Center for Strategic Assessment and forecasts

Autonomous non-profit organization

Home / Defence and security / / Other
Battle without battle field - the war in the twenty-first century
Material posted: Publication date: 20-05-1998

This material is one of the scenarios, war games, conducted in 1995 by staff of the RAND Corporation (USA). These games brought the leading U.S. experts in the field of computer security of corporations, government organizations and the Ministry of defense. The exercise worked out the issues develop a strategy for the protection of the United States in the event of the outbreak of information warfare. As a potential enemy was considered Iran. Naturally, the struggle was around the Persian Gulf and oil fields – the field of eternal "vital interests" of the United States.

This material is given as an example of a possible scenario of information war.

1. Political background

It's the middle of spring 2000.

At the end of the 20th century political changes and the continuing unrest in the Gulf region, in Pakistan, in the Islamic countries of the former Soviet Union and North Africa has led to the creation of a new and very troublesome region, which was often called the "Islamic arc of crisis".

Problems for the USA and European countries and added that one of the potential aggressors in the region have developed means of utilizing the Global Information Infrastructure (GII) to conduct strategic political-military operations.

This situation has caused particular concern in the US about the security and privacy of the National Information Infrastructure (NII) and the existing Defense Information Infrastructure (DII).

In 90-e years has occurred Cell revolution due to the rapid appearance of groups and low-orbit stationary satellites, such as Iridium, GlobalStar and Teledesic to ensure the availability of global communications via cell phones. It is estimated that about 25% of the population of the US, Europe and Japan use cell phones in everyday life. A similar increase in the use of cellular phones is observed in other regions.

The Internet has become the primary infrastructure for the NII and GII. Now all countries have their own Internet portals. It is estimated that around 70% of the entire population of the planet is at a distance of phone call from the gateway to the Internet.

The phenomenon of the WWW continues to grow, has already created about 40 million "home pages" of information providing links to databases around the world. Many of these pages include video files and audioobraschenie, specially made for convenient playback.

One of the most significant trends in the last decade has been the growth of electronic Commerce. Approximately a third of all commercial transactions in the USA are produced electronically as with a standard means of data interchange, and special means of communication between the companies to offer a large number of encryption standards.

The attempts of the US government to establish a standard hardware-based encryption (similar to the CLIPPER CHIP initiative failed because of opposition from public organizations and the companies-software developers.

NII and GII are widely used new generation of activists from various political groups. Many of these groups are United by transnational networks through which they share information on environmental issues, civil rights and many other topics.

Internet and WWW have become the object of study of software "agents" of various types. Tens of thousands of such agents have been created to scan the Internet and WWW-pages in search of items that meet the profile of interests of their users or blocking such access.

In 1998, the President was allowed to pass in peace time the main part of the information flow of the Ministry of defence and administrative data for commercial telephone networks and public data networks. So now the main thread in the DII data is transmitted via dial-up networking, using various levels of encryption to protect classified information.

In the period from 1995 to 2000, there have been several, mostly unsuccessful, attempts to improve the safety switched telephone networks. These efforts were hampered by the fact that telephone networks are owned and maintained by a large number of competing companies, including cable networks, cellular networks and satellite channels, so the desired changes have proved difficult to implement. As a result, the safety telephone networks, with the exception of using mikoszewo encrypt the communication channel agreed by the parties, practically has not increased since 1996.

This problem was complicated by several trends:

  • widespread open standard systems whose protocols and technical description are widely known;
  • using the remote management and maintenance because of its low cost (i.e. via dial-up ports) in the telecommunications and energy systems;
  • the increase of confidence between different providers of telephone service;
  • more frequent changes in the software of the telephone networks due to competition caused by the emergence of new features.

In 1998, the possibility of creating in USA "Minimum Necessary Information Infrastructure" (MEII) for there to exist "sidings on the high-speed information highway" in the event of various emergency situations - has become a subject of serious discussion. The main reason for the occurrence of the subject of the discussions was the understanding of the need for the availability of such infrastructure to support large-scale operations of the U.S. armed forces and Multinational forces.

Although discussions about the development of different architectures MEII and criteria of their working capacity are continuing, serious work to create a real MEII has not yet begun. There are significant differences in opinion about what should be included in this structure. While the main discussions are on the following matters:

  • do I need to protect only the military and other communication channels and information systems for the success of the basic operations quick reaction force or not;
  • will the protection of other infrastructure information systems in a simple population of the United States or not;
  • the same question in relation to the protection of information systems of allies and potential coalition partners.

