Nuclear Reactor Attacks

On March 11, 2011, exactly 33 days after the failed nuclear terror attack of February 6, 2011, there was an attack on the Fukushima Daiichi Nuclear Power Plant in Ōkuma, Japan. According to Japanese scientists, the 2011 Tōhoku earthquake and tsunami, which allegedly caused the Fukushima nuclear disaster, was actually the result of an underwater explosion. As with all airports used in the 9/11 attacks, Fukushima was also conveniently “secured” by an Israeli company shortly before the incident. The Fukushima disaster along with high profile cyber-attacks on Iran’s nuclear reactors by the U.S. and Israel has nuclear reactor terror blinking red on every level. 

Ever since the Fukushima nuclear reactor disaster in 2011, there have been approximately 
40 nuclear reactor “emergencies”, “closures”, “leaks” and other major incidents clearly setting the stage for coming nuclear reactor terror on an unimaginable scale. Complementing the unprecedented nuclear reactor emergencies are multiple cases of “terrorists” attempting to breach nuclear reactors, repeated lapses in nuclear reactor security, as well as countless propaganda articles indicating that a Fukushima-level event inside the United States is a  foregone conclusion. 

Aside from blatant programming of the 2012 Hollywood 
nuclear reactor disaster film entitled  “Chernobyl Diaries”, a recent Nuclear Regulatory Commission (NRC) panel recommended that the U.S. government customize emergency plans for each of America’s 65 nuclear power plants, a change would “expand” the standard 10-mile evacuation zone surrounding nuclear reactors. Also, in a letter
 submitted to internal investigators at the NRC, a whistleblower engineer within the agency accused regulators of deliberately covering up information relating to the vulnerability of U.S. nuclear power facilities that sit downstream from large dams and reservoirs. Lastly, a recent study led by European researchers found Fukushima is not alone, as 22 other nuclear plants around the world may also be “susceptible” to destructive tsunami waves. 

The non-stop Fukushima nuclear disaster propaganda in America along with recent nuclear reactor emergencies, plots and patsies, whistleblowers, propaganda, movies and changes in U.S. government regulations, policies and procedures, all indicate that nuclear reactor terror is in fact being plotted and planned. 

Title: Israeli Firm Which Secured Japan Nuclear Plant Says Workers There 'Putting Their Lives On The Line'
Date: March 18, 2011

AbstractMagna CEO says Japanese workers at nuclear plant 'projecting business as usual' but says it is 'unclear if they are healthy due to the high level of radiation at the reactor, which is life-threatening.'

The CEO of the Israeli company that installed the security system at Japan's Fukushima nuclear power plant said Thursday that those workers who have elected to stay behind are "putting their lives on the line" to save Japan.

Magna BSP set up the security system about a year ago at the facility, which suffered extensive damage after the recent earthquake and tsunami, with particular concern over radiation leakage from the reactors at the site.

The system includes cameras and a warning system, enabling the facility's security staff to monitor anyone attempting to trespass onto the site or damage the perimeter fence. The security system was designed to guard the plant against any hostile elements seeking to seize radioactive material to use in a terrorist attack.

Among the 50 Japanese workers who have remained at Fukushima amid the unfolding crisis, in an effort to bring the facility under control, are two individuals who were in Israel about three weeks ago, where they underwent training to transfer the operation of the security system to the Japanese themselves.

"We still haven't been able to make contact with them, either by phone or e-mail," Magna CEO Haim Siboni said yesterday. "We know they're alive, but it's not clear if they are healthy due to the high level of radiation at the reactor, which is life-threatening."

"The Japanese workers who have remained at the reactor are really putting their lives on the line, with the knowledge that they're doing it to save all of Japan," he added.

Although there is no access to the area, Siboni said the cameras from his company's security system - which were installed high up - were probably not damaged and likely captured the post-earthquake explosions at the site, as well as the impact of the tsunami.

Magna BSP was established by Siboni about 10 years ago and is owned by several partners. Based in Dimona, the firm employs 15 people, a number which Siboni expects to expand dramatically in light of additional orders Magna has received from Japan and interest shown by the operators of nuclear reactors in other countries. Its operations in Japan are conducted through a Japanese government firm.

