******************** POSTING RULES & NOTES ******************** #1 YOU MUST clip all extraneous text when replying to a message. #2 This mail-list, like most, is publicly & permanently archived. #3 Subscribe and post under an alias if #2 is a concern. *****************************************************************
Iran’s capabilities have been strongly influenced by its own experience as the target of cyber operations. In the years after Stuxnet, the U.S.-Israeli effort <https://www.washingtonpost.com/world/national-security/stuxnet-was-work-of-us-and-israeli-experts-officials-say/2012/06/01/gJQAlnEy6U_story.html> to stymie Iranian nuclear enrichment efforts, Tehran began making repeated efforts to gather information on industrial control systems in both countries. After a 2012 <http://www.nytimes.com/2012/04/24/world/middleeast/iranian-oil-sites-go-offline-amid-cyberattack.html> attack <http://www.nytimes.com/2012/04/24/world/middleeast/iranian-oil-sites-go-offline-amid-cyberattack.html> on an Iranian oil facility by malware designed to wipe computer systems of data, Iran responded by conducting precisely the same sort of attack <https://www.wired.com/2015/02/nsa-acknowledges-feared-iran-learns-us-cyberattacks/> against the back-office computer systems of oil giant Saudi Aramco <http://www.nytimes.com/2012/10/24/business/global/cyberattack-on-saudi-oil-firm-disquiets-us.html> and Qatari natural gas producer RasGas <https://www.wired.com/2012/08/hack-attack-strikes-rasgas/>, which forced the replacement of tens of thousands of computers. <http://www.darkreading.com/attacks-breaches/inside-the-aftermath-of-the-saudi-aramco-breach/d/d-id/1321676> https://foreignpolicy.com/2017/07/26/the-iranian-cyberthreat-is-real/?utm_source=Sailthru&utm_medium=email&utm_campaign=New%20Campaign&utm_term=Flashpoints _________________________________________________________ Full posting guidelines at: http://www.marxmail.org/sub.htm Set your options at: http://lists.csbs.utah.edu/options/marxism/archive%40mail-archive.com