Also there are the wide debate on the issue of the ability to maintain the reliability and efficiency of MEII, which will be developed, mainly due to the dynamic nature of the ongoing information revolution.

In light of the above, in the last few years was more and more realized the growing reliance on the telephone network system of electricity supply, data networks, providing air traffic control, global positioning system and other key infrastructure elements of the United States. As a consequence, the National Security Agency (NSA), intelligence services and law enforcement agencies in the United States (and other countries) are all great resources in trying to evaluate and confront national and international threats of use of information weapons.

2. The main features of the situation in the world in the security context of

2.1. The plight in Saudi Arabia

The Saudi government has recently taken several steps to create in this country an open society politically, economically and socially. New independent broadcast television broadcast centers with directional receivers of satellite and cellular telecommunication systems. Various sectors of society are increasingly using access to the Interent.

The Saudi monarchy has been badly damaged due to internal schism after the death in 1997 of king Fahd. His weak heir is now fighting for the establishment of his power in the family and for unity of his Kingdom that is torn apart by the growing contradictions between the opposition movement of Islamic fundamentalists and "modern nationalists" who now dominate the Saudi government.

Since 1998 a large part of the Saudi opposition (especially in universities) to share the goals and objectives of becoming a more meaningful Campaign for Islamic Renewal and Democracy (CIRD). The international coalition CIRD, established in 1997 at a meeting of Islamic state and public organizations in Damascus, became a major force determining social and political change in the Persian Gulf, but also throughout the Islamic world. CIRD is well funded, mainly from North American and European Islamic sources but also from national sources in Saudi Arabia, Iran and Pakistan. CIRD uses a variety of information and communication technologies for the organization, financing, speeches in mass media and establishing links with organizations in the Islamic world and with public organizations. Several CIRD leaders have great influence on Islamists in North America.

Oil prices remained stable in the 90 years that have forced the Saudi monarchy to curtail an ambitious national and social program put forward to achieve national reconciliation.

Saudi regime is gravely concerned about its vulnerability to common security and Finance after in the beginning of 1998 the Bank of Saudi Arabia was robbed of 1.2 billion dollars via sophisticated electronic attack which for two months had successfully used a number of technologies "Bank robbery from cyberspace" before there was revealed the British financial security. The Saudi government later found strong evidence of involvement in this attack Iran and Syria.

The financial position of the Saudi monarchy is further complicated by the opinions prevailing in the circles of government that is diametrically opposed to the proponents of CIRD that the defence power of the country should remain high in the face of growing military and political strength of Iran.

2.2.Domination in Persia

The power and influence of Iran in the Persian Gulf increased dramatically after the outbreak of civil war in Iraq due to the sudden death of Saddam Hussein. The result is a very skillful intervention of Iran in the civil war Iraq is in fact dissected. Weak Central post-batishche the government is in Baghdad, and the Kurds in the North and Shiites in the South have their own autonomy.

Iran openly supports radical Islamic fundamentalist groups in most of the countries of the Persian Gulf and promotes pan-Islamic strategy of creating large-scale military-political coalition to resist the hegemony of America and Europe in the Islamic world.

Iran's intentions to develop nuclear weapons is widely known, although at present there is no evidence that the Iranians have a nuclear bomb. The Iranians continue to support its fast-growing nuclear infrastructure, which is under the control of the IAEA "peaceful uses of atomic energy".

Iran continues to build its Arsenal of means of delivery of weapons, which now include:

  • 36 Russian Tu-22M BackFire;
  • 20 North Korean missiles HoDong II;
  • 200-300 missiles HoDong I.

Evidence that Iran is developing information weapons, appeared in 1999. Then in India, three employees of one company (including a world-class programmer) were arrested by police after penetration into considered secure, the Indian computer network for military purposes. They admitted that they sold Iran a number of means of information warfare.

Iran has a complex relationship with CIRD, which resists the attempts of Iran to make it more fundamentalist. In addition, a number of CIRD leaders privately criticized the slow pace of democratization in Iran. However, intelligence sources report that Iran is financing a separate group in the coalition CIRD.

