{
	"id": "e09c1ef6-1bec-48cb-946b-f32aebc7b660",
	"created_at": "2026-04-06T02:11:19.040553Z",
	"updated_at": "2026-04-10T03:20:28.210496Z",
	"deleted_at": null,
	"sha1_hash": "be1590e02b537da218aa639504d7d0da02efe319",
	"title": "Iranian Cyber Attack on New York Dam Shows Future of War",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 436411,
	"plain_text": "Iranian Cyber Attack on New York Dam Shows Future of War\r\nBy Mark Thompson\r\nPublished: 2016-03-24 · Archived: 2026-04-06 02:01:50 UTC\r\nThe first nationstate warfare took place between soldiers on the ground, and then ships at sea. In the 20th Century,\r\nthe battles moved into the skies. On Thursday, the Justice Department claimed Iran had attacked U.S.\r\ninfrastructure online, by infiltrating the computerized controls of a small dam 25 miles north of New York City,\r\nheralding a new way of war on American soil.\r\n“We can tell the world that hackers affiliated with the Iranian government attacked U.S. systems, and we seek to\r\nbring them to justice for their crimes,” Assistant Attorney General John P. Carlin said, unveiling charges against\r\nseven Iranians for cyber attacks. The hackers, members of the Iran’s Islamic Revolutionary Guards Corps, also\r\ntargeted several financial institutions, the New York Stock Exchange and AT\u0026T with barrages of incoming emails\r\ndesigned to slow or shut down some of their computers, according to the indictment.\r\nHackers broke into the command and control system of the dam in 2013, apparently through a cellular modem.\r\nWhile 34-year-old Hamid Firoozi should have been able to release water from behind the dam given his remote\r\naccess, he “did not have that capability because the sluice gate had been manually disconnected for maintenance at\r\nthe time of the intrusion,” the U.S. government said.\r\nFBI\r\nWhile insignificant in the overall scheme—the 20-foot, flood-control dam is on Blind Brook in Rye Brook, N.Y.\r\n—it signals the desire of some foreign nations to infect, and potentially operate, U.S. infrastructure. “They were\r\nsending a shot across our bow,” Senator Charles Schumer, D-N.Y., said of the Iranian probing of the dam earlier\r\nhttps://time.com/4270728/iran-cyber-attack-dam-fbi/\r\nPage 1 of 2\n\nthis month. “They were saying that we can damage, seriously damage, our critical infrastructure and put the lives\r\nand property of people at risk.”\r\nThere is next to no chance the Iranians will end up in U.S. courts. But U.S. officials say the “name and shame”\r\neffort is designed to make clear the U.S. knows what happened, and to deter those involved from traveling\r\noverseas, where they could be arrested.\r\nThe intrusion happened as the U.S. and Iran readied to negotiate a deal curbing Tehran’s nuclear-development\r\nprogram, and followed by two years a massive U.S.-Israeli cyber attack dubbed Stuxnet on Iran’s nuclear\r\ncentrifuges designed to thwart its atomic ambitions. Some U.S. officials believe the Iranian attacks were in\r\nretaliation for the Stuxnet assault.\r\nThis isn’t the first time the U.S. has linked cyber attacks to foreign nations. In recent years, the U.S. government\r\npublicly accused North Korea of hacking into Sony Pictures Entertainment’s computers and the Chinese military\r\nof cyber-attacking several U.S. companies. “The infiltration of the Bowman Avenue dam represents a frightening\r\nnew frontier in cybercrime,” U.S. Attorney Preet Bharara of the Southern District of New York said Thursday.\r\n“These were no ordinary crimes, but calculated attacks by groups with ties to Iran’s Islamic Revolutionary Guard\r\nand designed specifically to harm America and its people.”\r\nMuch U.S. infrastructure is privately owned and poorly defended, given the lack of a major attack and the\r\nresulting reluctance to spend money defending against a putative threat. “These sectors may be particularly\r\nvulnerable to cyberattack because they rely on open-source software or hardware, third-party utilities, and\r\ninterconnected networks,” the Congressional Research Service warns.\r\nThe ability to run such systems remotely, as well as conduct maintenance and update software via the web itself,\r\noffers hackers all the access they need. Such networks are particularly tempting because they often control\r\noperations, and not merely information, potentially magnifying the impact of any attack on them. “Attacks against\r\noperations technology are different than information technology attacks because OT attacks can produce kinetic\r\neffects”—physical destruction—that CRS report noted with studied understatement.\r\nGiven the success of Stuxnet, it should come as little surprise that Iran is engaging in cyber warfare. Tehran is\r\nbelieved to be targeting the controls “that operate and monitor our electrical grid,” a report by the cyber-security\r\nfirm Norse Corp. and the American Enterprise Institute warned in a 2015 report. “It seems clear that elements\r\nwithin Iran are working to build a database of vulnerable systems in the U.S., damage to which could cause severe\r\nharm to the U.S. economy and citizens.”\r\nSource: https://time.com/4270728/iran-cyber-attack-dam-fbi/\r\nhttps://time.com/4270728/iran-cyber-attack-dam-fbi/\r\nPage 2 of 2",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"MITRE"
	],
	"references": [
		"https://time.com/4270728/iran-cyber-attack-dam-fbi/"
	],
	"report_names": [
		"iran-cyber-attack-dam-fbi"
	],
	"threat_actors": [],
	"ts_created_at": 1775441479,
	"ts_updated_at": 1775791228,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/be1590e02b537da218aa639504d7d0da02efe319.pdf",
		"text": "https://archive.orkl.eu/be1590e02b537da218aa639504d7d0da02efe319.txt",
		"img": "https://archive.orkl.eu/be1590e02b537da218aa639504d7d0da02efe319.jpg"
	}
}