Documente Academic
Documente Profesional
Documente Cultură
A. Introduction
1. This is the story of a daring operation (Operation “Orchard” also called “Out of the Box”)
executed on the night-early morning of 5th - 6th September 2007 by the Israeli Air Force
(IAF), Army and Intelligence community. The strike destroyed a nuclear reactor that Syria
was building with help of North Korea.
2. During the operation, IAF used electronic warfare to take over Syrian air-defenses and feed
them a false-sky picture. Syria was equipped with advanced Russian air defense system
called Pantsir-S1 which claimed to be immune to electronic jamming. Syria’s Air Defence
System malfunctioned during the entire period of the operation, starting from the time the
Israeli fighters crossed into Syria, bombed their target and returned. Operation Orchard saw
the baptism of fire of the Suter airborne network system. The Suter airborne network attack
system, developed by the US, made it possible to feed enemy radar emitters with false
targets, and manipulate enemy sensors. The network attack activated a secret built-in kill
switch by injecting malware over the air and through the radar system.
3. In all matters of preemption, relevant international law warrants serious attention. During
the attack on Osiraq in 1981, Israeli fighter-bombers destroyed Iraq's nuclear reactor before
it was ready to go on line. Immediately following the attack, the general global community
reaction was preponderantly hostile. Under the long-standing customary right of anticipatory
self-defense, every state is entitled to strike first whenever the danger posed is "instant,
overwhelming, leaving no choice of means and no moment for deliberation." If anything,
this standard, which dates back to 1837 (in a naval incident known formally as "The
Caroline"), is more compelling in the nuclear age than ever before.
4. Regarding the 2007 Israeli Operation Orchard, then Israeli Prime Minister Ehud Olmert,
consciously reasserted the 1981 "Begin Doctrine," this time referencing the Deir ez-Zor
region of Syria. Several years later, in April 2011, the U.N.'s International Atomic Energy
Agency authoritatively confirmed that the bombed Syrian site had indeed been the start of
a substantial nuclear reactor. Indisputably, Olmert's decision, like Begin's earlier one, turned
out to be right.
5. "Defensive warfare does not consist of waiting idly for things to happen," counsels Carl von
Clausewitz in his classic, "On War." "We must wait only if it brings us visible and decisive
advantages." Israel chose not to wait in 1981 and 2007. As a welcome result, the world
does not have the same nuclear fears for Syria and Iraq that it harbors for North Korea.
B. The Milestones
B.1. The Proof
a. The Syrian nuclear reactor was referred to as the Al Kibar site. The nuclear
reactor was produced with the help of North Korea. Assad conducted the
nuclear project in great secrecy. The contacts with North Korea were
coordinated by the head of the Atomic Energy Commission, Othman, and Gen.
Muhammad Suleiman, the regime’s person for dark ops, who also oversaw
military relations with Iran and Hezbollah. This small and secret coterie headed
by Suleiman was directly subordinate to the President. In Israel it was called
“the shadow army.”
b. The Cube, as the site was called was located at an isolated site called Al Kibar,
less than a kilometer west of the Euphrates River. The Koreans and the
Syrians had built a camouflage structure on top of the reactor that made it look
like a factory from the outside. Rubble was scattered around the building and
Unique Selling Points: Walkie Talkie and SDR Features
the place looked fairly neglected. There was not much traffic in the area. In
January 2007, a pipeline leading from the Cube to the Euphrates was
identified in satellite photos. This was the sign of the existence of a cooling
system, an essential element in a reactor.
c. The next breakthrough occurred in Vienna in early March 2007. Ibrahim
Othman, head of the Syrian Atomic Energy Commission, had come to Austria
to participate in the deliberations of the International Atomic Energy Agency.
A cell of Mossad agents from the Keshet unit broke into the apartment where
Othman was staying and within less than an hour “vacuumed up” the
information that was on his laptop. The material was found to include about 35
photographs from inside the mysterious building in the Syrian desert. The
pictures revealed fusion cylinders and bars and also some Korean workers.
d. It emerged that the Cube design mirrored the North Korean reactor at
Yongbyon, which the North Koreans used to produce fissile material for
nuclear weapons. That was in turn a copy of a British reactor built in 1950s.
B.2. The Decision-Making Process
a. The decision making was made easy by the “Begin doctrine” that mandated
Israel, not to allow any of its foes in the Middle East to develop nuclear
weapons. To hear opinions from individuals beyond the heads of the military
and the intelligence communities, Olmert consulted other experienced people,
3 ex Prime Ministers and external oversight teams. In those meetings
Opposition leader Netanyahu and Barak were very firm in their opinion that
Israel had to attack the reactor. Simon Peres had expressed reservations. The
Prime Minister chose to ignore this suggestion.
b. Olmert decided to share the sensitive information about Syria with the
Americans. He hoped that perhaps the George W. Bush’s administration
would take it upon itself to destroy the reactor. Michael Hayden, the head of
the CIA, wrote years later in The Washington Post that he told Bush that his
agency had concluded that the site at Al Kibar was part of a nuclear weapons
program and there was no other explanation for its existence. However, Bush
told Olmert at their meeting on 19th June that he could not justify an American
attack on a sovereign state. Bush said, he had decided to send an envoy to
Syria to pose an ultimatum to Assad to demolish the reactor, under
international supervision. The Prime Minister warned the American President
that setting the diplomatic channel in motion would make it possible for the
Syrians to hasten the completion of the construction. Assad was liable to
position anti-aircraft batteries near the reactor or even to establish something
like a kindergarten there as a “human shield.”
c. The differences of opinion between the Prime Minister Olmert and Defence
Minister Barak on the matter of the reactor became evident relatively quickly.
