logo
Israel's trying to wipe out Iran's nuke program. It won't be an easy kill.

Israel's trying to wipe out Iran's nuke program. It won't be an easy kill.

Israel launched an air assault against Iran early Friday morning that officials said is intended to damage Tehran's nuclear program.
Hundreds of Israeli warplanes participated in a series of widespread airstrikes targeting sites associated with Iran's nuclear and missile programs, as well as military leaders and air defense systems, in a major escalation that has already drawn a retaliatory attack from Tehran.
Specifically, Israeli Prime Minister Benjamin Netanyahu said that his forces "struck at the heart" of the country's nuclear enrichment and weaponization programs, and targeted its main enrichment facility at Natanz. The extent of the damage is unclear so far, but analysts said it appeared to be limited based on satellite imagery.
Netanyahu had long pushed for a military approach to Iran's nuclear program, as opposed to the deal that the Trump administration was hoping to settle to prevent Tehran from building nuclear weapons.
Iran has said that its nuclear program is for civilian purposes.
However, military and nuclear experts say firepower alone won't be enough to completely wipe out Iran's nuclear program. It has many scientists with nuclear expertise and has stored its most critical facilities in bunkers buried deep underground.
This makes the facilities particularly challenging targets that, from the air, can only be reached by the largest bunker busters, which Israel lacks, or repeated strikes in the same spots.
Natanz, home to Iran's largest uranium enrichment site, is located several floors underground in the center of the country. The Israel Defense Forces said its airstrikes damaged an underground area of the facility that contains an enrichment hall with centrifuges, electrical rooms, and additional infrastructure.
Satellite imagery captured on Friday revealed what appears to be significant damage at Natanz, but only on the surface.
Overnight, Israeli strikes reportedly targeted strategic Iranian sites, including the Natanz nuclear facility, Iran's primary center for uranium enrichment. High-resolution imagery from @AirbusDefence, captured on June 13, 2025, reveals significant damage to the facility. pic.twitter.com/L7y9V64NIq
— Open Source Centre (@osc_london) June 13, 2025
Iran's other main enrichment site, Fordow, is buried even deeper in the side of a mountain and is the country's most "hardened" facility, said Darya Dolzikova, a senior research fellow for proliferation and nuclear policy at the UK-based Royal United Services Institute think tank.
In comments shared with Business Insider, Dolzikova said Fordow has not been affected by the Israeli strikes, nor have other locations. "Should Iran make a decision to produce a nuclear weapon, it would likely do that at hardened and potentially still secret sites," she said.
It's unclear what air-to-ground munitions Israel used to strike Natanz and the other targets affiliated with Iran's nuclear program. However, it would take a very large bunker-buster bomb to reach underground and destroy the more hardened sites.
The likely best weapon for the job is the US military's GBU-57 Massive Ordnance Penetrator, one of the most powerful non-nuclear bombs and the largest bunker buster in America's arsenal at 15 tons. These munitions can only be carried by the B-2 Spirit stealth bomber and the B-21 Raider in development.
Israel doesn't have bomber aircraft capable of carrying the largest bunker-buster munitions. The IDF shared footage showing its fighter jets — F-35s, F-16s, and F-15s — taking off and landing during the strikes. Weapons experts pointed out that some of the aircraft appear to be carrying 2,000-pound guided bombs. Israel's F-15I, though, can carry 4,000-pound anti-bunker bombs.
Military analysts with RUSI estimated in March that the Fordow site could be as deep as 260 feet underground, likely beyond the reach of even America's MOP. Damaging it would almost certainly require repeated strikes, likely over days or weeks.
US officials said Washington was not involved in the Israeli strikes. Secretary of State Marco Rubio warned Iran not to retaliate against American forces in the region, something Tehran and its allies have done in the past.
The US Navy has one aircraft carrier and six surface warships in the Middle East right now. These assets are capable of providing air defense in the event of a larger Iranian response. So far, Tehran has retaliated by launching dozens of drones at Israel.
Beyond the nuclear sites, Israeli officials said forces also went after other high-profile Iranian targets, including its top scientists, senior military commanders, air defenses, and ballistic missile program.
Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

Beijing's hackers are playing the long game
Beijing's hackers are playing the long game

