- Iran: Eight Prisoners Hanged on Drug Charges
- Daughter of late Iranian president jailed for ‘spreading lies’ - IRAN: Annual report on the death penalty 2016 - Taheri Facing the Death Penalty Again - Dedicated team seeking return of missing agent in Iran - Iran Arrests 2, Seizes Bibles During Catholic Crackdown
- Trump to welcome Netanyahu as Palestinians fear U.S. shift
- Details of Iran nuclear deal still secret as US-Tehran relations unravel - Will Trump's Next Iran Sanctions Target China's Banks? - Don’t ‘tear up’ the Iran deal. Let it fail on its own. - Iran Has Changed, But For The Worse - Iran nuclear deal ‘on life support,’ Priebus says
- Female Activist Criticizes Rouhani’s Failure to Protect Citizens
- Iran’s 1st female bodybuilder tells her story - Iranian lady becomes a Dollar Millionaire on Valentine’s Day - Two women arrested after being filmed riding motorbike in Iran - 43,000 Cases of Child Marriage in Iran - Woman Investigating Clinton Foundation Child Trafficking KILLED!
- Senior Senators, ex-US officials urge firm policy on Iran
- In backing Syria's Assad, Russia looks to outdo Iran - Six out of 10 People in France ‘Don’t Feel Safe Anywhere’ - The liberal narrative is in denial about Iran - Netanyahu urges Putin to block Iranian power corridor - Iran Poses ‘Greatest Long Term Threat’ To Mid-East Security |
Monday 17 January 2011Iran hit by secret cyber warfare
NEW YORK: The Dimona complex in the Negev desert is famous as the heavily guarded heart of Israel's never-acknowledged nuclear arms program. Over the past two years, according to experts familiar with its operations, Dimona has taken on a new, equally secret role - as a critical testing ground in a US-Israeli effort to undermine Iran's efforts to make a bomb of its own. Behind Dimona's barbed wire, the experts say, Israel tested the effectiveness of the Stuxnet computer worm, a destructive program that appears to have wiped out roughly a fifth of Iran's nuclear centrifuges and helped delay Tehran's ability to make its first nuclear arms. ''To check out the worm, you have to know the machines,'' said a US expert on nuclear intelligence. ''The reason the worm has been effective is that the Israelis tried it out [on their own centrifuges].'' The operations at Dimona, as well as related efforts in the US, are among the newest and strongest clues suggesting that the virus was designed as an American-Israeli project to sabotage the Iranian program. In recent days, the retiring chief of Israel's Mossad intelligence agency, Meir Dagan, and the US Secretary of State, Hillary Clinton, separately announced that they believed Iran's efforts had been set back by several years. Many mysteries remain: chief among them is exactly who constructed a computer worm that appears to have several authors on several continents. In early 2008 a German company, Siemens, co-operated with an important US national laboratory in Idaho to identify the vulnerabilities of computer controllers that US intelligence agencies have identified as key equipment in Iran's enrichment facilities. Siemens says that program was part of routine efforts to secure its products against cyber attacks. Nonetheless, it gave the Idaho National Laboratory the chance to identify well-hidden holes in the Siemens systems that were exploited the next year by Stuxnet. The worm itself now appears to have included two components. One was designed to send Iran's nuclear centrifuges spinning wildly out of control. Another seems right out of the movies: the program secretly recorded what normal operations at the nuclear plant looked like, then played those readings back to plant operators, so that it would appear that everything was operating normally while the centrifuges were tearing themselves apart. The attacks were not fully successful. Some parts of Iran's operations ground to a halt, while others survived. Nor is it clear the attacks are over: some experts who have examined the code believe it contains the seeds for yet more versions and assaults. Officially neither American nor Israeli officials will even utter the name of the malicious computer program. The New York Times |