطال الظل ,,,,ورعاكم الله في كل بلد عربي واسلامي
 
كما قلت سابقا فى تعليقى على تاريخ تأسيس هذا الجهاز القوى

على حد علمى

ما يميز المخابرات المصرية فى هذا المجال هو البساطة الشديدة للغاية

" السهل الممتنع " بعيدا عن كل التعقيدات ......
 
رد: كيف وصلت عبقرية المخابرات المصرية الى تركيبة الصاروخ الاسرائيلى حيتس؟

وشوية منوعات كدة علشان اللى بيحبوا الانجليزى:biggrin::biggrin::biggrin:

The Arrow Scandal By Ben Kaspit Reprinted from Maariv International (February 15, 2004) haled Sharif has an important role in protecting Israel from the threat of ballistic missiles. Sharif is a computer technician employed by the IBM Cairo office. In the past months Sharif and other Egyptian workers have been corresponding with their colleagues at the Israeli IBM office. Their task is to detect and correct bugs in the MOTIF computer program, on which the computerized system of the Arrow missile is programmed. No, that is no mistake. Egyptian computer engineers in Cairo work with Israeli computer engineers in Tel Aviv on the most expensive and most important defense project Israel has developed in the last decade - the “Wall” project, that operates the Arrow missile batteries. If it weren’t sad it could be funny. The Arrow is the world’s only operative ABM (Anti Ballistic Missile). It is a joint US-Israeli project, with Israel developing the heart of the system, the ultra-sensitiveGreen Pineradar system, which gives the missile the capability to track and intercept incoming ballistic missiles. It is the free world’s only current viable defense against such threats. Imagine U.S. scientists in the 1940s working on the first nuclear bomb and corresponding for that purpose with their colleagues in Moscow. The affair was discovered through the intervention of Maariv, that transferred the information to the defense establishment. Since then, for the past weeks, special teams of experts have been closely reviewing all of the computerized systems, including the Arrow, to clean, detect and neutralize bugs or “Trojan horses” that may have been implanted in them by hostile elements. It should be stressed that no damages or hostile implantations of bugs into the system have been discovered to date. Even if they were discovered we would probably not be allowed to publish it. Nor do we know of any legal violations, except for the violation of common sense. K Force is computerized to the gills. Everything flashes on computers screens. In the old days, to shoot, you had to pull a trigger. Today, more and more, you press “send” on a computer to release a missile or a guided bomb or to operate a sophisticated radar system. When F-16s fly over Ein Saheb in Syria the Air Force commander sits in his Tel Aviv bureau and e-mails them a photo of the target area marked with a red arrow. The pilot adjusts the photo to the view he sees, collates the arrows and presses “send”. One little bug implanted into the system would destroy the process. When it comes to the Arrow the implications are more serious: a computer engineer can introduce a Trojan horse into the operating system planned to be activated during real time use of the system and cause its collapse. It is simple, effective and fatal. According to that scenario, at the moment of truth, when ballistic missiles are on their way to Israel the “wall” system will be activated and then collapse. As a result the actual Arrow missiles will be diverted from their course, or blow up in the air, or just dally. It sounds like a completely fantastical scenario, but that scenario has been placed on more then a few desks in Israel in the last weeks. Maariv has documents that attest to the tight, nearly daily contact between Israeli IBM engineers and the company’s Egyptian office to find bugs in the Arrow operating system. Moreover: during our examination we learned that the next generation of the MOTIF software is being developed in Cairo. From there it was supposed to be sent here, to undergo some further adjustments and replace the current missile system that is supposed to defend Israeli skies from surprise missile attacks. comment on the affair. A senior Air Force officer approved its details and says everything is under control and examination now, under the supervision of a special team created for the purpose. IBM spokesman Yossi Shoval issued the following statement: “IBM has a large number of development laboratories in the world (including in Israel) that serve its clients throughout the world, develop products and handle problems and customer support. In a comprehensive examination we conducted we found there was no exposure of the specific software that was employed in the project in question and in the other IBM software packages operating in the defense establishment. We especially wish to emphasize that no IBM software package provided to the defense establishment was exposed to the infiltration of unwanted and unplanned elements. We want to emphasize that our activities are fully coordinated with the defense establishment”. Off the record, IBM officials confirmed the story. They say everyone in the defense establishment who needed to know the Egyptian office was handling bugs knew. They stressed no damage had been detected. Meanwhile, the defense system closed the strange breach. The fence within A comprehensive, professional, thorough, thick resource book just came out about Israel’s security fence. The booklet was produced by a security team headed by Brig.-Gen. Mike Herzog, the defense minister’s military secretary, ahead of the international trial at the Hague. It is fascinating, illuminating and convincing. It almost convinces you that the original route, the one that is about to be dramatically changed, was justified. Defense Minister Shaul Mofaz presented the booklet to his British counterpart Geoff Hoon. It has valuable information explaining how justified the fence is (regardless of its route), how much it is actually “Arafat’s fence” and how stupid we are that we just started building it seriously. From 1995 to the beginning of the current confrontation there were 12 suicide attacks in Israel in which 79 people were murdered. By last week there had been another 128 suicide attacks (in which 140 suicides were killed) murdering 464 people. The suicide attacks are less than half a percent of all the attacks in the conflict (20,000) but cause 50 percent of the casualties. Besides the 140 successful suicide bombers another 120 would-be suicides arrested on the way to their missions are in Israeli jails, as well as hundreds more arrested at earlier stages. The assault of suicide attacks is defined in the booklet as “an assault on the Israeli A work stop in Egypt The story is simple. Computer software is Anglophonic. IBM’s central Middle East office is in Cairo, and it is the office in charge of regionalizing into Arabic and Hebrew. That is all fine and well until it comes to such sensitive programs. For now, the blunder has been fixed, the route has been blocked and there is no more contact between Tel Aviv and Cairo. Better late than never. Nobody is blaming Egypt of anything. They say there are excellent computer engineers in Cairo who managed to solve many of the project’s flaws. IBM says nothing physical was transferred between the offices, it was only electronic correspondences. Other sources inside the system cite codes, bugs and valuable information that flowed between those two points for a long time. Not to speak of the next generation system that was developed there. The defense establishment and the Air Force decline to ATrojan horse Israel and Egypt have peaceful relations. It is important to encourage trade between them, but a clear red line should be drawn when it comes to such sensitive security systems. Egyptian intelligence is known for its efficiency and creativity. It surely has the means to find out what is happening at computer companies located in Cairo. That is how intelligence organizations work all over the world. The working assumption has to be that everything that passed between Tel Aviv and Cairo has been revealed to the Egyptian intelligence, at the very least. The IDF’s sophisticated combat systems, including the Arrow, are completely computerized. The Air fabric of life”. The booklet reviews the atrocities one by one. The families that were wiped out. The brainwashing that produces the endless production line of suicides. The unbearable ease of the process, from donning the explosive belt to the calm, careless stroll from the edge of Tulkarem to the center of Netanya. The fence, it says, was forced upon Israel by the flood of blood on the ground. Its figures are surprising: of the 235 kilometers of phases I and II, 94.5 kilometers are built on the Green Line or within one kilometer of it. And here is the surprise: in many places the fence was built west of the Green line inside Israeli sovereign territory. On Mt. Gilboa several agricultural fields were split down the middle and the farmers of Kibbutz Ma’aleh Gilboa go through special gates to their fields on the other side. The figures prove, according to the booklet, that the fence was motivated by security not political motives. All of the professional considerations for drafting the route are reviewed, as are the efforts to ease the Palestinians’ lives. The theory comparing the fence to the Berlin Wall is shattered. Measures to defend the Ben Gurion Airport and highway 443 are detailed. Only four percent of the fence are really a wall, about 8.8 kilometers, most of which were already built during the Oslo period or as part of the Trans-Israel Highway, for different reasons. The fence is defined as “dismantleable”. If the threat of terrorism is lifted, the fence will be lifted too. And besides, there is news: Israel does not intend to build the “eastern fence.” v