2.3. Algeria

The popularity of the government in the country's military increased in 1996, in June 1996, the Pro-Islamist group of colonels after a coup d'état to power instead of the "Rome coalition" of opposition groups. At the end of 1996 as a result of elections in the country was formally established Islamic government.

In summer 1998, relations between Algeria, the United States and Europe began to deteriorate as the Algerian regime has become a geo-strategic and political interests of Iran and military cooperation between the two countries became wider.

In the summer of 1999, French intelligence services have received information about the alleged setting up your computer "Trojan horse" in the latest version of the software aircraft control AB-330 AirBus Industries, apparently, the Algerian agents in France acting on the instructions of Iran. The investigation found that Aerospatiale uses the services of several Indian subcontractors in the development of programs that had access to which was considered "safe" compilers, and the source code of programs.

2.4. Libya

In November 1998, when inspecting a new plant for the production of chemical weapons in southern Libya President Gaddafi was seriously injured in the helicopter accident and died shortly thereafter. In the ensuing political chaos, the victory of the Islamist government, which quickly established control over the country.

For many observers was the surprise that the new Libyan government headed for elections and the "Islamic democracy". It is now considered to be one of the most serious supporters of CIRD in the struggle for the establishment of a unified Islamist political force.

2.5. Pakistan

In 1997, the Bhutto regime was overthrown in a military coup because of "political indecisiveness and inadequate military assistance" during suppressed unrest in Kashmir in late 1996.

After the change of regime, Bhutto, the military government began to pursue an active Islamic course and greatly expanded the military-political ties with Iran.

2.6. Israel and the Arabs

Israel has signed peace agreements with Syria and Lebanon in 1997. In the summer of 1999, the Israeli government became the object (in the terminology of the Mossad) the impact of a "new type of strategic weapon" - series of electronic attacks on military systems of control and communications Israel via sophisticated packet sniffers and logic bombs of unknown origin.

2.7. Russian Federation

Came to power, the nationalists in the elections of 1996 and began to take steps to unite the country and the "near abroad".

In 1997, the Ministry of defense created a new command electronic warfare in duty which was imputed to "the development of means of conducting both offensive and defensive information warfare in the 21st century". Russian efforts to develop information weapons was in part a reaffirmation of the continuing national problems of using increasingly complex technologies, "the bandits of cyberspace" Russian organized crime. When such attacks in Russia were suppressed, the criminals began to carry out a successful attack on the American and European banks (the damage from which amounted to about $ 2 billion in 1999). Law enforcement agencies of the USA and Europe strongly suspect that some "hacker talents of the mafia" went to serve in the Russian intelligence service.

2.8. China

Tough, pragmatic and nationalistic leadership, which consolidated the country after Deng Xiaoping, continues to lead Asia on the path of economic growth.

Among the political and military leadership of China, there is opinion, reflecting the increasing independence of China that China should become "the second largest military power in the world power in the early 21st century.

The new "strategic value of the 21st century" is the professionalism of the new generation of Chinese computer professionals that are able to ensure that Chinese trade and financial circles and the government defensive and offensive means of information warfare is world class.

2.9. Japan

The interest of the Japanese government to potential threats related to information weapons greatly increased after the "great yen crisis of 1998" when the yen fell after two-day drop was steady at 22% from the previous course. Only a few months after has been found evidence that the rapid decline of the yen was due in part to a very clever computer virus, which is an Alliance of several Chinese and Asian criminal groups.

2.10 Korea

Kim Jong Il continues to hold the main levers of power in the DPRK, although there is an internal struggle between him and the various groups in the North Korean elite, which continues to resist the attempts of the Association.

The implementation of the 1994 agreement between the US and North Korea about the nuclear program is difficult, but continues to regarded as a means to freeze the nuclear program of North Korea. However, the DPRK leads the development and production of primitive rockets and participates in an extensive program of cooperation with Iran in the field of development and export of missiles.

2.11 USA

After the dramatic presidential elections in 1996, the upper echelons of power came to a consensus that the United States must continue to maintain the idea of themselves as "world policeman". At the same time, public opinion in the United States due to acute national problems strongly opposed to funding expensive military projects. In this complex political environment in 1997 appeared the Consortium for Planetary Peace (CPP), an unusual political coalition, "green", supported by both right and left, and adhering to the following views:

1) the role of "world policeman" contrary to the national interests of the United States;

2) you should use "modern methods of conflict resolution" in international politics.

