The Rest Is Classified - 69. Israel Attacks Iran: Mossad’s First Assault (Ep 2)

Episode Date: July 29, 2025

How did Israel and the US develop this new type of weapon which they would unleash upon Iran? Who will they rely on to get it into the system? And how will they try to sabotage Iran in silence? Lis...ten as David McCloskey and Gordon Corera discuss Israel’s development of a cyber weapon that could damage the Iranian nuclear program without anyone even knowing it was there. ------------------- To sign up to The Declassified Club, go to ⁠www.therestisclassified.com⁠. To sign up to the free newsletter, go to: ⁠https://mailchi.mp/goalhanger.com/tric-free-newsletter-sign-up⁠ ------------------- Get our exclusive NordVPN deal here ➼ nordvpn.com/restisclassified It's risk-free with Nord's 30 day money back guarantee ------------------- Order a signed edition of Gordon's latest book, The Spy in the Archive, ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠via this link.⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ Order a signed edition of David's latest book, The Seventh Floor, ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠via this link.⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ ------------------- Email: classified@goalhanger.com Twitter: ⁠⁠⁠⁠⁠⁠⁠@triclassified⁠⁠⁠⁠⁠⁠⁠ Assistant Producer: Becki Hills Producer: Callum Hill Senior Producer: Dom Johnson Exec Producer: Tony Pastor Learn more about your ad choices. Visit podcastchoices.com/adchoices

Transcript
Discussion (0)
Starting point is 00:00:00 For exclusive interviews, bonus episodes, ad-free listening, early access to series, first look at live show tickets, a weekly newsletter, and discounted books, join the Declassified Club at therestisclassified.com. The code that struck Natanz was a work of engineering bravado every inch as much as the centrifuges it was designed to destroy. The first thing the Iranian engineers heard was a screeching sound. That's the machine skidding around inside its case as it loses control. By this point, if your control panel has not warned you of a problem, it's already too late. You'll hear one machine taking out the next and the next like dominoes.
Starting point is 00:00:51 There was no explosion, just a clatter as the delicate, precious machines destroyed each other. The Iranians had already been seeing smaller problems. Machines were failing, parts breaking down. It was not always clear why. Was it poor engineering standards, bad parts or designs? No sooner would one problem be fixed than more centrifuges would go awry, forcing them to be stopped and checked. What they did not know was that a hidden hand was remotely manipulating the controls
Starting point is 00:01:21 to take advantage of the delicate nature of the devices. Welcome to The Rest Is Classified. I'm David McCloskey. And I'm Gordon Carrera. And that, dear listeners, you will of course recognize as Carreran prose. That is Gordon Carrera writing in his book, Intercept, the Secret History of computers and spies about a terrible set of accidents at the Natanz enrichment facility in Iran. Gordon, you're of course going to have to set this up, but we are getting in that rich paragraph, a sense of the impact of this really history altering cyber weapon that is developed as part of Operation Olympic Games. Last time we looked at the Iranian nuclear program, particularly the site in the tents
Starting point is 00:02:12 filling up with centrifuges to enrich uranium obtained from Pakistan's nuclear salesman AQ Khan and this dilemma for Western governments, you know what to do about it, whether to let Iran go nuclear or launch a military attack. President Bush wanting that third option. And that's what we're going to be looking at this time, this third option, which is going to be a cyber attack. I guess it's the origin story of what we think of as cyber warfare and cyber attacks. And as you described there, Gordon, and that prose, this is so, I guess, history altering
Starting point is 00:02:44 because it is a cyber attack that bleeds into the physical world. It is not merely dealing with zeros and ones on a screen. It is physically leaping and affecting machines in the real world. And that I think is why this covert action program to develop it can be compared to the Manhattan Project, because it is that impactful on the internet. Yeah, and that I think is why this covert action program to develop it Can be compared to demand project because it is that impactful on the world today But of course cyber network computers been around for a little while prior to yeah early 2000s The vulnerabilities are sort of known prior to the time Yeah
Starting point is 00:03:21 I mean people have actually been thinking about the fact that computers could be remotely accessed and that you know, the code stolen or, or even altered as far back as the 60s. In the 80s, you see the first signs of what is basically cyber espionage and people stealing data and actually, it's American computers, which are the first to be on the internet. So you start to see East German Russian hackers trying to get into those in the 80s and the 90s. And then you see American and British hackers, I'm led to believe, getting into foreign allegedly, allegedly into foreign scientific programs in the 90s, when they go online, and you can kind of access them over this thing called the
Starting point is 00:04:00 internet. But all of this, you're right, is espionage. Yeah, there's information that is on these networks that previously might have been kept in safes right or somewhere physical that's now online or on these computer networks that spy agencies criminals whoever might want to access yeah and that is different from if you like in the hollywood version cyber war or sabotage or whatever you want to call it, which is having a physical destructive effect through online means.
