<b>Live updates: Follow the latest on </b><a href="https://www.thenationalnews.com/news/mena/2024/10/14/live-israel-gaza-war-lebanon/" target="_blank"><b>Israel-Gaza</b></a> Details are still emerging on Israel’s wave of air strikes against <a href="https://www.thenationalnews.com/news/mena/2024/10/28/iran-and-israel-trade-threats-at-un-after-weekend-strikes/" target="_blank">Iran</a> on Saturday, including a claim reported by Israel’s Kan News that Iranian <a href="https://www.thenationalnews.com/news/mena/2024/10/27/iran-in-bind-after-israel-sticks-to-us-imposed-strike-limits-say-diplomats/" target="_blank">air defences</a> were hacked in advance. The tactic was also disclosed to <i>The Independent</i>'s Farsi edition by purported security figures in Iran on Monday. Israel and Iran regularly exchange <a href="https://www.thenationalnews.com/mena/iran/2023/12/18/iran-petrol-station-hack-gonjeshke-darande/" target="_blank">cyber attacks</a>, including alleged attacks on civilian infrastructure such as banks and transport systems, and most famously, a 2010 cyber attack on Iranian uranium enrichment equipment, with the <a href="https://www.thenationalnews.com/opinion/comment/2024/09/19/israel-lebanon-digital-war/" target="_blank">Stuxnet</a> virus. “The defence radar systems were hacked in several places. The screens of these radars were frozen and the possibility of tracking the attackers was denied from more advanced radars in some defence systems,”<i> The Independent </i>reported. Both publications said there had been an attempt to breach air defences using a cyber attack, without elaborating. The tactic of using cyber warfare in air battles is not new. <i>The National </i>previously reported how Israel is thought to have used a <a href="https://www.thenationalnews.com/news/mena/2024/10/09/israels-strikes-on-hezbollah-in-syria-are-latest-episode-in-a-long-air-war/" target="_blank">cyber attack</a> to disable Syrian air defences in a 2007 operation to bomb a nuclear research site in the east of the country at Deir Ezzor. At that time, Syria’s formidable air defences had not yet been weakened by more than a decade of civil war that began in 2011, and waves of Israeli strikes that struck Iranian weapons starting in 2013. Israel also lacked the stealth <a href="https://www.thenationalnews.com/news/mena/2024/04/23/satellite-images-iran-stike-isfahan/" target="_blank">F-35I</a>s it has today, requiring novel methods for ensuring its non-stealth aircraft could safely cross Syrian airspace. Operation Outside the Box involved F-15Is and F-16Is dropping about 20 tonnes of bombs on the Syrian scientific site before it became operational. The site was confirmed as a destroyed nuclear reactor by the International Atomic Energy Agency in 2011, ending years of speculation and claims. However, debate on the methods used for the strike continued. Several aviation experts claimed Israel used technology similar to a US-British-developed system called Suter to hack into Syrian air defences. The aircraft-mounted system, designed by BAE, sends false information to radar displays about attacking aircraft, but its exact capabilities remain shrouded in secrecy. The Suter device – or an Israeli equivalent – is mounted on aircraft dedicated to electronic warfare. In the US, the concept is at least 20 years old and is thought to fall under the US Air Force Big Safari electronic warfare programme, which develops highly classified new capabilities. “The capability has transitioned to US Cyber Command,” said Thomas Withington, an independent expert on electronic warfare, radar and military communications. “So, it's a US Air Force system. When it's used tactically, it's deployed from the EC-130H Compass Call aircraft. In terms of the Iran strike, I would be amazed if there wasn't some kind of cyber effect that was used against the air defences.” According to a study by the International Institute for Strategic Studies, the plan for Suter envisioned using “radar or communications antennae as the entry point to plant malicious code into radars and command-and-control networks”. This could “access and manipulate threat-system displays, to introduce false targets and to break into wider communications networks”. It would be a logical method of attack, because many countries, including Iran, link up their air defence radars to create a national picture of air traffic, using secure fibre optic cables. “I don't think they would have necessarily hit all of the air defence systems, but I think what they might have done is certainly altered track information,” Mr Withington said. “The classic technique is, you're an air defence operator, and you're sitting at your radar, and you see contacts as they come in. You see targets. One of the things that was used in Syria when they hit the reactor was that the Israelis had recorded several Thursdays' worth of normal air traffic above Syria and the wider Mediterranean. “They basically merged that together and injected that radar picture into the Syrian air defence system, so it looked like a normal day with nothing unusual.” If the Iranian air defences were subjected to a cyber attack, it is not clear whether they would know it or admit to it, or whether the Israelis would disclose it. Two rumoured US cyber attacks – on<a href="https://www.thenationalnews.com/news/mena/2024/10/26/israel-iran-f-35-s-300/" target="_blank"> Iranian air defences </a>in 2019 after a RQ-4 reconnaissance drone was shot down, and another in 2012 on North Korean missile systems – have never been confirmed. Israel may have simply jammed the systems causing the screens to freeze. It possesses a jamming device for aircraft which, according to maker Rafael, “simultaneously suppresses multiple integrated air defence surveillance and fire control radar using accurate, high-power directional beam”. Alternatively, Mr Withington said the explanation could be something more normal – the systems just froze trying to process the volume of data on inbound enemy aircraft. “If you're doing a cyber attack, and you probably don't want to freeze the screens, because you're instantly indicating to people something's up. You want things looking as normal as humanly possible. So it's possible their systems were simply overloaded.”