Exclusive: U.S. carried out secret cyber strike on Iran in wake of Saudi
oil attack: officials
Send a link to a friend
[October 16, 2019]
By Idrees Ali and Phil Stewart
WASHINGTON (Reuters) - The United States
carried out a secret cyber operation against Iran in the wake of the
Sept. 14 attacks on Saudi Arabia's oil facilities, which Washington and
Riyadh blame on Tehran, two U.S. officials have told Reuters.
The officials, who spoke on condition of anonymity, said the operation
took place in late September and took aim at Tehran's ability to spread
"propaganda."
One of the officials said the strike affected physical hardware, but did
not provide further details.
The attack highlights how President Donald Trump's administration has
been trying to counter what it sees as Iranian aggression without
spiraling into a broader conflict.
Asked about Reuters reporting on Wednesday, Iran's Minister of
Communications and Information Technology Mohammad Javad Azari-Jahromi
said: "They must have dreamt it," Fars news agency reported.
The U.S. strike appears more limited than other such operations against
Iran this year after the downing of an American drone in June and an
alleged attack by Iran's Revolutionary Guards on oil tankers in the Gulf
in May.
The United States, Saudi Arabia, Britain, France and Germany have
publicly blamed the Sept. 14 attack on Iran, which denied involvement in
the strike. The Iran-aligned Houthi militant group in Yemen claimed
responsibility.
Publicly, the Pentagon has responded by sending thousands of additional
troops and equipment to bolster Saudi defenses - the latest U.S.
deployment to the region this year.
The Pentagon declined to comment about the cyber strike.
"As a matter of policy and for operational security, we do not discuss
cyberspace operations, intelligence, or planning," said Pentagon
spokeswoman Elissa Smith.
GULF TENSIONS RISE SHARPLY
The impact of the attack, if any, could take months to determine, but
cyber strikes are seen as a less-provocative option below the threshold
of war.
"You can do damage without killing people or blowing things up; it adds
an option to the toolkit that we didn't have before and our willingness
to use it is important," said James Lewis, a cyber expert with the
Washington-based Center for Strategic and International Studies.
[to top of second column]
|
Workers are seen at the damaged site of Saudi Aramco oil facility in
Abqaiq, Saudi Arabia, September 20, 2019. REUTERS/Hamad l
Mohammed/File Photo
Lewis added that it may not be possible to deter Iranian behavior
with even conventional military strikes.
Tensions in the Gulf have escalated sharply since May 2018, when
Trump withdrew from the 2015 Joint Comprehensive Plan of Action with
Tehran that put limits on its nuclear program in exchange for the
easing of sanctions.
It was unclear whether there have been other U.S. cyber attacks
since the one in late September.
Iran has used such tactics against the United States. This month, a
hacking group that appears linked to the Iranian government tried to
infiltrate email accounts related Trump's re-election campaign.
Over 30 days in August and September, the group, which Microsoft
dubbed "Phosphorous," made more than 2,700 attempts to identify
consumer accounts, then attacked 241 of them.
Tehran is also thought to be a major player in spreading
disinformation.
Last year a Reuters investigation found more than 70 websites that
push Iranian propaganda to 15 countries, in an operation that
cybersecurity experts, social media firms and journalists are only
starting to uncover.
Tensions with Iran have been high since the Sept. 14 attack. Tehran
has said an Iranian tanker was hit by rockets in the Red Sea last
week and warned that there would be consequences.
On Monday, President Hassan Rouhani reiterated his country's policy
toward the Trump administration, ruling out bilateral talks unless
Washington returns to the landmark nuclear deal and lifts crippling
U.S. economic sanctions.
(Reporting by Idrees Ali and Phil Stewart in Washington; Additional
reporting by Parisa Hafezi in Dubai and Jack Stubbs in London
Editing by Gerry Doyle, William Maclean)
[© 2019 Thomson Reuters. All rights
reserved.]
Copyright 2019 Reuters. All rights reserved. This material may not be published,
broadcast, rewritten or redistributed.
Thompson Reuters is solely responsible for this content.
|