Starting point is 00:04:33 People start to think this might be possible around the 2000s. And one of the first events is actually in Australia in 2000, when raw sewage starts to pour out from a treatment works in Queensland, and they can't work out wine, it turns out that the disgruntled worker who's just been sacked, and who knew how the systems work wasden of cyber sabotage, but just in a sewage treatment works rather than the NSA in the 2000, the insider does damage. It's the same impulse. It's the exact same impulse. Yeah. Let's not go back into snow.
Starting point is 00:05:15 I would love to Gordon, but yeah, you're right. Let's move on. You get after nine 11, there's lots of kind of loose talk about, you know, is Al Qaeda and the terrorists going to do cyber attacks. The crucial thing I think to say is it's really hard to do. It is not like the movies, you know, is Al Qaeda the terrorists going to do cyber attacks? The crucial thing I think to say is it's really hard to do. It is not like the movies, you know, the Australian engineer with those sewage treatment works was only basically able to do it because he'd worked in the sewage treatment works, he knew the systems intimately, he understood them.
Starting point is 00:05:40 And then he is, I think, physically sat in a car outside accessing it through a radio the idea that you could use a cyber attack to take down something much more advanced something which you haven't got direct knowledge or access to and is well protected say like an Iranian nuclear program now that seems beyond capabilities, but you know, that is what, as we heard last time, President Bush has said he wants that third option. And this is a third option, because I guess the key thing about it is it could buy you time, it's sabotage rather than warfare. It's maybe now even hard, you know, 20 years later to understand how revolutionary
Starting point is 00:06:21 this idea would have been, or frankly, just the capability, right? We're not talking about making it harder to use the computers at Natanz. The equivalent in industrial terms of like taking a website down, right. Or something like that, where you're dealing with a software problem that you can then fix. And it's presumably cleaner to fix, right.
Starting point is 00:06:44 What we're talking about here is actually getting into the physical infrastructure of the plant. And we talked in the last episode about the centrifuges that the Iranians had acquired through bomb salesman AQ Khan. And I would wager Gordon, it's sort of an expensive lot of equipment and highly technically complex. And so if Western intelligence services were able to wreck some of that machinery, you would potentially set the nuclear program back very significantly. And I think the interesting thing about it is they're not necessarily trying to destroy the program. They're trying to disrupt it. They're trying to do it covertly to sabotage to undermine
Starting point is 00:07:26 it and basically to buy time. I mean, that's what I think is quite interesting about this operation is that it's not a kind of one shot where you're suddenly going to kind of blow the whole place up. That's just not possible. But the idea is to do something more covert without anyone knowing without even the Iranians knowing they'd been attacked, let alone by whom. So it's very different from a bomb being dropped, or a kind of special forces raid into the side. The good news is no risk
Starting point is 00:07:55 need to risk pilots or ground troops to do something like this. And if you can do it, through cyber means there is this tantalising possibility that you can delay and set back this program without the Iranians understanding why and I think that also makes it a very tempting option. You can imagine if you're President Bush at this time and someone says we can buy you time and slow down this program that is tempting particularly of course when you've got the Israelis on your back who are saying we want to course, when you've got the Israelis on your back,
Starting point is 00:08:26 who are saying, we want to bomb this or you've got Netanyahu going, we want to attack this. We kind of set up some of this era when we did the episodes on Moslem Fakrizadeh. We talked about Mer de Gaon, who was the head of the Mossad at this period of time. And it's probably worth situating him a little bit in this story, because it does seem like the whole point from Mardigan's perspective was to avoid an open war with Iran. And so you want to slow the program down enough to create more options for you in the future. In this period, I mean, the cyber component of Olympic Games, right, is a piece of it. But the Israelis are doing a whole bunch of other stuff, too. And this is the era where they start assassinating nuclear scientists, right?
