National
0

2011 Cyber Strike Empowered Nuclear Program

Ali Akbar SalehiAli Akbar Salehi

Iran's top nuclear official said the 2011 cyber attack by the US and Israel against the Iranian nuclear energy program worked against their intended objectives and helped improve Iran's readiness against such acts of sabotage.

Ali Akbar Salehi, the head of the Atomic Energy Organization of Iran, said the deployment that year of a malware dubbed Stuxnet against Iran's nuclear facilities made the country realize how it should prepare against such attempts, Press TV reported on Saturday.

He said Iran can fill "an entire exhibition room with the West's acts of industrial sabotage [against Iran], things like this Stuxnet virus".

"They give us equipment in which they have planted explosives so that it would blow up sometime later, or they interfere with the equipment so that … it later damages the whole system," he said.

Salehi explained that as an act of precaution, Iran has been checking the pieces of equipment it buys for any potential interference.

"We don't immediately put to use whatever equipment that we buy; rather, we conduct all kinds of tests and we don't use it before there is complete assurance" that it is safe, he said.

"In fact, before the Stuxnet, we were not this careful and the attack opened up a new science to us. Just by testing different equipment for [potential] industrial sabotage, we learn a lot."

"We owe them a thank you, of course," he said jokingly, referring to the US and Israel.

The Washington Post reported in June 2012 that the US National Security Agency, its spy service CIA, and Israel's military had worked together to launch Stuxnet to damage Iran's nuclear facilities.

  Litigation Over Stuxnet

Salehi also said Iranian officials are taking measures to pursue litigation against the perpetrators of the cyber attacks against Iran.

Meanwhile, Swiss prosecutors have said that they had found malware on a number of computers at a hotel in Geneva that hosted talks between Iran and six other countries on the Islamic Republic's nuclear program last year.

The hotel, believed to be Hotel President Wilson, was raided in May 2015. Weeks later, the Swiss state prosecutor's office, the OAD, launched an investigation over suspicions that illegal intelligence services were operating in Switzerland.

The OAD has, however, had to close the case after failing to establish who was behind the cyber attack that planted the malware on the computers.

Talks at the Swiss hotel and elsewhere led to the conclusion in Vienna on July 14, 2015, of a nuclear agreement between Iran and the five permanent members of the United Nations Security Council—the United States, Britain, France, China and Russia—plus Germany.

 

Add new comment

Read our comment policy before posting your viewpoints

Financialtribune.com