Document Reveals Growth of Cyber-Warfare Between the US and Iran

Advertisement
By David E. Sanger, The New York Times | Updated: 23 February 2015 12:47 IST
A newly disclosed National Security Agency document illustrates the dramatic acceleration of the use of cyber-weapons by the United States and Iran against each other, both for spying and sabotage, even as Secretary of State John Kerry and his Iranian counterpart met in Geneva to try to break a stalemate in the talks over Iran's disputed nuclear program.

The document, which was written in April 2013 for Gen. Keith B. Alexander, then director of the NSA, described how Iranian officials had discovered new evidence the year before that the United States was preparing computer surveillance or cyber-attacks on their networks.

It detailed how the U.S. and Britain had worked together to contain the damage from "Iran's discovery of computer network exploitation tools'' - the building blocks of cyber-weapons. That was more than two years after the Stuxnet worm attack by the U.S. and Israel severely damaged the computer networks at Tehran's nuclear enrichment plant.

The document, which was first reported this month by The Intercept, an online publication that grew out of the disclosures by Edward J. Snowden, the former NSA contractor, did not describe the targets. But for the first time, the surveillance agency acknowledged that its attacks on Iran's nuclear infrastructure, a George W. Bush administration program, kicked off the cycle of retaliation and escalation that has come to mark the computer competition between the United States and Iran.

Advertisement

The document suggested that even while the high-stakes nuclear negotiations played out in Europe, day-to-day hostilities between the United States and Iran had moved decisively into cyberspace.

Advertisement

"The potential cost of using nuclear weapons was so high that no one felt they could afford to use them," said David J. Rothkopf, the author of "National Insecurity," a new study of strategic decisions made by several American administrations. But the cost of using cyber-weapons is seemingly so low, Rothkopf said, that "we seem to feel we can't afford not to use them" and that "many may feel they can't afford ever to stop."

The NSA's new director, Adm. Michael S. Rogers, has declared that his first task is to deter attacks by making it costly for countries like Russia, China and Iran to wage cyber-war. But a former senior intelligence official who looked at the two-page document prepared for Alexander after it was published 10 days ago said it provided "more evidence of how far behind we are in figuring out how to deter attacks, and how to retaliate when we figured out who was behind them."

Advertisement

The document declares that American intercepts of voice or computer communications showed that three waves of attacks against U.S. banks that began in August 2012 were launched by Iran "in retaliation to Western activities against Iran's nuclear sector," and added that "senior officials in the Iranian government are aware of these attacks.''

The main targets were the websites of Bank of America and JPMorgan Chase. By 2015 standards, those were relatively unsophisticated "denial of service" strikes that flooded the banks with data, so overloading them it was impossible for a time for customers to access their accounts. American officials - with the exception of then-Sen. Joe Lieberman of Connecticut, who was the chairman of the Senate Homeland Security committee - never publicly identified Iran as the culprit, though it was widely reported as the prime suspect.

Advertisement

More recently, the Obama administration, in an effort to deter attacks, has grown less reticent about naming countries that the administration believes are responsible for such attacks.

In May, five members of the Chinese People's Liberation Army were indicted on a charge of stealing intellectual property from American companies. And in December, President Barack Obama said he had evidence that North Korea's leadership was behind the attack on Sony Pictures Entertainment, though he did not provide details. The New York Times later reported that the NSA had gathered the evidence from implants it had placed in North Korean computers beginning in 2010.

But just as American officials woke up to North Korea's abilities last year, the newly disclosed document makes clear that by early 2012, American officials were increasingly alarmed by the successes of Iran's new "cyber-corps."

The background briefing for Alexander, who is now running his own cyber-defence firm, said flatly that Iran was responsible for the "destructive cyber-attack against Saudi Aramco in August 2012, during which data was destroyed on tens of thousands of computers," an attack that appeared to pave the way for technically similar strike on Sony last year. The NSA document suggests that the attack on Saudi Aramco was in response to "a similar cyber-attack" against Iran's oil industry earlier that year; it did not indicate who launched that attack.

