Archive for October 2012

IDF Gets Tough – Third Strike in 24 Hours

October 14, 2012

IDF Gets Tough – Third Strike in 24 Hours – Defense/Security – News – Israel National News.

The IDF foiled a terrorist attack early Sunday in the third counterterrorist strike in 24 hours, sending a clear massage to Hamas.

By Tzvi Ben Gedalyahu

First Publish: 10/14/2012, 8:04 AM

 

 A Palestinian Salafist holds an Al-Qaeda-affiliated flag during a protest  in Gaza

A Palestinian Salafist holds an Al-Qaeda-affiliated flag during a protest in Gaza
AFP photo

The IDF foiled a terrorist attack early Sunday in the third counterterrorist strike in 24 hours, sending a clear massage to Hamas.

The Air Force successfully targeted a cell preparing to fire at Israelis, an IDF spokesmen said. The latest counterterrorist measure killed at least one terrorist.

On Saturday, Air Force jets struck three terrorist targets in northern and central Gaza in retaliation for a Grad missile attack on Netivot Friday night.

In the pre-dawn hours of Sunday, the Air Force struck a second time in a significant counterterrorist action that eliminated two senior terrorists on motorbikes. They were identified as Jordanian national Sheikh Hisham al-Saedini, 43, also known as Abu Al-Waleed Al-Maqdissi, of the Mujahedeen Shura, and fellow Salafist Islamic terrorist Fayek Abu Jazar, 42. News services described him as an “activist.”

Saedini was one of the founders of the Mujahedeen Shura in Jerusalem. The terrorist group operated as part of the worldwide Jihadist war and was involved in several attacks and plots against Israeli civilians and soldiers.

The Mujahedeen Shura carried out the January 2009 attack on an arty patrol, killing one soldier and seriously wounding an officer. The same terrorist group also planted dozens of bombs along the IDF patrol route at the Gaza security fence and also fired on soldiers.

Saedini at one time was jailed by Hamas for his activities in the rival terrorist organization but was released in August despite Hamas’s knowledge of his involvement in terrorism.

Israel’s counterterrorist actions have intensified the past week.

Before the three strikes in the last 24 hours, Israeli jets on Thursday raided a Hamas training several hours after Gaza terrorists fired two rockets into southern Israel.

On Wednesday, the Israeli air force struck targets in northern Gaza after rocket fire that was also claimed by the Mujahedeen Shura Council.

Earlier in the week, the armed wings of Hamas and Islamic Jihad launched a barrage of fire at southern Israel– a day after the Air Force raided the southern city of Rafiah, targeting two global jihad activists, one of whom died. The other was critically wounded.

The continuation of Gaza rocket fire on Israel by Hamas and Islamic Jihad terrorists marked a rare show of force given that the two groups normally claim they observe a de facto truce.

More than 480 rockets or mortar rounds have been fired at southern Israel from Gaza this year, according to the IDF.

‘Hezbollah drone photographed secret IDF bases

October 14, 2012

‘Hezbollah drone photographed secret IDF bases… JPost – Defense.

By JPOST.COM STAFF
10/14/2012 08:53
Report in ‘Sunday Times’ says UAV struck down over Negev had beamed live images of IDF preparation for joint US exercise, missile sites, airfields and perhaps Dimona reactor.

IAF shoots down UAV that entered Israeli airspace

Photo: IDF Spokesman’s Office

The Hezbollah drone that infiltrated the Negev last week beamed back live images of secret Israeli military bases, the Sunday Times reported on Sunday.

According to the report, the drone was airborne for three hours before being intercepted by an F-16I jet. It is believed to have transmitted pictures of preparations for Israel’s joint military exercise with the US, as well as ballistic missile sites, airfields and, perhaps, the nuclear reactor in Dimona, the Sunday Times reported.

The report also stated the interception of the drone was “botched” when the first missile fired by the Israeli jet missed. The aircraft had traveled 200 miles, the program claimed.

Hezbollah leader Hassan Nasrallah took credit on Thursday sending the drone aircraft into Israel on Saturday, saying in a televised speech on the Al- Manar station that it was Iranian-made and that it was shot down near the Dimona reactor.

“The drone flew over sensitive installations inside southern Palestine,” he said.

Nasrallah claimed the Ayoub drone was designed and manufactured in Iran and assembled in Lebanon, denying reports that the drone was a Russian design.

The Hezbollah leader said the drone was sent as a response to what he referred to as Israel’s violations of Lebanese airspace since 2006.

“This flight was not our first will not be our last, and we give assurances we can reach any point we want. We have the right to dispatch recon planes over occupied Palestine at any time,” Nasrallah said.