The Prime Minister was imbued with a sense of urgency and a desire to act.
Barak, however, believed that the operational plans the IDF had formulated
for attacking the plant had not yet matured sufficiently and did not ensure
complete success. He pushed for formulation of alternative proposals. Barak
also downplayed the risk of attacking a “hot” reactor.
3rd Jan 2019 - PA2 1 | Page
Unique Selling Points: Walkie Talkie and SDR Features
e. After the attack, MI chief Yadlin went to the Turkish chief of staff to explain the
considerations and circumstances and to reassure him that there had been
absolutely no violation of Turkish sovereignty during the operation. The Turks
were not happy, but they decided not to make an issue of it.
f. Shortly after the arrival of the planes, Olmert phoned American President, who
was on a visit to Australia and informed him about the attack. The following
afternoon, the Syrian news agency issued a laconic statement to the effect
that during the night its air defense system had chased away Israeli planes
that had penetrated Syria’s air space.
g. The Syrian regime completed the destruction of the bombed building and
buried the ruins in sand. When the IAEA wanted to visit the site, the Syrians
claimed there was nothing to see because there had been nothing there. Yet
in 2008, IAEA inspectors found traces of radioactive substances there, and
the agency said there was a high probability that a nuclear reactor had been
in operation at the site.
off insurgent IEDs along convoy routes. NCCT and Suter were also tested in
a limited way operationally in Iraq and Afghanistan against insurgent
communication networks.
d. NCCT mimics the way the human central nervous system instantaneously
focuses the eyes on the potential source of a threatening sound. When an
enemy asset communicates or moves, a sensor platform will get a line of
bearing on it. It will further alert the other sensors to focus on the enemy asset
and provide corroborating evidence of the enemy’s identity and location. The
sensors can pick up even relatively weak signals such as those from cell
phones and can detect other C2 components that produce electromagnetic
signatures.
e. Once two other sensors detect the asset, the NCCT system automatically
calculates the location of the asset to within a few hundred feet. NCCT reduces
the time needed to locate a target from hours or minutes down to seconds.
f. The NCCT then compares the signals to dynamic databases of previously
collected signals to ascertain, even the individual identity of the emitting
enemy unit using radio finger printing technology.
C.4. Suter Program
a. Once NCCT localizes and identifies the target, Suter goes to work. The Suter
technology enables USAF operators to invade enemy communications and
computer networks, particularly those associated with integrated air defence
systems, while preventing enemy operators from understanding or
counteracting the exact nature of the invasion. Suter reduces the target zone
initially calculated by NCCT by at least an order of magnitude, which implies
tens of feet. After pinpointing the target antennas, Suter beams electronic
pulses into the antennas that effectively corrupt, the processing systems that
present the enemy operators with their physical picture of the battlefield. It is
widely speculated that Digital Radio Frequency Memory (DRFM) technology
was used to feed misleading information to the Syrian air defence radar
system. The data streams insert customized signals, including specialized
algorithms and malware, into the vulnerable processing nodes.
b. Corruption of an ADS network results in fabrication of phantom targets and
fake messages. Suter operators then take over control of enemy radars. By
steering the enemy sensors away from friendly aircraft, Suter operators can
figuratively put blinders on the enemy operators. Consequently, friendly
aircraft don’t have to be stealthy. Even if the operators know they’re being
hijacked, regaining control of the system is not easy.
c. Suter has two generic parts: one for inserting input and one for monitoring
output. Block one encompasses the second task, ie monitoring the infected
system. Technology from this block allows friendly operators to monitor what
enemy radars see. The main platform for this collection task is the RC-135
Rivet Joint electronic surveillance aircraft. Rivet Joint is based on the
venerable KC-135 strategic tanker airframe, designed for high altitudes, fast
subsonic speeds, and long ranges or loiter times. The platform can carry aloft
D. Conclusion
1. There had been indications that the Syrian government had been interested in acquiring
nuclear weapons for decades, dating back to the regime of Hafez Al Assad. The big break
came in 2007, when Israeli agents obtained actual photographs of the reactor under
construction inside the building and what appeared to be North Korean specialists working
at the site.
2. Operation Orchard showed the capabilities of the Israeli Air Force. The capabilities were
also used to carry out an air strike on a weapons convoy and military complex near
Damascus, at the beginning of 2013. As done in 2007, on the night between 29th and 30th
January 2013, Israeli bombers entered and egressed the Syrian airspace almost completely
3rd Jan 2019 - PA2 6 | Page
Unique Selling Points: Walkie Talkie and SDR Features
undetected by the Syrian air defenses: a sign that Syrian radars can do nothing against
Israel’s Electronic Warfare systems, most probably further improved to embed the capability
to inject malware from F-16s into enemy networks.
3. The strategy of not jamming radar signals and using a more sophisticated approach of
"hacking" into enemy defences is new. The process involves locating enemy emitters with
great precision and then directing data streams into them that can include false targets and
misleading message algorithms. This signals the beginning of a new era in Electronic
Warfare.