“Their God changes the path of our rockets in mid-air, said a terrorist,”

The commander recalled: “A missile was fired from Gaza. Iron Dome precisely calculated [its trajectory]. We know where these missiles are going to land down to a radius of 200 meters. This particular missile was going to hit either the Azrieli Towers, the Kirya (Israel’s equivalent of the Pentagon) or [a central Tel Aviv railway station]. Hundreds could have died.

“We fired the first [interceptor]. It missed. Second [interceptor]. It missed. This is very rare. I was in shock. At this point we had just four seconds until the missile lands. We had already notified emergency services to converge on the target location and had warned of a mass-casualty incident…

READ MORE

God-changes-path-of-rockets-jewish-telegraph-600

“Their God changes the path of our rockets in mid-air, said a terrorist,” was the headline in the July 18 edition of the Jewish Telegraph.

It was a partial quote from Barbara Ordman, who lives in Ma’ale Adumim on the West Bank.

Her exact quotation was: “As one of the terrorists from Gaza was reported to say when asked why they couldn’t aim their rockets more effectively: “We do aim them, but their God changes their path in mid-air.”

She opened her piece by noting: “In October 1956, [Israeli Prime Minister] David Ben Gurion was interviewed by CBS. He stated: ‘In Israel, in order to be a realist, you must believe in miracles.’”

Ordman also noted religious texts, specifically the Jerusalem Talmud, teaches Israelis not to depend on miracles for survival.

“It argues that we must not desist from our obligations and must not wait for miraculous intervention from the Supernatural,” she wrote.

Meanwhile, the Times of Israel reported a senior officer in Israel’s army said divine miracles protected his soldiers during fighting in the Gaza Strip.

Givati Brigade commander Col. Ofer Winter told the weekly publication Mishpacha that he “witnessed a miraculous occurrence, the likes of which he had never seen before during his military career.”

Winter indicated a predawn raid intended to use darkness as cover was delayed, forcing the soldiers to move toward their objective as sunrise was approaching.

With the troops in danger of being exposed at daybreak, Winter explained how heavy fog quickly descended to shroud their movements until their mission was accomplished.

“Suddenly a cloud protected us,” he said, referring to clouds the Bible says guided the ancient Israelites as they wandered in the desert. “Clouds of glory.”

Winter said only when the soldiers were in a secure position, the fog finally lifted.

“It really was a fulfillment of the verse ‘For the Lord your God is the one who goes with you to give you victory,’” he said, quoting Deuteronomy 20:4.

READ MORE

Russian Gang Amasses Over a Billion Internet Passwords

A Russian crime ring has amassed the largest known collection of stolen Internet credentials, including 1.2 billion user name and password combinations and more than 500 million email addresses, security researchers say….

READ FULL

The hacking ring is based in a small city in south central Russia, the region flanked by Kazakhstan and Mongolia. The group includes fewer than a dozen men in their 20s who know one another personally — not just virtually. Their computer servers are thought to be in Russia.

“There is a division of labor within the gang,” Mr. Holden said. “Some are writing the programming, some are stealing the data. It’s like you would imagine a small company; everyone is trying to make a living.”

They began as amateur spammers in 2011, buying stolen databases of personal information on the black market. But in April, the group accelerated its activity. Mr. Holden surmised they partnered with another entity, whom he has not identified, that may have shared hacking techniques and tools.

Since then, the Russian hackers have been able to capture credentials on a mass scale using botnets — networks of zombie computers that have been infected with a computer virus — to do their bidding. Any time an infected user visits a website, criminals command the botnet to test that website to see if it is vulnerable to a well-known hacking technique known as an SQL injection, in which a hacker enters commands that cause a database to produce its contents. If the website proves vulnerable, criminals flag the site and return later to extract the full contents of the database.

“They audited the Internet,” Mr. Holden said. It was not clear, however, how computers were infected with the botnet in the first place.

By July, criminals were able to collect 4.5 billion records — each a user name and password — though many overlapped. After sorting through the data, Hold Security found that 1.2 billion of those records were unique. Because people tend to use multiple emails, they filtered further and found that the criminals’ database included about 542 million unique email addresses.

READ FULL