And secondly, it doesn’t deliver. Israel does not have nuclear weapons, but if necessary, they must be used

Firstly / secondly / thirdly...

introductory word

Identified by punctuation marks, usually commas. For details on punctuation for introductory words, see Appendix 2. ()

There, firstly, discipline // Weak against ours. // And please, a picture: // Here is a column, there is a crowd. A. Tvardovsky, Terkin in the next world. The letter was indeed from Petenka, short, but “appropriate,” as the judge said. Firstly, he explained why he didn’t come for the holidays: he was on an excursion in Leningrad. Secondly, he was amazed at my appearance in Ensk and expressed his heartfelt feelings about it. Thirdly, he scolded me terribly for not writing, not looking for him, and generally “behaving like an indifferent horse.” Fourthly, there was another letter in the envelope, for Sanya, and she laughed and said: “What a fool, he could have just attributed it.” V. Kaverin, Two captains.


Dictionary-reference book on punctuation. - M.: Reference and information Internet portal GRAMOTA.RU. V. V. Svintsov, V. M. Pakhomov, I. V. Filatova. 2010 .

See what “firstly / secondly / thirdly...” is in other dictionaries:

    See firstly / secondly / thirdly... ... Dictionary-reference book on punctuation

    FIRSTLY- FIRST, an introductory word. First, first, first (the first member of the enumeration, in which the remaining members are sequentially designated by the words: secondly, thirdly, etc.). Dictionary Ushakova. D.N. Ushakov. 1935 1940 ... Ushakov's Explanatory Dictionary

    FROM FIRST HAND- find out, receive information, etc. Directly, without intermediaries. It is understood that information, news, information, etc. are accurate, reliable and trustworthy. This means that a person or group united by common... ... Phraseological Dictionary of the Russian Language

    Get up before the first, second, third roosters.- Stand up before the first, second, third roosters. See ELEMENTAL PHENOMENA... V.I. Dahl. Proverbs of the Russian people

    FIRSTLY- adv. or number, first, first to first, in advance, first of all, in the beginning, first; at the head, most importantly. First, always take care of others, not yourself. Give me, firstly, paper, secondly, a pen, thirdly, sealing wax, etc. Firstly, I don’t drink; in... ... Dahl's Explanatory Dictionary

    THIRD- THIRDLY, an introductory word. used to indicate the third item in the listing. Firstly, a trip requires money, secondly, time and thirdly, desire. Ushakov's explanatory dictionary. D.N. Ushakov. 1935 1940 ... Ushakov's Explanatory Dictionary

    Drunkenness (alcoholism) and the fight against it- P. is the excessive consumption of all kinds of stimulating and intoxicating substances and, in particular, alcoholic beverages. P.'s influence on a person is extremely diverse, affecting not only his physical and mental nature, but, to a large extent... ...

    Drunkenness and the fight against it- (alcoholism) P. is the excessive consumption of all kinds of stimulating and intoxicating substances and, in particular, alcoholic beverages. P.’s influence on a person is extremely diverse, affecting not only his physical and mental nature, but, in... ... Encyclopedic Dictionary F. Brockhaus and I.A. Ephron

    The fight against alcoholism in the 19th century- Drunkenness (alcoholism) and the fight against it. Main article: Alcoholism Article based on materials from the encyclopedia of Brockhaus F. A. and Efron I. A. (1890 1916) ... Wikipedia

    Chapter 2. CHANGES IN THE DAILY AND FESTIVAL TABLE MENU IN RUSSIA OVER THE LAST TWO CENTURIES- In order to be at the level of solving any problems of our time, it is necessary to know the history of each problem, to know how the same issues that interest us now were solved in the past. Taking into account historical experience is the basis of strategy in activities... Great Encyclopedia of Culinary Arts

Vladimir YANKELEVICH.

“Just because your nails grow doesn’t mean they don’t need to be cut.”

Israeli intelligence saying.

Of course, you need to cut your nails. But here’s the problem: they grow, for example, in Iran, but you need to cut your hair, for example, from Gush Dan or from an office overlooking the Potomac. But this is the 21st century, the century of telecommunications, and nothing is impossible about it. This is called the unpleasant word “Cyber ​​War”, unlike previous wars, this war is taking place in cyberspace, but this does not make it any less acute and dangerous.

Actually, penetration into closed computer networks is nothing new; the phenomenon is slightly younger than the Internet. For hackers, infiltrating websites was a kind of game. They did this to make fun of themselves or improve their financial situation, but the term “Cyber ​​Warfare” appeared only in 2007, when the Estonian government and the US Department of Defense were subject to hacker attacks. That is, the goal of the attacks was not the desire to penetrate the banking system and transfer a round sum to one’s account, not to show oneself better than all certified specialists, but to strike a blow at the state system, its information and communication networks, to create failures in information transmission and processing systems, in control systems. Since then, hackers have been an object close attention intelligence services, and all of the above, you see, is already a war.

THE POTENTIAL OF A CYBER ATTACK ON IRAN EXCEEDS THE CAPABILITIES OF CONVENTIONAL WEAPONS

Although this war is going on in the quiet of offices under the quiet noise of air conditioners, for the target of the attack this can result in consequences more serious than a missile strike. This is roughly what the head of Israeli military intelligence, Major General Aviv Kochavi, said on July 5 at a meeting of the Knesset Foreign Affairs and Defense Committee. He noted that the potential of computer warfare against the Iranian nuclear program exceeds the potential of conventional air and missile strikes.

