Archive for January 2011

Former Mossad chief: Nuclear Iran must not be neglected like North Korea

January 18, 2011

Former Mossad chief: Nuclear Iran must not be neglected like North Korea – Haaretz Daily Newspaper | Israel News.

Meir Dagan tells Foreign Affairs and Defense Committee that Iran is intent on acquiring nuclear weapons and could expedite that process.

By Jonathan Lis

Former Mossad chief Meir Dagan warned Monday that Iran could expedite its timeline to develop nuclear weapons faster than expected.

“The Iranian nuclear challenge will remain a very significant challenge,” Dagan said, in his final address to the Knesset Foreign Affairs and Defense Committee. “No schedule will change the important fact that Iran is striving for military nuclear capability and in certain scripts, could shorten the time [needed].”

Meir Dagan Former Mossad chief Meir Dagan
Photo by: Nir Keidar

“It is important for us to learn the lessons of North Korea, which was not dealt with accordingly and did not get the attention of the international community,” he added. The intelligence community must deal with these challenges and I believe in the State of Israel’s ability to contend successfully.”

Dagan, who retired from his post earlier last week after eight years, said during his address that he does not believe Iran will have nuclear capability before 2015.

In a summary given to the Knesset Foreign Affairs and Defense Committee, Dagan said Iran was a long way from being able to produce nuclear weapons, following a series of failures that had set its program back by several years.

Dagan handed over the job to his successor, Tamir Pardo, in the Prime Minister’s Bureau Thursday morning, after having parted from the ministers during last Sunday’s cabinet session.

The former Mossad chief had said on various occasions in the past that Israel should go to war only if attacked, or if in immediate danger of survival.

Dagan concluded his term saying Iran was still far from being capable of producing nuclear weapons and that a series of malfunctions had put off its nuclear goal for several years. Therefore, he said, Iran will not get hold of the bomb before 2015 approximately.

Home Front Command reduces warning time for incoming missiles to 90 seconds

January 18, 2011

Home Front Command reduces warning time for incoming missiles to 90 seconds – Haaretz Daily Newspaper | Israel News.

Hamas and Hezbollah possess more missiles than ever before and can launch longer range missiles with heightened precision.

By Anshel Pfeffer

The Home Front Command has decided to shorten the warning time for Tel Aviv and Gush Dan residents against incoming missiles from two minutes to 90 seconds. The move comes largely due to Hezbollah and Hamas’ improved missile launching capabilities.

In the past, The Israel Defense Forces were able to use sensors that would detect any incoming fire and missiles as well as the direction they were coming from.

The sensors would trigger a siren, giving Tel Aviv and Gush Dan residents a two-minute grace period to find shelter. After taking cover they were required to wait ten minutes until an additional siren was sounded, signifying the end of the threat.

However now, Hamas and Hezbollah can launch longer range missiles with heightened precision. They possess more missiles than ever before, concealed in buildings and underground bunkers.

This has prompted not only the 25 percent reduction in warning time, but also a modification of emergency Home Front Command protocol.

This protocol will be passed on to each municipality, with a guidebook detailing the number of missiles that could hit the district as well as the level of damage and number of injured each municipality would potentially have to deal with.

The Home Front Command will also be distributing guidebooks to local emergency forces; the police, firefighters and Magen David Adom, to prepare for the event of war.

According to security assessments, Israel will not have an effective deterrent for medium-range missiles, the type that Hezbollah and Hamas will most likely use on central Israel, until 2013.

It is therefore the hope that the Magic Wand defense system will be operational in the near future. Two weeks ago, security forces tested the missile interception device, developed by Rafael Advanced Defense Systems for the first time.

Iron Dome, which is meant to intercept shorter range missiles of up to 70 kilometers, was supposed to be ready for use by the end of 2010, however, due to some technical difficulties this is yet to happen.

According to an assessment by a top air force official, Iron Dome should be operational in the next few weeks. The first stage will involve the use of two Iron Dome batteries. It is unclear when there will be funding to acquire additional batteries.

The air force has instructed that Israel will need to acquire 13 to 15 more batteries for Iron Dome if they wish to be effectively protected from short range missiles.

Home Front Command drill Home Front Command drill in Tel Aviv

Military strike on Iran is what unites Netanyahu and Barak

January 18, 2011

Military strike on Iran is what unites Netanyahu and Barak – Haaretz Daily Newspaper | Israel News.

Barak, with his ranks and medals, can give Netanyahu the kind of backing he needs to advance aggressive moves on the Iranian front.

By Aluf Benn

Ehud Barak and Benjamin Netanyahu share a worldview. Both enjoy smoking cigars and reading biographies of Winston Churchill. Both consider Israel a Western bastion in the heart of a hostile Muslim world. Both do not trust the Arabs and believe that there is “no partner” on the Palestinian side. And both consider the Iranian nuclear program a major threat to Israel and support a military operation against it.