Starting point is 00:09:12 And they start killing the people who are working with Mosin Fakriz today. And the kind of widespread nature of this shadow conflict, I think, is in part driven by the fact that the Iranians have quite ingeniously set up a target, a nuclear program that is dispersed across many different facilities, some of which are very, very hard to access physically. And importantly, and this is what distinguishes it from, you know, the Syrian attempt to get the bomb or the Iraqi attempt to get the bomb is it's kind of homegrown. They get a lot of this stuff initially from AQ Khan, but the knowledge of how to do this stuff is in the
Starting point is 00:09:45 heads of Iranian scientists, right. And so the Israelis are trying to, to kill them to slow the program down by making it harder for people to do the work. And I also find it interesting, because even within Israel, Medigand is the head of Masada at this time, he is actually invariant, he's not pursuing the same policy, if you like, but his prime minister wants, which is Benjamin Netanyahu wants to attack the programme with a military strike, and Medigarn is not up for that. And he will talk about it after
Starting point is 00:10:14 he's basically ejected from office later. And so he is actually trying to stop his own prime minister, it feels like doing something which he thinks is dangerous, which is launching a military strike. So he's invested in this idea, you know, Mossad that they could do a covert action to slow it down. So he's also a bit like the American side, trying to kind of buy time. And if you like divert the pressure from going for a full military strike, and I find that kind of interesting as well, because you do get a sense of the tension
Starting point is 00:10:47 between, and you often hear about it between Netanyahu, and some of his own national security officials, because a lot of them at various times think this guy's going too far, he's too hawkish on some of these issues. And I think that was the case here. And so what Medigan is doing by pursuing, you know, Olympic Games, and by even the assassinations is actually trying to buy time and avoid, you know, the military option. And we should say that the US was not involved, at least as far
Starting point is 00:11:15 as I can tell, US is not involved in the assassinations. Now, there are pieces of this where Mossad and the agency or Mossad and Western intelligence are joined at the hip and then other places where they're not right and where Mossad is pursuing its own Mossad and Western intelligence are joined at the hip and then other places where they're not, right? And where Mossad is pursuing its own operations, its own sense of Israeli security interests. But there's an incredible overlap, I think, of interest, obviously, in stopping an Iranian bomb, but in, frankly, what is deemed as justifiable or worthy of the risk when it comes to sabotaging the physical components of the nuclear program because the US at this point Gordon I
Starting point is 00:11:50 think has already tried to sabotage some of the program by kind of getting into the supply chain. It's like they put some bad components and some kind of sabotage components into that supply chain. Allegedly., yeah, allegedly, including some power supplies shipped from Turkey, which explode, but I think the Iranians then work out a problem. It's kind of pretty obvious when a power supply explodes, and you look where it came from, and then you kind of get it from somewhere else, or you find a different way of doing it. So I think they're working out that
Starting point is 00:12:18 that's kind of traditional covert action or sabotage has its limits when Iran is protecting and kind of trying to build its nuclear program very much under its own auspices rather than bringing in material elsewhere. And so you know, this option of the cyber attack becomes suddenly possible and quite tempting for both the US and some of those in Israel, I think, but it is ambitious, you know, it's something that has never been done before. And you've got to work out how you're going to translate something which is on computer code that you're developing into a physical destructive act within this very closed and secretive nuclear program. Well, and this gets back or I mean, in the last episode, you gave us a wonderful tutorial on thank you on centrifuges. And I guess we're back to the centrifuge, the large
Starting point is 00:13:06 rows of hot water heaters that are sitting in the basement at Natanz. These are the targets, right? Of the cyber weapon that is going to be developed. And the key reason is they are obviously the thing which is enriching uranium. And crucially, they are these incredibly complex bits of engineering, The rotors inside them, you know, to separate the uranium-235 from 238, it spins so fast, it's faster than the speed of sound, supersonic, faster than the fastest fighter jet. That's the speed at which that rotor is moving. You know, it needs to be made out of a special metal to be able to withstand the kind of stress.
