The Complex

Is This Iran's First ICBM Launch Site?

i

You're looking at what may be the launch site that Iran is secretly building for its first intercontinental ballistic missiles. And that means Tehran could be inching dangerously close to striking foes from thousands of miles away.

This complex, revealed by Jane's Intelligence Review last night, appears to be Iran's latest space launch facility. However, this site, located about 35-40 kilometers southeast of the town of Shahrud, may be geared toward testing ICBMs instead of rockets meant to loft satellites into orbit.

"Imagery analysis of the Shahrud site suggests it will be a strategic facility used to test ballistic missiles, leaving the other two sites free to handle Iran's ambitious program of satellite launches," Matthew Clements, Editor at IHS Jane's Military and Security Assessments Centre, said in a statement.

How can you tell? Jane's says that July 2013 satellite imagery of the site shows rocket assembly buildings and a launch tower that are significantly smaller than those found at Iran's other space launch facility, near the town of Semnan. This may reflect the fact that the Shahrud facility is built to accommodate smaller, truck-mounted ballistic missiles compared instead of much larger satellite-lifting rockets.

(Remember, ICBMs aren't always launched from silos the way America's Minuteman III missiles are. Iran may well be trying to develop truck-launched ICBMs resembling those found in Russia and China.)

The new site also lacks a liquid-fuel storage facility needed to support the rockets that hoist Iranian satellites into space

Furthermore, the launch pad at Shahrud looks to Jane's like it's been built to support the weight of the larger missile carrying trucks that will lob ballistic missiles skyward.

"One explanation for the different pad sizes is that the one at Shahrud is designed to handle test launches of ballistic missiles fired from transporter-erector launcher (TEL) vehicles rather than [space launch vehicles]," reads the private intelligence firm's report on the site.

All of these signs point to Iran possibly getting ready to start testing a no-kidding intercontinental ballistic missile.

"Iran's claim that its 2,000 km-range, solid-fuel Sejjil missile is already in service after two tests suggests the next stage in the program will be the development of an intercontinental ballistic missile," claims Jane's.

Adding some credence to the theory is the Pentagon's 2012 estimate that Iran will be able to test an ICBM by 2015.

While satellite images of a construction site don't provide anything close to definitive proof that Iran will be testing ICBMs here, Janes' analysis "doesn't seem to be wildly inconsistent with the Intelligence Community's estimates," said Jeffrey Lewis, of the James R. Martin Center for Non-Proliferation Studies tells Killer Apps.

Whether this new site will be used to test ICBMs or less destructive, satellite-launching missiles, one thing is clear, Iran's missile program is advancing steadily.

(Maybe this is the next place you should be watching for a mysterious, massive set of explosions like the 2011 blasts that killed the architect of Iran's missile program, Major General Hassan Moghaddam, at the Alghadir missile base in Bid Ganeh.)

National Security

Even the White House Thinks This Secrecy Thing Is Out Of Control

The White House is promising to find new ways to declassify cybersecurity secrets -- even as the Obama administration continues to go after leakers with a vengeance.

"There is absolutely a shift toward doing that and we're working quite hard at that," said Andy Ozment, senior director for cybersecurity at the White House told Killer Apps today. "We have to change our culture and accept more risk to our [cyber intelligence] information in order to share it more aggressively."

While the administration has made a seemingly aggressive push for secrecy, prosecuting record numbers of alleged secret-spillers, the opposite is true when it comes to fighting cyber attacks on networks largely owned and operated by the private sector.

All of this was laid out in last February's cybersecurity executive order through which the White House is trying to dramatically increase the amount of network intelligence government shares with businesses.

"It is the policy of the United States Government to increase the volume, timeliness, and quality of cyber threat information shared with U.S. private sector entities," reads the order.

Ozment said his shop is trying to carry out that order, "and declassifying information or creating unclassified versions of information is a key part of that."

"Let's say we have a piece of information that we collected through intelligence that may be useful to protect a company. The goal would be to exert ourselves and say, ‘let's identify another way we could have found this information that would not have been through intelligence'," Ozment added.

In other words, the government might share secrets -- without telling anyone they're secrets.

"In other cases it will be, ‘we found this through intelligence, but we think the threat is [so] significant we'd rather lose the source and protect our infrastructure,'" said Ozment. "That's just a straight calculation."

Still, the government has work to do when it comes to quickly sharing information with the private sector. Companies routinely complain about supplying info to the government - and getting nothing back.

For a long time now there's been a chorus of experts saying that over-classification prevents intelligence from reaching businesses in time for it to be useful against network attacks. More broadly, the heavy blanket of secrecy is thrown over so much information, these experts say, that it actually encourages the kind of massive leaks we've seen from Edward Snowden and Bradley Manning. The ridiculousness of the classification system encourages certain leakers to ignore it altogether.

Just last week, we reported that the Government Accountability Office is kicking off its first-ever investigation into over-classification on a variety of topics at the request of California Republican Rep. Duncan Hunter.

This flies in the face of conventional Intelligence Community wisdom -- especially when it comes to cybersecurity. The traditional notion has been that the discovery of a software flaw should be kept secret so that the government can exploit it and deploy its own malware on enemy networks.

"Back in the pre-cyber world we had a pretty well worn rut in the road as to where that line [favoring offense over defense] is," former CIA and NSA director Michael Hayden told representatives from the electrical power industry in Washington on Aug. 6. "That line may now be in the wrong place."

Keeping security flaws secret from industry has resulted in tactical successes for U.S. government hackers but these come at the cost of causing "a real strategic problem [in] that industry is not aware of vulnerabilities out there," said the former spymaster.

He echoed the sentiments of the White House that when it comes to cyber, the emphasis must be placed on defense, even if it means burning some ability to conduct offensive operations.

"I think the trend line right now is in the direction of more defense even if it has to be at the expense of offense," said "Right now, what we need to do with that trend line is accelerate it."

President Obama has been taking a lot of heat for backing off some of the NSA-focused secrecy reforms he championed as a Senator and presidential candidate. (These reforms included, among other things, requiring the executive branch to routinely tell Congress how many Americans' communications information had been swept up by the government and limiting the amount of bulk electronic data the government could collect) But in the area of cybersecurity, at least, his administration is at least talking a good game about fulfilling Obama's earlier promises to open the government.

Getty Images