Bushehr - AP - Aug. 21, 2010 The reactor building of the Bushehr nuclear power plant is seen, just outside the southern city of Bushehr, Iran, on Aug. 21, 2010
Photo by: AP

The activist view against Iran unites Barak and Netanyahu and gives sense to their shared place in the country’s leadership. Bolstered by the incoming chief of staff, Yoav Galant, who is considered a supporter of their position, the prime minister and defense minister will seek to foil the Iranian nuclear program in their remaining time in office. Their move to offload the Labor ministers who opposed Barak sought to keep Barak in his defense minister’s chair. Concerns that Barak may be forced to resign in April because of Labor’s infighting have been lifted.

Without Barak by his side, Netanyahu would find it hard to advance aggressive moves on the Iranian front. Netanyahu has no military record that grants him supreme defense authority, as Ariel Sharon had. Only Barak, with his ranks and medals, his seniority as a former prime minister, can give Netanyahu this kind of backing.

Likud’s senior defense figure, former Chief of Staff Moshe Ya’alon, is considered a moderate on the Iranian issue, as is Foreign Minister Avigdor Lieberman, who more than anyone symbolizes the right in the right-wing government. Netanyahu cannot overcome their opposition without the defense minister’s definitive analyses, accompanied by his circular hand motions.

The press conference of former Mossad chief Meir Dagan undermined the view of Barak and Netanyahu: If the timetable for an Iranian bomb has been pushed back to 2015, there is no need to send the bombers to Natanz this year. But they have not given in. Barak’s political-security chief at the Defense Ministry, Amos Gilad, was quick to warn that the Iranian timetable is even shorter, and Dagan took back some of his statements yesterday at the Knesset Foreign Affairs and Defense Committee, apparently under pressure by the prime minister.

Netanyahu and Barak have hinted over the past two weeks that Israel is on the verge of a surprising diplomatic move. In his address to foreign reporters, Netanyahu promised that in 2011 “the truth will emerge” about who really wants peace in the region.

Even Mossad can get it wrong. Dagan backtracks on Iran’s 2015 timeline

January 18, 2011

DEBKAfile, Political Analysis, Espionage, Terrorism, Security.

DEBKAfile Special Report January 17, 2011, 8:19 PM (GMT+02:00)

Ex-Mossad chief Meir Dagan

Outgoing Mossad Director Meir Dagan has revised his earlier prognosis that Iran would not have nuclear weapons before 2015 because of technical obstacles. In his last briefing to the Knesset Foreign Affairs and the Security Committee, Monday, Jan. 17, Dagan said, “The Iranian nuclear challenge will remain significant… the timing will not change the fact that Iran is working towards nuclear military capabilities and in certain scenarios can shorten the timeline.”

In his original forecast, delivered at the changing of the guards in the Mossad on Jan. 6, the outgoing director did not spell out the technical obstacles, but he clearly meant the Stuxnet malworm and attacks on its nuclear scientists. He did refer to the infighting within the Iranian leadership, without which he was convinced Iran would have been nuclear-armed by now, had it so decided.

He spoke then the day after Deputy Prime Minister Moshe Yaalon stated: “Iran does not currently have the ability to make a nuclear bomb on its own.” Neither was prepared to say how that ability had come to be neutralized. Yaalon did say that if Western pressure on Iran – and not just sanctions – was ratcheted up, the Iranian regime would be left with two options: to stop developing a nuclear a bomb or stop existing.
He said he didn’t know when this would happen, in 2011 or 2012, but he spoke “in terms of three years.”

Both these statements were seized on as fodder for the opponents of military force against Iran both inside and outside Israel. One columnist and military pundit after another appeared to breathe a sigh of relief as though the world had won a respite of four to five years before it needed to start worrying about an Iranian nuclear bomb.
Owing to the high prestige enjoyed the Mossad, Dagan’s prognosis was taken almost as gospel with the effect of pulling the rug from under the feet of Prime Minister Binyamin Netanyahu and Defense Minister Ehud Barak and their drive to alert the world to the Iranian nuclear threat before it is too late. According to debkafile‘s sources, Netanyahu took Dagan sternly to task before embarking on damage control.
Saturday, Jan. 15, Ilan Mizrahi, a former director of Israel’s National Security Council, was reported in Washington to have warned US officials that Iran’s nuclear program was far more advanced than generally estimated and the 2015 timeline was seriously off-target.  He was the first Israeli intelligence figure to publicly contradict Dagan’s assessment.

Sunday, the New York Times, ran a story on Stuxnet, covering ground extensively reported by  debkafile, and noting that the US and Israel had together developed the virus which has attacked Iran’s nuclear facilities and that it had been tested at Israel’s nuclear center in Dimona.