In Israel, this work began a long time ago, in the late nineties, one might say that it was somehow unplanned. Shabak ((Shin Bet) abbreviation of Sherut Bitachon Klali), the Israeli General Security Service, was engaged in a routine check of security equipment at a strategically important facility - a large fuel depot near Tel Aviv. A Shin Bet computer specialist penetrated the computer that controlled the warehouse and suddenly discovered that he not only had access to secret data, but could also cause explosions simply by reprogramming the operation of pipelines. This episode gave rise to an understanding of the potential of cyber attacks, providing avenues for serious sabotage. This is where the history of Israeli military cyber programs began. The American “Cyber ​​Strategy 3” was born later.

But are these theories or is it really happening, so to speak, on the ground? American analysts argue that it couldn’t be more realistic; the number of cyber attacks on US government organizations tripled from 2005 to 2010. Only for the period from 2008-2010. seven major incidents related to cyber attacks were recorded. This caused failures in the automated control systems of power and electric networks, control systems of power plants (including nuclear power plants), and automated control systems of transport navigation and dispatch services. The head of the Pentagon Cyber ​​Command, General Alexander, even stated at a hearing of the US Armed Services Committee that cyber weapons have an effect comparable to the effect of using weapons of mass destruction.

In November 2009, a cyber attack occurred on one of the Brazilian hydroelectric power stations, which deprived 60 million residents of a dozen cities for three days. public transport, traffic lights, communications, paralyzed the work of thousands of gas stations, bank branches, enterprises and shopping centers. Why not war?

"TITANIUM RAIN" HEADACHE

Experts consider the most successful cyber attack (on the websites of NASA, the US Department of Defense, Lockheed Martin, etc.) to be the attack called “Titanium Rain” in FBI documents. Traces of this attack lead to China. For the attack, a program was created that scans thousands of computer networks of military and government agencies every second. As a result, networks were hacked and secret documents of the largest US nuclear research center Sandia, the US Rocket and Space Center - Redstone Arsenal, as well as NASA computer networks were copied. In 2009, Chinese hackers managed to open the networks of the Lockheed Martin corporation and gain access to documents of the Pentagon’s most promising and expensive project - the F35 fighter jet, the development of which has already cost about $300 billion.

It should be taken into account that in China over the past 5 years, the production of microcircuits has more than doubled and exceeded 65 billion units. The FBI believes that China prudently installed spyware in them that allows them to scan and email computer files of interest to them. Such cases were recorded in the networks of the US State Department, the Ministry internal security, Ministry of Commerce.

François d'Alençon (La Croix, France) writes: “As for China, it makes no secret of its objectives in the field of information warfare, which can be found in the white paper on defense policy published in 2006. The Chinese People's Army There is a special unit within the General Staff for these purposes. About 20,000 “patriotic hackers” work for the Chinese intelligence services, the total number of agents of which reaches two million people. In order to save money, the People’s Army is guided by the doctrine of “asymmetric deterrence,” which consists of developing “ sabotage" capabilities based on the most modern technologies."

In addition, the FBI claims that al-Qaeda has also joined the cyber war, its hackers tried to gain access to the control system of dams at several US reservoirs and, in addition, have already carried out several cyber attacks against Israeli government agencies.

On July 5, computer security company McAfee published its "Ten Days of Rain" review of attacks on U.S. and South Korean military sites that caused so-called "denial of service" attacks. According to McAfee, the attack has clear anti-Korean and anti-American motives. According to McAfee, the attack is characterized by technical excellence, but a very limited effect, which suggests that it is a test of the reaction of the attacked, in order to determine the time required for them to counteract.

To organize such attacks, “zombie networks” are used. To create them, cyber terrorists hack thousands of computers in many countries, usually personal ones, whose owners are not even aware of it, and, using a malicious “bot” program, combine them into a network. Due to the fact that a huge number of computers are collected in the network, its computing capabilities are extremely high, an attack from such a “Botnet” network on a website a huge amount requests exceed the capabilities of the site, which causes a “denial of service”. In such a “zombie network,” it is difficult to track the control center, since the attack is carried out from the computers of completely law-abiding users. The South Korean "botnet" was programmed to operate for 10 days and then self-destruct, removing traces of malware from the zombie computers so that the source of the attack could not be traced.

McAfee's research showed that the botnet was located almost all over the world, including Taiwan, Russia, Saudi Arabia, India and the United States, making it resistant to dismantling.

In response to the attack, South Korea's Ministry of Defense announced it was increasing the size of its cyberwarfare force and opening a cyberwarfare training school for them.

Panda Security issued a similar message. She said, “This quarter was one of the worst in history,” with victims ranging from the International Monetary Fund and the US Department of Defense to Sony, SEGA and Citigroup. As Panda Security found, in the past quarter, an average of 42 new strains of malware were created every minute.

In such a situation, only the organization of countermeasures at the state level can resist cyber attacks. About thirty countries besides the United States, including England, France, India, post-Soviet countries (Estonia, Latvia, Armenia, etc.), announced the creation of their own cyber units.