With the support of a large number of groups of peace activists, for civil rights, for the environment and other active groups of the CPP quickly became the organizing principle for groups of its kind in the United States, Canada and Mexico. Using the Internet for coordination, they had an operation to resolve an acute political conflict in southern Mexico. At the end of 1998, the CPP had great prestige because of the role it played during the signing of a peace agreement between the Mexican government and the movement "the third Zapatista revolution".

Having achieved success in Mexico, CPP over the past year has been an active participant in the "peace coalitions" in a number of regional conflicts around the world (during which he established close informal ties with the Islamic coalition CIRD).

In 1998 in the framework of the joint chiefs of staff organization was created with the task of monitoring the development of offensive and defensive operational concepts of "e-war" and new requirements. This organization works with different groups to create add-ons for planning conducting electronic warfare or information warfare to strategic military plans. Problems with the control over non-proliferation of nuclear weapons has led in 1998 a major revision of the structure plans of the U.S. armed forces to leave the place the package of initiatives against their proliferation:

1) project of high-altitude air defense systems throughout the theater;

2) large sales abroad of rockets "petriot" and the usual tactical anti-missiles;

3) accelerated development of unmanned aircraft with a long flight and supplementing the automated system of sensors, ground-based, multi-purpose.

At the end of 1999 because of the previous incident with the French company AirBus airlines USA conducted a survey of programs, developed for use in flight control, to guarantee its integrity. Except for a few minor bugs in the software, nothing was found - but it has led to increased vigilance in the aviation industry with regard to the protection of these systems.

3. Security in the Persian Gulf

In 1999, in the face of increasing political and military power of Iran, US, France and the UK have renewed a military agreement.

Now the military plans for the region include the transfer of a large number of additional military equipment to the region and commitment for rapid deployment under the code name "green hornet" for USA and "silver sabre" - for the UK and France.

British airmobile division and the French motorized division, along with several squadrons of tactical interceptors are the main military components of the European "silver saber".

In 1998, the joint chiefs of staff, endorsed the plan of actions in information warfare that includes both electronic and physical attacks: "Operation Forse field - the main plan combat control systems for all TVD, which should provide "information dominance within a 500 km" and, in particular, to make inoperative the key elements of the systems of command and control, air defense and tactical intelligence of a future opponent.

4. Crisis

4 may 2000, the Ministers of OPEC at a meeting in Caracas has revised its policy on the extraction and sale of oil. Iran, Iraq, Libya and Algeria have decided to drastically cut production to bring the price low to $ 60 per barrel.

Caracas meeting ended in a stalemate after three days of furious debate, especially visible in the TV broadcast of the meeting of Ministers of Iran and Saudi Arabia.

May 7 Iran announced that it will soon conduct military exercises due to the escalation of the situation in the Gulf.

8 may, the head of Saudi Arabia met with the U.S. Ambassador and expressed its deep concern at the actions of Iran, which it fears could use the problems in OPEC as a pretext to strengthen its military power in the Gulf.

10 may Tehran radio and television announced that the Iranian foreign Minister flew to Riad initiatives that will help to resolve the conflict in OPEC and to reduce tensions in the region.

That same evening the U.S. Ambassador to Saudi Arabia learned the contents of the Iranian initiatives:

  • · Iran, Iraq, Saudi Arabia and other countries of the Advisory Council of the Gulf (GCC) should immediately cut oil production by 20%.
  • · the GCC countries should terminate its military agreement with the United States and to declare its neutrality or absence of ties with the US.
  • · in response, Iran said that the GCC countries are protected by the Iranian security system in the Persian Gulf.

The next day, may 11, U.S. intelligence detected preparations for mobilization of three of the six Iranian divisions located near Dezful in South-Western Iran, including the mobilization of several regiments, equipped with powerful tractors, able to deploy armored vehicles and artillery.

11 may at 20:30 local time, Saudi Arabia has begun the deployment of one infantry division on the border with Iraq and a partial mobilization of reservists. Two hours later, Kuwait moved its army on high alert.

Later that night in Cairo for a few hours almost lost electricity (90%). The U.S. Ambassador to Cairo in his message noted that "it is unclear what was the cause of the accident was an accident or sabotage"

On the evening of may 11, Crisis Center of the White House received a message from US Ambassador to Ratjada that in the telephone network of RIADA has been a series of serious failures.