This story appeared to come from an American source for the purpose of backing up Dagan’s original estimate of four years before Iran can have a nuclear weapon. The Washington line appears to be that even if Dagan’s timeline was not quite accurate, Stuxnet had put paid to Iran’s nuclear ambitions.

On January 9, debkafile ran an exclusive analysis under the caption: Iran’s short cuts to an N-bomb before 2015 (Click here for article), demonstrating thatthe Mossad ex-chief’s estimated timeline may well be superseded if Tehran takes advantage of available shorts cuts, such as its close ties with North Korea, which may either give Iran nuclear weapons or carry out a nuclear test on its behalf.

Furthermore, no Western intelligence agency, even Mossad, knows absolutely for sure everything going on behind the high walls concealing Iran’s military nuclear program.

At his final appearance before the Knesset committee Monday, Dagan made exactly those points, emphasizing the options Iran possessed for shortening its timeline toward a weapon.

He stressed too: “It is important for us to learn the lesson of North Korea, which did not get the proper attention from the international community.”

The confessed Mossad spy is Majid the IRGC terminator

January 17, 2011

DEBKAfile, Political Analysis, Espionage, Terrorism, Security.

DEBKAfile Exclusive Report January 17, 2011, 10:43 AM (GMT+02:00)


Majid the terminator and champion kick boxer

The young Iranian man who “admitted” on Iranian TV last Tuesday, Jan. 11 that he had acted for the Israeli Mossad in the murder of Iranian nuclear scientist Massoud Ali-Mohammadi is revealed in real life by debkafile‘s Iranian sources as a member of the Iranian Revolutionary Guards’ secret reserve death squad of brawny sportsmen used to cut down opponents of the regime and break up protest rallies.

debkafile‘s Iranian sources had uncovered the real Majid Jamali Fashi – a champion kick boxer, a professional terminator and an ardent fan of President Mahmoud Ahmadinejad. As a sportsman, his face is familiar to people in Iran from the media and the Internet. Until late 2009, he represented his country in international kick-boxing contests.

Iranian intelligence minister Heidar Moslehi must have realized that putting him on national TV as a Mossad spy to support his boast that Iranian agents had penetrated the Mossad networks he claimed were spread across the country would open more than one can of worms.

If Majid had really been recruited by Mossad, this would have been a feather in the cap of the Israeli spy service – not Tehran. It would have told the television audience that Mossad’s tentacles had not only reached into Iran’s nuclear program but also the elite clandestine ranks of the Revolutionary Guards, the IRGC. So why make it the subject of a boast?
Majid Jamali Fash’s real persona is disclosed here by our Iranian sources: He was born in Tehran in 1978 and after completing his military service with the IRGC, took up kick boxing while continuing to serve the Guards as a reservist. He and hundreds of his fellow champion sportsmen belong to a unit which is regularly called up for undercover work such as liquidating enemies of the regime and breaking the heads, arms and legs of regime opponents.

In the summer of 2009, the young sportsman was employed in the brutal break-up of the mass street rallies protesting the rigged election which gave Ahmadinejad his second term.

Tehran’s practice of employing national sporting talent as IRGC hatchet men in “crowd control” has drawn angry protests from the international federations of Taekwondo, Judo, Karate, Kung fu and other martial arts.

Because of his fame, Iranian audiences found it hard to revise their view of Jamali-Fashi as a Mossad agent.

Many decided his performance was faked by Iranian intelligence. However, opposition circles did believe in his role as assassin of Prof. Mohammadi, though not in the service of Israel but his IRGC masters because the late professor supported the opposition’s cause.

In the second half of 2009, the leading Iranian nuclear scientist attended meetings of opposition leaders and signed petitions against the regime.

His destruction was ruled because Prof, Mohammadi was seen as betraying the elite class of academics and intelligentzia, the nuclear science corps, on whose loyalty the regime counts heavily. They could not afford to let him be identified as crossing over to the opposition.

The secret Guards unit specializing in these missions was therefore assigned with his liquidation. The young kick boxer Majid was enlisted.
So why did the intelligence minister lift the veil from this episode?

As usual the Islamic Republic of Iran’s rulers’ motives are mixed and enigmatic.

The word in Tehran is that the intelligence ministry will have to go through with the performance to its logical conclusion and announce the execution of Majid the Mossad spy. He will then be given a new identity and his face remodeled by plastic surgery before dropping out of sight.

The other theory is more elaborate: Majid fell prey to the real power struggle waged between the intelligence ministry and the IRGC commanders for some months. The latter decided to use the kick boxer as a scapegoat for Prof. Mohammadi’s assassination by claiming he committed the murder at the behest of a rogue Guards unit without receiving a formal order.
Majid’s future is therefore uncertain.