But opposition is opposition, and in the meantime, William Lin, the US Deputy Secretary of Defense, was recently forced to admit that 24 thousand computer files were stolen from a company working for the Pentagon several months ago. Lin did not blame a specific intelligence agency, but it is not difficult to assume the authorship of this attack; China is the leader in this field. He promised to respond accordingly, but that would be tomorrow (if ever).

What to do, gentlemen, new times - new wars.

FIRSTLY, WE DO NOT HAVE NUCLEAR WEAPONS, AND SECONDLY, IF WE NEED IT, WE WILL USE THEM. GOLDA MEIR

What about in Israel? American expert Scott Borg, in particular, stated that “Judging from my contacts with Israeli experts at various international forums, Israel today clearly has advanced capabilities for cyber attacks.”

Israeli cyber units are carefully classified and covered with caesura. Considering that Israel is one of the world leaders in high-tech, there is good reason to believe that the activities of these divisions are quite successful. It is clear that the primary task of this online army is defense, and offensive operations are usually not advertised, but they certainly exist. It is unlikely that we will be able to find out from official documents in the near future how these operations are carried out, but some information from investigative journalism is already available. The most famous is the successful Operation Orchard to destroy a nuclear facility in Syria. According to Spiegel magazine, the operation began with the 2006 intrusion into the computer of a Syrian official associated with the nuclear program. From his computer it was possible to obtain not only data about the facility under construction, but also even photographs of Chong Chibu, one of the leaders of nuclear projects, posing against the background of the facility under construction North Korea and Ibrahim Othman, who headed the Syrian Atomic Energy Commission. In addition, according to Spiegel, Israeli specialists managed to introduce spyware into this computer, thanks to which all secret documents from this computer began to go straight to the Mossad. Thanks to the information received on the night of September 5-6, 2007 of this object, threatening security Israel is gone.

Then events developed like this: Bashar al-Assad began to prepare a retaliation operation, which was entrusted to the experienced terrorist Imad Migniya, who is responsible for hundreds of victims. He was known, among other things, as the organizer of terrorist attacks against American barracks in Beirut in the 1980s, against the Jewish center in Buenos Aires, but somehow he survived. Migniyya, as a retaliation operation, planned terrorist attacks against Israeli embassies, but his SUV suddenly took off, putting an end to his career.

General Mohammed Suleiman was appointed chief supervisor of retaliation operations against Israel. He was a personal friend of Bashar al-Assad and his closest national security adviser, was responsible for the Syrian army's relations with Hezbollah and worked directly with Imad Mighniyya. His nickname was "Shadow Man". Among other things, he was also one of the most protected people in Syria, but in a villa in Tartus, on the beach with the romantic name “Golden Sand”, he joined Mignya, and now he knows exactly everything about the 30 virgins of the Muslim paradise. General Suleiman was shot in the head by a sniper from a passing yacht. Such a shot from a yacht rocking on the waves required considerable skill from the sniper. The operation was brilliantly planned and carried out, and Assad understood the subtle hint and stopped trying to somehow take revenge. What the role of cyber units in these operations can only be guessed at, but it certainly couldn’t have happened without them.

And already in 2010, the New York Times published information that the Israeli cyber unit ensured the blocking of Syrian air defenses during Operation Orchard using the military computer program Suter. This program allows you to attack computer networks and air defense communication systems. According to the Americans, without this, evading Syrian radars would be problematic, since Israeli F-15s and F-16s are not equipped with Stealth technology.

There are other examples. Thus, in 2008, Iranian businessman Ali Ashtari was executed, accused of supplying “infected” communications equipment for one of Iran’s military projects in the interests of Israel. Iranian media reported that Ashtari's actions "led to the collapse of the entire project with irreversible damage." Most likely, Ashtari did not know about the “infection” of the equipment, but this did not help him.

There have been no official comments from Israel regarding these publications, but as Golda Meir said, “Firstly, we do not have nuclear weapons, and secondly, if necessary, we will use them.”

The significance of cyber attacks today has especially increased, primarily because an airstrike to eliminate Iran’s nuclear program is no longer being considered in Israel today, and the main ally, the United States, does not seem to want to get involved in a military confrontation with Iran; they still need to get rid of Iraq and Afghanistan. Therefore, most likely the “direction of the main blow” in the fight against his nuclear ambitions will be the computer networks of the ayatollah regime. What the specific possibilities of a “small war” are in combating Iran’s nuclear program remains a mystery.

THE SMELL OF WAR

In the digital era, geopolitics and diplomacy based on state borders and their protection are experiencing serious problems. Cyberspace is a world where there are no borders, there are powerful information flows, border guards and customs officers will not help on this path, and therefore the United States and NATO adopt a resolution according to which a cyber attack is considered the opening of hostilities, just like with the use of conventional weapons.

We must admit that today the traditional division of army, air force, navy and space force is outdated and cyberspace is becoming another battle zone. Despite the veil of secrecy, it is clear that cyber warfare in the 21st century will be more and more significant. Unlike conventional weapons, a cyber attack is incomparably cheaper, and is often more effective than conventional weapons, and it is often very difficult to understand who the attacking party is.

Never before has the smell of a new type of war been so strong.

What did the “Great Prophet” tell us?

Alexander Voronel wrote: “The peace that is possible in our region is a peace based on military balance, and not on the absence of conflicting interests.” This is not pessimism, not optimism - this is realism.

