Sunday, June 09, 2013

Iran implicated in "Cyberattacks" with no evidence, and no attribution--New York Times and Vanity Fair


Thom Shanker and David E. Sanger have found a way to implicate Iran in the current discussion on cyber-surveillance. In the New York Times yesterday ("U.S. Helps Allies Trying to Battle Iranian Hacker" June 8, 2013), in the series of Sanger attacks on Iran appearing virtually every Saturday--perhaps to avoid close scrutiny.

http://www.nytimes.com/2013/06/09/world/middleeast/us-helps-allies-trying-to-battle-iranian-hackers.html?pagewanted=all&_r=0

Shanker and Sanger attribute an attack on Aramco facilities to Iran using unattributed soures:

"But deterring cyberattacks is a far more complex problem, and American officials concede that this effort, which will include providing computer hardware and software and training to allies, is an experiment. It has been propelled by two high-profile attacks in the past year. One was against Saudi Aramco, Saudi Arabia’s largest, state-run oil producer, and according to American officials it was carried out by Iran. That attack crippled 30,000 computers but did not succeed in halting production." [the other was purportedly launched by North Korea--shades of the Axis of Evil]

A more nuanced, but still inaccurate picture arises in Michael Joseph Gross' article "Silent War" in the July 2013 issue of Vanity Fair
http://www.vanityfair.com/culture/2013/07/new-cyberwar-victims-american-business#livefyre

Gross writes:

"The data on three-quarters of the machines on the main computer network of Saudi Aramco had been destroyed. Hackers who identified themselves as Islamic and called themselves the Cutting Sword of Justice executed a full wipe of the hard drives of 30,000 Aramco personal computers. . . .

In the immediate aftermath of the attack, as forensic analysts began work in Dhahran, U.S. officials half a world away gathered in the White House Situation Room, where heads of agencies speculated about who had attacked Aramco and why, and what the attackers might do next. Cutting Sword claimed that it acted in revenge for the Saudi government’s support of “crimes and atrocities” in countries such as Bahrain and Syria. But officials gathered at the White House could not help wondering if the attack was payback from Iran, using America’s Saudi ally as a proxy, for the ongoing program of cyber-warfare waged by the U.S. and Israel, and probably other Western governments, against the Iranian nuclear program."

So we see from Gross' account that the perpetrators of this attack did not identify themselves as Iranian, but the United States "officials" were ready to be "wondering" if Iran had some kind of "proxy" to carry out the attack.

Both articles continue to imply that Iran has done things for which no one has any evidence or proof. It is Claude Rains in Cassablanca--"round up the usual suspects," and Iran is ALWAYS the usual suspect. 

2 comments:

Anonymous said...

I'm sure Iran was not involved.
Just as I'm sure Iran has no interest in keeping Assad in power...or removing the Zionist cancer, etc.

Blogger said...

YoBit lets you to claim FREE CRYPTO-COINS from over 100 unique crypto-currencies, you complete a captcha once and claim as many as coins you want from the available offers.

After you make about 20-30 claims, you complete the captcha and keep claiming.

You can click CLAIM as many times as 50 times per one captcha.

The coins will held in your account, and you can exchange them to Bitcoins or USD.