Page 58 - Cyber Warnings
P. 58
correlated with the terrorism and monitoring his communications find those facilities. The
modern defense technology would offer you the real-time scanning of some terrain using
antenna systems which can cover miles and miles throwing their stream of waves.
Those systems could identify an electrical signal anywhere within a range. We would suggest
that such a technology could get used for discovering the Iranian nuclear facilities.
From that perspective, it’s clear that the defense forces would see literally everything happening
within those objects from the outside.
It’s possible that the Iranian experts would use some measures of protection in sense of
intelligent computer’s network infrastructure, but they would make a mistake using the USB
sticks for their data transfer. It would appear that the Iranians would get aware of that the
project’s computers and networks should not get exposed to the internet for the reason of
hacker’s attacks.
On the other hand, they could use some computers with the internet connection for
communications purposes. Also, those computers could get helpful for finding and doing
storage of web resources as well as transfer of the project documentation being sent through
the e-mail or any other communication means.
The defense community would observe their routine very carefully and probably notice that the
Iranian weakness got that they would do that data transfer using the removable device. In other
words, computers being used for a project development would not get the internet connection,
while the rest would get used for a communication – so they would get opened to the web.
The skillful intelligence work would offer those findings and the rest of the job belongs to the
strategists who would decide how to level down this threatening activity.
Phase 2: The strategic preparation of operation
Once the defense community identified the weakness in the Iranian nuclear program and such a
weakness got their data transfer, they decided to create the advanced persistent threat that
would cause the malfunction of their Siemens PLC industrial computers.
We believe that a team of skillful code’s developers could research how those controllers work
and create a malware for the purposes of their sabotage within some reasonable period of time.
So, the situation was as follows – you got all computers inside being covered, the intelligence
community got familiar with the Iranian routine and finally, highly sophisticated cyber weapon
got ready for its use.
58 Cyber Warnings E-Magazine – August 2016 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide