0 0 lang="en-US"> The War Beneath the War — IntercontinentalNews247
Site icon IntercontinentalNews247

The War Beneath the War

Read Time:7 Minute, 33 Second

The War Beneath the War

 

By Alabidun Shuaib AbdulRahman

 

When the rivalry involving the United States, Israel and Iran is discussed in newspapers or on television shows, the focus is almost always on dramatic moments—missile launches, air strikes, nuclear negotiations, or the activities of proxy militias in Lebanon, Iraq and Yemen. Yet these visible episodes tell only a fraction of the story. Beneath them lies a far more consequential contest fought through technology, intelligence systems, covert engineering and cyber operations. It is a war fought not just with weapons, but with code, algorithms, sensors and the manipulation of industrial machinery.

 

Over the past two decades, the confrontation has gradually transformed into what security analysts describe as systems warfare. The aim is not merely to defeat an enemy army on the battlefield but to sabotage the technological foundations on which a modern state depends its infrastructure, communications networks, scientific programmes and financial systems. This quiet technological instance has unfolded largely outside public attention, even though it has shaped the strategic balance in the Middle East.

 

The moment that revealed this hidden battlefield most clearly occurred in June 2010 when cybersecurity researchers identified an unusual computer worm circulating across networks around the world. The malware was later named Stuxnet. At first glance it appeared to be another sophisticated cyber intrusion. But detailed analysis soon revealed something far more alarming. Stuxnet had been designed not merely to steal data or disrupt computers; it was built to destroy physical industrial equipment.

 

READ ALSO: Kwara Emerges Beneficiary of $500m FG Power, Irrigation Project

 

The target of the malware was Iran’s uranium enrichment complex at the Natanz Nuclear Facility, located roughly 250 kilometres south of Tehran in Isfahan Province. Natanz housed thousands of centrifuges used to enrich uranium gas for Iran’s nuclear programme. These centrifuges, delicate machines spinning at extremely high speeds were controlled by programmable logic controllers produced by the German engineering company Siemens.

 

Stuxnet infiltrated the facility’s control systems and subtly altered the instructions regulating centrifuge speed. At specific intervals, the malware forced the centrifuges to accelerate far beyond their normal operational limits before abruptly slowing them down again. This repeated stress caused mechanical failure. At the same time, the virus fed false data to monitoring screens so that Iranian technicians would see readings indicating that everything was functioning normally.

 

By the time the attack was discovered, the damage had already been done. Security analysts later estimated that approximately 1,000 centrifuges, roughly one-fifth of Iran’s installed capacity at Natanz in 2009 had been destroyed. Subsequent investigative reporting revealed that the operation was part of a covert cyber programme known as Operation Olympic Games, initiated during the presidency of George W. Bush and later expanded under Barack Obama. Although neither United States nor Israel officially acknowledged responsibility. Although it was later confirmed that the operation was a joint effort by both Countries’ cyber specialists.

 

The importance of Stuxnet cannot be overstated. It represented the first publicly known cyber weapon capable of causing physical destruction to industrial infrastructure. In effect, it proved that lines of computer code could function as strategic weapons. Before Stuxnet, cyber warfare was generally associated with espionage or data theft. After Stuxnet, it became clear that cyber tools could sabotage factories, power plants and transportation systems.

 

This revelation carried profound implications. Modern societies depend on complex networks of industrial control systems which are software platforms that manage electricity grids, water treatment plants, oil pipelines, manufacturing facilities and transportation networks. Many of these systems were designed decades ago with minimal cybersecurity protections. By exploiting these vulnerabilities, technologically advanced countries can potentially disrupt entire sectors of national infrastructure without firing a single missile.

 

Yet cyber sabotage is only one dimension of the technological struggle involving the United States, Israel and Iran. Intelligence gathering has also undergone a profound transformation with the rise of artificial intelligence and advanced data analysis. Modern intelligence agencies collect staggering volumes of information: satellite imagery, intercepted communications, digital transactions, social media activity and geolocation data from billions of mobile devices. Processing such enormous datasets would overwhelm human analysts.

 

To solve this problem, intelligence organisations increasingly rely on machine learning algorithms capable of detecting patterns within massive streams of data. Israel’s signals intelligence division within the Israel Defense Forces, widely known as Unit 8200, has invested heavily in such technologies. These systems help analysts identify suspicious logistical movements, map covert networks and monitor scientific activities linked to Iran’s missile and nuclear programmes.