Earlier that day, Prime Minister Binyamin Netanyahu said Israel would “act with determination to defend its borders at sea, on air and land” just as it had “thwarted Hezbollah’s attempt over the weekend,” to send an unmanned aircraft into Israeli airspace.

Gil Hoffman and Joanna Paraszczuk contributed to this report.

Spreading Iranian cyber attacks hit Israeli military, US financial and Gulf oil targets

October 14, 2012

Spreading Iranian cyber attacks hit Israeli military, US financial and Gulf oil targets.

DEBKAfile Exclusive Analysis October 13, 2012, 5:39 PM (GMT+02:00)

Tags:  Leon Panetta   Iran   cyber war   Syria   Israel   UAV 

A week ago, on Oct. 6, an unmanned Iranian aerial vehicle with stealth attributes breached Israeli air space. By eluding Israel’s radar, the UAV exposed serious gaps in its air defenses. Thursday, Oct. 11, Hizballah’s Hassan Nasrallah admitting the drone had come from Lebanon, promised it would not be the last. He seemed to be mocking Israeli Prime Minister Binyamin Netanyahu and his reliance on strong border fences to keep Israel safe.
A week went by and Saturday, Oct. 13, the Iranian Revolutionary Guards (IRGC) website quoted its chief, Lt. Gen. Ali Jabari as stating that his naval and missile forces are on “strategic deterrent readiness” – a novel term just invented by the Islamic Republic. He spoke Friday at an army base in Khorrasan, during a tour with Supreme Leader Ayatollah Ali Khamenei. The Iranian general hinted that the Iranian-Hizballah drone had been able to come close to Israel’s nuclear reactor in Dimona.
Both admissions that Iran and Hizballah were conducting military cyber warfare on Israel were tinged with contempt, arising from the certainty that Israel would not retaliate for the UAV’s invasion any more than it had responded to the posting of thousands of Iranian elite Al Qods troops just across its Syrian and Lebanese borders.
Shortly after Nasrallah spoke, the US Republican vice presidential candidate Paul Ryan managed to break through VP Joe Biden’s interruptions to reveal the stark fact that Iran already possesses enough fissile material to make five nuclear bombs.  The cat was finally out of the bag after years in which American and Israeli leaders contrived to keep this secret dark by verbal acrobatics and blinding showers of impenetrable “facts and figures.”
It was no slip of the tongue: Mitt Romney’s running mate was briefed by the team which is preparing the candidate himself for his second debate against President Barack Obama next Tuesday, Oct. 16.

debkafile’s Washington sources disclose that the team is headed by the former US ambassador to the UN, John Bolton, who is slated for the job of National Security Adviser if Romney wins the Nov. 6 election.
Ryan’s revelation implied that a Romney administration’s Iran policy would take off from the point of its possession of sufficient fissile material for a nuclear arsenal.

Not that this guarantees US military action against Iran’s nuclear program under a new president – or even backing for an Israeli strike – only that now we all know that it is not necessary to destroy the 20 or more Iranian nuclear sites to demolish its program, only to home in on the stockpile of fissile material which took Tehran 20 years to enrich and accumulate.
The Iranians, realizing their secret was out, are certainly not hiding their precious fissile stockpile of approximately one ton at the Fordo nuclear enrichment plant which continues to turn out more enriched uranium. This stock encased in a lead container no bigger than a large kitchen table could be concealed anywhere in the vast 1.6 million-square-kilometer area of the Islamic Republic of Iran.
So a fleet of bombers and array of bunker buster bombs have become dispensable for pre-empting Iran’s nuclear bomb aspirations. All that is needed is one missile – provided of course that the vital core stock can be located.
Also on Thursday, US Defense Secretary Leon Panetta unveiled his “pre-9/11 moment” speech which revealed that for two weeks, hackers had been hammering the websites of big American banks, the Saudi national oil company Aramco and Qatar’s Rasgas.

In a strong comment, he said the US would strike back and consider a preemptive strike against cyber terrorism, without saying how or actually naming Iran.
However in leaks to the American media, former U.S. government officials and cyber-security experts reported that the administration believes Iranian-based hackers were responsible for what Panetta warned could be the first “cyber Pearl Harbor” against America.
The Wall Street Journal pointed to a team of 100 Iranian experts as the perpetrators of the cyber attacks on America and the Gulf oil states.
Tehran appears to be sending a message that if US-led sanctions continue to cut down its oil exports and restrict its banking business, Gulf oil producers and American banks would pay the price.
Panetta’s words may therefore be read as Washington’s final warning to Iran to desist from cyber warfare.