"We have an agreement in principle with the Japanese that we will provide protection for all of the country's nuclear reactors," Siboni said.

Magna had planned to send additional security equipment to Japan next week. The Japanese have not asked that the shipment be halted, Siboni said, adding: "They are projecting business as usual" (Haaretz, 2011).

Title: French Nuclear Power Company Hit By Cyber Attack
November 2, 2011
eSecurity Planet

Abstract: French energy conglomerate Areva may have been hit by an attack first detected in September.

"Local reports are consistent only in terms of talking about cyber-espionage, perhaps involving malware rather than some kind of terrifying Stuxnet-style nuclear kit sabotage caper," writes The Register's John Leyden.

"Staff reportedly learned that all might not to be well with Areva systems in mid-September, following a weekend security upgrade that left some systems out of action for three days," Leyden writes. "The National Security Agency Information Systems (ANSSI) reportedly assisted the security upgrade."

Go to "French nuke biz slapped in mystery cyberattack" to read the details (eSecurity, 2011).

Title: U.S. Authorities Probing Alleged Cyberattack Plot By Venezuela, Iran
Date: December 13, 2011
Washington Times 

Abstract: U.S. officials are investigating reports that Iranian and Venezuelan diplomats in 
Mexico were involved in planned cyberattacks against U.S. targets, including nuclear power plants.

Allegations about the cyberplot were aired last week in a documentary on the Spanish-language TV network Univision, which included secretly recorded footage of Iranian and Venezuelan diplomats being briefed on the planned attacks and promising to pass information to their governments.

A former computer instructor at the National Autonomous University of Mexico told Univision that he was recruited by a professor there in 2006 to organize a group of student hackers to carry out cyberattacks against the United States, initially at the behest of the Cuban Embassy.

In an undercover sting, instructor Juan Carlos Munoz Ledo and several selected students infiltrated the hackers and secretly videotaped the Iranian and Venezuelan diplomats.

Reports about Iran’s involvement in the suspected plot come amid the Islamic republic’s refusal to return a sophisticated, unmanned U.S. spy plane that crashed inside its borders this month. Iranian officials have laid claim to the drone, vowing to research it for its technology.

Calling the reports “disturbing,” State Department spokesman William Ostick said federal authorities are examining the cyberplot allegations but added that U.S. officials “don’t have any information at this point to corroborate them.”

Sen. Robert Menendez, New Jersey Democrat and chairman of the Senate Foreign Relations subcommittee on the Western Hemisphere, called for hearings in the new year about Iranian activities in Latin America.

Some House lawmakers called for the expulsion of a Venezuelan diplomat in the U.S. who is implicated in the suspected plot.

The Univision documentary fanned fears among lawmakers that Iran’s recent diplomatic outreach in the region, particularly to Venezuela’s anti-American leftist President Hugo Chavez, might be a front for nefarious activities.

Earlier this year, U.S. prosecutors charged an Iranian official based in Tehran with trying to recruit a Mexican drug cartel to kill the Saudi ambassador to the United States by bombing a Washington restaurant.

“If Iran is using regional actors to facilitate and direct activities against the United States, this would represent a substantial increase in the level of the Iranian threat and would necessitate an immediate response,” Mr. Menendez said.

An aide to Mr. Menendez told The Times that the Univision report, which also said that Iranian extremists were recruiting young Latin American Muslims, is “one of a variety of concerns we have about Iran’s efforts to engage with countries and other actors in the region.”

Next year’s hearing will examine Iran’s “political and commercial outreach, as well as more nefarious activities,” the aide said.

“We monitor Iran’s activities in the region closely,” Mr. Ostick said. “That vigilance led to the arrest of the individual responsible for the recent assassination plot” against the Saudi ambassador.

“We constantly monitor for possible connections between terrorists and transnational criminals.”

A congressional staffer said members of the Senate subcommittee and their staffs had requested a classified intelligence briefing before the hearing.