The document refers to a major program at the NSA to prepare for traditional or cyber-war "contingencies" with Iran, including a "planned battle rhythm" that would allow it to feed data to the White House and the military's commands. That is fairly standard planning, but the document underscored that the plans depended on "both our access and Iran's capabilities," meaning that there is a constant reassessment of how deeply the NSA and its military partner, U.S. Cyber Command, have penetrated Iranian systems.

The core of the document urges Alexander to tell his counterpart at the Government Communications Headquarters that the two organizations have "worked multiple high-priority surges" against Tehran. GCHQ, as it is known, is the blandly named British intelligence agency that is famous for breaking Germany's Enigma codes, recently portrayed in the movie "The Imitation Game."

But it hints at discord. GCHQ wanted to set up "a trilateral arrangement to prosecute the Iranian target," the memo said. But the United States "has been opposed to such a blanket arrangement," the document said, and hints that both the NSA and GCHQ "have agreed to continue to share information gleaned from the respective bilateral relationships" with Israel's Unit 8200, also known as the Israeli Sigint National Unit. "Sigint" stands for "signals intelligence."

The relationship between the NSA and its Israeli counterpart has always been testy. American and Israeli intelligence agencies spy on each other, even while working together. The joint development of Olympic Games was their proudest moment of collaboration, but it was also marked by disagreements about how, and how vigorously, to press cyber-attacks on Iran.

© 2015 New York Times News Service

 

Get your daily dose of tech news, reviews, and insights, in under 80 characters on Gadgets 360 Turbo. Connect with fellow tech lovers on our Forum. Follow us on X, Facebook, WhatsApp, Threads and Google News for instant updates. Catch all the action on our YouTube channel.

Advertisement

Related Stories

Popular Mobile Brands
  1. iQOO 15: Everything You Need to Know Ahead of Launch in India
  2. Adobe Launches Photoshop Chrome Extension, Offers One Year of Free Access
  3. iQOO 15 Mini Launch Timeline Leaked; May Arrive With This Chipset
  4. Vivo X300 FE, OnePlus 15s Tipped to Launch in India Soon
  5. YouTube Music's 2025 Recap Starts Rolling Out: Here's What It Looks Like
  6. Kevin Hart Brings Big Laughs in Acting My Age, Now Streaming on Netflix
  7. How to Switch Accounts on WhatsApp for iOS, Android: A Step-by-Step Guide
  8. Huawei Launches Mate X7 Foldable in China With These Features
  9. Oakley Meta Glasses Set to Go on Sale in India in December at This Price
  1. Airtel Ramps Up Xstream Fiber Rollout Amid Surge in India’s Connected Homes
  2. OnePlus Ace 6T Charging Speed, Cooling System, Other Specifications Confirmed Ahead of Launch
  3. Samsung Galaxy S25 Series Could Get One UI 8.5 Beta Soon; Update Spotted on Samsung Server: Report
  4. Sam Altman and Jony Ive’s AI Device Prototype Finalised, Could Launch Within Two Years
  5. Vivo X300 FE, OnePlus 15s India Launch Tipped; Specifications, Features Leaked
  6. Google Chrome for Android Could Soon Let You Share Your Approximate Location With Websites
  7. Telegram Rolls Out Live Stories, Repeated Messages, and Other Creator-Focused Features
  8. OnePlus Watch Lite Design Teased; Will Launch in Europe Alongside OnePlus 15R, OnePlus Pad 2
  9. Acting My Age Starring Kevin Hart Now Streaming on Netflix: Everything You Need to Know About This Comedy Special
  10. The Golden Combi Season 2 Streaming Now on Amazon Prime Video: Know Everything About This Japanese Comedy Show
Gadgets 360 is available in
Download Our Apps
Available in Hindi
© Copyright Red Pixels Ventures Limited 2025. All rights reserved.