Subscribe free to our newsletters via your
. Military Space News .




CYBER WARS
Cyber war on Iran has only just begun
by Staff Writers
Washington (AFP) July 11, 2012


A US cyber war against Iran's nuclear program may have only just begun and could escalate with explosions triggered by digital sabotage, experts say.

Although the Iranian regime remains vulnerable to more cyber attacks in the aftermath of the "Stuxnet" worm that disrupted its uranium enrichment work, Tehran may be receiving help from Russian proxies for its digital security, some analysts say.

The nuclear program is "really not that well protected" from more digital assaults and Iran will be hard-pressed to safeguard its uranium enrichment efforts from tainted software, said David Albright, president of the Institute for Science and International Security.

"With Stuxnet, they lost about a year. And it caused a lot of confusion. They really didn't know what hit them," he said. "It looks like a viable way to disrupt their program."

The United States, which reportedly masterminded the Stuxnet operation along with Israel, has every incentive to press ahead with a cyber campaign to undermine Iran's atomic ambitions, according to analysts.

The next cyber attack, possibly in combination with more traditional spycraft, could shut off valves or issue incorrect orders that might cause an explosion at a sensitive site.

"I think that it could get more violent," Albright told AFP. "I would expect more facilities to blow up."

A major explosion at a missile plant in Iran in November sparked speculation that the incident was the result of sabotage.

"There is of course the possibility of sending in a team to modify a system in a way that would make it vulnerable, and then use a cyber weapon at a later date as a trigger event," said David Lindahl, research engineer at the Swedish Defense Research Agency.

A new wave of cyber attacks could involve inserting hardware with infected chips into the industrial process, possibly through an agent or a duped employee, or penetrating diagnostic software used to gauge uranium enrichment or other work, Lindahl said.

But some cyber security experts suspect Russian proxies could be assisting Iran with its digital defenses, and possibly helped Tehran trace the origins of Stuxnet.

"The part that we probably miscalculated on in Stuxnet was the (possible) assistance of the Russians in attribution," said James Lewis, senior fellow at the Center for Strategic and International Studies.

"The Iranians never would have figured this out on their own," said Lewis, a former senior government official with the Departments of State and Commerce.

The elaborate Stuxnet malware, which was reportedly introduced using a thumb drive, contained malicious code that caused centrifuges used to enrich uranium to spin out of control. The worm, meanwhile, sent back signals to operators indicating the centrifuges were operating normally.

After the malware was discovered in 2010, at least a thousand centrifuges had to be removed and analysts estimate Tehran's program was set back by at least a year.

By pushing the boundaries of cyber warfare, the United States has left itself open to retaliation. But US officials clearly view the risks associated with digital strikes as dwarfed by the dangers of an all-out war with Iran.

Bombing raids are "more likely to explode the region and certainly could lead to a conflict with Iran, and that would be very messy," said Lewis. "Cyber is much cleaner."

Although unnamed officials told The New York Times that the United States and Israel were behind the digital operations, cyber attacks -- unlike air strikes -- allow for "plausible deniability," he said.

The Stuxnet worm broke new ground by successfully hijacking a program designed to supervise power plants or other large industrial systems, said Sean McGurk, a consultant who previously led cyber security efforts at the Department of Homeland Security.

"Stuxnet demonstrated going from a disruptive capability to a destructive capability and that's what made it unique," he said.

The super virus also was unusual for the way it sought out a specific target while sidestepping systems that did not fit certain criteria.

"Almost all cyberattacks are 'to whom it may concern' but Stuxnet was a bullet with someone's name on it," Lindahl said.

"Repeating something like Stuxnet or (computer virus) Flame will be much more difficult, because they (the Iranians) will spend a lot more energy trying to stop those activities," he added.

"But the defender needs to plug all holes, while the attacker need only find one."

.


Related Links
Cyberwar - Internet Security News - Systems and Policy Issues






Comment on this article via your Facebook, Yahoo, AOL, Hotmail login.

Share this article via these popular social media networks
del.icio.usdel.icio.us DiggDigg RedditReddit GoogleGoogle








CYBER WARS
Indian navy investigates cyberattacks
New Delhi (UPI) Jul 12, 2012
India's navy is investigating the extent of a cyberattack at its base in Visakhapatnam, the headquarters of the Eastern Naval Command. Naval officials said it was "premature at this stage" to comment on the sensitivity of the compromised data which was discovered at the beginning of the year, a report by The Indian Express newspaper said. A Naval Board of Inquiry is believed to h ... read more


CYBER WARS
Raytheon reveals new missile defense system architectural analysis capability

Raytheon awarded $636 million for Exoatmospheric Kill Vehicle

Israel-U.S. drill will boost missile plans

U.S., Israel map out joint missile plan

CYBER WARS
Israeli navy eyes new missile systems

Israel deploys missile system on Egypt border

U.S. Navy Awards Lockheed Martin Contract for Additional VLA Missiles

Unique MEADS Mobile Testing Capability Arrives At White Sands Missile Range

CYBER WARS
University of Texas at Austin researchers demonstrate first 'spoofing' of UAVs

UAVForge Reveals Challenge Of Developing Perch And Stare UAV

Northrop Grumman, U.S. Navy Establish Fire Scout Training Center in Florida

Pakistan civilian deaths from US drones 'lowest since 2008'

CYBER WARS
Raytheon's vehicular soldier radio system links 37 different types of US, coalition radios

Lockheed Martin to Support Intelligence Analysis Worldwide Under DIA Solutions Contract

Raytheon already meets 80 percent of USAF requirements for alternate satellite terminal program

ONR Opens a Gateway to Improved Network Data Sharing on Navy Ships

CYBER WARS
Boeing Introduces Intelligent Sensor Camera System for Defense and Security Customers

Six charged in Britain over faulty Iraq bomb detectors

Ex-US commander McChrystal calls for reviving draft

Boeing Completes Wind Tunnel Tests on Silent Eagle Conformal Weapons Bay

CYBER WARS
Finmeccanica gains multinational deals

U.N. blasted for using security firms

NGOs complain at being excluded from UN arms talks

Rolls-Royce wins $183 mln US army contract

CYBER WARS
Outside View: State Dept. must have spine

Outside View: Outsourcing demagoguery

US, Russia hold talks at Pentagon

US, China seek to play down rivalry

CYBER WARS
Ferroelectricity on the Nanoscale

Unprecedented subatomic details of exotic ferroelectric nanomaterials

Tiny bubbles snap carbon nanotubes like twigs

Nanodiamonds cut through dirt to bring back 'bling' to low temperature laundry




The content herein, unless otherwise known to be public domain, are Copyright 1995-2014 - Space Media Network. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA Portal Reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement,agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. Privacy Statement