In the secretly recorded meetings with the Venezuelan and Iranian diplomats, the hackers discussed possible targets, including the FBI, the CIA and the Pentagon, and nuclear facilities, both military and civilian.

The hackers said they were seeking passwords to protected systems and sought support and funding from the diplomats.

At one point in the documentary, according to a translation provided by Univision, Iran’s ambassador to Mexico at the time, Mohammed Hassan Ghadiri, is seen telling the students that it was “very important to know about what [the United States has] in mind, attack Iran or not.”

Interviewed from Iran by Univision, Mr. Ghadiri acknowledged meeting the students and consulting Tehran about whether the Iranian government should back the attacks.

“I wrote to Iran that a person can do this. They said do not allow him in [the building] anymore because this not an embassy’s job,” he said.

The ambassador denied any involvement in a plot, telling Univision that the students’ sting was a provocation by “CIA agents.”

“They proposed this, and we told them that this is not our job. We rejected it,” he said. “We don’t have any interest in doing those types of things.”

“A good ambassador with good intentions would have thrown [the hackers] out and contacted the Mexican authorities,” said the documentary’s director, Gerardo Reyes. “Instead, he listened to them, he asked questions, he made suggestions.”

One of the other diplomats implicated by the documentary - Livia Antonieta Acosta Noguera, then the second secretary at the Venezuelan Embassy in Mexico - is currently the Venezuelan consul in Miami.

Students secretly taped her asking for more information about the planned cyberattacks and promising to pass it along to Mr. Chavez via his head of security, Gen. Alexis Lopez.

Rep. Ileana Ros-Lehtinen, Florida Republican and chairwoman of the House Foreign Affairs Committee, wrote to Secretary of State Hillary Rodham Clinton to urge her to investigate and expel Ms. Antonieta if the reports are true.

The consul represents “a potential threat to our national security,” Mrs. Ros-Lehtinen said in the letter, which was co-signed by Reps. Mario Diaz-Balart and David Rivera, both Florida Republicans; and Albio Sires, New Jersey Democrat.

Officials at the Venezuelan Embassy in Washington and the consulate in Miami were unavailable for comment Tuesday.

In VenezuelaMr. Chavez denied the allegations in the documentary.

“They are using a lie as an excuse to attack us,” he said of the U.S. during a TV and radio address. “We must be on our guard.”

Meanwhile, Iranian Defense Minister Gen. Ahmad Vahidi shrugged off President Obama’s request for the return of the unmanned spy plane and demanded an apology from the United States, the Associated Press reported.

Tehran last week identified the drone as the RQ-170 Sentinel and said it was captured over the country’s east. U.S. officials say the aircraft malfunctioned and was not brought down by Iran, the AP reported (Washington Times, 2011).

Title: Iran: 'Massive Cyber Attack' Detected On Nuclear Facilities
Date: June 21, 2012
Source: M

Abstract: Iran has detected a planned "massive cyber attack" against its nuclear facilities, state television said on Thursday, after talks with major powers this week failed to resolve a row over Tehran's disputed nuclear activities.

Iran's Intelligence Minister Heydar Moslehi said the country's arch enemies the United States and Israel, along with Britain, had planned the attack.

"Based on obtained information, America and the Zionist regime (Israel) along with the MI6 planned an operation to launch a massive cyber attack against Iran's facilities following the meeting between Iran and the P5+1 in Moscow," Iran's English-language Press TV quoted him as saying.

"They still seek to carry out the plan, but we have taken necessary measures," he added, without elaborating.

Security experts said last month a highly sophisticated computer virus, dubbed "Flame", had infected computers in Iran and other Middle Eastern countries.

Iranian officials were quick to say the country had defeated the virus, capable of snatching data and eavesdropping on computer users. It was not clear if the cyber attack referred to by Moslehi was "Flame", or a new virus.

Iran's nuclear program came under attack in 2010 by the Stuxnet computer worm which caused centrifuges to fail at the main Iranian enrichment facility. Tehran accused the United States and Israel of deploying Stuxnet.

Iran has been locked in a row for nearly a decade with Western countries over its disputed nuclear program which the West believes is aimed at making nuclear weapons.

