Full-text resources of CEJSH and other databases are now available in the new Library of Science.
Visit https://bibliotekanauki.pl

PL EN


2020 | 29 | 2 | 63-71

Article title

Operation “Olympic Games.” Cyber-sabotage as a tool of American intelligence aimed at counteracting the development of Iran’s nuclear programme

Content

Title variants

Languages of publication

EN

Abstracts

EN
The purpose of the article is to analyse Operation “Olympic Games” including, in particular, to indicate the political background to the activities aimed at preventing the development of Iran’s nuclear programme, and to examine the preparation and conduct of the operation, the involvement of the US and Israeli intelligence services, and the use of intelligence methods and sources. An equally important objective is to indicate the real consequences of the cyberattack with the Stuxnet virus. In the research process, a critical analysis of literature in the field of Intelligence Studies and source materials (including legal acts, strategies, reports, and other official studies of the entities forming the US Intelligence Community) was carried out. The example of Operation Olympics Games shows that complex cyber-sabotage operations resulting in the destruction of critical infrastructure on a large scale require the involvement of numerous state resources and advanced cyber activities, and the use of many different methods and intelligence sources. Thus, strong states with well-developed intelligence capabilities are much more capable of effectively using cyber-sabotage on a large scale.

Year

Volume

29

Issue

2

Pages

63-71

Physical description

Dates

published
2020-06-25
received
2019-12-03
revised
2020-04-30
accepted
2020-05-02

Contributors

  • Wydział Bezpieczeństwa Narodowego, Akademia Sztuki Wojennej, Poland

References

  • Albright, D., Brannan, P., Stricker, A., Walrond, C., and Wood, H. (2012) Preventing Iran from getting nuclear weapons: constraining its future nuclear options. New York: The Institute for Science and International Security.
  • Broad, W. J. and Sanger, D. E. (2008) ‘In Nuclear Net’s Undoing, a Web of Shadowy Deals’, New York Times. Available from: http://www.nytimes.com/2008/08/25/world/25nuke.html (Accessed 30 November 2019).
  • Brown, G. D. (2011) ‘Why Iran Didn’t Admit Stuxnet Was an Attack’, Joint Force Quarterly, (63)4.
  • Bush, G. W. (2002) ‘The President’s State of the Union Address’, Available at: https://georgewbush-whitehouse. archives.gov/news/releases/2002/01/20020129-11.html (Accessed: 30 November 2019).
  • Bush, G. W. (2011) Decision Points. New York: Crown Publishing Group.
  • Byres, E., Ginter, A. and Langill, J. (2001) White Paper. How Stuxnet Spreads – A Study of Infection Paths in Best Practice Systems. Tofino Security, Abterra Technologies, ScadaHacker.com.
  • Farwell, J. P., Rohozinski, R. (2012) ‘The New Reality of Cyber War’, Survival: Global Politics and Strategy, (54)4.
  • Hayden, M. V. (2016) Playing to the Edge: American Intelligence in the Age of Terror. New York: Penguin Book.
  • Huntington, S. P. (1996) Clash of civilizations and the remaking World Order. New York: Simon and Schuster.
  • Kapusňak, J. (2013) ‘Covert operations attributed to Israel’s Intelligence Services against Iran’s nuclear program’ in Majer, M., Ondrejcsák, R., Tarasovič V., and Valášek, T. (eds.) Panorama of Global Security Environment, Centre for European and North Atlantic Affairs, Bratislava: Centre for European and North Affairs.
  • Kelsey, D. (2017) UN Security Council Resolutions on Iran. Available at: https://www.armscontrol.org/factsheets/Security-Council-Resolutions-on-Iran (Accessed: 30 November 2019).
  • Kerr, P. K., Rollins, J. and Theohary, C. A. (2010) The Stuxnet Computer Worm: Harbinger of an Emerging Warfare Capability. Washington: Congressional Research Service.
  • Kissinger, H. (2017) World order. New York: Penguin Press.
  • Lindsay, J. R. (2013) ‘Stuxnet and the Limits of Cyber Warfare’, Security Studies, (22)3.
  • Milevski, L. (2011) ‘Stuxnet and Strategy: A Special Operation in Cyberspace?’, Joint Force Quarterly, (63)4.
  • National Intelligence Strategy of the United States of America (2009) Available at: http://fas.org/irp/offdocs/nis2009.pdf (Accessed: 30 November 2019).
  • Osawa, J. (2017) ‘The Escalation of State Sponsored Cyberattack and National Cyber Security Affairs: Is Strategic Cyber Deterrence the Key to Solving the Problem’, Asia-Pacific Review, (24)2.
  • Prince, B. (2010) Defense Department Confirms Critical Cyber-attack. Available at: http://www.eweek.com/security/defense-department-confirms-critical-cyber-attack (Accessed: 30 November 2019).
  • Sanger, D. E. (2009) ‘U.S. Rejected Aid for Israeli Raid on Iranian Nuclear Site’, New York Times. Available at: http://www.nytimes.com/2009/01/11/washington/11iran.html (Accessed: 30 November 2019).
  • Sanger, D. E. (2012a) Confront and Conceal. Obama’s Secret Wars and Surprising Use of American Power. New York: Random House.
  • Sanger, D. E. (2012b) ‘Obama Order Sped Up Wave of Cyberattacks Against Iran’, New York Times Available at: http://www.nytimes.com/2012/06/01/world/middleeast/obama-ordered-wave-of-cyberattacks-against-iran.html (Accessed: 30 November 2019).
  • Segal, A. (2016) The Hacked World Order: How Nations Fight, Trade, Maneuver, and Manipulate in the Digital Age. New York: PublicAffairs.
  • Smeets, M. (2017) ‘A matter of time: On the transitory nature of cyberweapons’, Journal of Strategic Studies, (41)1–2.
  • Veebel, V. and Ploom, I. (2016) ‘Estonian Perceptions of Security: Not Only About Russia and the Refugees’, Journal on Baltic Security, (2)2.
  • Weber, V. (2018) ‘Linking cyber strategy with grand strategy: the case of the United States’, Journal of Cyber Policy, (3)2.

Document Type

Publication order reference

Identifiers

YADDA identifier

bwmeta1.element.doi-10_35467_sdq_121974
JavaScript is turned off in your web browser. Turn it on to take full advantage of this site, then refresh the page.