 
رد: كيف وصلت عبقرية المخابرات المصرية الى تركيبة الصاروخ الاسرائيلى حيتس؟

Report: Arrow missile technology may have been compromised

Security officials are concerned that Israel's anti-ballistic Arrow missile technology may have been compromised with key information falling into hostile hands, Maariv reported on Friday. Egyptian computer engineers helped fix bugs in the software program that runs the system, the newspaper said.

Security sources described the situation as "an unbelievable blunder," the newspaper reported. According to the report, the Egyptian office of IBM has been in close contact with the Israeli IBM office regarding the detection and correction of bugs in the MOTIF computer program, on which the Arrow system is programmed.

The Arrow missile interceptor program has been jointly developed by Israel and the United States at a cost of over $2 billion. At the heart of the system is the ultra-sensitive "Green Pine" radar system, which gives the Arrow the capability to track and intercept incoming ballistic missiles.

Last year, the Israel Air Force in an exercise testing the country's anti-missile defense ahead of a possible Iraqi Scud missile attack. Deployed but never used during the war in Iraq, security sources are convinced the Arrow, which can travel at nine times the speed of sound, can successfully intercept hostile missiles as far as 50 kilometers from their targets.

According to the Maariv report, the next generation of the MOTIF software was written in Cairo and IBM planned to transfer the technology to Israel to replace the current missile operating system.

As a result of their concern, security officials assigned teams of experts from the defense establishment to examine all of the Arrow's computerized systems, to clean, detect and neutralize bugs or "Trojan horses" that might have been implanted by hostile elements. In addition, the contact between IBM's Tel Aviv and Cairo offices has been cut off, Maariv reported.

Officials feared that a bug implanted in the Arrow system could cause the missile to collapse during a real activation of the system and fail to destroy an incoming ballistic missile.

Defense officials and the Israeli Air Force refused to comment on the Maariv report. A senior Air Force official confirmed the details of the story and said it is all under control and being checked by a special team, the newspaper reported.

IBM said in response: "In a comprehensive examination we conducted, we found there was no exposure of the specific software that was employed in the project in question and in the other IBM software packages operating in the defense establishment. We especially wish to emphasize that no IBM software package provided to the defense establishment was exposed to the infiltration of unwanted and unplanned elements. We want to emphasize that our activities are fully coordinated with the defense establishment."
 
رد: كيف وصلت عبقرية المخابرات المصرية الى تركيبة الصاروخ الاسرائيلى حيتس؟

عمــــــــــــــــــــــــــــــــــــــــــار يامصر .
 
رد: كيف وصلت عبقرية المخابرات المصرية الى تركيبة الصاروخ الاسرائيلى حيتس؟

..فإن الإستخبارات المصريه قد أحرزت هدفا مبكرا جدا.. فى بداية المباراة

.’

لكن هناك أمر غير واضح هل الأمر مجرد خطا إسرائيلي ام أنه ضربة إستخباراتية ناجحة ومبكرة لمصر ؟!

نتمنى ان تتضح الامور أكثر ’

 
عودة
أعلى