Tehran denies the charge, saying it only wants peaceful nuclear technology to generate.

Earlier this month current and former U.S. officials said the United States under former President George W. Bush began building Stuxnet to try to prevent Tehran from completing suspected nuclear weapons work without resorting to risky military strikes against Iranian facilities.

They said President Barack Obama accelerated the efforts after succeeding Bush in 2009.

World powers and Iran failed to secure a breakthrough at talks on Tehran's nuclear program in Moscow on Tuesday, despite the threat of a new Middle East conflict if diplomacy collapses.

After two days of talks, European Union foreign policy chief Catherine Ashton said significant differences remained and the two sides had agreed only on a technical follow-up meeting in Istanbul on July 3.

Tehran has repeatedly said that as a member of the nuclear Non-Proliferation Treaty (NPT), it can develop a full nuclear fuel cycle, and, if this is recognized, talks with the permanent members of the U.N. Security Council — Britain, France, Russia, China, the United States — and Germany (the P5+1) can succeed.

"If the other side agrees to recognize Iran's (nuclear) rights based on international regulations, Iran is ready to negotiate anything," Ali Akbar Velayati, an adviser to Iran's Supreme Leader Ayatollah Ali Khamenei was quoted as saying by the official IRNA news agency on Thursday (MSNBC, 2012)

Title: Dirty Deeds: Iranian Nuclear Program Hit By 'AC/DC Virus'?
Date: July 24, 2012

Abstract: Iranian nuclear facilities have reportedly been attacked by a “music” virus, turning on lab PCs at night and blasting AC/DC’s “Thunderstruck.”

Mikko Hypponen, Chief Researcher at Finnish digital security firm F-secure, publicly released a letter he received from an unnamed Iranian scientist. The researcher, who claimed to work for the Atomic Energy Organization of Iran (AEOI), said that another virus has struck the Natanz uranium enrichment facility in central Iran and a secret underground research facility at Fordo, southwest of Tehran.

The letter’s author reported that the virus shut down equipment (made by Germany’s Siemens Corporation) and automated systems at both research centers.

Hypponen published the letter on his blog, but cautioned that there is no way for him to verify the accusations. He was able to confirm, however, that the letter did originate from the AEOI’s servers.

The letter, which was reportedly sent to various cybersecurity experts, said that Metasploit’s Penetration Testing Software had been used to direct this new attack on Iran’s nuclear facilities.

The scientist stressed that he is not a cybersecurity specialist, and does not have detailed information on the virus.

“There was also some music playing randomly on several of the workstations during the middle of the night with the volume maxed out. I believe it was playing ‘Thunderstruck’ by AC/DC,” the scientist wrote.

If true, this attack is the third hacking attempt aimed at Tehran’s controversial nuclear program. In 2010, the state-of-the-art Stuxnet virus set Iran’s nuclear ambitions back by at least two years.

In May 2012, experts at Russia’s Kaspersky Laboratories exposed another Trojan virus called Flame, which was designed to spy on web activity in Iran and some Middle Eastern countries. Russian cybersecurity experts labeled Flame “probably the most complicated virus ever.”

Iran claimed to have found a way to neutralize Flame (RT, 2012)

Title: Iran Accuses Siemens Of Nuclear Sabotage
Date: September 22, 2012
Fox News

Abstract:  Iran is accusing the German technology company Siemens of implanting tiny explosives in equipment the Islamic Republic purchased for its nuclear program.

A prominent Iranian lawmaker says the booby-trapped equipment was meant to derail Iran's uranium enrichment efforts, but security experts discovered the explosives and removed them.

Siemens denies the charge and says its nuclear division has had no business with Iran since the 1979 revolution.

Any sale of nuclear equipment to Iran is banned under U.N. sanctions, raising the possibility that if it indeed has some, it may have been acquired through third parties.
  Iran claims it has been the target of a concerted campaign by Israel, the U.S. and their allies to undermine its nuclear efforts through covert operations.