Starting point is 00:13:43 It needs to be perfectly balanced this rotor on a kind of ball bearing. It's incredibly delicate and fragile. The Iranians would find if you don't wear gloves when you assemble them and you get some dust on these rotors, they're spinning so fast. Just that dust will cause an imbalance on the rotors and it will spin off and then smash into the kind of casing in which it is. So you have to maintain the speed of that rotor perfectly as well.
Starting point is 00:14:10 You basically can't switch them off very easily and it mustn't vibrate. It mustn't get any kind of dirt inside it. The slightest imbalance in this system and it can spin out of control. And then what happens is it crashes into the casing. And then because they're in a cascade, all these centrifuges together, one will potentially crash into the others like dominoes, and you can take down a whole cascade of centrifuges.
Starting point is 00:14:35 So they are incredibly vulnerable bits of engineering. So if you start from the idea that you want to wreak havoc on the centrifuge cascade at Natanz. And you want the Iranians to be confused about what's happened. You don't want something to go boom. And then they go back on the supply chain and say, oops, we're not buying from the supplier anymore. You want there to be this perpetual sort of confusion about what's happening.
Starting point is 00:14:58 I mean, it seems like first off, you need a pretty detailed understanding of the facility at Natanz and exactly how how it's laid out. And exactly what type of machinery and software it's using to run the place, right? I mean, yeah, you need a lot of information to even get started. And all the signs are that pre the deployment of the code that's going to cause the damage, there are a couple of stages of more traditional espionage and there's a couple of very advanced espionage tools called I think flame and
Starting point is 00:15:31 dooku which are the kind of you know the hacker names for these packages which get inside the system and they are basically there to just collect the data about what the system is and how it's working. We don't entirely know which countries were involved in that. I think US, Israel looks like definitely some signs, maybe some other countries as well. One of the interesting questions about that, who knows if the Brits might have had some involvement at that stage in some suggestions of it. Of course, they wouldn't confirm it, but this is still espionage, you see, and you could imagine everyone saying, well, we need to understand this espionage. But then the next bit, which I think is really interesting.
Starting point is 00:16:06 So even if you know what the centrifuges are, and how the system is configured, you need to be sure how to have an effect on them, what code would allow you to have a physical impact on them. And this is where we get back to not sure he is a friend of the show, because I think in terms of hero villain, I think you can is that we can play that game with'm not sure he is a friend of the show. Cause I think in terms of hero or villain, I think AQ Khan is, I don't think we can play that game with him. I think he's in the villain category. Sorry, Pakistani Patriots who love him as father of their bomb.
Starting point is 00:16:32 You raise a good point, Gordon, which I'm sure will be an ongoing conversation, which is if you are a villainous character, can you actually be a friend of the pod? Or is it just, you've got to be a kind of a straight shooter? I don't know. I think we need to, we need to think about that. You have to give me an example, but I think AQ Khan, I mean- I don't think he, yeah, we should, as we say it straight shooter. I don't know. I think we need to we need to think about that. You have to give me an example. But I think if you can't I mean, I don't think yeah, we should as we say it out loud. I don't think he can be a friend of the pod. No, no. Last time we explained how he had sold some of the equipment,
Starting point is 00:16:54 some of the designs for centrifuges to the Iranians, and they're going to basically copy those, they are going to use those designs. And the crucial thing is, in 2003, the AQ Khan network gets taken down. Again, we'll do that another time amazing story involves the interception of some components, which the Khan network was selling to Libya, the US will get Pakistan to put a Yukon at the house arrest, Libya will give up its program. Now, the interesting bit is that means the US will get hold of a whole load of the centrifuges, what were the P1 and P2 centrifuges, but which are identical to the IR1 Iranian one and two centrifuges that Iran is developing. And these centrifuges are
Starting point is 00:17:40 going to be shipped back to the National Security Complex at Oak Ridge Lab in Tennessee, which is one of those US national security labs, isn't it? That's right. And it is essentially the centerpiece of the US nuclear stockpile, right? And a tremendous amount of the research on the maintenance of that stockpile, the procurement of it. I think the kind of locus point for that is Oak Ridge, Tennessee. So it's a natural place. If you were an officer of a Western intelligence service who was really interested in sabotaging the Iranian nuclear program to kind of go down there and have a look, have a look at these centrifuges and understand how they work. And how you might be able to play with them.
