The early hours of April 11 witnessed a power distribution network crash occur at the uranium enrichment plant in the Iranian city of Natanz, causing its shutdown. The accident did not inflict any injuries upon the plant's scientific or technical personnel. There were no nuclear emissions and no environmental hazard. A management representative reported on a conventional tripping event meant to ensure perfect safety of technical means.
At the same time, the country's Vice-President, Head of the Atomic Energy Organization of Iran (AEOI) Ali Akbar Salehi dubbed the nuclear accident a terrorist attack.
In turn, the Israeli KAN Public Broadcasting Corporation, citing its intelligence sources, reported that Israel might appear as the accident's mastermind. "Intelligence sources say Israel is behind the activity in Natanz. This is an Israeli cyber operation in which the Mossad was involved," the broadcaster informs. At the same time, no details are given as regards the information provider.
Nevertheless, it is thought that Iranian nuclear facilities' electronic security is hardly able to provide good safety against outside penetration: it's not the first case in this power industry of Iran. It must be admitted that Iranian specialists in electronic security technology development and implementation face an urgent need to work out measures that would help avoid software cracking of industrial processes not only at nuclear power plants, but also in the context of using various weapons and military equipment.
Once we talk about cyber terrorism, it is also possible that the operation has involved some well-placed subversive underground organization that will eventually scale up its activity in other sectors of Iran's economy either.