In the days leading up to his speech on cyber-terror, the defense secretary was tireless in cautioning against the menace of the Syrian civil war spreading to neighboring countries and evoking Bashar Assad’s threat to bring out and use his chemical weapons.
Before he turned to the cyber threat, the Syrian war had indeed tipped over into an escalating Turkish-Syrian showdown.
Both these developments mean that the waves of Middle East violence are lapping ever farther afield. All the parties with an interest in stirring up trouble are keeping a weather eye on the Obama-Romney debate next Tuesday to see if the president recovers the momentum he lost to his Republican challenger in the first debate.
Before or after the debate, each of them – Al Qaeda, Iran, Syria or Hizballah – is capable of taking direct action to show it is a player to be reckoned with.  Such action may explicitly target an American interest or stir the pot by going for Israel, Turkey, Jordan, or a Gulf oil nation.
It can no longer be denied that Tehran is already on a cyber offensive against them all. In the absence of any response, Iran may decide to push further against its targets.

Tehran ready to be flexible at nuclear talks, says spokesman

October 13, 2012

Tehran ready to be flexible at nuclear talks, says spokesman | The Times of Israel.

Amid reports of a new diplomatic push to end the crisis with Iran, foreign ministry representative says his country is willing to ease Western concerns

 

October 13, 2012, 5:44 pm 3

 

 

Iranian Deputy Foreign Ministry spokesman Ramin Mehmanparast, right, is escorted from the street near the United Nations headquarters after being involved in a scuffle with a small crowd, Wednesday, Sept. 26 (photo credit: AP/Monica Gutierrez)

Iranian Deputy Foreign Ministry spokesman Ramin Mehmanparast, right, is escorted from the street near the United Nations headquarters after being involved in a scuffle with a small crowd, Wednesday, Sept. 26 (photo credit: AP/Monica Gutierrez)

 

Tehran is ready to show flexibility at nuclear talks to ease Western concerns over its contentious nuclear program, Iran’s foreign ministry spokesman reportedly said Saturday.

 

The remarks by Ramin Mehmanparast, published by the official IRNA news agency, underscore Iran’s push to resume talks with world powers as Western sanctions squeeze the economy tighter and the European Union weighs a boycott of Iranian natural gas.

 

“Iran is ready to show flexibility to remove concerns within a legal framework but such measures should be reciprocal,” Mehmanparast was quoted as saying. “The other party needs to take measures to fully recognize Iran’s nuclear rights and Iran’s enrichment for peaceful purposes.”

 

But contrary to the pragmatic viewpoint reflected in Mehmanparast’s words, remarks made Saturday by Iranian Supreme Leader Ayatollah Ali Khamenei suggested a more militant stance.

 

“We should not neglect the enemy. The enemy enters through various ways. One day it’s talk of sanctions. Another day it’s talk of military aggression. And one day, it’s talk of soft war … We have to be vigilant,” state TV quoted Khamenei as saying during a speech in northeast Iran.

 

Britain’s Guardian reported Friday that the so-called P5+1, a grouping comprised of the US, UK, France, Germany, Russia and China, plans to launch a new diplomatic drive to defuse the Iranian nuclear crisis in the next several months, after the US elections.

 

According to the report, a “reformulated” proposal will offer the Islamic Republic some relief from crippling economic sanctions in exchange for Iran’s limiting the level of uranium enrichment.

 

“We recognize that the Iranians need something more with which they can sell a deal at home, and we will expect real change on the other side,” said one European official regarding the new diplomatic initiative.

 

The five members of the UN Security Council, plus Germany and Iran, aim to resume high-level talks that were suspended in June. The countries want the Islamic Republic to stop enriching uranium to 20 percent purity because at that level the material can be quickly turned into fuel for nuclear weapons.

 

Spreading Iranian cyber attacks hit Israeli military, US financial and Gulf oil targets

October 13, 2012

Spreading Iranian cyber attacks hit Israeli military, US financial and Gulf oil targets

DEBKAfile Exclusive Analysis October 13, 2012, 5:39 PM (GMT+02:00)

