Feeds

Gaza youth 'corrupted' by aphrodisiac chewing gum

Israel finds Hamas claim hard to swallow

7 Elements of Radically Simple OS Migration

An Israeli military source has dismissed Hamas claims that its intelligence service is offloading aphrodisiac chewing gum on Gaza Strip youth in some form of cunning sex-based plan to destabilise the Palestinian territory.

Hamas spokesman Islam Shahwan said: "We have discovered two types of stimulants that were introduced into the Gaza Strip from Israeli border crossings. The first type is presented in the form of chewing gum and the second in the form of drops."

According to AFP, a Hamas dragnet to capture those responsible for the distribution of the aphrogum began when a Palestinian man reported his daughter had suffered "dubious side effects" from the sinister chewable.

Cops subsequently cuffed members of a gang who apparently helped get the products into Gaza and "admitted during the investigation they were linked to the Zionist intelligence services".

Shahwan insisted: "The intelligence services are aiming to corrupt the young generation by distributing these products among students."

The Israeli military declined to comment officially, but one source described Hamas's claim as "absurd". ®

Bootnote

Yes, about as absurd as an aphrodisiac "gay bomb", we reckon.

Boost IT visibility and business value

Whitepapers

7 Elements of Radically Simple OS Migration
Avoid the typical headaches of OS migration during your next project by learning about 7 elements of radically simple OS migration.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Solving today's distributed Big Data backup challenges
Enable IT efficiency and allow a firm to access and reuse corporate information for competitive advantage, ultimately changing business outcomes.
A new approach to endpoint data protection
What is the best way to ensure comprehensive visibility, management, and control of information on both company-owned and employee-owned devices?