The Rest Is Classified - 69. Israel Attacks Iran: Mossad’s First Assault (Ep 2)
Episode Date: July 29, 2025How did Israel and the US develop this new type of weapon which they would unleash upon Iran? Who will they rely on to get it into the system? And how will they try to sabotage Iran in silence? Lis...ten as David McCloskey and Gordon Corera discuss Israel’s development of a cyber weapon that could damage the Iranian nuclear program without anyone even knowing it was there. ------------------- To sign up to The Declassified Club, go to www.therestisclassified.com. To sign up to the free newsletter, go to: https://mailchi.mp/goalhanger.com/tric-free-newsletter-sign-up ------------------- Get our exclusive NordVPN deal here ➼ nordvpn.com/restisclassified It's risk-free with Nord's 30 day money back guarantee ------------------- Order a signed edition of Gordon's latest book, The Spy in the Archive, via this link. Order a signed edition of David's latest book, The Seventh Floor, via this link. ------------------- Email: classified@goalhanger.com Twitter: @triclassified Assistant Producer: Becki Hills Producer: Callum Hill Senior Producer: Dom Johnson Exec Producer: Tony Pastor Learn more about your ad choices. Visit podcastchoices.com/adchoices
Transcript
Discussion (0)
For exclusive interviews, bonus episodes, ad-free listening, early access to series,
first look at live show tickets, a weekly newsletter, and discounted books, join the
Declassified Club at therestisclassified.com. The code that struck Natanz was a work of engineering bravado every inch as much as
the centrifuges it was designed to destroy.
The first thing the Iranian engineers heard was a screeching sound.
That's the machine skidding around inside its case as it loses control.
By this point, if your control panel has not warned you of a problem, it's
already too late. You'll hear one machine taking out the next and the next like dominoes.
There was no explosion, just a clatter as the delicate, precious machines destroyed
each other. The Iranians had already been seeing smaller problems. Machines were failing,
parts breaking down. It was not always clear why. Was it poor engineering standards, bad parts or designs?
No sooner would one problem be fixed
than more centrifuges would go awry,
forcing them to be stopped and checked.
What they did not know was that a hidden hand
was remotely manipulating the controls
to take advantage of the delicate nature of the devices.
Welcome to The Rest Is Classified.
I'm David McCloskey.
And I'm Gordon Carrera.
And that, dear listeners, you will of course recognize as Carreran prose.
That is Gordon Carrera writing in his book, Intercept, the Secret History of computers and spies about a terrible set of accidents at the Natanz enrichment facility in Iran.
Gordon, you're of course going to have to set this up, but we are getting in that rich paragraph, a sense of the impact of this really history altering cyber weapon that is developed as part of Operation Olympic Games.
Last time we looked at the Iranian nuclear program, particularly the site in the tents
filling up with centrifuges to enrich uranium obtained from Pakistan's nuclear salesman
AQ Khan and this dilemma for Western governments, you know what to do about it, whether to let
Iran go nuclear or launch a military attack.
President Bush wanting that third option.
And that's what we're going to be looking at this time, this third option, which is
going to be a cyber attack.
I guess it's the origin story of what we think of as cyber warfare and cyber attacks.
And as you described there, Gordon, and that prose, this is so, I guess, history altering
because it is a cyber attack that bleeds into the physical world.
It is not merely dealing with zeros and ones on a screen.
It is physically leaping and affecting machines in the real world.
And that I think is why this covert action program to develop it can be compared to the
Manhattan Project, because it is that impactful on the internet. Yeah, and that I think is why this covert action program to develop it
Can be compared to demand project because it is that impactful on the world today But of course cyber network computers been around for a little while prior to yeah early 2000s
The vulnerabilities are sort of known prior to the time
Yeah
I mean people have actually been thinking about the fact that computers could be remotely accessed and that you know, the code stolen or, or even altered as far back as the 60s.
In the 80s, you see the first signs of what is basically cyber espionage and people stealing data
and actually, it's American computers, which are the first to be on the internet. So you start to
see East German Russian hackers trying to get into those in the 80s and
the 90s. And then you see American and British hackers, I'm
led to believe, getting into foreign allegedly, allegedly
into foreign scientific programs in the 90s, when they go online,
and you can kind of access them over this thing called the
internet. But all of this, you're right, is espionage.