A week ago, on Oct. 6, an unmanned Iranian aerial vehicle with stealth attributes breached Israeli air space. By eluding Israel’s radar, the UAV exposed serious gaps in its air defenses. Thursday, Oct. 11, Hizballah’s Hassan Nasrallah admitting the drone had come from Lebanon, promised it would not be the last. He seemed to be mocking Israeli Prime Minister Binyamin Netanyahu and his reliance on strong border fences to keep Israel safe.
A week went by and Saturday, Oct. 13, the Iranian Revolutionary Guards (IRGC) website quoted its chief, Lt. Gen. Ali Jabari as stating that his naval and missile forces are on “strategic deterrent readiness” – a novel term just invented by the Islamic Republic. He spoke Friday at an army base in Khorrasan, during a tour with Supreme Leader Ayatollah Ali Khamenei. The Iranian general hinted that the Iranian-Hizballah drone had been able to come close to Israel’s nuclear reactor in Dimona.
Both admissions that Iran and Hizballah were conducting military cyber warfare on Israel were tinged with contempt, arising from the certainty that Israel would not retaliate for the UAV’s invasion any more than it had responded to the posting of thousands of Iranian elite Al Qods troops just across its Syrian and Lebanese borders.
Shortly after Nasrallah spoke, the US Republican vice presidential candidate Paul Ryan managed to break through VP Joe Biden’s interruptions to reveal the stark fact that Iran already possesses enough fissile material to make five nuclear bombs.  The cat was finally out of the bag after years in which American and Israeli leaders contrived to keep this secret dark by verbal acrobatics and blinding showers of impenetrable “facts and figures.”
It was no slip of the tongue: Mitt Romney’s running mate was briefed by the team which is preparing the candidate himself for his second debate against President Barack Obama next Tuesday, Oct. 16.

debkafile’s Washington sources disclose that the team is headed by the former US ambassador to the UN, John Bolton, who is slated for the job of National Security Adviser if Romney wins the Nov. 6 election.
Ryan’s revelation implied that a Romney administration’s Iran policy would take off from the point of its possession of sufficient fissile material for a nuclear arsenal.

Not that this guarantees US military action against Iran’s nuclear program under a new president – or even backing for an Israeli strike – only that now we all know that it is not necessary to destroy the 20 or more Iranian nuclear sites to demolish its program, only to home in on the stockpile of fissile material which took Tehran 20 years to enrich and accumulate.
The Iranians, realizing their secret was out, are certainly not hiding their precious fissile stockpile of approximately one ton at the Fordo nuclear enrichment plant which continues to turn out more enriched uranium. This stock encased in a lead container no bigger than a large kitchen table could be concealed anywhere in the vast 1.6 million-square-kilometer area of the Islamic Republic of Iran.
So a fleet of bombers and array of bunker buster bombs have become dispensable for pre-empting Iran’s nuclear bomb aspirations. All that is needed is one missile – provided of course that the vital core stock can be located.
Also on Thursday, US Defense Secretary Leon Panetta unveiled his “pre-9/11 moment” speech which revealed that for two weeks, hackers had been hammering the websites of big American banks, the Saudi national oil company Aramco and Qatar’s Rasgas.

In a strong comment, he said the US would strike back and consider a preemptive strike against cyber terrorism, without saying how or actually naming Iran.
However in leaks to the American media, former U.S. government officials and cyber-security experts reported that the administration believes Iranian-based hackers were responsible for what Panetta warned could be the first “cyber Pearl Harbor” against America.
The Wall Street Journal pointed to a team of 100 Iranian experts as the perpetrators of the cyber attacks on America and the Gulf oil states.
Tehran appears to be sending a message that if US-led sanctions continue to cut down its oil exports and restrict its banking business, Gulf oil producers and American banks would pay the price.
Panetta’s words may therefore be read as Washington’s final warning to Iran to desist from cyber warfare.

In the days leading up to his speech on cyber-terror, the defense secretary was tireless in cautioning against the menace of the Syrian civil war spreading to neighboring countries and evoking Bashar Assad’s threat to bring out and use his chemical weapons.
Before he turned to the cyber threat, the Syrian war had indeed tipped over into an escalating Turkish-Syrian showdown.
Both these developments mean that the waves of Middle East violence are lapping ever farther afield. All the parties with an interest in stirring up trouble are keeping a weather eye on the Obama-Romney debate next Tuesday to see if the president recovers the momentum he lost to his Republican challenger in the first debate.
Before or after the debate, each of them – Al Qaeda, Iran, Syria or Hizballah – is capable of taking direct action to show it is a player to be reckoned with.  Such action may explicitly target an American interest or stir the pot by going for Israel, Turkey, Jordan, or a Gulf oil nation.
It can no longer be denied that Tehran is already on a cyber offensive against them all. In the absence of any response, Iran may decide to push further against its targets.

Hezbollah’s CFO flees to Israel carrying stolen money, classified documents

October 13, 2012

Hezbollah’s CFO flees to Israel carrying stolen money, classified documents.

