Western Cyber Attack on Iran’s Nuclear Facility?

A computer virus that appears aimed at Iranian nuclear facilities and other Iranian industrial installations is making headlines around the globe as the malware leaps borders and cybersystems. Robert Dreyfuss, The Nation‘s excellent progressive national security blogger, rounds up some reports in a post on the subject.

He speculates while President George W. Bush’s covert war against Iran was much discussed, the United States could be waging a similar effort under the radar screen. If this cyber-attack is a potential piece of that puzzle — it might working: the Iranians have been known to have technical problems at their centrifuge plants and have admitted the Bushehr reactor is under attack.

Dreyfuss writes:

Now, it appears, there is a serious computer worm affecting Ian’s nuclear industry, along with other Iranian industrial facilities. Called Stuxnet, the worm appears to be a case of outright industrial sabotage or cyber warfare, created and unleashed not by rogue hackers but by a state. According to the Seattle Times, the time stamp on the Stuxnet virus reveals that it was created in January 2010, meaning that if the United States is behind it, it’s Obama’s doing, not Bush’s.

If so, and if the United States is behind it, then Obama is already at war with Iran. Cyber warfare is no less war than bombs and paratroopers. Besides the United States, of course, Israel is high on the list of countries with both motive and capability. Iran’s PressTV, a government-owned news outlet, quotes various Western technology and cybersecurity experts saying that either the United States or Israel is behind Stuxnet.

The Times reports that Stuxnet is highly specific, aimed “solely at equipment made by Siemens that controls oil pipelines, electric utilities, nuclear facilities, and other large industrial sites.”

Kevin Hogan, the Senior Director of Security Response at Symantec, a virus-protection software company, told Reuters’ William Maclean that:

We cannot rule out the possibility (of a state being behind it). Largely based on the resources, organization and in-depth knowledge across several fields – including specific knowledge of installations in Iran – it would have to be a state or a non-state actor with access to those kinds of (state) systems.

With sixty percent of the world’s infected computers in Iran, there’s little question that someone – or some nation – with great resources directed this attack against Iranian facilities. It remains to be seen just who.

Ali Gharib

Ali Gharib is a New York-based journalist on U.S. foreign policy with a focus on the Middle East and Central Asia. His work has appeared at Inter Press Service, where he was the Deputy Washington Bureau Chief; the Buffalo Beast; Huffington Post; Mondoweiss; Right Web; and Alternet. He holds a Master's degree in Philosophy and Public Policy from the London School of Economics and Political Science. A proud Iranian-American and fluent Farsi speaker, Ali was born in California and raised in D.C.

SHOW 8 COMMENTS

8 Comments

  1. How does this differ from “terrorism”?

    FROM WIKIPEDIA:
    …The term “terrorism” comes from French terrorisme, from Latin: ‘terror’, “great fear”, “dread”, related to the Latin verb terrere, “to frighten”
    …since 1994, the United Nations General Assembly has condemned terrorist acts using the following political description of terrorism: “Criminal acts intended or calculated to provoke a state of terror in the general public, a group of persons or particular persons for political purposes are in any circumstance unjustifiable, whatever the considerations of a political, philosophical, ideological, racial, ethnic, religious or any other nature that may be invoked to justify them.” [4]
    SOURCE – http://en.wikipedia.org/wiki/Definitions_of_terrorism

  2. See today’s New York Times on a possible Israeli link to the cyberattacks.

  3. “How does this differ from “terrorism”?. Da, how about no blood and guts scattered around, for example!

Comments are closed.