What did we hear from the “prophet” called “Great Prophet-6”, military exercises of the guards of the Islamic Revolution. The commander of the rocket and space forces, General Amir Hadjizadeh, acted as the prophet's mouthpiece. He said that during the exercise, two Shihab-3 missiles were launched at a range of 1,900 km. This missile has been known for quite a long time; previously the range of these missiles was 1300 km, and the missiles were powered by a liquid jet engine. The Iranians carried out a serious modernization of them, created and successfully tested solid fuel engine for missiles and significantly reduced the weight of the missile body, which increased its range and accuracy. But real full-range tests of these missiles, ones that would be confirmed and recognized as reliable in the West, were carried out for the first time. The proven range of the Iranian Shihabs will allow, if desired, to hit targets both in Israel and in Europe, not to mention the Persian Gulf countries, with which Iran has serious contradictions. Many media outlets came out with the information “The Iranian threat to Israel has been confirmed.”

Pessimism is a luxury that Jews cannot afford. (Golda Meir)

Given that Iran is Israel's most vocal enemy, this threat must be taken seriously. Let's try to figure out in what directions it is possible to work to neutralize Iranian missile threats.

First, it is consolidating efforts with countries, like Israel, that are the target of the Iranian threat for coordinated countermeasures. Such countries include, first of all, the GCC countries, and Iran's main Arab opponent in the region - Saudi Arabia. This work is being carried out primarily within the framework of the regional missile defense system being created by the United States, designed to protect both Israel and Arab countries, and Israeli missile defense troops will become its integral part. The head of the US National Missile Defense Agency, Lieutenant General Patrick O'Reilly, spoke about this in an interview with Defense News.

Secondly, it is necessary to continue to improve the Homa missile defense system - Israel's missile defense shield. This system is also known as HEC-2, after the name of its anti-missile missile. The complex is a joint development of the Israeli company IAI and the American corporation Lockheed Martin and is capable of hitting missiles in conditions of powerful electronic countermeasures.

The Hets-3 rocket has recently successfully passed bench tests, which, according to expert estimates, should become the best in the world. These missiles are classified, but it is known that it is designed to destroy Syrian Scuds, Iranian Shihabs, and Lebanese Fatah-110s with a range of 400 to 2000 km. Moreover, Hetz-3, already in flight, if necessary, will be able to switch from one target to another.

The Israeli Ministry of Defense has developed a plan to create a four-level missile defense system, the implementation of which will make Israel practically the most protected state in the world from any missile attacks.

Thirdly, it is necessary to prepare forces and means for an adequate retaliatory strike. For this purpose, Israel has its own ballistic missiles, Jericho. Jericho-1 can carry a payload of approximately 450 kg. with a range of 500 km. Jericho-2 reaches from 1500 km to 3500 km, depending on the modification, with a payload of about a ton. Jericho-3 is the latest development. It is a three-stage missile, with a warhead of about one ton and a range of 2,000 to 4,800 km. Some sources estimate its range to be 6,500 km or more and report the possibility of installing a warhead with multiple warheads.

The presence of only ground-based ballistic missiles today is considered insufficient; they are supplemented by sea-based missiles. And it is obvious that this direction of weapons development also did not go unnoticed. The Navy has three of the latest German-built Dolphin-class submarines, two more are in the process of completion, and in May it announced a decision to order a sixth submarine from Germany. Each submarine has six 533 mm torpedo tubes designed to fire Sub-Harpoon torpedoes and missiles, and four 648 mm. torpedo tubes, which, according to GlobalSecurity.org, can be used to launch cruise missiles with a nuclear warhead. The presence of submarines with such weapons on board will provide Israel with guarantees of delivering a powerful retaliatory strike in the event of an enemy attack. It should be noted that Israel does not confirm that it has nuclear weapons, but be that as it may, it is clear that the Israeli Navy is becoming an important part of the country's strategic balance.

Fourth, it is necessary to conduct an active campaign in the media, explain Israel's policies, win friends and resist efforts to delegitimize the country. It is important to convey to the enemy the possibility of a tough response to any attack, so that it becomes clear that a military confrontation with Israel, a war with modern weapons, is too dangerous for these regimes. Only awareness of this danger can ensure peace in our troubled region.

And, in conclusion, a small digression suggested by Professor Delbrück in the book “History of Wars and Military Art.” He writes that the explanation for the fall of Rome by the blows of hordes of barbarians was invented by Roman commanders for self-justification. “Hordes of barbarians” is a very dubious statement, since their military organization did not allow them to control a large enough army; most likely they did not outnumber the Roman troops, but consisted of brave people. TO

By this time in Rome, the prestige of army service had already fallen, and “the Romans had forgotten how to fight,” a quiet life became so attractive to them that only asocial elements agreed to serve in the army, and the barbarians on the battlefield met “Romans” who differed from them only in that they fought reluctantly. The result of this is known - “On the ruins of the forums of the empire, goats grazed, and the wild shepherds did not know who erected these buildings and for what.”

The Rafael Defense Systems company presented a unique system for detecting improvised explosive devices. Simple, like everything ingenious. The drone takes aerial photographs of the area, which is stored in the system's memory after computer processing. If there are any changes in the soil structure on the ground (the system detects recently moved or loosened soil or moved stones), the system will mark this area as dangerous, where a mine is likely to be planted. It takes 10 minutes to identify a dangerous area.

