Is The US Planning A Cyber Attack On Iran?

The Pentagon have presented a military plan to the president’s top national security aides that calls for up to 120,000 troops deploying to the Middle East and a potential crippling cyber-attack on Iran’s infrastructure should Iran speed up its nuclear program or attack US forces.

Details of the briefing were first reported by the New York Times, which cited more than half a dozen American national security officials, granted anonymity, who have been briefed on the updated plans.

President Donald Trump brushed aside the Times reporting in comments to the press.

“I think it’s fake news. OK? Now would I do that? Absolutely. But we have not planned for that. Hopefully, we’re not gonna have to plan for that, and if we did that, we’d send a hell of a lot more troops than that,” Trump said.

The updated plan comes as Iranian President Hassan Rouhani has given the remaining signatories to the 2015 nuclear deal 60 days to come up with a plan to buffer his country from sanctions imposed by Trump when he pulled out of the deal last year.

Now the Pentagon said it would deploy a Patriot missile battery to the Middle East to defend against Iranian threats. Officials also announced an amphibious ship would be sent to the region, adding better launch capabilities for Marines. The move comes after four Patriot batteries were removed from the region last fall.

Those shifts in resources came after intelligence reports suggesting that Iranian military leaders are calling US assets in the region a target, according to Reuters, citing a report in the Iranian Students’ News Agency (INSA).

“An aircraft carrier that has at least 40 to 50 planes on it and 6,000 forces gathered within it was a serious threat for us in the past but now it is a target and the threats have switched to opportunities,” said Amirali Hajizadeh, head of the Guards’ aerospace division.

“If the Americans make a move, we will hit them in the head,” he added, according to ISNA.

Also, four oil tankers off of the coast of the United Arab Emirates were recentky damaged in potential sabotage or attacks. The incident remains under investigation. The Iranian government has called it a, “regretful incident.”

“It’s going to be a bad problem for Iran if something happens,” Trump told in response to questions about the tankers.

The new intelligence report looks at Iran preparing its proxy forces. But officials told the Times that the most likely scenario that ends up in conflict would be after act or attack by the Iranian Revolutionary Guard Corps’ (IRCG).

The IRGC has a history of sending small, fast moving boats at US Navy ships in the Gulf, attempting to provoke a military response. It’s unclear if Trump himself has received the military plan briefing, based on the Times report. But a recent statement does not remove a military response.

“The president has been clear, the United States does not seek military conflict with Iran, and he is open to talks with Iranian leadership,” Garrett Marquis, a National Security Council spokesman, wrote in an email to the Times. “However, Iran’s default option for 40 years has been violence, and we are ready to defend US personnel and interests in the region.”

At the same time, European allies have reportedly been talking with Secretary of State Mike Pompeo in efforts to deescalate any tensions and avoid any inadvertent overstepping on either side that could lead to conflict.

“We are very worried about the risk of a conflict happening by accident, with an escalation that is unintended really on either side,” said Jeremy Hunt, the British foreign secretary told reporters in Brussels, Belgium.

The updated military plans do not call for an Iraq War-style land invasion but instead focus on air strikes and a potential cyber-attack, which in previous plans had been called “Nitro Zeus” and would have attempted to disable major Iranian cities, military facilities and the power grid. That plan dates to at least 2010 or earlier, experts have said.

The cyber-attack plan was previously considered as a way to hit Iran in the first hours of a conflict, reducing the need for much of the conventional attacks such as bombings and missile strikes, abut, experts have noted that Iran’s cyber capabilities have increased, pointing to attacks on financial markets in 2012, military targets and a Las Vegas casino.

Military Times:

You Might Also Read:

Iranian Cyber-Espionage Exposed:

Cyberwar Vs. Traditional Conflict:

 

 

« Cyber Command Knows Its Tools Can Also Be Used By Their Targets
Big-Data Analytics Risks Becoming Jammed »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

CCL Solutions Group

CCL Solutions Group

CCL is one of Europe’s leading digital investigation specialists, supporting law enforcement, government and organisations across both public and private sectors.

CYBER 1

CYBER 1

CYBER 1 provides cyber security solutions to customers wanting to be resilient against new and existing threats.

NEC

NEC

NEC offers a complete array of solutions to governments and enterprises to protect themselves from the threats of digital disruption.

The Data Privacy Group

The Data Privacy Group

The Data Privacy Group provide expert professional services underpinned by world leading automation tools and a consulting team specialized in privacy and data protection.

Shield-IOT

Shield-IOT

Shield-IoT provides real-time analytics and cyber security solutions for deployment in mass scale B2B and IIoT networks.

Trustelem

Trustelem

Trustelem offers European and global companies a ready-to-use access management service that respects the principles of sovereignty, territoriality and privacy.

Whistic

Whistic

Whistic is a cloud-based platform that uses a unique approach to address the challenges of third-party risk management.

Logit.io

Logit.io

Logit.io is a log analysis & management platform that provides a scalable solution for hosting the open-source tools Elasticsearch, Logstash, and Kibana.

Cyber Defense Technologies (CDT)

Cyber Defense Technologies (CDT)

Cyber Defense Technologies provides services and turn-key solutions to secure and maintain the integrity of your organization’s systems and data against attacks.

Birch Cline Cybersecurity

Birch Cline Cybersecurity

Birch Cline specializes in helping Local Government and Education agencies, as well as mid-market organizations, build and maintain successful cybersecurity programs.

Verichains

Verichains

Verichains Lab is a pioneer and leading APAC blockchain security firm with extensive expertise in the areas of security, cryptography and core blockchain technology.

SGTech

SGTech

SGTech is the leading trade association for Singapore's tech industry, offering focused support and development to both strategic and emerging sectors in the industry.

Battery Ventures

Battery Ventures

Battery partners with talented founders and teams building category-defining businesses at all stages of growth.

Relatech

Relatech

Relatech is a Digital Enabler Solution Knowledge (D.E.S.K.) Company that offers digital services and solutions dedicated to the digital transformation of businesses.

Trovent Security

Trovent Security

Trovent was founded with a clear goal: to support medium-sized companies in significantly increasing their IT security level.

DataPatrol

DataPatrol

DataPatrol is a software company, specialized in providing Security and Privacy of company’s data and information in an evolved way.