 

Artificial intelligence has therefore become a powerful tool in identifying individuals and facilities associated with sensitive research. Over the years, several Iranian nuclear scientists have been targeted in covert operations. One of the most dramatic incidents occurred on 27 November 2020 when Mohsen Fakhrizadeh, a senior physicist widely regarded as the architect of Iran’s nuclear weapons research, was assassinated near the town of Absard east of Tehran. Iranian officials later claimed that the attack involved a sophisticated remote-controlled machine gun mounted on a vehicle, demonstrating the increasing role of advanced technology in covert operations.

 

Drone technology has also become a critical instrument in the shadow conflict between Israel and Iran. Unmanned aerial vehicles have evolved rapidly over the past two decades, becoming smaller, cheaper and more versatile. Intelligence reports suggest that Israeli operatives have occasionally smuggled drone components into Iran through clandestine networks. Once assembled near strategic installations, these drones can be launched to attack radar systems, missile launchers or ammunition depots.

 

Such operations represent a new form of warfare sometimes described by analysts as “inside-out attacks.” Instead of launching strikes from outside a country’s borders, covert assets positioned within the target state create vulnerabilities that can later be exploited. By disabling air defence radars or surface-to-air missile batteries, these drones can make it easier for conventional aircraft to operate if a broader conflict erupts.

 

Another largely invisible battlefield lies within telecommunications networks. Modern military forces rely on secure communication systems linking field units with central command structures. If those communications are disrupted, even highly capable armed forces can struggle to coordinate operations. Cyber units therefore often attempt to infiltrate telecommunications infrastructure before or during military operations.

 

Such attacks may involve manipulating network routing systems, penetrating data centres or disrupting fibre-optic communication nodes. Although details are rarely disclosed publicly, analysts widely believe that telecommunications systems in the Middle East have periodically been targeted during periods of heightened tension between Israel and Iran. The goal is not necessarily permanent destruction but temporary paralysis—disrupting an adversary’s ability to respond quickly during a crisis.

 

Financial infrastructure has also become a target in this technological contest. Banking systems, electronic payment platforms and cryptocurrency exchanges now form essential parts of modern economies. Disrupting these systems can generate economic instability and public frustration. Cyber operations targeting financial databases or digital payment networks can therefore serve as instruments of strategic pressure.

 

Iran’s economy, already strained by international sanctions, is particularly vulnerable to such disruptions. Government subsidy programmes for fuel and basic commodities rely heavily on digital infrastructure. If cyber attacks interrupt payment systems or corrupt financial records, millions of citizens may suddenly find themselves unable to access essential services. In this way, cyber warfare can exert pressure not only on governments but also on societies.

 

Another rarely discussed aspect of the confrontation involves supply-chain sabotage. Nuclear programmes depend on highly specialised equipment—centrifuge components, electronic sensors, control circuits and advanced materials. Because these components are difficult to manufacture domestically, procurement networks often span multiple countries and intermediaries.

 

Taken together, these various operations reveal how profoundly warfare has changed in the twenty-first century. In earlier eras, military power was measured primarily by the size of armies, the number of tanks or the range of missiles. Today, power increasingly depends on technological expertise—cyber capabilities, data analysis, advanced electronics and intelligence networks capable of penetrating the digital architecture of modern states.

 

The rivalry involving the United States, Israel and Iran therefore provides an early glimpse into the future of conflict. The most decisive battles may not occur on visible battlefields but within the hidden systems that sustain national power: computer networks, industrial machinery, telecommunications infrastructure and financial databases.

 

This reality poses difficult challenges for policymakers. Cyber attacks can be extremely difficult to attribute with certainty, allowing states to conduct covert operations without openly acknowledging responsibility. This ambiguity complicates traditional deterrence strategies. In conventional warfare, identifying an attacker is usually straightforward; in cyberspace, digital footprints can be manipulated or disguised.

 

Moreover, the vulnerabilities exploited in operations like Stuxnet are not unique to Iran. Similar industrial control systems operate in power plants, transportation networks and factories across the world. As cyber capabilities continue to evolve, the possibility of attacks targeting critical infrastructure in other countries—including major global economies—becomes increasingly real.

 

Alabidun is a media practitioner and can be reached via alabidungoldenson@gmail.com

Happy
0 0 %
Sad
0 0 %
Excited
0 0 %
Sleepy
0 0 %
Angry
0 0 %
Surprise
0 0 %
Exit mobile version