Starting point is 00:18:23 Right. Yeah. I'm just going to play around with them for a little while. Yeah. What's amazing is that Khan has supplied the centrifuges to Iran. And then by his network being broken down, there's an opportunity because the US can build its own replica of the kind of enrichment cascades that are being used in the tanks with the same controllers, the same hardware around these centrifuges and work out how to sabotage them effectively. And they can work out what will lead them to crash. And supposedly they had a cage where they could watch them and toy with the controls and work out what would make them crash and break, making this awful screeching sound. And the Israelis are also doing something very similar, it seems, making a scale model of the Natanz enrichment facility set up at Demona, which is their nuclear power facility
Starting point is 00:19:18 out in the desert. And they are building their own also replica of Natanz. You've got both sides trying to understand what is going on in this kind of cavernous site at Natanz and how the centrifuges specifically work and what you could do to them. Spy agencies love a good scale model. It reminds me of the replica built of the bin Laden compound right at Avada Bada that the seals train. Do they have like modelers?
Starting point is 00:19:41 No, they do. Yeah, they recruit people like because you know, you get people who love I met someone the other day loves scale models. They were showing me pictures of scale model village and something like that. And then do you think you know, you get recruited and someone says you're really good scale model village builder, do you want to come here and build models of nuclear compounds and terrorist compounds for the CIA or Mossad? I guess they do the
Starting point is 00:20:00 ones that I met, worked at the National Geospatial Okay, intelligence agency NGA, there'd be a natural connection between the imagery and the model and the modeling. So they had a team of modelers there who would who that was their job. That's a great job. That's like the best job. Yeah, I'm not even into it. And I want that job. But they I would be discovered on day one as an incompetent, incompetent modeler. Well, so Gordon may be there with scale models all over the place of Natanz and alleged Western intelligence services, practicing destroying centrifuges.
Starting point is 00:20:37 Let's take a break and we come back. We will see how they code this destructive cyber attack that's going to change the history of the Middle East. See you after the break. I'm David Ullishogger. And I'm Sarah Churchwell. Together we're the hosts of Journey Through Time, where we explore the darkest depths of history through the eyes of the people who live through it.
Starting point is 00:21:02 Today we're going to tell you about our new series on the Great Fire of London, one of the great pivotal events of the 17th century, one of the most important events in all of English and British history. It began at a bakery on Pudding Lane and quickly turned into a catastrophe. It consumed 13,000 houses, it decimated London, and caused 10 billion pounds worth of damage
Starting point is 00:21:23 in today's money. It even burned down the iconic St. Paul's Cathedral. The city was already devastated by the Great Plague, but rumors of foreign invasion led mobs to attack innocent foreigners on the streets. In this episode, we'll explore the chilling consequences of rumors of fake news of xenophobia, problems that clearly are not unique to today. From desperate attempts to save their homes and belongings to the struggle to assign blame which turned deadly. This is the story of the fire as it was lived through by the people on the ground and the
Starting point is 00:21:57 lasting impacts it left on the city. We've got a short clip at the end of this episode. Welcome back, Gordon. We've talked about the centrifuges and the physical destruction, but you have to, I guess, design a code, right, that will actually have an impact on those centrifuges. And so there's a software coding component to this that is really really critical. And it's thought to be done by the US and Israel primarily those allegedly to allegedly. We should say again this is all in the public domain here right but nobody's taking ownership of of Olympic games. But they're writing this code which is going to be covert and it's got to be really precise.