Yeah, there's information
that is on these networks that previously might have been kept in safes right or somewhere
physical that's now online or on these computer networks that spy agencies criminals whoever
might want to access yeah and that is different from if you like in the hollywood version
cyber war or sabotage
or whatever you want to call it, which is having a physical destructive effect through
online means.
People start to think this might be possible around the 2000s.
And one of the first events is actually in Australia in 2000, when raw sewage starts
to pour out from a treatment works in Queensland, and they can't work out wine, it turns out that the disgruntled worker who's just been sacked, and who knew how the systems work wasden of cyber sabotage, but just in a sewage treatment
works rather than the NSA in the 2000, the insider does damage.
It's the same impulse.
It's the exact same impulse.
Yeah.
Let's not go back into snow.
I would love to Gordon, but yeah, you're right.
Let's move on.
You get after nine 11, there's lots of kind of loose talk about, you know,
is Al Qaeda and the terrorists going to do cyber attacks.
The crucial thing I think to say is it's really hard to do. It is not like the movies, you know, is Al Qaeda the terrorists going to do cyber attacks? The crucial thing I think to say is it's really hard to do.
It is not like the movies, you know, the Australian engineer with those sewage
treatment works was only basically able to do it because he'd worked in the
sewage treatment works, he knew the systems intimately, he understood them.
And then he is, I think, physically sat in a car outside accessing it through
a radio the idea that you could use a cyber attack to take down something much more advanced
something which you haven't got direct knowledge or access to and is well protected say like
an Iranian nuclear program now that seems beyond capabilities, but you know, that is what, as we heard last
time, President Bush has said he wants that third option.
And this is a third option, because I guess the key thing about it is it could
buy you time, it's sabotage rather than warfare.
It's maybe now even hard, you know, 20 years later to understand how revolutionary
this idea would have been, or frankly, just the capability, right?
We're not talking about making it harder to
use the computers at Natanz.
The equivalent in industrial terms of like
taking a website down, right.
Or something like that, where you're dealing
with a software problem that you can then fix.
And it's presumably cleaner to fix, right.
What we're talking about here is actually
getting into the physical infrastructure of the plant. And we talked in the last episode
about the centrifuges that the Iranians had acquired through bomb salesman AQ Khan. And
I would wager Gordon, it's sort of an expensive lot of equipment and highly technically complex.
And so if Western intelligence services were able to wreck some of that machinery,
you would potentially set the nuclear program back very significantly.
And I think the interesting thing about it is they're not necessarily trying to destroy the program.
They're trying to disrupt it. They're trying to do it covertly to sabotage to undermine
it and basically to buy time.
I mean, that's what I think is quite interesting about this operation is that it's not a kind
of one shot where you're suddenly going to kind of blow the whole place up.
That's just not possible.
But the idea is to do something more covert without anyone knowing without even the Iranians
knowing they'd been attacked, let alone by whom. So
it's very different from a bomb being dropped, or a kind of
special forces raid into the side. The good news is no risk
need to risk pilots or ground troops to do something like
this. And if you can do it, through cyber means there is this
tantalising possibility that you can delay and set back
this program without the Iranians understanding why and I think that also makes it a very
tempting option.
You can imagine if you're President Bush at this time and someone says we can buy you
time and slow down this program that is tempting particularly of course when you've got the
Israelis on your back who are saying we want to course, when you've got the Israelis on your back,
who are saying, we want to bomb this or you've got Netanyahu going, we want to attack this.
We kind of set up some of this era when we did the episodes on Moslem Fakrizadeh.
We talked about Mer de Gaon, who was the head of the Mossad at this period of time.
And it's probably worth situating him a little bit in this story, because it does seem like the whole point from Mardigan's perspective was to avoid an open war
with Iran. And so you want to slow the program down enough to create more options for you in
the future. In this period, I mean, the cyber component of Olympic Games, right, is a piece of it.
But the Israelis are doing a whole bunch of other stuff, too.