The center of National Communications, the U.S. reported that almost simultaneously with accidents in Saudi Arabia main telephone network in Fort Lewis became the object of serious attacks phone with the help of personal computers seems to have started with ATS to operate the BBS, which had the input telephone line, which paralyzed the phones for a few hours.

About the problems in Saudi Arabia, the CIA reported the suspicion that Luke was used in the program which, apparently, was inserted in the latest version of the programs that control basic a PBX in Saudi Arabia. This code allows you to use unauthorized passwords to gain access for remote maintenance of the PBX. The causes of this problem is unknown, although radical anti-American group has taken responsibility and reported it on the Internet.

12 may at 5 am in the Gulf Saudi two gunboats were fired upon by Iranian military vessels were clearly in the exploration of the shore of El Dubai.

In a few minutes there was a 12 Saudi F-15 and in the ensuing battle both Saudi gunboats and three Iranian vessels were sunk. After that there were 15 Iranian MiG-29 and MiG-31 were shot down Iranian planes 9 and 5 Saudi F-15.

At 6:30 local time S-3B Viking with ship group "Ronald Reagan" was shot down by an Iranian missile frigate while conducting a reconnaissance mission at the gate of Hormuz.

After 30 minutes the F/A-18 and F/A-14 with ship group found the frigate fifteen miles South of Bandar-Abbas.

Aircraft of the United States engaged in battle with 8 Iranian MIG-29. After a short battle, 3 MIG-29 were shot down, and the frigate sank after being hit by 3 missiles "Harpoon".

13 may at 11:00 on the largest ARAMCO refinery near Dhahran had a catastrophic failure of the control system, which led to the huge explosion and fire in the area of new tanks for the distillation. This was followed by a statement of the radical Islamist group affiliated with Iran, "the enemies of Islam will soon feel the power of the warriors of Islam." This statement concluded with a phrase that "the economy of Saudi Arabia can be brought to its knees by a simple press of a button.

In its report, the U.S. Ambassador to Saudi Arabia warned that the Saudi elite are very frightened by the prospect that Iran can cause serious damage to the economy even without firing a single shot, and begins to doubt the ability of the U.S. to help the Saudi government to deal with a new threat.

At a press conference on 13 may, the Russian foreign Minister urged the UN Security Council to resolve the conflict.

May 14 at 7:30 local time Iran has sent a message to all the members of the GCC and the United States, France and Britain, which claimed:

  • a ceasefire of all forces of both sides;
  • an immediate freeze on further deployment of "foreign military forces" in the region;
  • immediate meeting on neutral territory to "discuss a peaceful resolution to the crisis."

The statement ends with the phrase that "if there is no positive response within the next 12 hours", Iran "will take action in accordance with his rights and duties in the Persian Gulf".

In the statements the leaders of Kuwait and Saudi Arabia was also the phrase that Iran will soon show the futility of reliance on the U.S. imperialists in the protection from modern weapons.

Shortly after midnight, Iran launched 3 missiles I HoDong from the site near Tehran. Two of the three missiles successfully reached the upper atmosphere, demonstrating a previously unknown possibilities of Iran.

May 14, 18:12 new German high-speed passenger train "Siegfried", which had a speed of 300 km/h, faced towards the wrong path freight train near Frankfurt am main.

German Federal police have established that the collision killed 60 people and seriously injured another 120.

After 3 hours, the CIA reported that there is direct evidence that a freight train was directed on the same path as passenger with penetration into the system of management of the railway "Bundesbahn".

In the middle of the day on may 15 at the reception, organized with the help of CPP, the Iranian Ambassador to the UN inadvertently said that the US and Europe as the most technologically advanced regions on the planet, is very vulnerable to attacks of the 21st century, organized by the States, owning modern computer and telecommunication technologies.

Later than 15 may in the preliminary report on the crash of DCI German trains, it was stated that the computer system had placed a logic bomb, perhaps one of their own, and the trail leads to Iran.

When you upload the report to the President that evening the National security Advisor (NSA) noted that the NSA has a strong suspicion regarding the origin of the attack. Moreover, it is noticed that the center of the CIA in combating international terrorism has prepared a report that expressed strong suspicions regarding the fact that this tragedy was a result of the activities of the secret organization, which may be associated with events from the Persian Gulf.

16 may at 11 hours the Director of Scotland Yard informed the Prime Minister that the Bank of England found three batch analyzer new model in its core network to transfer electronic money and that the Bank's management is concerned that unauthorized people could get into the transmission system of electronic money, until then considered invincible.