Supporters of Lebanon’s Hezbollah wave Hezbollah flags as a poster depicting their leader Sayyed Hassan Nasrallah is held in the background during a rally in the southern Lebanese town of Bint Jbeil. Southern Lebanon where Hezbollah’s CFO, Hassan Fahs, hails from is considered to be the group’s base. (Reuters)

Supporters of Lebanon’s Hezbollah wave Hezbollah flags as a poster depicting their leader Sayyed Hassan Nasrallah is held in the background during a rally in the southern Lebanese town of Bint Jbeil. Southern Lebanon where Hezbollah’s CFO, Hassan Fahs, hails from is considered to be the group’s base. (Reuters)

Hezbollah’s CFO has fled to Israel taking with him large sum of stolen money, classified documents and maps, local news media reported on Friday.

The news website, Now Lebanon, cited Hezbollah officials saying that the 29-year old telecommunication engineer, Hassan Fahs, has crossed to Israel carrying with him $5 million in embezzled money from the group. Fahs is also head of Hezbollah’s operational communications network.

In September, Fahs, who is native of southern Lebanon, was arrested along with other four Hezbollah members over the suspicion of embezzling the group’s funds and collaborating with Israel, Yoni Alpert’s Terror Watch reported.

The operation to arrest the five was a collaborative one between Hezbollah and Iranian intelligence. Hezbollah, which has long been a staunch ally to both Iran and Syria, officially became part of the Lebanese government in 2011.

According to Al-Joumhouria newspaper, he was arrested while on his way to an unknown destination by 20 Iranian intelligence officers at Beirut’s Hariri Airport. At the time it was suspected that they stole at least $5 million in Iranian aid funds.

Cases of Lebanese nationals collaborating and spying for Israel are not new.

On Tuesday, Imad al-Zein, a Lebanese Military Tribunal Judge, issued eight arrest warrants against Lebanese citizens charged of collaborating with Israel, Lebanon’s National News Agency reported.

The eight arrested include seven women and one man and were all charged in absentia. They were also natives of southern Lebanon, a region known for being a Hezbollah stronghold.

Since 2009, Lebanon has arrested more than 100 people on suspicion of spying for Israeli intelligence, including high-ranking security and telecommunication officials, Nahar Net said.

Officials: Iran could halt 20% enrichment if given fuel

October 13, 2012

Officials: Iran could halt 20% e… JPost – Iranian Threat – News.

By REUTERS
10/13/2012 11:33
Position may be a bid to reinvigorate moribund talks with big powers, but Iran wants economic sanctions lifted as condition; Western powers say much more needed for sanctions relief.

Isfahan uranium conversion facility

Photo: REUTERS

DUBAI – Iran would negotiate on halting higher-grade uranium enrichment if given fuel for a research reactor, senior officials said, reviving a previous offer in a possible attempt to show flexibility in stalled nuclear talks with world powers.

The talks have made scant progress since resuming in April, leading to harsher Western sanctions against Iran and increasing talk of Israeli air strikes on its arch-adversary over concerns Tehran is covertly seeking the means to develop nuclear weapons.

The Islamic Republic’s economy is suffering from the tightened noose of sanctions, with the rial currency losing nearly two-thirds of its value to the dollar over the past year.

“If a guarantee is provided to supply the 20 percent (enriched) fuel for the Tehran Research Reactor, our officials are ready to enter talks about 20 percent enrichment,” Foreign Ministry spokesman Ramin Mehmanparast said at a Eurasian media forum in Kazakhstan on Friday, according to Iran’s Press TV.

Foreign Minister Ali Akbar Salehi told the German newsmagazine Der Spiegel earlier in the week: “If our right to enrichment is recognized, we are prepared to offer an exchange. We would voluntarily limit the extent of our enrichment program, but in return we would need a guaranteed supply of the relevant fuels from abroad.”

At the heart of Iran’s dispute with world powers is its insistence on the right to enrich uranium and that economic sanctions should be lifted before it stops activities that could lead to its achieving the capability to produce nuclear weapons.

The United States and European allies reject such conditions. They say Iran forfeited a right to enrich by having concealed sensitive nuclear work from U.N. inspectors and blocking their inquiry into suspected bomb research.

They also believe that dropping sanctions first would remove any incentive for Iran to come clean and negotiate seriously.

EU widens sanctions

Mehmanparast, the Foreign Ministry spokesman, spoke on the same day the European Union provisionally approved yet wider economic sanctions complementing US plans for further financial penalties.

Mehmanparast said any flexibility shown by Iran should be matched by reciprocal measures from world powers, including full recognition of Iran’s right to enrich uranium, according to Saturday’s Press TV report.