And this is the era where they start assassinating nuclear scientists, right?
And they start killing the people who are working with Mosin Fakriz today.
And the kind of widespread nature of this shadow conflict, I think, is in part driven
by the fact that the Iranians have quite ingeniously set up a target, a nuclear program that is dispersed across
many different facilities, some of which are very, very hard to access physically.
And importantly, and this is what distinguishes it from,
you know, the Syrian attempt to get the bomb or the Iraqi attempt to get the bomb is
it's kind of homegrown. They get a lot of this stuff initially from AQ Khan, but
the knowledge of how to do this stuff is in the
heads of Iranian scientists, right. And so the Israelis are
trying to, to kill them to slow the program down by making it
harder for people to do the work.
And I also find it interesting, because even within Israel,
Medigand is the head of Masada at this time, he is actually
invariant, he's not pursuing the same policy, if you like, but his prime minister wants, which is Benjamin Netanyahu
wants to attack the programme with a military strike, and
Medigarn is not up for that. And he will talk about it after
he's basically ejected from office later. And so he is
actually trying to stop his own prime minister, it feels like
doing something which he thinks is dangerous, which is launching a military strike. So he's
invested in this idea, you know, Mossad that they could do a
covert action to slow it down. So he's also a bit like the
American side, trying to kind of buy time. And if you like
divert the pressure from going for a full military strike, and
I find that kind of interesting as well, because you do get a sense of the tension
between, and you often hear about it between Netanyahu, and
some of his own national security officials, because a
lot of them at various times think this guy's going too far,
he's too hawkish on some of these issues. And I think that
was the case here. And so what Medigan is doing by pursuing,
you know, Olympic Games, and by even the assassinations is actually trying
to buy time and avoid, you know, the military option.
And we should say that the US was not involved, at least as far
as I can tell, US is not involved in the assassinations.
Now, there are pieces of this where Mossad and the agency or
Mossad and Western intelligence are joined at the hip and then
other places where they're not right and where Mossad is pursuing its own Mossad and Western intelligence are joined at the hip and then other places where they're not, right?
And where Mossad is pursuing its own operations, its own sense of Israeli security interests.
But there's an incredible overlap, I think, of interest, obviously, in stopping an Iranian
bomb, but in, frankly, what is deemed as justifiable or worthy of the risk when it comes to sabotaging the physical
components of the nuclear program because the US at this point Gordon I
think has already tried to sabotage some of the program by kind of getting into
the supply chain. It's like they put some bad components and some kind of sabotage
components into that supply chain. Allegedly., yeah, allegedly, including some power supplies
shipped from Turkey, which explode, but I think the
Iranians then work out a problem. It's kind of pretty obvious
when a power supply explodes, and you look where it came from,
and then you kind of get it from somewhere else, or you find a
different way of doing it. So I think they're working out that
that's kind of traditional covert action or sabotage has
its limits when Iran is protecting and kind of trying to build its nuclear program very much under its own
auspices rather than bringing in material elsewhere. And so you
know, this option of the cyber attack becomes suddenly possible
and quite tempting for both the US and some of those in Israel, I
think, but it is ambitious, you know, it's something that has
never been done before. And you've got to work out how you're going to translate something which is on computer code that you're developing into a physical destructive act within this very closed and secretive nuclear program.
Well, and this gets back or I mean, in the last episode, you gave us a wonderful tutorial on thank you on centrifuges. And I guess we're back to the centrifuge, the large
rows of hot water heaters that are sitting in the basement at Natanz. These are the targets,
right? Of the cyber weapon that is going to be developed.
And the key reason is they are obviously the thing which is enriching uranium. And crucially,
they are these incredibly complex bits of engineering, The rotors inside them, you know, to separate the uranium-235 from 238, it spins so fast,
it's faster than the speed of sound, supersonic, faster than the fastest fighter jet.
That's the speed at which that rotor is moving.
You know, it needs to be made out of a special metal to be able to withstand the kind of
stress.
It needs to be perfectly balanced
this rotor on a kind of ball bearing.
It's incredibly delicate and fragile.
The Iranians would find if you don't wear gloves when you assemble them
and you get some dust on these rotors, they're spinning so fast.
