Friday, July 10, 2009

Wary of naked force, Israelis eye cyberwar on Iran

"We came to the conclusion that, for our purposes, a key Iranian vulnerability is in its on-line information," said one recently retired Israeli security cabinet member, using a generic term for digital networks. "We have acted accordingly."

Reuters

Asked to speculate about how Israel might target Iran, Borg said malware -- a commonly used abbreviation for "malicious software" -- could be inserted to corrupt, commandeer or crash the controls of sensitive sites like uranium enrichment plants.

Such attacks could be immediate, he said. Or they might be latent, with the malware loitering unseen and awaiting an external trigger, or pre-set to strike automatically when the infected facility reaches a more critical level of activity. As Iran's nuclear assets would probably be isolated from outside computers, hackers would be unable to access them directly, Borg said. Israeli agents would have to conceal the malware in software used by the Iranians or discreetly plant it on portable hardware brought in, unknowingly, by technicians.[...]

Ali Ashtari, an Iranian businessman executed as an Israeli spy last year, was convicted of supplying tainted communications equipment for one of Iran's secret military projects.

Iranian media quoted a security official as saying that Ashtari's actions "led to the defeat of the project with irreversible damage". Israel declined all comment on the case.[...]

Israel may be open to a more overt strain of cyberwarfare. Tony Skinner of Jane's Defence Weekly cited Israeli sources as saying that Israel's 2007 bombing of an alleged atomic reactor in Syria was preceded by a cyber attack which neutralised ground radars and anti-aircraft batteries.

2 comments:

Diogenes said...

I must say, the phrase "naked force" caught my attention. Was not what I thought it was...

kyros said...

lol, sorry Diogenes.