After admitting that the scientist’s death caused extreme damage to Iran’s nuclear program, Moslehi must find someone to punish. Iran’s supreme leader Ayatollah Ali Khamenei will no doubt be called upon to settle the dispute within the country’s intelligence community – along with the fate of Majid. The champion terminator’s.  TV performance as a Mossad agent may have been his last.

The New York Times Fails To Deliver Stuxnet’s Creators

January 17, 2011

The New York Times Fails To Deliver Stuxnet’s Creators – Jeffrey Carr – Digital Dao – Forbes.

Jeffrey Carr

Yesterday the New York Times published a major story by William J. Broad, John Markoff and David E. Sanger which named the U.S. and Israel as co-developers of the Stuxnet worm. Unfortunately for their millions of readers, they provided almost no verifiable evidence to back up their claims, and even worse, excluded evidence that didn’t support their theory.

The Dimona Complex

The article’s entire hook is built upon claims made for the Dimona Complex by un-named sources:

Over the past two years, according to intelligence and military experts familiar with its operations, Dimona has taken on a new, equally secret role — as a critical testing ground in a joint American and Israeli effort to undermine Iran’s efforts to make a bomb of its own.”

And the proof? The journalists give none, because no one wants to go on the record. Fair enough, but with such a sensational claim I’d expect, at the very least, to read some additional supporting evidence. And here it is – “Israeli officials grin widely when asked about its effects.” That’s it. That’s all they’ve got. Some officials grinned.

So how likely is it that an Israeli official who has direct knowledge of Stuxnet testing at Dimona is going to speak to a reporter about it? Based upon the experience of Mordechai Vanunu, who’s considered a traitor to Israel and has spent most of his life in prison after he revealed his knowledge of the top secret facility to the British press in 1986, I’m guessing the answer has something to do with snowballs and hell. To put it mildly, the Mossad was very unhappy with Mr. Vanunu. And everyone in Israel knows it.

As far as Mossad chief Meir Dagan telling the Israeli Knesset on the day before his retirement that Iran’s capabilities to develop a nuclear warhead have been pushed back until 2015, I have no idea where that figure came from or what Mr. Dagan’s motivations would be for saying that but the Israeli Prime Minister, the founder of Israel’s Computer Emergency Response Team (CERT) and at least two respected Israeli experts disagree with Mr. Dagan. One of them spent 40 years working in precisely this area.

Efrayim Asculai, a 40 year veteran of Israel’s Atomic Energy Commission and an expert on Iran’s nuclear weapons development wrote a recent article (01 Dec 2010) warning about nuclear proliferation in 2011 in general and Iran’s still robust capabilities in particular:

Take the case of Iran. Even prior to the November 23 distribution by the IAEA to its member states of its periodic report on Iran, much was heard heralding the fact that the Iranians were grappling with complications in operating their gas centrifuge uranium enrichment plant at Natanz. Some blamed the delays on the potent Stuxnet computer virus that was apparently very effective in disrupting electrical inverters, a vital component in the centrifuge operations. Others, however, attributed the difficulty to the inherent challenges in operating the almost obsolete P-1 model machines. This opinion was bolstered by a statement in the report (in a footnote) that feeding the centrifuge cascades with its input uranium hexafluoride was stopped on November 16. Yet the next statement in the footnote was far less reassuring when it noted that the feed was resumed six days later.

On the same day the report was published, the Institute for Science and Security (ISIS) published an analysis of the IAEA report, showing that in the reporting period Iran increased its operational efficiency in almost every parameter. The number of centrifuges enriching uranium is almost at its peak; the flow of the feed material into the enrichment cascades is at its peak, and so is the rate of production of the 3.5% enriched uranium. The rate of the enrichment process from 3.5% to 20% is quite steady, in spite of the old centrifuge model. Although this is a small scale operation, the Iranians could turn it into a large scale one in a very short time. Since this is a stone’s throw away from weapons-grade uranium, this situation cannot be a source of optimism.”

Shai Blitzblau, head of the computer warfare laboratory at Israel-based Maglan Information Defense Technologies, Ltd was quoted in John Markoff’s first article about Stuxnet in the New York Times last September:

Israel had nothing to do with Stuxnet. We did a complete simulation of it and we sliced the code to its deepest level. We have studied its protocols and functionality. Our two main suspects for this are high-level industrial espionage against Siemens and a kind of academic experiment.”

In a different interview for Defense-Update, Blitzblau said

Stuxnet is definitely not a military code, at least not a Western one” said Shai Blitzblau, Head of Maglan-Computer Warfare and Network Intelligence Labs, interviewed by Defense Update. “Stuxnet is a sophisticated and highly advanced code, but it lacks certain elements commonly associated with military operations” Blitzblau explains that the broad, indiscriminate attack on industrial computers launched by Stuxnet is not characteristic to a military operation, where the nation launching the attack tries to minimize collateral damage and focus on a specific target.”