Just that dust will cause an imbalance on the rotors and it will spin off and
then smash into the kind of casing in which it is.
So you have to maintain the speed of that rotor perfectly as well.
You basically can't switch them off very easily and it mustn't vibrate.
It mustn't get any kind of dirt inside it.
The slightest imbalance in this system and it can spin out of control.
And then what happens is it crashes into the casing.
And then because they're in a cascade,
all these centrifuges together,
one will potentially crash into the others like dominoes,
and you can take down a whole cascade of centrifuges.
So they are incredibly vulnerable bits of engineering.
So if you start from the idea that you want to wreak havoc
on the centrifuge cascade at Natanz.
And you want the Iranians to be confused about what's happened.
You don't want something to go boom.
And then they go back on the supply chain and say, oops, we're not buying
from the supplier anymore.
You want there to be this perpetual sort of confusion about what's happening.
I mean, it seems like first off, you need a pretty detailed understanding
of the facility at
Natanz and exactly how how it's laid out. And exactly what type
of machinery and software it's using to run the place, right? I
mean, yeah, you need a lot of information to even get started.
And all the signs are that pre the deployment of the code that's
going to cause the damage, there are a couple of stages of more
traditional espionage and there's a couple of very advanced espionage tools called I think flame and
dooku which are the kind of you know the hacker names for these packages which get inside the
system and they are basically there to just collect the data about what the system is and
how it's working. We don't entirely know
which countries were involved in that. I think US, Israel looks like definitely some signs,
maybe some other countries as well. One of the interesting questions about that,
who knows if the Brits might have had some involvement at that stage in some suggestions
of it. Of course, they wouldn't confirm it, but this is still espionage, you see, and you could
imagine everyone saying, well, we need to understand this espionage. But then the next bit, which I think is really interesting.
So even if you know what the centrifuges are, and how the system is configured, you need
to be sure how to have an effect on them, what code would allow you to have a physical
impact on them.
And this is where we get back to not sure he is a friend of the show, because I think
in terms of hero villain, I think you can is that we can play that game with'm not sure he is a friend of the show. Cause I think in terms of hero or villain, I think AQ Khan is, I don't think we can play
that game with him.
I think he's in the villain category.
Sorry, Pakistani Patriots who love him as father of their bomb.
You raise a good point, Gordon, which I'm sure will be an ongoing conversation, which
is if you are a villainous character, can you actually be a friend of the pod?
Or is it just, you've got to be a kind of a straight shooter?
I don't know.
I think we need to, we need to think about that. You have to give me an example, but I think AQ Khan, I mean- I don't think he, yeah, we should, as we say it straight shooter. I don't know. I think we need to we need to think about that. You have to give me an example.
But I think if you can't I mean, I don't think yeah, we should as we say it out loud.
I don't think he can be a friend of the pod.
No, no. Last time we explained how he had sold some of the equipment,
some of the designs for centrifuges to the Iranians, and they're going to basically copy those,
they are going to use those designs. And the crucial thing is, in 2003, the AQ
Khan network gets taken down. Again, we'll do that another time amazing story involves
the interception of some components, which the Khan network was selling to Libya, the
US will get Pakistan to put a Yukon at the house arrest, Libya will give up its program.
Now, the interesting bit is that means the US will get hold
of a whole load of the centrifuges, what were the P1 and P2 centrifuges, but which are identical
to the IR1 Iranian one and two centrifuges that Iran is developing. And these centrifuges are
going to be shipped back to the National Security Complex at Oak Ridge Lab in Tennessee, which is one of those US national security labs, isn't it?
That's right. And it is essentially the centerpiece of the US nuclear stockpile,
right? And a tremendous amount of the research on the maintenance of that stockpile,
the procurement of it. I think the kind of locus point for that is Oak Ridge, Tennessee.
So it's a natural place. If you were an officer of a Western intelligence service who was really
interested in sabotaging the Iranian nuclear program to kind of go down there and have a look,
have a look at these centrifuges and understand how they work.
And how you might be able to play with them.