A real hit from the Raphael company in Le Bourget was the Iron Dome (Kipat Barzel) missile defense system, which protects the territory from unguided missiles. Kipat Barzel was developed in two years, which is a kind of record for systems of this level.

MANPADS also did not go unnoticed: Israel presented the Starry Sky system at Le Bourget, a laser system that neutralizes terrorist missile attacks on aircraft. The system detects a missile fired from a MANPADS and disables it with a laser beam electronic systems guidance There are no analogues of such a system. And what’s interesting is that among the countries that became interested in the Israeli system was Iran, which probably remembered the times of cooperation with Israel.

The Military Industry Concern presented the Refaim (Ghost) system, containing a video surveillance and aiming system attached to the American M16 assault rifle or Tavor assault rifle. The system allows a disposable video camera to be fired, which will transmit an image that will be captured during flight, thereby informing the soldier that he is in an unobservable area, avoiding unnecessary risk. The Refaim system is intended mainly for combat in urban environments.

Israel Aerospace Industries demonstrated a new multifunctional bomb weighing 114 kg. The bomb can explode in the air, detonate on impact, and, in addition, has a delayed detonation. The bomb is equipped with a laser guidance system, providing hit accuracy of up to one meter, and is integrated into the GPS guidance system, which allows it to be used not only against stationary, but also against moving targets.

The Aviation Industry concern showed friends and enemies a series of missiles, including the Barak-8 air defense system and the Hets-2 and Hets-3 missile defense systems, and the Military Industry concern showed a surface-to-air missile "Delilah", and a missile guidance correction system designed to hit targets deep behind enemy lines, primarily to destroy missile launchers and radars. So the Iranians, inspired by the Great Prophet-6 exercises, have something to think about - Hetz-3 is designed specifically to destroy ballistic missiles like the Syrian Scud, Iranian Shihab or Lebanese Fatah-110, which have a flight range of 400 to 2000 km .

There is also something special for Gaza tunnel enthusiasts. EMI, a company specializing in the production of explosives, has developed the second generation of the Emulsion system, which makes it possible to deal with them very effectively - liquid components are injected into the ground, each of which is individually explosion-proof, but in the ground they flow into voids - tunnels, turning into explosives. You can sympathize with the tunnels.

Big space of little Israel

Israel surpasses all countries, with the exception of the United States, in the resolution and quality of images received from satellites, and even underground objects cannot be hidden from the eye of an Israeli satellite. Our military can clearly see the Hamas tunnels from Gaza from space. You could say that the Israeli satellite literally sees through the earth!

It is impossible to list all the latest developments within the scope of this message. But from the above it is clear that the Israeli military-industrial complex is working to provide for the IDF the latest technologies and weapons to counter today's threats.

Of course, it would be better not to spend money on weapons, but to build schools and hospitals, but we live in an inverted Orwellian world, where “doublethink” has become the norm. Remember the slogan “War is peace!”? Does this not resemble the aspirations of Hezbollah, Fatah and Hamas? “War” is a plan for coexistence with us, and “peace” is the name of this coexistence for the co-sponsors of the “peace process”. But in the same novel, Orwell also cited another slogan of “doublethink”: “Ignorance is strength!” Surprisingly accurately said about today. Knowledge is characterized by doubt, ignorance (not lack of education, but ignorance as a way of thinking) is not. It is possible that this is why the “neighbors” do not stop dreaming about a “final solution” to the Israeli issue instead of solving their real pressing problems. In this Orwellian world, threats to Israel do not disappear, but, as in years past, the presence of modern weapons helps potential adversaries cool their hotheads.

What is the correct way to write “firstly” or “at first”?

    Firstly written with a hyphen.

    The spelling of this word is subject to the rule of writing adverbs with a hyphen, which says that adverbs with the prefix vo- (in-) and suffixes -х (-ы) are written with a hyphen.

    In the above sentences, firstly, there is an introductory word, and introductory words in the sentence are highlighted with punctuation marks.

    First of all, always write with a hyphen and it will be correct. Similar words secondly, thirdly, and so on, it must also be written with a hyphen. For example - First, find out where these rules come from.

    This adverb includes the prefix vo and the suffix х, and in this combination cannot be written otherwise than firstly, i.e. hyphenated Now, if it were not an adverb, but a preposition in with a noun, we would write separately, without any hyphen. But this design would have a completely different meaning. For example: the jury members sat in the front rows. There is no need to think about any enumeration here.

    But if we need to list something specifically, then all adverbs formed from an ordinal number will be written with a hyphen (and firstly, and secondly, etc.).

    Introductory word Firstly is such a part of speech as an adverb. And it is formed from an ordinal number using the prefix vo-.

    There is a rule that states that adverbs formed from such numerals with the addition of a prefix in- or V- written with a hyphen.

    Words formed from numerals with the prefix vo and ending in - them (s) are usually written with a hyphen. For example, firstly, secondly, thirdly and so on. This is a rule of Russian spelling about hyphenated spelling of adverbs.

    Word Firstly spelled correctly with a hyphen and separately.

    We apply the rule of the Russian language: adverbs formed from ordinal numbers with the prefix VO (V) are separated by a hyphen.

    And there is one more feature: if the sentence contains firstly, then it must be secondly.

    When counting any objects, so-called ordinal numbers. So, if adverbs are formed from such numerals using the prefix vo- or v-, then they are written with a hyphen.