There is no sign Iran’s readiness to discuss its enrichment of uranium to a fissile concentration of 20 percent would go anywhere near enough to satisfy the demands of the West.

World powers want Iran to stop 20 percent enrichment, shut down the Fordow underground centrifuge plant where this work is carried out and ship out its stockpile of this material.

Western officials say such gestures would serve to raise confidence in Iranian intentions but more would be needed to obtain any significant relief from sanctions.

Iran says it needs uranium enriched to a fissile purity of 20 percent for a medical research reactor in Tehran, but this would also overcome most of the hurdles in terms of technology and time to the 90 percent level suitable for nuclear weapons.

According to the latest International Atomic Energy Agency watchdog report, issued in August, Iran has a stockpile of 20 percent uranium of just over 90 kilograms (200 pounds).

Traditionally experts say 200-250 kg would be required for one nuclear device, if it is refined further to weapons grade, but some say less would do. Iran is believed to be producing about 15 kg per month.

A US-based think tank earlier this week said Iran would currently need at least two to four months to refine enough uranium for one bomb but that considerably more time would be required to assemble a deliverable nuclear weapon.

Defense Secretary Warns of ‘Cyber-Pearl Harbor’

October 13, 2012

Defense Secretary Warns of ‘Cyber-Pearl Harbor’ | TechNewsDaily.com.

The threats of train derailment, contaminated water supplies, a crippled power grid and other infrastructure nightmares in the United States loom on the horizon, Defense Secretary Leon Panetta said yesterday (Oct. 11).

In what he described as a “cyber-Pearl Harbor,” Panetta said the recent attacks against the websites of major U.S. banks were further evidence that the nation is becoming increasingly vulnerable to crippling attacks delivered digitally.

The secretary said he fears that similar instances, such as August’s Shamoon attack that destroyed 30,000 computers at an oil company in Saudi Arabia, could occur at home.

“Imagine the impact an attack like this would have on your company,” he said. “While this kind of tactic isn’t new, the scale and speed with which it happened was unprecedented.”

 

[Obama’s Doomsday Cyberattack Unrealistic, Experts Say]

Panetta’s speech at the Intrepid Sea, Air and Space Museum in New York comes after Democratic senators failed to muster the 60 votes required to defeat a proposed Republican filibuster against the Cybersecurity Act of 2012.

President Barack Obama may consider issuing an executive order to put in place many of the protections outlined in the act.

Under that legislation, operators of private-sector infrastructure deemed critical would have to adopt a set of standards established, in part, by the government.

The proposed order could affect energy, water, transportation operations or any other systems that, if compromised, could result in catastrophic death or damage.

Panetta reprimanded Congress for failing to pass the legislation, which was sponsored by Sen. Joe Lieberman, I-Conn., and strongly backed by the White House.

“If we detect an imminent threat of attack that will cause significant physical destruction in the United States, or kill American citizens, we need to have the option to take action against those who would attack us, to defend this nation when directed by the president,” Panetta said. “The fact is, that to fully provide the necessary protection in our democracy, cybersecurity [legislation] must be passed by the Congress.”

In spite of his dire warning, Panetta said the U.S. had made “significant advances” in detecting the origins of cyberattacks.

“Potential aggressors should be aware that the United States has the capacity to locate them and hold them accountable for actions that harm America or its interests,” he said.

Panetta blamed Iran for the Shamoon attack on the Saudi computers. Lieberman has blamed Iran for the attacks on American banking websites.

Both accusations may be premature. There is more evidence that the U.S. and Israel have attacked Iran with cyberweapons at least twice in the past five years, first with the Flame spyware and then with the Stuxnet worm that sabotaged an Iranian uranium-processing facility.

Follow Ben on Twitter @benkwx.

The Associated Press: Iran’s leader says army ready to deter any attack

October 13, 2012

The Associated Press: Iran’s leader says army ready to deter any attack.

TEHRAN, Iran (AP) — Iran’s supreme leader said Friday that his country’s military is ready to deter any attack and warned enemies of the Islamic Republic to abandon any “thoughts of invasion.”

Ayatollah Ali Khamenei’s remarks came as tensions are rising in the region over a possible strike by Israel against Iran’s nuclear facilities.

The U.S. and its allies accuse Iran of using its civilian nuclear program as a cover to develop nuclear weapons. Tehran has denied the charges, saying its program is peaceful and geared toward generating electricity and producing radioisotopes to treat cancer patients.

“The readiness of the Iranian armed forces is such … it will deter the enemy from harboring any thoughts of invasion,” state TV quoted Khamenei as saying during a visit to a military base in the country’s northeast.