Right. Yeah. I'm just going to play around with them for a little while. Yeah. What's amazing is that Khan has supplied the
centrifuges to Iran. And then by his network being broken down, there's an opportunity because
the US can build its own replica of the kind of enrichment cascades that are being used in the
tanks with the same controllers, the same hardware around these centrifuges and work out how to sabotage them effectively.
And they can work out what will lead them to crash.
And supposedly they had a cage where they could watch them and toy with the controls and work out what would make them crash and break, making this awful screeching sound.
And the Israelis are also doing something very similar, it seems, making a scale model
of the Natanz enrichment facility set up at Demona, which is their nuclear power facility
out in the desert.
And they are building their own also replica of Natanz.
You've got both sides trying to understand
what is going on in this kind of cavernous site at Natanz and how the centrifuges specifically
work and what you could do to them.
Spy agencies love a good scale model. It reminds me of the replica built of the bin Laden compound
right at Avada Bada that the seals train.
Do they have like modelers?
No, they do.
Yeah, they recruit people like because you know, you get people who love I
met someone the other day loves scale models. They were showing
me pictures of scale model village and something like that.
And then do you think you know, you get recruited and someone
says you're really good scale model village builder, do you
want to come here and build models of nuclear compounds and
terrorist compounds for the CIA or Mossad? I guess they do the
ones that I met, worked at the National Geospatial
Okay, intelligence agency NGA, there'd be a natural connection between the
imagery and the model and the modeling. So they had a team of modelers there who
would who that was their job. That's a great job. That's like the best job.
Yeah, I'm not even into it. And I want that job. But they I would be discovered
on day one as an incompetent, incompetent modeler.
Well, so Gordon may be there with scale models all over the place of Natanz and
alleged Western intelligence services, practicing destroying centrifuges.
Let's take a break and we come back.
We will see how they code this destructive cyber attack that's going to change the history
of the Middle East.
See you after the break.
I'm David Ullishogger.
And I'm Sarah Churchwell.
Together we're the hosts of Journey Through Time, where we explore the darkest depths
of history through the eyes of the people who live through it.
Today we're going to tell you about our new series on the Great Fire of London,
one of the great pivotal events of the 17th century,
one of the most important events
in all of English and British history.
It began at a bakery on Pudding Lane
and quickly turned into a catastrophe.
It consumed 13,000 houses, it decimated London,
and caused 10 billion pounds worth of damage
in today's money.
It even burned down the iconic St. Paul's Cathedral.
The city was already devastated by the Great Plague, but rumors of foreign invasion led
mobs to attack innocent foreigners on the streets. In this episode, we'll explore the chilling
consequences of rumors of fake news of xenophobia, problems that clearly are not unique to today.
From desperate attempts to save their homes and belongings to the struggle to assign blame
which turned deadly.
This is the story of the fire as it was lived through by the people on the ground and the
lasting impacts it left on the city.
We've got a short clip at the end of this episode.
Welcome back, Gordon. We've talked about the centrifuges and the physical destruction,
but you have to, I guess, design a code, right, that will actually have an impact on those
centrifuges. And so there's a software coding component to this that is really really critical.
And it's thought to be done by the US and Israel primarily those allegedly to allegedly.
We should say again this is all in the public domain here right but nobody's taking ownership of of Olympic games.
But they're writing this code which is going to be covert and it's got to be really precise.
And it's interesting because believe it or not,
we're not going to get deep into the specific types of code
that we're going to use.
I could, but I just thought, you know, too shy.
To show off my knowledge of coding.
Last time I coded was I think in the 1980s
using basic computer language.
If you remember, you're too young David
to know what basic was on a Commodore VIC-20
computer, you probably don't know what that is.
I am too young to know what that is.
That's my coding knowledge. I do understand a little bit, but
not that much.
You were not recruited to help Western intelligence in its
efforts to sabotage the Iranian nuclear program.
No, me playing jetpack on my computer did not qualify me to
be a top cyber hacker. But by 2007, they've got
some code ready. And it's worth saying, there's actually not going to be just one cyber attack.