    Therefore the word First of all, it is written with a hyphen.

    Other examples: secondly, thirdly

    According to the grammatical rule of the Russian language, all numerals with the prefix vo and v are written with a hyphen.

    For example: firstly, sixthly, twentiethly.

    The rule is quite simple, it is not difficult to remember and apply it.

    It would be correct to write this introductory word with a dash, or in another way, with a hyphen. There is simply a rule in the Russian language that such adverbs are written with a hyphen. Firstly, secondly, and so on.

    These Words are often used as introductory words in argumentative essays, and they must be written correctly with a hyphen.

    First of all x, secondly, thirdly and so on...

    The spelling dictionary says that these are adverbs and such words are written with a hyphen.

    The words first, second, third are adverbs in the Russian language and they are formed from numerals, therefore they are always written with a hyphen.

    In addition, this adverb, like others like it, acts as an introductory word and is necessarily separated by a comma. Here's an example sentence: Firstly, this answer is accurate and comprehensive. Secondly,....

    In the Russian language there is such a simple rule: that all numerals that are formed with the help of a prefix such as in-, V-, and then it is followed by any numeral - written strictly with a hyphen. For example:

    • tenth,
    • Firstly,
    • sixthly,
    • thirdly,
    • seventh,
    • fifthly,
    • ninth
    • eighth,
    • secondly, and
    • fourthly.**
  • The words firstly, secondly, fifthly and others are adverbs. In sentences, as a rule, they are introductory words, which are separated by commas on both sides.

    According to the rules of the Russian language, adverbs formed using ordinal numbers (first, second, tenth, etc.) and the prefixes v-, vo- are written with a hyphen.

© East News, Xinhua/Shen Hong

Israel does not have nuclear weapons, but if necessary, they must be used

Warning: The author does not know about Israel's nuclear potential, about the presence of nuclear weapons in Israel, everything that can be taken as such statements is his personal assumptions, based on a statement attributed to Golda Meir: “Firstly, we do not have nuclear weapons, but secondly, if necessary, we will use it"

If it seems to you that things are going badly, then perhaps you are incorrectly assessing the situation; most likely, things are much worse.

Murphy's Laws of War

About the agreement with Iran

Today there is no longer any doubt that the Big Six (5 permanent members of the UN Security Council + Germany) and Iran will not reach a permanent agreement on the nuclear issue within the deadline they have set for themselves. And it is unclear whether they have been achieved at all.

In November 2013, Iran pledged to sign a permanent agreement by July 20 of this year that would completely exclude a military option for the development of Iran’s nuclear program. The harsh hands of the world community “on the throat” of Iran’s economy immediately weakened, Iran took a breath of air and thought - what’s the hurry?

Probably the considerations were:

The United States and Great Britain guaranteed the territorial integrity of Ukraine, but reacted somewhat sluggishly to the annexation of Crimea.
. The West is stuck in problems with Russia; they have no time for us.
. Russia can only scare the West by closing the gas tap, and we Iranians can help them with energy problems in Europe.
. By the time hands close around the throat of the Iranian economy again, the point of no return will have already been passed. In short, it will be too late, much like with the DPRK.

Considerations required verification. As a test case, the Iranian delegation in Vienna put on a surprised face and refused to discuss its nuclear weapons delivery program, pointedly ignoring UN Security Council Resolution 1929 of 2010 banning Iran from developing ballistic missiles.

It seemed that, in accordance with Article 25 of the UN Charter on the binding nature of Security Council decisions, the sanctions regime would immediately tighten and/or the Big Six would begin to prepare a coercion operation, but the Iranians calculated the situation correctly, nothing happened except the words that the negotiations would be difficult.

In the meantime, everything is going according to plan in Iran. They will not discuss the ballistic missile development program, repurpose the reactor in Arak, which is very necessary for the production of weapons-grade plutonium, and the world can be lulled by saying that Iran has destroyed its stockpiles of highly enriched nuclear materials. At first these materials seemed not to exist, and then they were seemingly destroyed. Sleep peacefully, earthlings, just as in the time of Aladdin: “Residents of Baghdad, sleep peacefully, you are protected, the guards do not sleep!”

Firstly, prudent Iranians could have hidden nuclear materials, let’s not forget what volumes of substance we are talking about. For those who like to count. 1 cubic meter of uranium weighs 19.04 tons, and the critical mass of a uranium nuclear charge is 40-60 kg. For plutonium, the figures will be as follows: 1 cubic meter of plutonium - 19.25 tons, and the critical mass of the charge - 10-20 kg. It is clear that the reserves required for several bombs are an insignificant amount; hiding it is quite a feasible task for Iran. Well, secondly, we should not forget that a “black market” for nuclear materials has formed in the world, and no one is going to dismantle centrifuges from Iranian plants.

A few words about the Israeli preventive strike

Much has been said about the fact that Israel is quite capable of destroying Iranian nuclear facilities alone, at least the main part of them. Experts speculated how many years this Israeli strike would set Iran back from possessing a nuclear bomb, some said two years, others three years, but added that it could lead to the Iranians rallying around the ayatollahs, and that it would be necessary fight Hezbollah and Hamas...

At that time, there was a consensus in the world that aggressive Iran was striving for a bomb, that it needed to be stopped, but we just needed to let the sanctions work a little more, but if they didn’t understand... then then!!!