Israel has not ruled out a military option against Iran’s suspect program and has recently said that time is running out before Iran obtains a nuclear weapon. Israel considers a nuclear-armed Iran to be a threat to its existence, citing Iranian denials of the Holocaust, calls for Israel’s destruction, development of missiles capable of striking the Jewish state and its support for hostile Arab militant groups.

Washington and others favor a mix of sanctions and diplomacy to try to force Tehran to curb its nuclear program.

Khamenei, who has final say on all state matters in the country, said Iran “is not seeking to invade anyone but will not succumb to any attack or act of aggression.”

As Khamenei visited the base Friday, his host Gen. Mohmmad Ali Jafari of the powerful Revolutionary Guard said the troops’ naval and missile power has now been raised to a “strategic deterrence level.”

Iran has long sought a self-sufficient military program and top officials frequently make announcements about the country’s strides in military technology.

Tehran has recently said it has upgraded the accuracy of its missiles with a range of 2,000 kilometers (1,250 miles), which covers much of the Middle East, including Israel and U.S. bases in the Gulf.

However, it is virtually impossible to independently determine the actual capabilities or combat worthiness of Iran’s arsenal.

Separately, the foreign ministry said a recent U.N. report that condemned Tehran of “deeply troubling” human rights violations was politically motivated and influenced by western adversaries including the United States.

The report, obtained by The Associated Press on Thursday, said many of the government’s violations were “systemic in nature.” It also called for an extensive, impartial, and independent investigation into the violence in the months that followed the re-election of President Mahmoud Ahmadinejad in 2009.

U.S. Says Iranian Hackers Are Behind Electronic Assaults on U.S. Banks, Foreign Energy Firms – WSJ.com

October 13, 2012

U.S. Says Iranian Hackers Are Behind Electronic Assaults on U.S. Banks, Foreign Energy Firms – WSJ.com.

U.S. Officials Say Iranian Hackers Behind Electronic Assaults on U.S. Banks, Foreign Energy Firms

By SIOBHAN GORMAN And JULIAN E. BARNES

WASHINGTON—Iranian hackers with government ties have mounted cyberattacks against American targets in recent months, escalating a low-grade cyberwar, U.S. officials say.

The Iranian effort culminated in a series of recent attacks against U.S. banks as well as electronic assaults this year on energy companies in the Persian Gulf. The attacks bore “signatures” that allowed U.S. investigators to trace them to the Iranian government, the officials said.

The hackers appear to be a network of fewer than 100 Iranian computer-security specialists at universities and network security companies in Iran, investigators said.

Iranian officials didn’t return a call seeking comment.

U.S. officials said detailed evidence linking the attacks to Tehran is classified. But Iranian hackers don’t have the resources to mount major attacks without the support and technical expertise of the government, the officials said.

“These are not ordinary Iranians,” one senior U.S. official said.

Defense Secretary Leon Panetta alluded to the Iranian cyberattacks in a policy announcement this week on U.S. efforts to counter the threat. He didn’t directly finger Iran in these attacks, but said they mark “a significant escalation.” Mr. Panetta, in an address in New York, outlined procedures being put into place to block such attacks, identify attackers and retaliate, if necessary.

A Litany of High-Tech Assaults

Incidents have escalated in recent months.

  • January 2012: Potent but smaller-scale denial-of-service attacks against U.S. banks.
  • July 2012: Cyberattack at Saudi Arabian Oil Co. unleashes a virus called ‘Shamoon,’ destroying data on 30,000 computers.
  • August 2012: Cyberattack at Rasgas, a Qatari natural gas company, disabled websites and email system.
  • September 2012: A group called “Qassam Cyber Fighters” announced plans for cyberattacks on U.S. banks. Powerful denial of service strikes hit Bank of America Corp, J.P. Morgan Chase & Co., U.S. Bancorp, PNC Financial Services Corp. and Wells Fargo & Co.
  • October 2012: The Qassam Cyber Fighters issued announcements, followed by cyber strikes, involving other U.S. banks, slowing or interrupting consumer websites

“They have been going after everyone—financial services, Wall Street,” said a senior defense official. “Is there a cyberwar going on? It depends on how you define ‘war.'”

The attacks against U.S. banks were so-called denial of service attacks, in which computers are programmed to bombard a particular website and knock it off line. But investigators fear that they represent a first step to more destructive electronic assaults, which already had been mounted on a Saudi oil company.

The attacks began early this year in what some officials surmised was retaliation for harsh sanctions on Iran’s oil and financial sectors, imposed as part of an effort by the U.S. and its allies to halt Tehran’s nuclear program. Tehran denies Western charges that it is seeking to use the nuclear program to develop atomic weapons.