And that's actually going to be important for our story. There's going to be multiple
and they're going to be varied and covert to so confusion. And the code is kind of stealthy
designed to work over an extended period without being spotted rather than being a single strike,
which takes it down. And the way to think of it is as
two things a delivery system, which is if you like the missile
which is going to get you into the target and then the payload,
the warhead which is actually going to do the damage and the
aim of the you know, the Olympic Games code is to be very, very
targeted in its delivery system. Because they create code which is looking for
something called a programmable logic controller, a PLC. And the PLC is used to control industrial
facilities. So it's a small computer, which you have at things like sewage plants, gas pipelines,
train signaling, anything industrial in a factory, you know, air conditioning, even in a building,
they're not built with huge amounts of security in mind, they just control a physical process. So they're the
controlling system. And the coders are going to design something which is looking for a very
specific one of these PLCs built by the German company Siemens, a specific PLC, and one that's
operating in a very specific setup. So you're not just after a specific PLC and one that's operating in a very specific setup.
So you're not just after a specific PLC, but in a particular configuration, which is effectively
unique because going back to the espionage bit they've already done, they've worked
out the exact controllers, the exact configurations, what everything's connected to it in a tanz
and they are targeting it for that. None of this, the covert nature of it, the precision would have been possible
without what was probably an extended phase of reconnaissance, right?
Digital reconnaissance to map out exactly the structure, the architecture of all of the
systems running at Natanz, right?
I mean, you couldn't develop either the, you know, to use the weapon term in the architecture of all of the systems running at Natanz, right?
I mean, you couldn't develop either the, you know, to use the weapon terminology,
the missile or the payload without the really detailed map of the facility.
But you've got a problem when it comes to the delivery, because these industrial
control systems are not connected to the regular internet, you know, companies
have corporate networks, which are connected to the internet, and can be accessed from anywhere and then hacked,
but these industrial systems are not. And then Iran has also taken extra steps, unsurprisingly,
given it's a nuclear program, to air gap them so that there are no direct connection points
to the regular internet. So the question is, how do you get the code?
Do you get that code in there?
Right.
Sounds like you need a human to me.
It sounds like you might need a human.
You hear a lot of people saying, oh, you know, don't need those human spies anymore.
You know, don't need humans in the world of cyber espionage.
Yeah.
You can steal all the secrets online.
And I do remember, you know, in the early 2000s, I think a lot of the kind of human humant guys, you know, the CIA and MI6 people were a little bit insecure, I think,
you know, as the arrival of cyber espionage came, because it's like, you want to get secrets
from that safe or that computer, you don't need to bribe the person running the office
anymore, or, you know, recruit an agent stealing it, you just go online.
You just need a son deprived guy eating pop tarts sitting behind a computer screen right you just need an Eddie Snowden you know to go and steal this to steal the stuff right and I think there was a bit of insecurity I mean I think there was in the early two thousands that the cyber guys were going to take over and there's no need for these.
These human operators how wrong they were still need to meet sack right Gordon.
operators. How wrong they were.
You still need a meat sack, right, Gordon?
I've never heard that phrase.
Really?
Meat space. I know meat space, cyberspace and meat. Yeah. Well, who sits in the meat space?
It's the meat sacks. It's the humans.
It's the meat sacks.
So you're going to need a meat sack because you've got to get that coding over
what's called an air gap, which means it's not connected to the systems.
So, yeah, you need a person.
So it's thought that what they do is draw up lists of companies and engineers who might have some kind of access to Natanz and to the Iranian nuclear system. Then the idea is you're going to be able to perhaps feed them a USB stick, which they are going to connect onto their laptop and
then into an Iranian air gap system and plug it in because there are a lot of systems there
which require updating.
It's a fascinating part, I think of espionage these days.
And it's something which I think people don't realize is that melding of kind of cyber and
human espionage.
Yeah.
And this is a good example of that.
It looks like.
Well, there were even reports that the Dutch were involved in this part of it.
Right.
There was a Dutch engineer, I think, who went in and out of Natanz and
who may have been involved.
Yeah.
Initially, after all of this became public, people were wondering, you know,
was it a witting or unwitting engineer?
How did it get in?
What was the method?