Gadi Evron, an Israeli security expert and founder of Israel’s CERT, wrote “Stuxnet: An Amateur’s Weapon” for Dark Reading on why Stuxnet was most likely not an Israeli operation, referring to it as “sloppy” and “amateurish”:

For such an operation, Stuxnet must not fail. There has to be clear intelligence about how the systems it attacks are built. Also, given the nature of these systems (industrial software that controls power plants, like SCADA systems), it would have to be developed in a replication of the target environment — an immense cost to reconstruct and an effort in intelligence collection. Such a tool would be used carefully to avoid the risk of discovery — not just the specific operation, but of methods used, the technology developed, and past targets.

How then could a target-specific weapon such as Stuxnet be found in tens of thousands of computers worldwide, as vendors such as Microsoft report? It makes no operational sense to attack random computers, which would increase the likeliness of discovery and compromise the operation.

A Questionable Timeline

Furthermore, Sanger, Markoff and Broad have mis-stated the facts of the Stuxnet timeline. After writing about a leaked State Dept cable that discusses how the United Arab Emirates (UAE) stopped a shipment of Siemens Step 7 controllers from entering Iran in April, 2009, the reporters then wrote “Only months later, in June, Stuxnet began to pop up around the globe”. Except that that didn’t happen in June, 2009. It happened about 15 months later in July, 2010, several weeks after VirusBlokAda broke the news about the Windows shortcut exploit (.LNK). Here’s Symantec’s timeline as documented in their final report:

June, 2009: Earliest Stuxnet sample seen. Does not exploit MS10-046. Does not have signed driver files.

January 25, 2010: Stuxnet driver signed with a valid certificate belonging to Realtek Semiconductor Corps.

March, 2010: First Stuxnet variant to exploit MS10-046.

June 17, 2010: Virusblokada reports W32.Stuxnet (named RootkitTmphider). Reports that it’s using a vulnerability in the processing of shortcuts/.lnk files in order to propagate (later identified as MS10-046).

In other words, the Stuxnet worm that amazed so many security researchers with its 4 zero day exploits and two genuine digital certificates didn’t exist in June 2009. Only the most rudimentary version of it did, which begs the question – why was it so effective in its stripped-down form in 2009 and why would the developers keep pushing more sophisticated versions out in 2010?

The other problem not addressed in the NYT piece is what happened to the P1 centrifuges in 2008 and early 2009, before Stuxnet had been released? According to the IAEA as reported by ISIS (.pdf), an unknown event occurred in 2008 which impacted centrifuge performance and from which Natanz had not recovered as late as February 2010.

On December 22, 2010, ISIS released another report “Did Stuxnet Take Out 1,000 Centrifuges at the Natanz Enrichment Plant? (.pdf)”. Rather than addressing the earlier performance problems from 2008, the ISIS authors looked at centrifuge replacement numbers at Natanz:

In late 2009 or early 2010, Iran decommissioned and replaced about 1,000 IR-1 centrifuges in the Fuel Enrichment Plant (FEP) at Natanz, implying that these centrifuges broke. Iran’s IR-1 centrifuges often break, yet this level of breakage exceeded expectations and occurred during an extended period of relatively poor centrifuge performance.

Although mechanical failures or operational problems have often been discussed as causing problems in the IR-1 centrifuges, the crashing of such a large number of centrifuges over a relatively short period of time could have resulted from an infection of the Stuxnet malware.

David Albright and his co-researchers at ISIS concluded that the Stuxnet worm most likely was designed to destroy a limited number of centrifuges and temporarily set back Iran’s fuel enrichment program.  Does that sound like a strategy that Israel would agree to? Not to Benjamin Netanyahu, Israel’s PM. After expressly stating his disagreement with Dagan’s 2015 date, he said that “sanctions should be strictly enforced and materially strengthened…, and that if they don’t achieve their goal, they would be followed by a credible military option.”

CONCLUSION

Broad, Markoff, and Sangar failed to provide any verifiable evidence to support their claims that Israel tested the U.S. developed Stuxnet worm at Dimona.

Broad, et al failed to establish an accurate timeline of events which, had they done so, would have raised several un-answered questions about when the Natanz centrifuges were crashing versus when Stuxnet was fully developed.

Broad, et al provided no expert analysis on the state of Iran’s fuel enrichment program, opting for a disputed comment by Mr. Dagan and Hilary Clinton, who tried to credit U.N. sanctions for Iran’s Fuel Enrichment Program (FEP) delays.

When I wrote “Stuxnet’s Finnish-Chinese Connection“, I supported my theory that the People’s Republic of China developed the Stuxnet worm with five pieces of verifiable evidence that were unique to China. Not a single one of those 5 was because a senior official in the Chinese government “smiled”.

