Podcast Summary: The Rest Is Classified
Episode: 69. Israel Attacks Iran: Mossad’s First Assault (Ep 2)
Release Date: July 29, 2025
Hosts: David McCloskey & Gordon Corera
Introduction
In episode 69 of The Rest Is Classified, hosts David McCloskey, a former CIA analyst turned spy novelist, and Gordon Corera, a veteran security correspondent, delve deep into the covert operations aimed at sabotaging Iran’s nuclear program. Titled “Israel Attacks Iran: Mossad’s First Assault,” this episode unpacks the sophisticated cyber-espionage campaign known as Operation Olympic Games, highlighting its implications on global intelligence dynamics.
Background on Iran’s Nuclear Program and Natanz Facility
The episode begins by contextualizing Iran's nuclear ambitions, focusing on the Natanz enrichment facility. Iran’s acquisition of centrifuges through Pakistani nuclear scientist A. Q. Khan marked a significant escalation in their uranium enrichment capabilities ([02:25] David McCloskey). The Natanz facility became a central target for Western intelligence agencies aiming to prevent Iran from developing nuclear weapons.
Quote:
“From Cold War espionage to modern-day intelligence agencies like the CIA, MI6, and Mossad, explore the world of double agents, classified missions, and the shadowy figures who operate in them.”
— David McCloskey [02:25]
Operation Olympic Games: Origins and Objectives
The core of the discussion revolves around Operation Olympic Games, a pioneering cyber-attack initiative designed to disrupt Iran's nuclear program without engaging in open warfare. President Bush advocated for this “third option” alongside diplomatic negotiations and military strikes ([04:08] Gordon Corera).
Quote:
“President Bush wanting that third option. And that's what we're going to be looking at this time, this third option, which is going to be a cyber attack.”
— Gordon Corera [04:08]
Cyber Warfare and Sabotage Techniques
McCloskey and Corera explore the innovative nature of the cyber-weapon developed under Operation Olympic Games. Unlike traditional cyber espionage focused on data theft, this operation sought to cause physical disruptions by manipulating the centrifuges’ control systems.
Quote:
“… this is a cyber attack that bleeds into the physical world. It is not merely dealing with zeros and ones on a screen. It is physically leaping and affecting machines in the real world.”
— David McCloskey [04:38]
The hosts compare the complexity and impact of this cyber assault to the Manhattan Project, emphasizing its potential to significantly set back Iran’s nuclear advancements.
Espionage Efforts and Scale Modeling of Natanz
A fascinating segment discusses the extensive espionage efforts required to execute such a precise cyber attack. Both the US and Israeli intelligence agencies constructed detailed scale models of the Natanz facility to understand the layout and operational intricacies of the centrifuges.
Quote:
“That makes a very natural place if you were an officer of a Western intelligence service who is really interested in sabotaging the Iranian nuclear program to kind of go down there and have a look.”
— David McCloskey [20:22]
This meticulous preparation allowed intelligence operatives to develop targeted code capable of manipulating physical infrastructure without immediate detection.
The Role of Different Intelligence Agencies
The episode highlights the collaboration and occasional tensions between various intelligence agencies. Mossad, under the leadership of Mayor Degan, pursued covert operations independently from US intelligence, aiming to disrupt Iran’s nuclear program without triggering open conflict.
Quote:
“Mossad is pursuing its own operations, Operations, its own sense of Israeli security interests.”
— David McCloskey [11:53]
Additionally, the involvement of lesser-known agencies like the Dutch AIVD underscores the multinational effort in safeguarding global security interests.
Technical Aspects of the Cyberattack
A significant portion of the discussion is dedicated to the technical sophistication of the cyberattack. The malware developed was designed to interfere with the Programmable Logic Controllers (PLCs) that manage the centrifuges, causing them to malfunction without raising immediate alarms.
Quote:
“… the code is looking for something called a programmable logic controller, a plc. And the PLC is used to control industrial facilities.”
— Gordon Corera [26:35]
Moreover, the malware employed advanced techniques like data replay to mask its malicious activities, ensuring that Iranian operators perceived normal operations while the centrifuges were being sabotaged.
Quote:
“The code also records what the normal operation of the centrifuges looks like for two weeks. And then when it starts playing with the centrifuges and those valves, it plays back to the operators, the normal flow of data, as if they're operating normally.”
— Gordon Corera [34:30]
Human Element in Cyber Sabotage
Despite the high-tech nature of Operation Olympic Games, the successful deployment of the malware required human intervention. The operation likely involved recruiting individuals with access to the Natanz facility to introduce the malware via physical media, such as USB drives.
Quote:
“… you need a person. So it's thought that what they do is draw up lists of companies and engineers who might have some kind of access to Natanz and to the Iranian nuclear system.”
— Gordon Corera [29:14]
The tragic death of a Dutch engineer linked to the operation adds a layer of mystery and underscores the perilous nature of such espionage missions.
Impact and Implications
Operation Olympic Games marked a paradigm shift in cyber warfare, demonstrating the ability to conduct espionage that directly impacts physical infrastructure. By silently disrupting the Natanz facility, the operation bought critical time for international actors to recalibrate their strategies against Iran’s nuclear ambitions.
Quote:
“… it's not like you've blown up the valves. It's not like you've done something really obvious to them. You've just changed the flow of gas for a while, causing some of it to be wasted.”
— Gordon Corera [33:08]
This stealthy approach prevented Iran from immediately identifying the source of the sabotage, fostering confusion and delaying their nuclear progress without escalating to open conflict.
Conclusion and Future Directions
David McCloskey and Gordon Corera conclude the episode by emphasizing the ongoing cat-and-mouse game between intelligence agencies and state actors. The success of Operation Olympic Games set a precedent for future cyber operations aimed at neutralizing high-stakes targets without traditional warfare.
Quote:
“It's a brilliant piece of tradecraft here… It is an absolutely brilliant piece of tradecraft here.”
— Gordon Corera [36:38]
The hosts hint at future episodes that will explore the escalating tensions as both Iran’s nuclear capabilities and the covert measures against them continue to evolve, promising deeper insights into the shadowy world of modern espionage.
Notable Quotes with Timestamps
-
David McCloskey [02:25]:
“The code that struck Natanz was a work of engineering bravado, every inch as much as the centrifuges it was designed to destroy.” -
Gordon Corera [04:08]:
“President Bush wanting that third option. And that's what we're going to be looking at this time, this third option, which is going to be a cyber attack.” -
David McCloskey [04:38]:
“…this is a cyber attack that bleeds into the physical world. It is not merely dealing with zeros and ones on a screen. It is physically leaping and affecting machines in the real world.” -
Gordon Corera [26:35]:
“The code is looking for something called a programmable logic controller, a plc. And the PLC is used to control industrial facilities.” -
Gordon Corera [34:30]:
“The code also records what the normal operation of the centrifuges looks like for two weeks. And then when it starts playing with the centrifuges and those valves, it plays back to the operators, the normal flow of data, as if they're operating normally.” -
David McCloskey [36:38]:
“It is an absolutely brilliant piece of tradecraft here.”
Final Thoughts
Episode 69 of The Rest Is Classified offers a compelling exploration of one of the most intricate cyber-espionage operations in recent history. Through detailed discussions and expert insights, David McCloskey and Gordon Corera illuminate the clandestine efforts to curb Iran’s nuclear advancements, showcasing the evolving tactics in the realm of modern intelligence and cyber warfare.
For those fascinated by espionage, cyber warfare, and global security dynamics, this episode provides a meticulously detailed narrative, enriched with technical explanations and strategic analyses, making the complex world of intelligence operations accessible and engaging.