Then quite recently, there was this report which came out of
Dutch media that there was an individual who worked on the
water pumps in the tents who was a Dutch engineer, he had an
Iranian wife, and that he had somehow been recruited by Dutch
intelligence, the AIBD back in 2005. And that he might have been the one to introduce the virus and the code into the system on one of these visits, although I think the suggestion is he and maybe even the Dutch may have not known what the actual purpose was. You could imagine the Americans or the Israelis or someone telling the Dutch, we just need to get
this coded to the system to do some espionage. And you can
this imagine this engineer going, could you put this in,
you know, help us out.
You don't want to be the meat sack who gets sent into Natanz to
like stick a USB drive into a computer, right? That doesn't
seem like a great job to have in this whole game.
Yeah, all we'll say about this engineer is he then dies in a motorbike crash two
years later near his home in Dubai.
Now, I mean, look, that could be entirely innocent.
I'm not suggesting it's anything worse, but the guy who was involved is not
around anymore to explain what happened.
It's worth saying.
Is this the first appearance of the Dutch AIVD on the podcast?
This is another like semi obscure intelligence agency that's, that's
appeared for those keeping track.
Welcome to the program to the AIVD, the Dutch external service.
Cause we've got the bingo cards.
Haven't we have Intel services?
Yeah, exactly.
If you put the Dutch AIVD in the middle of that bingo card, you are now you're rolling.
I'm just imagining someone sitting on a train and go bingo is there you know, they're listening
to this podcast where they finally realized they filled in their filled in their card and everyone
go why are you shining bingo anyway, well done if that's you.
It's 2007 though, Gordon and the very first variant of this virus is ready to be unleashed
on the tons.
And the first attack, at least the first one we know about looks
like it targets the valves that transfer the uranium gas from one
machine to the next, including the isolation valves that protect
the centrifuges from faults and the code which has been introduced
into the system understands and finds its target. And it's really
interesting because it closes one set of valves. So the
pressure in the machine grows as the gas builds up, then it
opens another set of valves, which dumps the gas out of the
tank to waste it. Now it's really kind of interesting
because it would do this for a couple of hours and then reset
itself.
That sounds confusing. If you're the Iranians watching this,
right?
Because again, it's not like you brick to the computers and just
turn them off. It's not like you blown up the valves. It's not
like you've done something really obvious to them. You've
just changed the flow of gas for a while, causing some of it to
be wasted. And you just do this at periodic points. And I just
think it's clever, isn't it?
Because it is, it is not obvious that something is going wrong.
And we should say that the flow here was that let's say a meat sack, put a USB
drive into a computer on that closed network, right?
The virus unbeknownst to anyone on the Iranian side watching this escapes, but it's not on presumably
anything close at that point to the PLCs that run the centrifuge cascade.
So that that virus has found a way it's looking for its target.
It's looking for its target.
It then finds its way to the PLCs that control these cascades. And it is then
manipulating. Yeah, the PLC, which is kind of the interface
between the digital world and the and the physical reality of
the centrifuges, right? So it's remarkably complex. I think it's
just worth restating that because it's not like all of a
sudden someone in Tel Aviv opened up a screen, and they're
just running those
PLCs, right?
I mean, it's gone through this long process to get to its target.
The covert bit of it is what I find fascinating because there's one really kind of clever
bit of the operation, which is the code also records what the normal operation of the centrifuges
looks like for two weeks.
And then when it starts playing with the centrifuges and those
valves, it plays back to the operators, the normal flow of
data as if they're operating normally.
So we talked about the valves changing.
So the pressure is building up.
But if you're an operator, you don't see that it looks totally normal
because you're being
replayed old data of when it was running normally before the code switched it on.
The parallel is in I think it's oceans 11 isn't it where there's a bank of CCTV cameras.
You must have seen oceans 11.
Yeah, yeah, I have seen it.
I was too young Gordon, I was too young.
Where they're going to do the heist of this vault beneath the casino.
And what they've done is they've recorded the normal operation of the CCTV cameras
when nothing's happening.
Right.
And then when they're in doing the heist, they play back normal.
And so the CCTV operators think, you know, everything looks fine until suddenly
the picture shows your kind of vault empty of all the money.
