Subscribe free to our newsletters via your
. Military Space News .




CYBER WARS
Iran battles Israel, U.S. on cyberwar front
by Staff Writers
Tehran (UPI) Jun 22, 2012


disclaimer: image is for illustration purposes only

As the Middle East becomes a hot cyberwar battleground, Iran claims it has detected a planned "massive cyberattack" by the United States, Britain and Israel against its nuclear installations.

The Iranians said the attack was timed to follow the failure of talks in Moscow to convince Tehran to abandon its nuclear program, which the Americans and their allies suspect masks a drive to develop nuclear weapons. Iran denies that.

There has been no indication from U.S., British or Israeli authorities that they had undertaken such an attack.

But Iran has been the target of at least two, and possibly more, cyberattacks by the United States and Israel since 2009.

The development of increasingly powerful cyber weapons points to an intention to continue efforts to sabotage Iran's nuclear project, which the Israeli leadership under hawkish Prime Minister Binyamin Netanyahu views as an existential threat to the Jewish state.

Iranian Intelligence Minister Heydar Moslehi was quoted as saying on state television Thursday, "They still seek to carry out the plan but we've taken necessary measures."

He gave no details about what those measures might be. Indeed, there was no independent verification that any such attack had taken place.

It may be that Tehran was simply seeking to deflect criticism of its refusal to accede to the demands of the P5+1 powers -- the five permanent members of the U.N. Security Council plus Germany.

But a major cyberattack on Iran's nuclear infrastructure, particularly its uranium-enrichment program, a key process in developing weapon-grade nuclear material, now would seem appropriate.

The talks in Moscow on Monday and Tuesday, the third round of negotiations since April, broke down with no progress. Western diplomats said the Iranians refused to make any commitment toward the key demand that it limit uranium enrichment to 20 percent, below military requirements.

They refused to discuss their new enrichment plant at Fordow, near the holy city of Qom south of Tehran. This facility, opened last year, is built into a mountain and supposedly safe from air attacks, unlike the enrichment center at Natanz, in central Iran.

If Fordow is invulnerable from the air, subjecting the enrichment program to cyberattack seems a logical alternative and much less risky in terms of casualties.

In this regard, the enrichment process has been the primary target of the so-called Stuxnet computer virus used in 2009 and 2010. Those attacks sabotaged the enrichment process but the Iranians were able to resume it later.

Computer experts say Stuxnet was created by the Americans and Israelis.

The Washington Post reported June 1 U.S. President Barack Obama secretly ordered cyberattacks on Iran's nuclear facilities within weeks of taking office.

Several weeks ago, Iran's nuclear program came under cyberattack again, this time from an even more virulent cyber weapon identified as W32.Flame. This one not only penetrates a system but is able to steal vast amounts of sensitive data and even turn on cameras and PC microphones to obtain additional data or change settings on computer systems.

The Symantec security firm reported June 8 that the creators of the Flame malware, considered the most dangerous virus so far developed, sent a "suicide command" that removes it from some infected computers.

In June 4, a week after Flame was uncovered, the Israeli military admitted for the first time it uses cyberspace for offensive purposes to gather intelligence, attack Israel's enemies and conduct secret operations.

The day Flame was discovered, Israeli Deputy Prime Minister Moshe Yaalon dropped broad hints that the Jewish state's military and intelligence community was behind the cyber attack on Iran's nuclear program.

"These achievements of ours open all kinds of possibilities for us," he commented.

The main unit involved in Israel's cyber operation is Unit 8200, arguably the most secret organization in the Israel military. It's the equivalent of the United States' National Security Agency or Britain's General Communications Headquarters.

Unit 8200 is responsible for signals intelligence, electronic eavesdropping, code decryption and all offensive cyber operations.

The defense of Israeli networks is the responsibility of another organization, the C4I Directorate -- for command and control, communications and computers plus intelligence.

The Iranians haven't been idle and are no doubt striving to develop countermeasures or offensive malware to retaliate.

.


Related Links
Cyberwar - Internet Security News - Systems and Policy Issues






Comment on this article via your Facebook, Yahoo, AOL, Hotmail login.

Share this article via these popular social media networks
del.icio.usdel.icio.us DiggDigg RedditReddit GoogleGoogle








CYBER WARS
Researchers advance biometric security
Calgary, Canada (SPX) Jun 22, 2012
Researchers in the Biometric Technologies Laboratory at the University of Calgary have developed a way for security systems to combine different biometric measurements-such as eye colour, face shape or fingerprints-and create a learning system that simulates the brain in making decisions about information from different sources. Marina Gavrilova, the founding head of the lab-among the firs ... read more


CYBER WARS
US, Russia to seek joint 'solutions' to missile defense row

Missile defense system for Europe and potential threat to Russia

Rafael seeks to boost range of Iron Dome

Lockheed Martin Delivers Core Structure for Fourth SBIRS Satellite

CYBER WARS
Two Russians convicted of treason over missile data

Javelin Missile Proves New Capability during Vehicle-Launched Norwegian Tests

Lockheed Martin Partners With Turkey For PAC 3 Missile Canister Production

US Navy awards Raytheon $338 million for Tomahawk

CYBER WARS
Drones: pros and cons

UN urges answers on US drone attacks, targeted killings

Northrop Grumman Unveils U.S. Navy's First MQ-4C BAMS Unmanned Aircraft

X-47B Flight Testing Completed at Edwards Second Aircraft Moved to East Coast

CYBER WARS
Boeing FAB-T Demonstrates Communications with On-orbit AEHF Satellite

Lockheed Martin Completes Environmental Testing on Second US Navy Satellite

Raytheon receives contract to link Navy Multiband Terminal to USAF's Polar Satellite

Raytheon receives $79 million award for US Navy Multiband Terminal systems

CYBER WARS
Portuguese armor vehicle to test in Brazil

Northrop Grumman Demonstrates Joint Threat Emitter for NAS Whidbey Island

Germany orders new soldier systems

Air Force spy planes facing postwar cut

CYBER WARS
US holds talks on arms handover to CAsia: report

Saudi, Japan deals drive record US arms sales

Defense industries face $100B less orders

China, US smash international arms trafficking ring

CYBER WARS
Stonehenge a symbol of a united Britain?

Political 'dysfunction' threatens US security: Panetta

Hu and Obama meet on sidelines of G20 talks

US, New Zealand sign defense cooperation accord

CYBER WARS
In nanotube growth, errors are not an option

From pomegranate peel to nanoparticles

Switchable nano magnets

Syracuse University researchers use nanotechnology to harness the power of fireflies




The content herein, unless otherwise known to be public domain, are Copyright 1995-2014 - Space Media Network. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA Portal Reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement,agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. Privacy Statement