Starting point is 00:22:46 And it's interesting because believe it or not, we're not going to get deep into the specific types of code that we're going to use. I could, but I just thought, you know, too shy. To show off my knowledge of coding. Last time I coded was I think in the 1980s using basic computer language. If you remember, you're too young David
Starting point is 00:23:04 to know what basic was on a Commodore VIC-20 computer, you probably don't know what that is. I am too young to know what that is. That's my coding knowledge. I do understand a little bit, but not that much. You were not recruited to help Western intelligence in its efforts to sabotage the Iranian nuclear program. No, me playing jetpack on my computer did not qualify me to
Starting point is 00:23:21 be a top cyber hacker. But by 2007, they've got some code ready. And it's worth saying, there's actually not going to be just one cyber attack. And that's actually going to be important for our story. There's going to be multiple and they're going to be varied and covert to so confusion. And the code is kind of stealthy designed to work over an extended period without being spotted rather than being a single strike, which takes it down. And the way to think of it is as two things a delivery system, which is if you like the missile which is going to get you into the target and then the payload,
Starting point is 00:23:53 the warhead which is actually going to do the damage and the aim of the you know, the Olympic Games code is to be very, very targeted in its delivery system. Because they create code which is looking for something called a programmable logic controller, a PLC. And the PLC is used to control industrial facilities. So it's a small computer, which you have at things like sewage plants, gas pipelines, train signaling, anything industrial in a factory, you know, air conditioning, even in a building, they're not built with huge amounts of security in mind, they just control a physical process. So they're the controlling system. And the coders are going to design something which is looking for a very
Starting point is 00:24:36 specific one of these PLCs built by the German company Siemens, a specific PLC, and one that's operating in a very specific setup. So you're not just after a specific PLC and one that's operating in a very specific setup. So you're not just after a specific PLC, but in a particular configuration, which is effectively unique because going back to the espionage bit they've already done, they've worked out the exact controllers, the exact configurations, what everything's connected to it in a tanz and they are targeting it for that. None of this, the covert nature of it, the precision would have been possible without what was probably an extended phase of reconnaissance, right? Digital reconnaissance to map out exactly the structure, the architecture of all of the
Starting point is 00:25:22 systems running at Natanz, right? I mean, you couldn't develop either the, you know, to use the weapon term in the architecture of all of the systems running at Natanz, right? I mean, you couldn't develop either the, you know, to use the weapon terminology, the missile or the payload without the really detailed map of the facility. But you've got a problem when it comes to the delivery, because these industrial control systems are not connected to the regular internet, you know, companies have corporate networks, which are connected to the internet, and can be accessed from anywhere and then hacked, but these industrial systems are not. And then Iran has also taken extra steps, unsurprisingly,
Starting point is 00:25:54 given it's a nuclear program, to air gap them so that there are no direct connection points to the regular internet. So the question is, how do you get the code? Do you get that code in there? Right. Sounds like you need a human to me. It sounds like you might need a human. You hear a lot of people saying, oh, you know, don't need those human spies anymore. You know, don't need humans in the world of cyber espionage.
Starting point is 00:26:18 Yeah. You can steal all the secrets online. And I do remember, you know, in the early 2000s, I think a lot of the kind of human humant guys, you know, the CIA and MI6 people were a little bit insecure, I think, you know, as the arrival of cyber espionage came, because it's like, you want to get secrets from that safe or that computer, you don't need to bribe the person running the office anymore, or, you know, recruit an agent stealing it, you just go online. You just need a son deprived guy eating pop tarts sitting behind a computer screen right you just need an Eddie Snowden you know to go and steal this to steal the stuff right and I think there was a bit of insecurity I mean I think there was in the early two thousands that the cyber guys were going to take over and there's no need for these. These human operators how wrong they were still need to meet sack right Gordon.
Starting point is 00:27:01 operators. How wrong they were. You still need a meat sack, right, Gordon? I've never heard that phrase. Really? Meat space. I know meat space, cyberspace and meat. Yeah. Well, who sits in the meat space? It's the meat sacks. It's the humans. It's the meat sacks. So you're going to need a meat sack because you've got to get that coding over
Starting point is 00:27:19 what's called an air gap, which means it's not connected to the systems. So, yeah, you need a person. So it's thought that what they do is draw up lists of companies and engineers who might have some kind of access to Natanz and to the Iranian nuclear system. Then the idea is you're going to be able to perhaps feed them a USB stick, which they are going to connect onto their laptop and then into an Iranian air gap system and plug it in because there are a lot of systems there which require updating. It's a fascinating part, I think of espionage these days. And it's something which I think people don't realize is that melding of kind of cyber and human espionage.
Starting point is 00:28:06 Yeah. And this is a good example of that. It looks like. Well, there were even reports that the Dutch were involved in this part of it. Right. There was a Dutch engineer, I think, who went in and out of Natanz and who may have been involved. Yeah.