Israel has already struck Iran

January 17, 2011

Israel has already struck Iran – Haaretz Daily Newspaper | Israel News.

It is gradually becoming clear that Israeli intelligence, in cooperation with its American counterparts, has made a military strike on Iran’s nuclear facilities redundant.

By Yossi Melman

Israel will not attack Iran. At least not in the next few years. It will not attack, first and foremost, because the United States opposes such a move. Israel has never taken any independent step on a strategic issue of global importance without first coordinating or consulting with its allies, or at least without reaching the conclusion that the move would be received favorably in Washington. Israel will not attack Iran because its leadership is divided over the issue, and most decision makers at the operational and political levels, including Foreign Minister Avigdor Lieberman, are concerned that adventurism could be disastrous.

Israel will not strike because this would mean that Iran, Hezbollah and not unlikely, also Hamas (the chances of Syria joining in are minor), will respond with massive missile barrages targeting population centers and strategic sites – including the Dimona reactor, power plants, military basis and airports.

There is also another reason, which is gradually becoming clearer and bolsters the assessment that an Israeli strike against Iran’s nuclear installations and support systems (aerial defense, communications, command and control) is not expected in the coming years. Such a strike would be redundant. According to foreign reports, Israeli intelligence, in cooperation with its American counterparts, has made such a strike redundant.

For a few months now, experts around the world have been trying to understand why Iran’s nuclear program has been delayed, delays which have primarily manifested themselves in the partial shutdown of centrifuges at the Natanz facility. Until about 18 months ago, Iran had some 10,000 active centrifuges there. Now, according to the reports of the International Atomic Energy Agency inspectors, only 4,000 of them are operational.

The P-1 model of centrifuges are old and tend to become damaged; their operation requires staff with excellent technical skills. Even American experts who tried to master the P-1, according to The New York Times, ran into difficulties, in part because of its relatively primitive design.

However, according to the Times report yesterday, the ones who did succeed in getting the centrifuges to work were teams of experts from the Israel Atomic Energy Commission and Israeli intelligence. They had set up a model of the Natanz installation at the Dimona plant and learned how the centrifuges worked. This enabled hi-tech experts from Israeli intelligence to put together a sophisticated program known as the Stuxnet Worm, which was then inserted into the control and operation systems of the Natanz facility. The program entered the computer networks, took over the systems operating the machinery (manufactured by the German firm Siemens), and caused serious damage to the centrifuges. According to the report, as many as a fifth of the centrifuges have become inoperable as a result.

There are disagreements over the extent of the damage inflicted on Tehran’s nuclear program by the worm and other sabotage efforts which have been attributed to Western, including Israeli, intelligence services – such as the establishment of shell companies that sold flawed equipment to Iran. Meir Dagan, who recently stepped down from heading the Mossad, and who is considered to be primarily responsible for this sabotage work, can proudly announce that Iran’s ability to develop nuclear weapons has now been pushed back and will not manifest itself before 2015.

However long the delay may be, it is clear that it has given Israel and the West some breathing room. Experts in the United States and Europe have assessed, on the basis of knowledge of the air force’s capabilities, that even the most successful strike would have delayed the Iranian nuclear program no more than three years – and this does not even take into account the number of pilots who would not have come home from the mission. The intelligence operation that has been attributed to Israel achieved this delay without any casualties or complications.

Stuxnet damage in Iran: Iran’s nuclear program and a new era of cyber war – latimes.com

January 17, 2011

Stuxnet damage in Iran: Iran’s nuclear program and a new era of cyber war – latimes.com.

Stuxnet, the game-changing computer worm that is believed to have significantly set back Tehran’s progress in nuclear enrichment, may herald a new era of shadowy digital combat

Just a few months ago, U.S. and Israeli officials were warning that Iran was a year away from having the capability to rapidly build a nuclear weapon. Speculation was intensifying that Israel would launch airstrikes to prevent that from happening.

But as the new year dawned, Western officials, with little fanfare, significantly revamped their estimates of Iran’s nuclear progress.
Israel’s strategic affairs minister, Moshe Yaalon, said Dec. 29 that the Islamic Republic was at least three years away from a bomb. This month, the retiring head of Israel’s intelligence service, Meir Dagan, went further, saying Iran wouldn’t be able to develop a nuclear warhead before 2015 at the earliest.

A few days later, Secretary of State Hillary Rodham Clinton also downplayed Tehran’s progress, saying, “Their program, from our best estimate, has been slowed down” because of “technological problems.”

People who study computer warfare for a living have no doubt about what’s behind these reappraisals: Stuxnet, a game-changing computer worm that may herald a new era of shadowy digital combat.

Identified in June, Stuxnet is being called the most sophisticated cyber weapon ever unleashed, because of the insidious way in which it is believed to have secretly targeted specific equipment used in Iran’s nuclear program.