Five nuclear scientists and researchers have been killed in Iran since 2010. Tehran blames the deaths on Israel's Mossad spy agency as well as the CIA and Britain's MI-6. Washington and London have denied any roles. Israel has not commented (Fox News, 2012)

Title: Spy Rock Explodes Near Secret Iranian Nuclear Compound - Report
Date: September 23, 2012

Abstract:  Iranian troops patrolling the perimeter of a secret uranium enrichment site have reportedly found a monitoring device disguised as a rock. The spy gadget exploded when disturbed, probably on a self-destruct trigger.

The incident happened last month, although no link to espionage operations was known before The Sunday Times newspaper broke the news. At the time Iranian Revolutionary Guards were checking terminals connecting communication links at Fordo, an underground site near Qom in northern Iran, the British newspaper reported Sunday citing intelligence sources.

Iranian experts who examined the scene after the explosion believe that the spy device was capable in intercepting data from computers at the plant.

Tehran did not report discovering the device. But last week Iranian Vice-President Fereydoun Abbasi, who heads the national atomic energy agency, said the explosion on August 17 damaged power lines at Fordo.

Inspectors from the International Atomic Energy Agency (IAEA), who visited Fordo the day after the explosion, did not mention any disruption in their report.

The newspaper’s sources did not indicate which country’s intelligence service planted the rock at the Iranian nuclear facility. Israeli, British and American agents are reportedly actively operating in the country, monitoring its military and nuclear programs. Some Western countries say Iran is trying to build a nuclear weapon under the guise of its civilian nuclear energy projects, an allegation Tehran firmly denies.

Disguising spy equipment as elements of landscape is far from unusual. In 2006 a major scandal erupted in Russia, after a controversial documentary said British secret services used a transmitter disguised as a rock to communicate with some non-governmental organizations working in Moscow.

This year British officials admitted that they did use such a device disguised as a rock for monitoring and secret communication with intelligence informants (RT, 2012)

Title: Spy Device Disguised As Rock Blown Up Near Iran Nuclear Site
Date: September 23, 2012
Al Arabiya News

Abstract:  A spy device camouflaged as a rock exploded when it came into contact with Iranian troops near an underground nuclear enrichment plant, The Sunday Times reported this week. 

Last month, Revolutionary Guards at the Fordo nuclear facility, near the northern city of Qom, came across the rock and attempted to move it, according to sources who spoke to the newspaper.

The guards, who had been on patrol to check terminals connecting data and telephone links to the site, reportedly witnessed the disguised spy device exploding when they came into contact with it. 

Experts who surveyed the scene of the explosion, according to the newspaper, analyzed remnants of the device and found it had been able to intercept data from computers at the nuclear plant, where uranium is enriched.

News of the explosion was reportedly first kept secret by the Iranians. But last week, Fereydoun Abbasi the Iranian vice-president and the head of the nuclear energy agency, revealed that the power lines between Qom and the Fordo facility were blown-up in August.

The finding has sparked speculation over whether the spy device could have been a significant source of intelligence for Western countries, which has now been lost. 

Israel believes Iran's nuclear program to be aimed at developing an atomic weapons capability that would menace its own existence, and its current status as the Middle East's sole, if undeclared, nuclear weapons power.

Iran insists its program is exclusively for peaceful, civilian ends, but it is locked in a deepening standoff with the U.N. nuclear watchdog and the U.N. Security Council over the issue.

The existence of the site was unknown until it was uncovered three years ago in 2009, according to The Sunday Times, which added that the nuclear plant has been under surveillance by American, British and Israeli intelligence agencies. 

It is believed that there are up to 3,000 centrifuges which are pieces of equipment used to separate substances of different densities and rotates at high speed that are hidden under 260ft of rock.

There are reports that claim the explosion was planned to cut the power supply to the plant and damage the centrifuges, however, inspectors from the International Atomic Energy Agency, who visited the site the day after the explosion occurred did not state that there was any damage or disruption to the plant in their reports.

The enrichment of uranium in Iran has become a matter of considerable diplomatic importance. Israeli Prime Minister Benjamin Netanyahu stated last week, that Iran would have what it needed for a nuclear weapon by the middle of next year, and has threatened a unilateral attack.

However, Britain and the United States believe that Iran is progressing at a slower pace. 

