PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Powiadomienia systemowe
  • Sesja wygasła!
  • Sesja wygasła!
Tytuł artykułu

Operation “Olympic Games.” Cyber-sabotage as a tool of American intelligence aimed at counteracting the development of Iran’s nuclear programme

Wybrane pełne teksty z tego czasopisma
Identyfikatory
Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
The purpose of the article is to analyse Operation “Olympic Games” including, in particular, to indicate the political background to the activities aimed at preventing the development of Iran’s nuclear programme, and to examine the preparation and conduct of the operation, the involvement of the US and Israeli intelligence services, and the use of intelligence methods and sources. An equally important objective is to indicate the real consequences of the cyberattack with the Stuxnet virus. In the research process, a critical analysis of literature in the field of Intelligence Studies and source materials (including legal acts, strategies, reports, and other official studies of the entities forming the US Intelligence Community) was carried out. The example of Operation Olympics Games shows that complex cyber-sabotage operations resulting in the destruction of critical infrastructure on a large scale require the involvement of numerous state resources and advanced cyber activities, and the use of many different methods and intelligence sources. Thus, strong states with well-developed intelligence capabilities are much more capable of effectively using cyber-sabotage on a large scale.
Słowa kluczowe
Rocznik
Strony
63--71
Opis fizyczny
Bibliogr. 25 poz.
Twórcy
  • Wydział Bezpieczeństwa Narodowego, Akademia Sztuki Wojennej, Poland
Bibliografia
  • 1. Albright, D., Brannan, P., Stricker, A., Walrond, C., and Wood, H. (2012) Preventing Iran from getting nuclear weapons: constraining its future nuclear options. New York: The Institute for Science and International Security.
  • 2. Broad, W. J. and Sanger, D. E. (2008) ‘In Nuclear Net’s Undoing, a Web of Shadowy Deals’, New York Times. Available from: http://www.nytimes.com/2008/08... (Accessed 30 November 2019).
  • 3. Brown, G. D. (2011) ‘Why Iran Didn’t Admit Stuxnet Was an Attack’, Joint Force Quarterly, (63)4.
  • 4. Bush, G. W. (2002) ‘The President’s State of the Union Address’, Available at: https://georgewbush-whitehouse. archives.gov/news/releases/200... (Accessed: 30 November 2019).
  • 5. Bush, G. W. (2011) Decision Points. New York: Crown Publishing Group.
  • 6. Byres, E., Ginter, A. and Langill, J. (2001) White Paper. How Stuxnet Spreads – A Study of Infection Paths in Best Practice Systems. Tofino Security, Abterra Technologies, ScadaHacker.com.
  • 7. Farwell, J. P., Rohozinski, R. (2012) ‘The New Reality of Cyber War’, Survival: Global Politics and Strategy, (54)4.
  • 8. Hayden, M. V. (2016) Playing to the Edge: American Intelligence in the Age of Terror. New York: Penguin Book.
  • 9. Huntington, S. P. (1996) Clash of civilizations and the remaking World Order. New York: Simon and Schuster.
  • 10. Kapusňak, J. (2013) ‘Covert operations attributed to Israel’s Intelligence Services against Iran’s nuclear program’ in Majer, M., Ondrejcsák, R., Tarasovič V., and Valášek, T. (eds.) Panorama of Global Security Environment, Centre for European and North Atlantic Affairs, Bratislava: Centre for European and North Affairs.
  • 11. Kelsey, D. (2017) UN Security Council Resolutions on Iran. Available at: https://www.armscontrol.org/fa... (Accessed: 30 November 2019).
  • 12. Kerr, P. K., Rollins, J. and Theohary, C. A. (2010) The Stuxnet Computer Worm: Harbinger of an Emerging Warfare Capability. Washington: Congressional Research Service.
  • 13. Kissinger, H. (2017) World order. New York: Penguin Press.
  • 14. Lindsay, J. R. (2013) ‘Stuxnet and the Limits of Cyber Warfare’, Security Studies, (22)3.
  • 15. Milevski, L. (2011) ‘Stuxnet and Strategy: A Special Operation in Cyberspace?’, Joint Force Quarterly, (63)4.
  • 16. National Intelligence Strategy of the United States of America (2009) Available at: http://fas.org/irp/offdocs/nis... (Accessed: 30 November 2019).
  • 17. Osawa, J. (2017) ‘The Escalation of State Sponsored Cyberattack and National Cyber Security Affairs: Is Strategic Cyber Deterrence the Key to Solving the Problem’, Asia-Pacific Review, (24)2.
  • 18. Prince, B. (2010) Defense Department Confirms Critical Cyber-attack. Available at: http://www.eweek.com/security/... (Accessed: 30 November 2019).
  • 19. Sanger, D. E. (2009) ‘U.S. Rejected Aid for Israeli Raid on Iranian Nuclear Site’, New York Times. Available at: http://www.nytimes.com/2009/01... (Accessed: 30 November 2019).
  • 20. Sanger, D. E. (2012a) Confront and Conceal. Obama’s Secret Wars and Surprising Use of American Power. New York: Random House.
  • 21. Sanger, D. E. (2012b) ‘Obama Order Sped Up Wave of Cyberattacks Against Iran’, New York Times Available at: http://www.nytimes.com/2012/06... (Accessed: 30 November 2019).
  • 22. Segal, A. (2016) The Hacked World Order: How Nations Fight, Trade, Maneuver, and Manipulate in the Digital Age. New York: PublicAffairs.
  • 23. Smeets, M. (2017) ‘A matter of time: On the transitory nature of cyberweapons’, Journal of Strategic Studies, (41)1–2.
  • 24. Veebel, V. and Ploom, I. (2016) ‘Estonian Perceptions of Security: Not Only About Russia and the Refugees’, Journal on Baltic Security, (2)2.
  • 25. Weber, V. (2018) ‘Linking cyber strategy with grand strategy: the case of the United States’, Journal of Cyber Policy, (3)2.
Uwagi
Opracowanie rekordu ze środków MNiSW, umowa Nr 461252 w ramach programu "Społeczna odpowiedzialność nauki" - moduł: Popularyzacja nauki i promocja sportu (2020).
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-727efc1f-be9c-4c26-a4e6-19387db52604
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.