Computer experts have examined the worm for months, and many believe Stuxnet was created by Israel or the United States as part of a covert effort to hamper Iran’s alleged drive for an atomic weapon. But the extent to which the operation succeeded had remained unclear.

In recent weeks, however, a rough consensus has emerged that Stuxnet has had a measurable effect. In addition to the remarks from U.S. and Israeli officials, the Institute for Science and International Security, an independent think tank, judged in late December that Stuxnet appears to have “set back Iran’s progress.”

Stuxnet “will undoubtedly reshape international security and foreign policy forever,” said John Bumgarner, chief technology officer of the U.S. Cyber Consequences Unit, a nonprofit research organization that studies cyber conflict. “It’s a tipping point that will usher in a cyber-defense revolution in military affairs.”

By wreaking havoc on gas centrifuges — spinning machines that separate isotopes to produce enriched uranium, which at higher levels can be used for nuclear bombs — the Stuxnet worm seems to have inflicted significant damage on Iran’s nuclear program, cyber experts say, with none of the dangerous repercussions of a U.S. or Israeli airstrike, at least so far.

“This is a really good example of what cyber war looks like,” said former White House terrorism advisor Richard Clarke, author of “Cyber War: The Next Threat to National Security and What to Do About It.” “It’s a precision-guided munition.”

The worm’s slow-motion trajectory, its ability to secretly seize control of machinery and the fact that its authors remain unknown offer lessons for the future of high-tech warfare.

Stuxnet is not the first apparent state-sponsored cyber attack: Other examples include a massive disruption of websites in Estonia in 2007 after a dispute with Russia, and the use of digital trickery to fool Syria’s air defenses when Israel bombed an alleged nuclear facility there in 2007.

But in those cases, it became fairly clear who was responsible. Stuxnet is the most significant development yet in the realm of cyber conflict, Bumgarner said, because of the lack of attribution. Although Iran would have been expected to respond ferociously to an Israeli or U.S. airstrike, no response has been forthcoming to Stuxnet, perhaps because Tehran can’t be sure of the culprit.

“Stuxnet takes it to a different level because … Iran doesn’t know who to retaliate against,” he said.

Stuxnet also proves it is possible to use malware to seize control of equipment that runs all sorts of features of a modern economy, from power grids to chemical plants. The U.S. and its allies have that capability, but so do Russia and China, experts say.

And Stuxnet may remain a persistent thorn in Iran’s side, said German expert Ralph Langner, who first disclosed that Stuxnet had targeted Siemens equipment used in Iran’s nuclear program.

In an e-mail, Langner said the Iranians would have to replace all the computer systems in their nuclear program to be sure they were rid of the worm, a tall order for a country under trade sanctions.

Unique virus

The full extent of the damage to Iran’s nuclear equipment wrought by Stuxnet is a matter of speculation. Other than limited international inspections, the outside world has almost no access to information about Iran’s nuclear program. Iran, which says its nuclear program is intended for peaceful purposes, has refused to comply with a U.N. Security Council order that it stop its uranium enrichment program.

Iranian officials acknowledge that the complex malware snaked its way into industrial software used to operate centrifuges in the Natanz nuclear facility and went undetected for a year. As of Sept. 29, after which Iran took action that made further assessment impossible, Stuxnet had infected 100,000 hosts worldwide, 60,000 of which were in Iran, according to a detailed report on the worm by Symantec, a computer security company.

According to the Institute for Science and International Security, 1,000 of about 8,000 centrifuges at Natanz had to be replaced in late 2009 and early 2010. In mid-November, Iran temporarily halted enrichment at Natanz because of technical problems with its centrifuges, according to the International Atomic Energy Agency, the U.N.’s nuclear watchdog.

Experts aren’t sure why the malware seems to have caused damage to some, but not all, of the centrifuges at Natanz, allowing Iran to continue to enrich uranium, albeit at a slower pace. Some experts have speculated that the worm’s creators intentionally limited its effect to avoid detection. Other theorize that it was designed to send a message as much as to destroy centrifuges.

Iranian leaders downplay the worm’s damage. President Mahmoud Ahmadinejad said Nov. 29 that outside powers had “succeeded in creating problems for a limited number of our centrifuges with the software they had installed in electronic parts.”

Israeli and U.S. media reports since 2009 have quoted intelligence officials alluding to covert sabotage programs by both countries against Iran’s nuclear program. But neither country acknowledges creating Stuxnet, and not every expert believes either of them did.

One prominent cyber war authority, Jeffrey Carr, has written a white paper suggesting China may have been behind it. Nor can Russia be ruled out, said Joel Brenner, a former senior counsel at the National Security Agency, which is deeply involved in offensive and defensive U.S. cyber operations.