Times are different now - “There have been worse times, But there were none meaner”

The phrase belongs to Nadezhda Khvoshchinskaya, its poetic form belongs to Nekrasov

The gloomy Ahmadinejad was replaced by a smiling Rouhani, and the fact that he is essentially no different from his predecessor, so who cares, now is the time of supposed hope...

For Israel, this means that a strike on Iran will not receive support, but will be viewed solely as a disruption of global efforts to resolve the problem of the Iranian atom. The strike should have been carried out earlier, but today the efforts of the world community led by the United States have led to the fact that Iran will almost inevitably become the owner of nuclear weapons.

The time has come for Israel to acknowledge the obvious fact that Iran is rapidly approaching military nuclear capability, and the previously existing option of a pre-emptive strike by Israel is becoming unrealistic.

Living with a nuclear Iran

It is unlikely that Israel is not considering the possibility of living with a nuclear Iran, but how Iran's nuclear deterrence policy is viewed is still unclear. Meanwhile, this cannot but worry both the Israelis and the Iranian leadership; they should be interested in what else Israel will come up with.

But there are not many options, the most important areas are the appropriate cyber defense of Israel, the further development of space reconnaissance and target designation technologies, but not only - it is possible that it makes sense, following the example of India and Pakistan, to declare itself a country with a full-fledged nuclear triad, if it exists, Certainly.

About cyber protection

“You must know the enemy in order to be able to defeat him,” said Chinese military strategist Sun Tzu 2.5 thousand years ago. Today he would say, "You must hack into the enemy's computer network and find out about him in order to be able to win."

Iran is improving rapidly and has been able to carry out a number of successful cyber attacks. At the largest Saudi oil company in the world, Saudi Aramco, 30,000 computers were disabled as a result of an Iranian cyber attack. US banks were attacked; earlier, hackers managed to gain control of a satellite from the UK Ministry of Defense.

Military secrets are an attractive target for attack. From computers of companies producing special software to control satellites and missiles of the American army, as a result of a cyber attack, almost two-thirds of the available information was stolen. In 2012 alone, there were 2,500 significant cyber attacks against NATO systems.

In general, a cyber attack can be comparable in consequences to a full-fledged military strike.

“Constant threats have turned Israel into an experimental laboratory where technologies are not only created, but also immediately tested in practice.”

Zeev Elkin on cyber defense.

Zeev Elkin is right, Israel has gained a lot of experience in cyber defense, Israel’s knowledge and experience are significantly ahead of the capabilities of a potential enemy, but the fact is that there is no such thing as sufficient security.

About space reconnaissance and target designation

To succeed in battle, you need to keep your intentions hidden from the enemy, and strike where the enemy least expects it and where he is most vulnerable.

British philosopher and strategist Sir Basil Henry Liddell Hart

Information about the intentions of a potential enemy for the army and political leadership is collected by reconnaissance satellites and drones.

In April 2014, the Ofek-10 reconnaissance satellite joined other satellites in orbit: Ofek-5, Ofek-7, Eros A1, EROS B, TecSAR, Ofek-9. Ofek-10 allows you to photograph objects on Earth under dense clouds, fog and at night - to obtain high-quality images regardless of the weather and time of day.

The satellite system makes it possible to monitor the situation thousands of kilometers from Israel, including Iran. Unit 9900 (UNIT 9900) analyzes the information received. During the Fisher Institute's Space Intelligence Capabilities Conference in 2009, a three-dimensional model of the Natanz uranium enrichment facility in central Iran, including its underground facilities, was shown. This is the job of division 9900 analysts.

They provide real-time information to all levels of government: political leadership, senior military command, down to battalion commanders and even smaller units. Satellite cameras are redirected to the desired monitoring area on demand, and 9900 analysts can run a 3D modeling program and show what everything really looks like.

“In a rapidly changing complex reality, in an era of intertwined operational-tactical strategic changes, it is imperative to have creative thinking that seeks to improve the ability of military intelligence, the IDF, and the State of Israel to meet the challenges of the hour and many threats.”

Chief of IDF Military Intelligence Major General Aviv Kochavi

Unit 9900 is staffed with specialists with unique visual and analytical capabilities. They can detect even the smallest details that are inaccessible to most people. The team also includes soldiers with autism spectrum disorder. It turned out that they have an amazing memory for detail and a large working memory capacity, which made it possible to use their strengths for the needs of the IDF and Israeli intelligence. (Working memory is a system in the human brain that allows people to remember large number heterogeneous information short time in order to complete the task).

Today, ballistic missiles are guided to the target by GPS, and the accuracy of the strike is determined by the accuracy of the target coordinates, and this will provide UNIT 9900.

Israel, like the United States, is at the forefront in the world in the quality and technology of satellite reconnaissance and is one of the few states that produces both modern satellites and their rockets to launch them.

About the nuclear triad and active defense

The Treaty on the Non-Proliferation of Nuclear Weapons stipulates that five countries have the right to nuclear weapons, but the nuclear weapons of India and Pakistan, although not very exciting, have become commonplace. These countries have long-standing unresolved conflicts, and their nuclear weapons keep hotheads in their countries at bay. But, in addition, both countries restrain China with their nuclear potential. Are they dangerous to the West? It is unlikely that Pakistan will start selling elements of its nuclear programs to countries or terrorist organizations that want to acquire nuclear weapons.

