- Subscribe: Digital / Home Delivery
- Log In
- Register Now
- Help
Obama Order Sped Up Wave of Cyberattacks Against Iran
By DAVID E. SANGER
Published: June 1, 2012 344 Comments
WASHINGTON — From his first months in office, President Obamasecretly ordered increasingly sophisticated attacks on the computer systems that run Iran's main nuclear enrichment facilities, significantly expanding America's first sustained use of cyberweapons, according to participants in the program.
Hasan Sarbakhshian/Associated Press
Multimedia
Related
Iran Confirms Attack by Virus That Collects Information (May 30, 2012)
Facing Cyberattack, Iranian Officials Disconnect Some Oil Terminals From Internet (April 24, 2012)
Times Topic: Cyberattacks on Iran — Stuxnet and Flame
Connect With Us on Twitter
Follow@nytimesworld for international breaking news and headlines.
Readers' Comments
Share your thoughts.
Mr. Obama decided to accelerate the attacks — begun in the Bush administration and code-named Olympic Games — even after an element of the program accidentally became public in the summer of 2010 because of a programming error that allowed it to escape Iran's Natanz plant and sent it around the world on the Internet. Computer security experts who began studying the worm, which had been developed by the United States and Israel, gave it a name: Stuxnet.
At a tense meeting in the White House Situation Room within days of the worm's "escape," Mr. Obama, Vice President Joseph R. Biden Jr. and the director of the Central Intelligence Agency at the time, Leon E. Panetta, considered whether America's most ambitious attempt to slow the progress of Iran's nuclear efforts had been fatally compromised.
"Should we shut this thing down?" Mr. Obama asked, according to members of the president's national security team who were in the room.
Told it was unclear how much the Iranians knew about the code, and offered evidence that it was still causing havoc, Mr. Obama decided that the cyberattacks should proceed. In the following weeks, the Natanz plant was hit by a newer version of the computer worm, and then another after that. The last of that series of attacks, a few weeks after Stuxnet was detected around the world, temporarily took out nearly 1,000 of the 5,000 centrifuges Iran had spinning at the time to purify uranium.
This account of the American and Israeli effort to undermine the Iranian nuclear program is based on interviews over the past 18 months with current and former American, European and Israeli officials involved in the program, as well as a range of outside experts. None would allow their names to be used because the effort remains highly classified, and parts of it continue to this day.
These officials gave differing assessments of how successful the sabotage program was in slowing Iran's progress toward developing the ability to build nuclear weapons. Internal Obama administration estimates say the effort was set back by 18 months to two years, but some experts inside and outside the government are more skeptical, noting that Iran's enrichment levels have steadily recovered, giving the country enough fuel today for five or more weapons, with additional enrichment.
Whether Iran is still trying to design and build a weapon is in dispute. The most recent United States intelligence estimate concludes that Iran suspended major parts of its weaponization effort after 2003, though there is evidence that some remnants of it continue.
Iran initially denied that its enrichment facilities had been hit by Stuxnet, then said it had found the worm and contained it. Last year, the nation announced that it had begun its own military cyberunit, and Brig. Gen. Gholamreza Jalali, the head of Iran's Passive Defense Organization, said that the Iranian military was prepared "to fight our enemies" in "cyberspace and Internet warfare." But there has been scant evidence that it has begun to strike back.
The United States government only recently acknowledged developing cyberweapons, and it has never admitted using them. There have been reports of one-time attacks against personal computers used by members of Al Qaeda, and of contemplated attacks against the computers that run air defense systems, including during the NATO-led air attack on Libya last year. But Olympic Games was of an entirely different type and sophistication.
It appears to be the first time the United States has repeatedly used cyberweapons to cripple another country's infrastructure, achieving, with computer code, what until then could be accomplished only by bombing a country or sending in agents to plant explosives. The code itself is 50 times as big as the typical computer worm, Carey Nachenberg, a vice president of Symantec, one of the many groups that have dissected the code, said at a symposium at Stanford University in April. Those forensic investigations into the inner workings of the code, while picking apart how it worked, came to no conclusions about who was responsible.
A similar process is now under way to figure out the origins of another cyberweapon calledFlame that was recently discovered to have attacked the computers of Iranian officials, sweeping up information from those machines. But the computer code appears to be at least five years old, and American officials say that it was not part of Olympic Games. They have declined to say whether the United States was responsible for the Flame attack.
Get Free E-mail Alerts on These Topics
Ads by Google | what's this? |
Route 66 in Oklahoma Get your kicks on Route 66 for an epic road trip in Oklahoma! www.TravelOK.com |
Ads by Google | what's this? |
Route 66 in Oklahoma Get your kicks on Route 66 for an epic road trip in Oklahoma! www.TravelOK.com |
INSIDE NYTIMES.COM
OPINION »The Stone: Do Bishops Have a Case Against Obama?Not every effort of the government to restrict religious rights is a step toward the total undermining of religion. | OPINION »Townies: Fortunate SonAfter a brutal mugging, a young man recuperates, and reconnects, with his mother. |
You received this message because you are subscribed to the Google Groups "Open Debate Political Forum IMHO" group.
To post to this group, send email to OpenDebateForum@googlegroups.com
To unsubscribe from this group, send email to OpenDebateForum-unsubscribe@googlegroups.com
For more options, visit this group at http://groups.google.com/group/OpenDebateForum?hl=en
344 Comments
Share your thoughts.