Iran is racing forward with its nuclear-bomb making effort. The Obama administration is racing forward with its effort to get the ayatollahs to sign a piece of paper promising peace in our time. The only thing Secretary of State Kerry’s diplomacy is missing these days is the same kind of hat that Neville Chamberlain held in his hand as he met with Herr Hitler in Munich and begged him to be reasonable.
What alternatives exist for stopping Iran from obtaining a nuclear weapon? Several years ago, U.S. and Israeli intelligence attempted to derail Iranian nuclear progress by introducing the Stuxnet virus into Iran’s uranium processing facility at Natanz. If the operation’s objective was to stop Iran in its nuclear tracks, it failed. But it might have temporarily slowed the Iranians down. A fascinating new book, Countdown to Zero Day, has assembled what is known about the cyber-attack. You can read my review of it in the Wall Street Journal . G.S.
Hacking the Ayatollahs
The Stuxnet virus opened and closed valves on Iranian centrifuges and adjusted their power supply as false readings were fed to operators.
In early 2010, inspectors from the International Atomic Energy Agency noticed a problem at Iran’s nuclear facility at Natanz, Iran. The centrifuges employed to separate enriched uranium—the precursor to bomb-grade material—from uranium hexafluoride gas were breaking down at a startling rate. What the inspectors did not know was that the facility was under attack by Stuxnet, a computer virus designed by American and Israeli intelligence agencies under the code name Operation Olympic Games. “Countdown to Zero Day” by Kim Zetter, a reporter for the technology magazine Wired, gives a full account of this “hack of the century,” as the operation has been called. Exhaustively researched, the book goes well beyond its ostensible subject to offer a hair-raising introduction to the age of cyber warfare.