Starting point is 00:28:20 Initially, after all of this became public, people were wondering, you know, was it a witting or unwitting engineer? How did it get in? What was the method? Then quite recently, there was this report which came out of Dutch media that there was an individual who worked on the water pumps in the tents who was a Dutch engineer, he had an Iranian wife, and that he had somehow been recruited by Dutch
Starting point is 00:28:42 intelligence, the AIBD back in 2005. And that he might have been the one to introduce the virus and the code into the system on one of these visits, although I think the suggestion is he and maybe even the Dutch may have not known what the actual purpose was. You could imagine the Americans or the Israelis or someone telling the Dutch, we just need to get this coded to the system to do some espionage. And you can this imagine this engineer going, could you put this in, you know, help us out. You don't want to be the meat sack who gets sent into Natanz to like stick a USB drive into a computer, right? That doesn't seem like a great job to have in this whole game. Yeah, all we'll say about this engineer is he then dies in a motorbike crash two
Starting point is 00:29:28 years later near his home in Dubai. Now, I mean, look, that could be entirely innocent. I'm not suggesting it's anything worse, but the guy who was involved is not around anymore to explain what happened. It's worth saying. Is this the first appearance of the Dutch AIVD on the podcast? This is another like semi obscure intelligence agency that's, that's appeared for those keeping track.
Starting point is 00:29:50 Welcome to the program to the AIVD, the Dutch external service. Cause we've got the bingo cards. Haven't we have Intel services? Yeah, exactly. If you put the Dutch AIVD in the middle of that bingo card, you are now you're rolling. I'm just imagining someone sitting on a train and go bingo is there you know, they're listening to this podcast where they finally realized they filled in their filled in their card and everyone go why are you shining bingo anyway, well done if that's you.
Starting point is 00:30:13 It's 2007 though, Gordon and the very first variant of this virus is ready to be unleashed on the tons. And the first attack, at least the first one we know about looks like it targets the valves that transfer the uranium gas from one machine to the next, including the isolation valves that protect the centrifuges from faults and the code which has been introduced into the system understands and finds its target. And it's really interesting because it closes one set of valves. So the
Starting point is 00:30:48 pressure in the machine grows as the gas builds up, then it opens another set of valves, which dumps the gas out of the tank to waste it. Now it's really kind of interesting because it would do this for a couple of hours and then reset itself. That sounds confusing. If you're the Iranians watching this, right? Because again, it's not like you brick to the computers and just
Starting point is 00:31:09 turn them off. It's not like you blown up the valves. It's not like you've done something really obvious to them. You've just changed the flow of gas for a while, causing some of it to be wasted. And you just do this at periodic points. And I just think it's clever, isn't it? Because it is, it is not obvious that something is going wrong. And we should say that the flow here was that let's say a meat sack, put a USB drive into a computer on that closed network, right?
Starting point is 00:31:39 The virus unbeknownst to anyone on the Iranian side watching this escapes, but it's not on presumably anything close at that point to the PLCs that run the centrifuge cascade. So that that virus has found a way it's looking for its target. It's looking for its target. It then finds its way to the PLCs that control these cascades. And it is then manipulating. Yeah, the PLC, which is kind of the interface between the digital world and the and the physical reality of the centrifuges, right? So it's remarkably complex. I think it's
Starting point is 00:32:17 just worth restating that because it's not like all of a sudden someone in Tel Aviv opened up a screen, and they're just running those PLCs, right? I mean, it's gone through this long process to get to its target. The covert bit of it is what I find fascinating because there's one really kind of clever bit of the operation, which is the code also records what the normal operation of the centrifuges looks like for two weeks.
Starting point is 00:32:44 And then when it starts playing with the centrifuges and those valves, it plays back to the operators, the normal flow of data as if they're operating normally. So we talked about the valves changing. So the pressure is building up. But if you're an operator, you don't see that it looks totally normal because you're being replayed old data of when it was running normally before the code switched it on.
Starting point is 00:33:11 The parallel is in I think it's oceans 11 isn't it where there's a bank of CCTV cameras. You must have seen oceans 11. Yeah, yeah, I have seen it. I was too young Gordon, I was too young. Where they're going to do the heist of this vault beneath the casino. And what they've done is they've recorded the normal operation of the CCTV cameras when nothing's happening. Right.
Starting point is 00:33:31 And then when they're in doing the heist, they play back normal. And so the CCTV operators think, you know, everything looks fine until suddenly the picture shows your kind of vault empty of all the money. I mean, it's, you know, it's that bit of it, I think, which is just frankly brilliant. It's brilliant. Yeah. I mean, again, it ladders up to like, what's the goal here? Right.