One thing is clear, experts say: The worm is far too sophisticated to have been cooked up by basement hackers.

Stuxnet made use of four “zero day” vulnerabilities, openings in Microsoft Windows operating systems that were not previously known. Criminal hackers, the usual suspects when it comes to malware, could have used such vulnerabilities to generate millions of dollars in illicit revenue by stealing banking and credit card information, which is one reason experts believe Stuxnet was the work of an intelligence service. Instead of making money, as some malware does, it cost money.

“This was written for one purpose,” Bumgarner said. “Sabotage of national critical infrastructure.”

Now that Stuxnet is in the public domain, experts are deeply concerned that hackers, criminals or terrorist groups could use some of the vulnerabilities it reveals to attack systems that control power grids, chemical plants and air traffic control.

“The attackers created a weapon that they used in a very specific way, but you can copy the attack technology and use it in a very generic way,” said Sebastian Linko, spokesman for Finland’s Vacon, whose power control units, which are used in Iran’s nuclear program, are sought out by the worm. “This is the most scary part about Stuxnet.”

ken.dilanian@latimes.com

Stuxnet virus attack: Russia warns of ‘Iranian Chernobyl’ – Telegraph

January 17, 2011

Stuxnet virus attack: Russia warns of ‘Iranian Chernobyl’ – Telegraph.

Russian nuclear officials have warned of another Chernobyl-style nuclear disaster at Iran’s controversial Bushehr reactor because of the damage caused by the Stuxnet virus, according to the latest Western intelligence reports.

Bushehr nuclear power plant, Iran

Russian nuclear scientists have raised serious concerns about the extensive damage caused to Bushehr’s computer systems by the mysterious Stuxnet virus Photo: REX

Russian nuclear scientists are providing technical assistance to Iran’s attempts activate the country’s first nuclear power plant at the Gulf port.

But they have raised serious concerns about the extensive damage caused to the plant’s computer systems by the mysterious Stuxnet virus, which was discovered last year and is widely believed to have been the result of a sophisticated joint US-Israeli cyber attack.

According to Western intelligence reports, Russian scientists warned the Kremlin that they could be facing “another Chernobyl” if they were forced to comply with Iran’s tight deadline to activate the complex this summer.

After decades of delays over the plant, which was first commissioned by the Shah in the 1970s, Iran’s leaders are demanding that scientists stick to the schedule set last year. They argue that any delay would be a blow to Iran’s international prestige.

Bushehr is due to produce its first electricity for Iran’s national grid this summer after Russian technicians started loading the first nuclear rods into the reactor last October.

WikiLeaks: Iran developing nuclear bomb with help of more than 30 countries

January 16, 2011

WikiLeaks: Iran developing nuclear bomb with help of more than 30 countries – Haaretz Daily Newspaper | Israel News.

The Norwegian newspaper Aftenposten quotes U.S. diplomatic cables as saying that Iran is racing to achieve nuclear bomb before its economy collapses due to sanctions.

By Reuters

Iran has been developing contacts in more than 30 countries to acquire technology, equipment and raw materials needed to build a nuclear bomb, a Norwegian newspaper said on Sunday, citing U.S. diplomatic cables.

Aftenposten said that according to the cables, obtained by WikiLeaks, more than 350 Iranian companies and organizations were involved in the pursuit of nuclear and missile technology between 2006 and 2010.

Iran nuclear plant in Bushehr, AP Technicians measuring parts of Iran’s Bushehr nuclear power plant in this undated photo.
Photo by: AP

Iran says its nuclear program has purely peaceful aims but the West suspects is designed to develop a weapons capability.

“For years, Iran has been working systematically to acquire the parts, equipment and technology needed for developing such weapons, in violation of UN sanctions against the country’s nuclear and missile program,” Aftenposten said.

Aftenposten has said that it has all 250,000 U.S. cables leaked to WikiLeaks, most of which have not yet been published, and is gradually releasing them.

It cited sources as saying Iran is racing to develop nuclear weapons before its already crippled economy succumbs to the sanctions. “A race exists between the bomb and financial collapse,” the daily cited a cable quoting a French nuclear expert.

Iran was practically out of uranium, which it needs to enrich for use in weapons, forcing Tehran to look abroad for more radioactive material, cables said.

“Iran’s limited domestic supply of uranium makes it practically impossible to supply the nation’s current and future nuclear power plant capacity,” said a U.S. State Department note from February 2009.

“Consequently, the Iranians are likely to be forced into dealing with foreign suppliers to get uranium for their domestic nuclear industry,” it added.

U.S. Secretary of State Hillary Clinton said earlier this month that the sanctions had set back Iran’s nuclear program, giving major powers more time to persuade Tehran to change tack.

Tehran is due to hold talks with the major powers on the nuclear program in Istanbul on January 21-22.