A nuclear Iran directly threatens Israel. If sufficient information about Iranian nuclear weapons is obtained, it may be advisable to declare Israeli nuclear weapons, just as India and Pakistan did in their time. There will be no limit to indignation, Russia will again start talking about a nuclear-free Middle East, there will be quite a lot of such indignants. Are there not enough of them now?

There is no need to set unattainable goals, and there is no need to expect a balanced reaction to Israeli nuclear weapons. This is as ridiculous as expecting applause for destroying reactors in Iraq and Syria, but no one needs applause, what is needed is the security of the country, and indignation and discontent have accompanied Israel since its creation.

All regional adversaries, and especially Iran, should already understand that Israel is a nuclear power. Jerusalem, by declaring its nuclear capabilities, should dispel any doubts about its existing nuclear capabilities, leaving Iran without even a shadow of hope that Israel's strategic forces are somehow too vulnerable to a first strike, or too destructive to be operationally used for military purposes.

It is clear that nuclear deterrence must be combined with active defense.

Active defense, as opposed to passive, consists of striking the enemy yourself, and not serving as a target for his attacks. It strives for victory by striking the enemy at an opportune moment, as opposed to passive defense, aimed only at repelling the blow.

Military encyclopedia: [In 18 volumes] / Ed. V.F. Novitsky and others - St. Petersburg: T-vo I.D. Sytin, 1911-1915.

Active defense against the Iranian threat is two-pronged. One direction is the main enemy Iran, and the second is its satellites, Hezbollah and Hamas.

The backbone of Israel's active defense against the Iranian threat is the Arrow missile program, designed to intercept medium- and short-range surface-to-surface ballistic missiles. The Arrow-2 missiles used a non-contact warhead, hitting ballistic missiles without directly hitting them; the Arrow-3 used a kinetic destruction warhead, that is, defeat by hitting the warhead of the missile - “a needle to a needle.”

Arrow-3 is capable of intercepting ballistic missiles at ranges from 400 to two thousand kilometers. Thanks to its maneuverable qualities, Arrow-3 will be able to switch from one target to another in flight if necessary. But there is such a need. One interceptor missile has a 90% probability of hitting a target. Is this enough? In the event of an attack by missiles with a nuclear warhead, this is not enough. But if three interceptor missiles are launched, then the probability of hitting the target will be 99.9%, which corresponds to the threat.

If the target was hit by the first missile, then the remaining two can be redirected to other targets, which is when their ability to reorient in flight to another target comes in handy. In addition, the Arrow is capable of simultaneously intercepting a salvo of more than five incoming missiles in a 30-second period, as well as distinguishing between warheads and decoys.

Rocket attacks from the Gaza Strip and Lebanon should be intercepted by the Iron Dome and David's Sling (Magic Wand) systems.

From a technical point of view, everything looks good. There is, however, a serious problem. There is no missile defense system that cannot be overcome - 99.9% protection, still not 100%. An option could be not only strengthening the missile defense system, but, mainly, clarifying the position of Israeli nuclear deterrence.

Remains topical issue, what to do if the Iranian leadership is not guided by the usual criteria of rational behavior in world politics? What can we expect from Iran, from its theocratic leadership? The ayatollahs make no big secret of their priorities. For example, Ayatollah Khomeini directly called Iran’s Islamic obligations a priority.

It seems appropriate:

Convince a potential enemy that Israel has nuclear strike forces ready to deliver an unacceptable retaliatory strike against enemy targets,
. Make it clear to any potential nuclear aggressor that Arrow defenses always work in tandem with Israeli nuclear retaliation, and that Arrow deployment never precludes, or in any way makes, less likely an Israeli nuclear strike.
. determine to what extent it is possible and advisable to disclose its nuclear capabilities.

Arrow's development has Jordan concerned. This is understandable; shooting down Iranian missiles so that the contents of the warheads do not fall on the heads of the Israelis does not mean ensuring the same result for the Jordanians. As an option, it is possible to expand the Israeli missile defense system - its umbrella would not be at all out of place, not only for Jordan, but also for Saudi Arabia and Egypt. The idea of ​​a regional missile defense system was expressed by the Americans, but the time for such relations has not yet come, although it would be wrong in principle to reject such an idea.

Instead of a conclusion

Iran's FARS News Agency reported on the presentation by the Aerospace Group of the Islamic Revolutionary Guard Corps of a new missile with a multiple warhead containing 30 multiple warheads weighing 17 kg each. each. According to the agency, only a handful of countries in the world have such a missile. The rocket was inspected by the Supreme Leader of the Islamic Revolution, Ayatollah Ali Khamenei, on a two-hour tour at the aerospace showroom. According to the Iranian agency, multiple warheads are capable of deceiving enemy radars and passing through missile defense systems.

It's just a matter of details. A missile with multiple warheads is generally considered to be a missile with individually targeted warheads, which are deployed at the starting points of the corresponding ballistic trajectories by an autonomous breeding unit. But the Iranians don’t have that in this missile. In addition, 17 kg is the weight of a relatively small and simple artillery shell that does not deceive enemy radars and does not penetrate missile defense systems. Radars and missile defense systems do not work for these targets. Such shrapnel could scare Saudi Arabia in the event of an attack on its oil fields and ports. But maybe this fear will help Saudi Arabia take a more pragmatic position towards Israel?