The Iranian effort may also be payback for a high-tech campaign against Iran that involved the U.S., including the cybersabotage project known as Stuxnet. That project targeted Iran’s Natanz nuclear plant with cyberattacks that caused a large proportion of its centrifuges to spin out of control beginning in 2008.

U.S. officials have long considered Iran as a second-tier cyberpower, behind China, Russia, France, Israel and the United States. They now are debating the extent to which Iran has the capability to damage the financial system and other U.S. infrastructure.

Iran has stepped up its cyber capabilities in recent years, spending at least $1 billion on them since the beginning of this year, said Ilan Berman, a Middle East expert at the American Foreign Policy Council. The Pentagon spends about $3 billion a year on cyberdefenses.

Iran’s strategy has shifted from fortifying its cyberdefenses to developing offensive cyberweapons, said Mr. Berman.

Defense officials see the cyberattacks as part of a larger effort by Iran. U.S. investigators allege Iran was behind an attack in July on Israeli tourists in Bulgaria, the killing of a Saudi diplomat in May in Pakistan, and the attempted assassination last year of the Saudi ambassador in Washington. Iran has denied involvement in all the incidents.

U.S. banks were the first targets of attacks that were comparatively small in scale, according to former U.S. officials.

The attacks expanded to oil and gas companies in the Persian Gulf and Middle East over the summer, then returned to U.S. banks with far more potent attacks in recent weeks.

Three more banks were hit this week, and each of those actions was preceded by an Internet warning of an imminent attack.

“In the last year, there’s been a cyberwar going on in the Middle East, and it’s spilled over now” into America, a former U.S. official said.

The attacks began shortly after approval last December of a U.S. defense bill that stepped up punitive sanctions. Iranian hackers initially mounted potent, but smaller-scale denial of service attacks on a group of U.S. banks in January, investigators say. The attackers were testing the banks’ responses to each assault and adjusting their tactics to penetrate banks’ defenses.

The Tel Aviv Stock Exchange and the website of Israeli airline El Al also came under attack that month, each suffering website outages. Although an unknown hacker who claimed to be a Saudi took credit, investigators are examining a possible Iranian role. The stock exchange and airline acknowledged the attack at the time and said they quickly recovered from it.

The Iranian hackers re-emerged in July with an attack on the Saudi Arabian Oil Co., known as Saudi Aramco, investigators believe. That attack, wielding a virus called “Shamoon,” destroyed data on 30,000 computers. A group calling itself “Cutting Sword of Justice” claimed responsibility for the attack, which U.S. investigators believe was tied to Iran.

Aramco acknowledged then that its computers had been taken down by an electronic attack and said it expected more attacks in the future. It said that it quickly recovered.

The Aramco attacks set off alarms within the U.S. government as a shift in tactics from stealing information to destroying it.

In August, the target was Rasgas, a Qatari natural gas company that is a leading global provider of liquefied natural gas. The attack, which U.S. officials believe was carried out by the same Iranian network, shut down its website and internal email servers. Rasgas also acknowledged the attack and said it had no impact on operations.

In September, the group redoubled its attacks on the U.S. financial sector. It announced its plans in advance under the moniker “Qassam Cyber Fighters,” a previously unknown group.

On Sept. 18, the group announced it would target Bank of America Corp. It followed with several more attacks, including J.P. Morgan Chase & Co., U.S. Bancorp, PNC Financial Services Corp., and Wells Fargo & Co.

This past week, the pre-announced attacks continued with Capital One Financial Corp., SunTrust Banks Inc., and Regions Financial Corp. Following the announcements, the attacks bombarded computers that run bank websites, slowing website performance of some and taking others offline temporarily.

Bank of America declined to comment and J.P. Morgan wouldn’t confirm an attack but acknowledged some customers had difficulty accessing its website. PNC’s president wrote an open letter to customers about the attacks, which lasted about 31 hours. Wells Fargo and U.S. Bancorp also acknowledged they had been hit.

With this week’s attacks, a Capital One spokeswoman said that some customers were intermittently unable to log on to their accounts on Oct. 9 due to a large volume of traffic. A SunTrust spokesman said the company experienced increased traffic Oct. 10 that led to service outages. A Regions spokesman said the company experienced intermittent Internet service disruption on Oct. 11.

—Suzanne Kapner, Jessica Holtzer and Devlin Barrett contributed to this article.

Write to Siobhan Gorman at siobhan.gorman@wsj.com and Julian E. Barnes at julian.barnes@wsj.com