Starting point is 00:33:51 The goal is time and confusion or just not even being aware that your program is being sabotaged while it's being sabotaged is ideal. Right. That is exactly what Western Intel wants out of this. It does make me think, Gordon, have you seen the movie The Sting? Yeah, classic. Classic. It's Robert Redford and Paul Newman. And the premise, right, of this whole wonderful film is how do you con somebody and then at the end, they don't even know they've been
Starting point is 00:34:22 conned, right? That's the most effective con. And it makes me think of this, which is how do you sabotage a program? And the Iranians don't even know that anyone has sabotaged the program, right? It's, it's an absolutely brilliant piece of trade craft here. And you can imagine, you know, what it must be like for those Iranian engineers, because suddenly not enough uranium is coming out. Their centrifuges gas is getting dumped out, but all their controls are telling them they're operating normally. You're going to start pulling the stuff apart, you're going to kind of start wondering is
Starting point is 00:34:53 it a problem with our controls is, you know, our sensors mistaken is one of our colleagues, you know, mucking around with this, there's no obvious reason why it's not working as it should do. And you could just imagine this is just going to kind of so confusion, doubt, chaos, you've got to pull everything apart. Probably have to pull apart every bit of sensor as well as the centrifuges to try and understand why they're not working. I mean, that is going to slow a program and you're not going to find anything
Starting point is 00:35:19 because, you know, you don't realize that you could be doing this remotely through code. It is amazing. So they're constantly taking these centrifuges out of action. And of course they've had problems before the P one centrifuges were a bit dodgy. So it's plausible. They're just badly engineered. You know, they actually learn not to trust the instruments, the control panels, and
Starting point is 00:35:38 they ask people to go and watch the centrifuges. It's not how you want to run an industrial facility. We don't look at the controls because they don't tell us what's going on. We need we need someone with eyes on, you know, go and radio back and tell us what's going on. So in that sense, Olympic Games, it looks like it's working. Well, and maybe they're Gordon with the virus unleashed on the tans. We should stop and next time we will look at how really the stakes get raised in this entire program as the Iranian nuclear program becomes more ambitious as does this covert effort to bring
Starting point is 00:36:14 it down and stop it. We should also note though Gordon, right, that you don't have to wait for that episode. You don't have to be delayed like the Iranian nuclear program. That's right. Don't be the Iranian nuclear program. Don't be an engineer wondering what's going on. What's going to happen next? Be ahead of the curve and join the Declassified Club at the rest is classified.com where you get early access to all the episodes in this series and future series and crucially also
Starting point is 00:36:43 bonus episodes. And we've got a cracker coming up, haven't we? On Friday, we got an interview we've done with none less than David Petraeus. That's right. Wonderful conversation with Director Petraeus, who was the CIA director, actually, when I was there, and talked with him about that, talked with him about what's going on in the world, talked with him about the agency, really brilliant stuff, great interview, and we'll be dropping that on Friday. So sign up at the rest is classified.com and we'll see you next time. See you next time.
Starting point is 00:37:23 It's David Oleshooga from Journey Through Time. Here's that clip that we mentioned earlier. If you look at all of the accounts of the fire at this point, as we get to the end of Sunday the second, the first day, this fire is not behaving in any way the way fires traditionally did in London. And there are some people who've argued that it was becoming a firestorm, that the heat and the wind and the movement of air caused by the fire was feeding it, was becoming self-sustaining as it were. John Evelyn, who's a great writer and a diarist of this moment, he talks about the sound of the fire. He said it was like
Starting point is 00:38:02 thousands of chariots driving over cobblestones. There are descriptions in peeps and elsewhere of this great arc of fire in the sky. I mean imagine that everything around you is coloured by the flames, yellows and oranges, and above you is this thick black smoke. This is a city you know. These are streets you walk. This is a place that's deeply familiar to you. And it looks completely otherworldly. It looks like another, like a sort of landscape you've never seen before.
Starting point is 00:38:34 People describe the fire almost as if it's supernatural. If you wanna hear the full episode, listen to Journey Through Time, wherever you get your podcasts.

There aren't comments yet for this episode. Click on any sentence in the transcript to leave a comment.