British officials confessed earlier in the year that a fake rock had been discovered in Moscow in 2006, the camouflaged rock was reportedly revealed to hold monitoring and transmission equipment used for espionage
(Al Arabiya News, 2012)

Title: First-Ever Terror Rocket Fired At Dimona Nuclear Plant
November 14, 2012
Arutz Sheva 7

Gaza terrorists fired a rocket at Dimona Wednesday, where Israel's nuclear reactor is located. The rocket fell wide of its mark and caused no casualties or damage. Channel 2 said this was the first time a terror rocket was fired at the sensitive site.

Terrorists fired about 20 Grad Katyusha missiles at Be'er Sheva, after firing at Sderot and Ashkelon. There have been no reports of casualties. Iron Dome anti-missile batteries successfully intercepted most of the rockets fired at Be'er Sheva. One woman was reportedly lightly hurt in Be'er Sheva.

At least two rockets were fired at Ashdod. Iron Dome intercepted one but a second one fell within the city, in an open space. No one was hurt.

Rockets were also fired at Ofakim.

The IDF released video of a Fajr rocket being placed inside a concrete silo at an unknown date in the past. The IAF is believed to have hit most of the Fajr rockets that have been hidden in Gaza.

The IDF also released an aerial photo showing the proximity between a Fajr launch site and civilian structures, including a kindergarten (Arutz Sheva 7, 2012).

Title: Symantec Discovers 2005 US Computer Virus Attack On Iran Nuclear Plants
Date: February 26, 2013

Abstract: Researchers at the security company Symantec have discovered an early version of the "Stuxnet" computer virus that was used to attack nuclear reprocessing plants in Iran, in what they say is a "missing link" dating back to 2005.

The discovery means that the US and Israel, who are believed to have jointly developed the software in order to carry out an almost undetectable attack on Iran's nuclear bomb-making ambitions, were working on the scheme long before it came to public notice – and that development of Stuxnet, and its forerunner, began under the presidency of George W Bush, rather than being a scheme hatched during Barack Obama's first term.

The older version of the virus, dubbed "Stuxnet 0.5" – to distinguish it from the "1.0" version – also targeted control systems in Iran's Natanz enrichment facility, the researchers said.

"Stuxnet 0.5 was submitted to a malware scanning service in November 2007 and could have begun operation as early as November 2005," Symantec notes in a report. It may have been submitted to see whether Symantec's defences would recognise it as malware – in which case it would have been useless. One key to Stuxnet's success was that it was not detected by conventional antivirus systems used in corporate and state computer systems.

The success of Stuxnet – in both forms – is reckoned to have averted a planned military strike by Israel against Iran's reprocessing efforts in 2011. During 2010 it had seemed increasingly likely that Israeli jets might target the heavily-armoured plant to thwart Iran's nuclear ambitions.

But the computer virus, one of the most visible forms of a cyberwar that is increasingly raging between nation states, made that unnecessary, and is reckoned to have put Iran's plans back by years.

The 1.0 version of Stuxnet is reckoned to have infected Iranian computers after being copied onto USB sticks which were left in locations in India and Iran known to be used by Iranian nuclear scientists and their contacts. It then spread into computer systems and took over the connected Siemens control systems, spinning centrifuges to dangerous speeds in order to damage the systems.

The 0.5 version, by contrast, was transmitted as part of an infected control archive for specific Siemens systems used for uranium enrichment. Once active, it infected the network and control systems and closed off valves, a move that would cause serious damage to the centrifuges and the enrichment system. It also recorded data about the system it was on, which it would send back over the internet to a set of "command and control" servers – which at the time had been faked to look like a group of internet advertising agencies created in 2005, with names such as and, and all bearing the same phrase on the front: "Believe What the Mind Can Dream." (They have since been adopted by other companies, or closed.)

"The 0.5 version was a mixture of sabotage and espionage – affecting the valves and reporting back," said Sian John, Symantec's director of security strategy for UK and Ireland Enterprise. "This really goes to show that with the right impact and amount of research, these groups can create very targeted attacks" (Guardian, 2013).