Is The US Planning A Cyber Attack On Iran?

The Pentagon have presented a military plan to the president’s top national security aides that calls for up to 120,000 troops deploying to the Middle East and a potential crippling cyber-attack on Iran’s infrastructure should Iran speed up its nuclear program or attack US forces.

Details of the briefing were first reported by the New York Times, which cited more than half a dozen American national security officials, granted anonymity, who have been briefed on the updated plans.

President Donald Trump brushed aside the Times reporting in comments to the press.

“I think it’s fake news. OK? Now would I do that? Absolutely. But we have not planned for that. Hopefully, we’re not gonna have to plan for that, and if we did that, we’d send a hell of a lot more troops than that,” Trump said.

The updated plan comes as Iranian President Hassan Rouhani has given the remaining signatories to the 2015 nuclear deal 60 days to come up with a plan to buffer his country from sanctions imposed by Trump when he pulled out of the deal last year.

Now the Pentagon said it would deploy a Patriot missile battery to the Middle East to defend against Iranian threats. Officials also announced an amphibious ship would be sent to the region, adding better launch capabilities for Marines. The move comes after four Patriot batteries were removed from the region last fall.

Those shifts in resources came after intelligence reports suggesting that Iranian military leaders are calling US assets in the region a target, according to Reuters, citing a report in the Iranian Students’ News Agency (INSA).

“An aircraft carrier that has at least 40 to 50 planes on it and 6,000 forces gathered within it was a serious threat for us in the past but now it is a target and the threats have switched to opportunities,” said Amirali Hajizadeh, head of the Guards’ aerospace division.

“If the Americans make a move, we will hit them in the head,” he added, according to ISNA.

Also, four oil tankers off of the coast of the United Arab Emirates were recentky damaged in potential sabotage or attacks. The incident remains under investigation. The Iranian government has called it a, “regretful incident.”

“It’s going to be a bad problem for Iran if something happens,” Trump told in response to questions about the tankers.

The new intelligence report looks at Iran preparing its proxy forces. But officials told the Times that the most likely scenario that ends up in conflict would be after act or attack by the Iranian Revolutionary Guard Corps’ (IRCG).

The IRGC has a history of sending small, fast moving boats at US Navy ships in the Gulf, attempting to provoke a military response. It’s unclear if Trump himself has received the military plan briefing, based on the Times report. But a recent statement does not remove a military response.

“The president has been clear, the United States does not seek military conflict with Iran, and he is open to talks with Iranian leadership,” Garrett Marquis, a National Security Council spokesman, wrote in an email to the Times. “However, Iran’s default option for 40 years has been violence, and we are ready to defend US personnel and interests in the region.”

At the same time, European allies have reportedly been talking with Secretary of State Mike Pompeo in efforts to deescalate any tensions and avoid any inadvertent overstepping on either side that could lead to conflict.

“We are very worried about the risk of a conflict happening by accident, with an escalation that is unintended really on either side,” said Jeremy Hunt, the British foreign secretary told reporters in Brussels, Belgium.

The updated military plans do not call for an Iraq War-style land invasion but instead focus on air strikes and a potential cyber-attack, which in previous plans had been called “Nitro Zeus” and would have attempted to disable major Iranian cities, military facilities and the power grid. That plan dates to at least 2010 or earlier, experts have said.

The cyber-attack plan was previously considered as a way to hit Iran in the first hours of a conflict, reducing the need for much of the conventional attacks such as bombings and missile strikes, abut, experts have noted that Iran’s cyber capabilities have increased, pointing to attacks on financial markets in 2012, military targets and a Las Vegas casino.

Military Times:

You Might Also Read:

Iranian Cyber-Espionage Exposed:

Cyberwar Vs. Traditional Conflict:

 

 

« Cyber Command Knows Its Tools Can Also Be Used By Their Targets
Big-Data Analytics Risks Becoming Jammed »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Synovum

Synovum

Synovum was formed with the intention to provide high quality advice, consultancy, training and project management services to clients in all sectors of industry.

WatchGuard

WatchGuard

WatchGuard is a leader in network security, secure Wi-Fi, and network intelligence products and services for SMBs and Enterprises worldwide.

CERT-EU

CERT-EU

CERT-EU is a permanent Computer Emergency Response Team for the EU institutions, agencies and bodies.

Planit Testing

Planit Testing

Planit is a leader in Quality Assurance and a specialist in software testing and training services.

BlueID

BlueID

BlueID is an IDaaS technology product which enables your objects to securely connect and interact with your users’ smart phones and smart watches.

Secure-IC

Secure-IC

Secure-IC provide end-to-end, best-of-breed security expertise, solutions, and hardware & software technologies, for embedded systems and connected objects.

SECFORCE

SECFORCE

SECFORCE is a leading information security consultancy specialising in bespoke penetration testing and red team engagements.

BridgingMinds Network

BridgingMinds Network

BridgingMinds Network is an industry leading best practices and IT security training provider in Singapore.

Kordia

Kordia

Kordia is a leading provider of mission-critical technology solutions throughout Australasia. We have the most comprehensive cyber security offering in New Zealand.

Nitrokey

Nitrokey

Nitrokey is the world-leading company in open source security hardware. Nitrokey develops IT security hardware for data encryption, key management and user authentication.

Nextgen Group

Nextgen Group

Nextgen Group is a pioneering technology services group with innovative and unique services across enterprise software, cloud, data management, and cybersecurity solutions.

Gravitee

Gravitee

Gravitee helps organizations manage and secure their entire API lifecycle with solutions for API design, management, security, productization, real-time observability, and more.

Nortal

Nortal

Nortal is a strategic digital transformation partner for leading companies and governments around the world.

Cool Waters Cyber

Cool Waters Cyber

Cool Waters Cyber manage cyber security governance, risk and compliance.

RIoT Secure

RIoT Secure

RIoT Secure AB is a technology enabler within the IoT industry - created with a vision to ensure security technology exists in the foundations of software development for IoT solutions.

CyberAI Group

CyberAI Group

CyberAI's mission is to pioneer the evolution of the cybersecurity landscape globally, by strategically acquiring and elevating IT consulting firms into leaders of cybersecurity innovation.