After a few hours in Atlanta and CNN and ITN London as a special issue told about the collapse of the German trains and the problems in the data transfer system of the Bank of England. In the CNN report it was said that some Western intelligence services believe that Iran could hire computer experts from the Russian mafia and in India in order to threaten the entire economy of the USA and Western Europe.

The effect of these messages was reinforced by interviews with a large number of computer security experts.

The index on the London stock exchange fell by 10% due to the fact that investors began to invest in safer places.

At 14:30 on may 16 on the new York stock exchange burst into a major crisis after 1987. The Dow fell at the end of the day is 17 percent. Analysts at CNBC and other networks of business information to draw conclusions that the major investors are trying to withdraw from the market, managed with the help of computer technology.

By 15:00 the oil price reached 75 cents per barrel. Gold has increased in price by 10 percent.

At 17:00 crisis group SEC informed the Secretary of the trade that there is evidence that there was manipulation of the investments carried out through the European and middle Eastern banks, and they have been the main reason for the rapid fall of the Dow.

This night was the termination of electricity supply in the area of Germany where the U.S. air base on the Rhine. Although the electricity supply was quickly restored, there are indications that the cause of failure was the penetration into the system management of the power supply.

Night may 17, CPP announced the mobilization of all members in the next 48 hours to stop unnecessary and potentially bloody war.

Two hours later, the CPP sent a formal request for a rally on may 21 to support demonstrations against the US intervention in Saudi Arabia with the number of participants of around 100 thousand.

Similar requests were sent to the police in 10 other U.S. cities.

CPP applications were approved, and began the mobilization of members of the CPP through the media and Internet.

In the early evening of may 18 after receiving reports of a massive invasion of the armed forces of Iran in southern Iraq, activity of Iran in the sea near the gates of Ormusa and "strategic warning" of Iran's joint chiefs of staff sent a message advising you to proceed immediately to the phase 1 and phase 2 of the plan "the green hornet" deployment of allied forces in the Persian Gulf.

At 14:40 in Delaware in the telephone network has also been a number of failures due to attacks of unknown origin. The main purpose of the attacks were ATS, whose failure led to the inability of air traffic control at the air base, "Dover".

At 15:00 was held an emergency meeting of the NSC for the development of chemistry in the solution of the crisis in the Persian Gulf.

The meeting began with statements by intelligence officials, who described the difficulty of establishing the source of the attacks and noted that while there is no way to know for sure whether the events:

  • check the strategic power of information weapons by anyone;
  • the beginning of information operations to disrupt plans to deploy U.S. troops in the Persian Gulf;
  • the maximum effect of the strategic information operations organized by Iran;

The problem is complicated by the fact that antiinterventionist groups both in the US and in Europe can organize a large number of incidents involving the use of information weapons.

The Chairman of the joint chiefs of staff stressed that the plan deployment is highly dependent on the ability of the operational interaction of parts and not be able to be completed on time if that is not possible. He also expressed concern about problems with the mobilization of the aircraft and crews of the air force, which is key when performing phase 2 of the plan "green hornet", which can occur if someone manages to penetrate a management system the major airlines of the United States.

In the ensuing discussion, it became clear that although there is circumstantial evidence of Iranian involvement in the current incidents, there is still uncertainty regarding the extent of participation of Iran.

After that went to the military situation in the Persian Gulf and the President took the following action:

  • · proceed to the phase 1 and phase 2 of the plan "green hornet";
  • · to deploy half of available forces CONUS in Egypt and Saudi Arabia;
  • · organize a video conference with the British Prime Minister and French President to work out an agreement with these governments to implement the plan, "silver sabre";
  • · immediately collect the North Atlantic Council;
  • · to reject any diplomatic initiatives from Iran and CIRD.

The President also noted that he wants to get congressional authorization for their actions. After this he began a more in-depth discussion of the situation after the use of information weapons. The President expressed concern about the possible consequences of successful attacks against the U.S. and its allies in the Persian Gulf and the national information infrastructure the U.S. and its European allies and coalition partners in the Persian Gulf. He stressed the need to demonstrate the sooner the better, that the future information attacks, such as those that have already taken place, will not seriously interfere with U.S. military strategy in this crisis.