I mean, it's, you know, it's that bit of it, I think, which is just frankly brilliant.
It's brilliant.
Yeah.
I mean, again, it ladders up to like, what's the goal here?
Right.
The goal is time and confusion or just not even being aware that your program is being
sabotaged while it's being sabotaged is ideal.
Right.
That is exactly what Western Intel wants out of this. It does make me think,
Gordon, have you seen the movie The Sting?
Yeah, classic.
Classic. It's Robert Redford and Paul Newman. And the premise, right, of this whole wonderful
film is how do you con somebody and then at the end, they don't even know they've been
conned, right? That's the most effective con. And it makes me think of this, which is how do you sabotage a program?
And the Iranians don't even know that anyone has sabotaged the program, right?
It's, it's an absolutely brilliant piece of trade craft here.
And you can imagine, you know, what it must be like for those Iranian engineers,
because suddenly not enough uranium is coming out.
Their centrifuges gas is getting
dumped out, but all their controls are telling them they're operating normally.
You're going to start pulling the stuff apart, you're going to kind of start wondering is
it a problem with our controls is, you know, our sensors mistaken is one of our colleagues,
you know, mucking around with this, there's no obvious reason why it's not working as
it should do.
And you could just imagine this is just going to kind of so confusion, doubt,
chaos, you've got to pull everything apart.
Probably have to pull apart every bit of sensor as well as the centrifuges
to try and understand why they're not working.
I mean, that is going to slow a program and you're not going to find anything
because, you know, you don't realize that you could be
doing this remotely through code.
It is amazing.
So they're constantly taking these centrifuges out of action.
And of course they've had problems before the P one centrifuges were a bit dodgy.
So it's plausible.
They're just badly engineered.
You know, they actually learn not to trust the instruments, the control panels, and
they ask people to go and watch the centrifuges.
It's not how you want to run an industrial facility.
We don't look at the controls because they don't tell us what's going on.
We need we need someone with eyes on, you know, go and radio back and tell us what's going on.
So in that sense, Olympic Games, it looks like it's working.
Well, and maybe they're Gordon with the virus unleashed on the tans.
We should stop and next time we will look at how really the stakes get raised in this entire program
as the Iranian nuclear program becomes more ambitious as does this covert effort to bring
it down and stop it. We should also note though Gordon, right, that you don't have to wait for
that episode. You don't have to be delayed like the Iranian nuclear program.
That's right.
Don't be the Iranian nuclear program.
Don't be an engineer wondering what's going on.
What's going to happen next?
Be ahead of the curve and join the Declassified Club at the rest is classified.com where you
get early access to all the episodes in this series and future series and crucially also
bonus episodes. And we've got a cracker coming up,
haven't we? On Friday, we got an interview we've done with none less than David Petraeus.
That's right. Wonderful conversation with Director Petraeus, who was the CIA director,
actually, when I was there, and talked with him about that, talked with him about what's going on
in the world, talked with him about the agency, really brilliant stuff, great
interview, and we'll be dropping that on Friday.
So sign up at the rest is classified.com and we'll see you next time.
See you next time.
It's David Oleshooga from Journey Through Time.
Here's that clip that we mentioned earlier.
If you look at all of the accounts of the fire at this point, as we get to the end of
Sunday the second, the first day, this fire is not behaving in any way the way fires traditionally
did in London.
And there are some people who've argued that it was becoming a firestorm, that the heat and the wind and the movement of air caused
by the fire was feeding it, was becoming self-sustaining as it were. John Evelyn, who's a great writer
and a diarist of this moment, he talks about the sound of the fire. He said it was like
thousands of chariots driving over cobblestones. There are
descriptions in peeps and elsewhere of this great arc of fire in the sky. I mean imagine that
everything around you is coloured by the flames, yellows and oranges, and above you is this thick
black smoke. This is a city you know. These are streets you walk.
This is a place that's deeply familiar to you.
And it looks completely otherworldly.
It looks like another, like a sort of landscape
you've never seen before.
People describe the fire almost as if it's supernatural.
If you wanna hear the full episode,
listen to Journey Through Time,
wherever you get your podcasts.