A virus is the simplest form of what is commonly thought of as “life”. Many viruses consist of nothing more than a single strand of DNA wrapped in a protein casing, although they sometimes have additional structural features that perform rudimentary functions.
The bacteriophage is one of the most well-known types of viruses. In addition to its capsule of DNA, it features a columnar tail with a base plate. Attached to the plate are fibers that look like the legs of a landing craft, which bring the base plate into full contact with the target bacterium at specific receptors on the victim’s cell wall using special pins. After the virus attaches itself, the tail contracts, injecting viral DNA into the host cell. The invader’s DNA then hijacks the host cell’s ribosomes, forcing them to build new viruses rather than perform their normal functions. After a sufficient number of new viruses have been assembled, the cell wall is destroyed, and a new generation of viruses is released into the environment to repeat the cycle with other bacteria.
Viruses that target multicellular organisms function in a similar manner. However, they have of necessity evolved genetic strategies of greater complexity in order to exploit their more complex hosts. To reach the tissues they have evolved to target, they must make their way past the immune defenses that their hosts have developed to thwart them. A weakened organism whose immune system has been compromised by age, injury, stress, famine, or previous bouts of infection is more vulnerable to an attack by invading viruses.
A strategy that includes the weakening of a host’s immune system thus becomes a useful part of a well-tailored virus’ wardrobe. Viruses that cause autoimmune diseases — HIV is the most well-known example — attack the host’s immune system directly.
Analogous behavior is exhibited by the computer viruses used to target cybernetic systems. Labeling these snippets of code “viruses” is apt: their modus operandi is directly analogous to that used by biological viruses that attack living organisms.
As soon as it has been inadvertently downloaded, the first action attempted by a well-tailored piece of “Trojan horse” malware may be to disable the target’s virus-protection software. It overwrites the antivirus system’s database of malicious code signatures, removing any reference to itself as a malicious entity. After that it masquerades as virus protection and announces that the user’s computer has been infected. Typically it offers additional software for sale, which it says is necessary to remedy the problem.
This and other malicious strategies may do serious damage to the host system, sometimes disabling it completely and necessitating a rebuild of the computer.
The virus analogy may be extended to other complex information systems. Any system that is sufficiently complex is also vulnerable to malicious intrusion. A packet of information from outside the system may mimic the characteristics of some part of the system, providing appealing “hooks” to induce its incorporation. Then, once it is fully integrated into the substrate of its host, it begins to replicate itself, using internally encoded instructions to disable further resistance on the part of the surrounding system.
After that the invader spreads, gradually replacing components of its host with its own simulacra. Its replacements may not be fully functional, but they only have to serve until the invader’s purpose has been accomplished — which is usually to suck all useful sustenance/information from the system before moving on to other uninfected hosts.
By now regular Gates of Vienna readers will have noticed the resemblance between invading viruses and a certain Religion of Peace…
Human cultures are complex information systems. Like all such systems, they are subject to infection by analogues of viruses. When a malicious component of one culture invades another, it may behave exactly like a biological virus in a cell, or malware in a computer.
To continue the analogy of the bacteriophage, the organelles of the host are analogous to our cultural institutions. The ribosomes might be the industrial plant, while the endoplasmic reticulum would correspond to networks for transportation and communication, the mitochondria to power plants, and so on. And some combination of institutions — churches, universities, and media, perhaps — functions as the cultural nucleus for our society. The basic characteristics of our culture are recorded there, and in addition a mechanism for replicating them from generation to generation.
It is into this informational matrix that the virus of Islam has injected itself. And Islam is not just an ordinary virus — it has all the characteristics of an autoimmune disease. The first thing it does when it invades a society is to find the institutions that protect the culture, discover how they work, and disable them. When the host society’s institutions have been significantly weakened, they can be converted gradually to Islamic institutions, after which the spread of Islam throughout the culture is expedited and accelerated.
Islamized institutions function less effectively than the host’s versions, but that is no impediment to the spread of Islam. The Islamic virus is a classic parasite: it extracts as much useful sustenance from its host as it can, leaving just enough of the original structure in place to assure that system continues to function for its benefit. The host society may eventually be severely damaged or destroyed, but that is of no concern to Islam — by then it is ready to use the platform of its debilitated host to inject itself into yet another victim.
It is commonly stated that Islam is a political ideology disguised as a religion, but it is even more than that: Islam is political malware. It is superbly adapted to invade alien political systems and convert them into replication machines for more Islam. The infection of Europe has now advanced sufficiently to allow the launch of thousands upon thousands of jihad vectors into other parts of the world.
When Islam realizes its final goal and achieves world domination, it will be like a parasite that has killed off its host and has no others to jump to. At that point it will self-destruct, but the occasion will hold no consolation for non-Muslims, since there won’t be any left.
The autoimmune characteristics of the Islamic disease were enhanced by the weakened cultural immunity of the West, which had been significantly degraded over several decades before Islam arrived. The forces of deliberate cultural destruction — neo-Marxism, cultural Marxism, political correctness, call them what you will — had already degraded and hollowed out our traditional institutions when the first imams began spouting their Friday sermons from the pulpits of brand new Saudi-sponsored mosques.
The “root causes” of the Great Jihad in the West are thus to be found not within Islamic societies, but within the West itself. Our cultural immune system was severely weakened well before 1980. Islam just saw the opportunity, and seized it.
The Islamic virus functions as a kafirophage — it invades and devours what it calls “kafir” societies, which it defines as any that are not Islamic. Western Civilization serves as the kafir-of-the-moment.
Can a host that is already severely compromised by such a massive infection repair its immune defenses sufficiently in time to fend off the invader?
The chances don’t look good. The final outcome won’t be known in my lifetime, but if you’re under forty-five, you may live to see it — if the mujahideen let you live, that is.