During the discussion, the President demanded that the press Secretary to end the speculation on the vulnerability of the USA to attacks from cyberspace and origin of these attacks. He noted that further decisions can be more difficult if the society will begin to panic concerning the threat of information weapons for U.S. and they will connect with Iran when they are the real source can be antiinterventionist political forces.

5. The aggravation of the crisis

On the morning of 20 may, the U.S. Senate gave permission to send troops to the Persian Gulf. This morning the ATMs of the largest Bank in Georgia failed due to permanent errors of the order of thousands of dollars in each transaction. This forced the Bank to close the entire network of ATMs.

Officials of the Bank said that it was the actions of their employees, as they recently installed a new version of the programs in the ATMs and suspect the existence of logic bombs, are included in some way.

shortly after midnight the CNN center in Atlanta is out of order for 12 minutes.

May 20 the Ministry of defence found that the computer database for the deployment plan of forces seriously distorted. In the preliminary report of the CSC, it was stated that a computer worm does not set the origin inside of the work programme to this database via a personal computer, is temporarily connected to the system where the database, which was launched popular commercial package for working with databases that had a known vulnerability.

On the morning of 21 may, the US Ambassador to Egypt advised Secretary of state that the President of Egypt is very concerned about Iran's capability to inflict economic and political damage in Egypt.

This morning the Pentagon for the first time faced problems due to delays in deployment of forces in the Gulf because of information attacks on LAN and PBX in a number of major air bases and naval bases.

Shortly after midnight on may 21, the new aircraft AB-340, performing a fully automatic landing at the airport Ohara, there was a failure of management systems, and in a few minutes it crashed, killing 236 passengers and 36 people on earth.

Then the FAA banned flights of all the latest models AB-340 and 330 because of suspicions that the software could be infected with a complex logic bomb.

This evening the Ministry of justice announced the arrest of two suspects in a programming firm in San Antonio that made the last change in the control software and flight for AB-340 (both recently received large sums of money in Swedish Bank). Although the code was carefully studied before installation, the suspects had access to the compiler, and apparently modified it in such a way that they compiled the program started to execute unintended commands.

21 may, Washington was anti-interventionist demonstration which was attended by about 400 thousand people. Also passed a large number of demonstrations in several other cities of the country.

At morning meeting on may 22, the President was informed about the plans:

  • operation "Iron lance" was a pre - emptive bombing attack on Iran forces threatening Saudi Arabia;
  • the operation of the "Force field" - the plan of attack on the command and control systems.

Plans were discussed, but so far has not been adjudicated.

At 19:20 on may 22 during a news broadcast two government TV networks on the screen suddenly appeared the image of the head of the CIRD, urging the citizens of Saudi Arabia to overthrow the monarchy. Began large-scale demonstrations against the Saudi monarchy in Ratjada, Jiddah, Mecca and:.

On the same day the telephone network in Saudi Arabia again failed. The reason again was an unauthorized modification of the system through the "hatches" in the programs that manage them ATS, which were similar to those that have already been the reason for earlier failures in the telephone network (Saudi telecommunication network was purchased from the company, which produces about 30% of all Telecom equipment for USA).

Tonight supporters of the self-proclaimed provisional Islamic Republic of Arabia seized power in Dhahran and Mecca.

This evening began a serious collision in Ratjada between police and members of the national guard, which announced support for the new Republic. The US Ambassador reported on the coup attempt.

On the morning of 23 may the joint chiefs of staff announced a full-scale media attack from unknown source against almost every U.S. military base involved in the "green hornet" and "silver sabre". The report was publicly reported that the entire deployment plan fell apart, and they don't know how to plan the deployment now.

Morning in Atlanta was followed by a press conference by the CPP, where its representatives stated that CPP is mobilizing all of its members to conduct acts of civil disobedience to stop the actions of the US government at the outbreak of war, and to support undemocratic regime of Saudi Arabia.

At 12:30 on the Chicago Mercantile exchange has been the biggest riots in its history. Trade stopped completely due to the fact that exchange was the victim of a serious electronic manipulation by persons unknown.

At midnight telephone network in the Baltimore area, including all of the cell system is out of order. The attack was made with "hatches", similar to those that caused the failure of the telephone network in Saudi Arabia. A preliminary investigation found that only about 70% of ATS is disabled, but the rest is heavily congested.

What will happen next?


RELATED MATERIALS: Defence and security