Axios

time15 minutes ago

  • Axios

Beijing's hackers are playing the long game

Chinese hackers are targeting more sensitive U.S. targets than ever — not to smash and grab, but to bide their time. Why it matters: Beijing is investing in stealthy, persistent access to U.S. systems — quietly building up its abilities to disrupt everything from federal agencies to water utilities in the event of escalation with Washington. Even the most routine spying campaign could leave China with backdoors to destruction for years to come. Driving the news: At least three China-based hacking groups exploited vulnerable SharePoint servers in the last month, according to Microsoft. Researchers at Eye Security, which first discovered the SharePoint flaws, estimates that more than 400 systems were compromised as part of the SharePoint attacks. In this case, hackers also stole machine keys. That means the attackers can regain access whenever they want — even after the system is patched — unless admins take rare manual steps to rotate keys. The big picture: China's state-linked hackers have been growing in sophistication over the last few years as they focus more on targeting technology and software providers with hundreds of customers, often including government agencies. By the numbers: More than 330 cyberattacks last year were linked to China, double the total from 2023, according to CrowdStrike data shared with the Washington Post. Those numbers continued to climb in early 2025, according to CrowdStrike. Between the lines: At least three major Chinese government teams have been targeting U.S. networks in recent years. Volt Typhoon has focused on breaking into endpoint detection tools to burrow deep into U.S. critical infrastructure, including pipelines, railways, ports and water utilities. Their goal is to maintain persistent access and be prepared to launch destructive attacks in the event of contingencies such as a war over Taiwan, experts say. Salt Typhoon, known for its compromises of global telecom networks, has focused on traditional espionage and spying. This group tapped cell phones belonging to President Trump, Vice President Vance and other top government officials. The FBI believes that threat is now "largely contained." Silk Typhoon — which has been linked to a recent breach of the U.S. Treasury Department and is known for the global 2021 Microsoft Exchange hacks — has been ramping up its work in recent months. The group uses previously undetected vulnerabilities, known as zero-days, to break into networks. Zoom in: Researchers at cybersecurity firm SentinelOne have uncovered more than 10 patents tied to Silk Typhoon's work — a rarity among nation-state hackers. The patents — detailed in a report published Thursday — suggest the group was at one point developing new offensive tools, including to encrypt endpoint data recovery, conduct phone and router forensics and decrypt hard drives. The researchers also found that Silk Typhoon has links to at least three private sector companies. The intrigue: Beijing's growing reliance on private contractors adds another layer of complexity — shielding state involvement while expanding capability. A DOJ indictment released last month details how the Shanghai State Security Bureau directed employees at tech companies to hack into computers across U.S. universities and businesses to steal information. A trove of leaked documents stolen from private Chinese contractor I-Soon early last year also highlighted how hired hackers targeted several U.S. government agencies, major newspapers and research universities. State of play: China's growing cyber prowess comes as the Trump administration has diminished resources for its own cyber defenses. At least a third of the workforce at the Cybersecurity and Infrastructure Security Agency has left through voluntary buyouts, early retirements or layoffs. The Trump administration also wants to cut its budget. Yes, but: The administration is expected to invest heavily in its own offensive cyber powers — with $1 billion from the "One Big Beautiful Bill" heading to the Pentagon for just that purpose.

I was Palestinian activist Awdah Hathaleen's rabbi and friend. He was not killed in my name
I was Palestinian activist Awdah Hathaleen's rabbi and friend. He was not killed in my name

San Francisco Chronicle​

timean hour ago

  • San Francisco Chronicle​

I was Palestinian activist Awdah Hathaleen's rabbi and friend. He was not killed in my name

My friend, Awdah Hathaleen, was killed on Monday — supposedly in my name. I was one of his rabbis; he was my teacher. On Monday, unarmed and posing no danger to anyone, he was killed by an Israeli settler who believes that Palestinians have no right to live in the West Bank, or in any of Israel/Palestine, and that Judaism requires Jews to expel them from it. I disagree, and furthermore, claiming that my religion justifies Awdah's death is a sacrilege. I had known Awdah for eight years, since I first visited to his village, Umm al-Khair. I came as a rabbi who was disturbed by the many reports of how the Palestinians were treated in the occupied West Bank by Jewish settlers. Maybe it was my Jewish ethics, or maybe it was a guilty conscience that called me to see the situation for myself. Once I saw that degrading behavior, I could not turn away. What had been abstractions gleaned from daily news reports turned into real people trying to keep their children safe, to raise them with love even while living under a Damocles sword. These Palestinians became people with names: Awdah, Eid, Tariq. The villagers were happy to have visitors who would, like me, inevitably join them in any way we could to help them in their nonviolent resistance to the encroachment of Carmel, the illegal Jewish settlement growing ever bigger every year that abuts the village and threatens its future existence. When I met Awdah, I was so touched by what a good soul he had and what a creative organizer he was. He was diligently studying English. He wanted to communicate the plight of Palestinians under occupation. He believed that when people understood what was happening, they would become allies. That is why he was active in the creation of the acclaimed film 'No Other Land,' to let the world to know what was taking place in his neighborhood. Piedmont's Kehilla Community Synagogue became allies when we formed Face-to-Face under the inspiration of our founder, Rabbi Burt Jacobson. Every month we would meet with Awdah on Zoom and get often-depressing updates from the village. We raised money for Umm al-Khair when its cars and equipment were destroyed by settlers or the Israeli military. We raised money for school books. It was the least that we could do. In June, Face-to-Face worked with Awdah and Eid Suleiman to bring them to the Bay Area. After the many times they welcomed me in their village, I looked forward to greeting them at our shul. Finally, they would be face-to-face with our congregants and be able to talk to audiences at other places around the United States. Phil Weintraub, a Kehilla member who worked on the lengthy effort to obtain visas for Awdah and Eid, went to pick them up at the airport. Hours passed after their plane landed, but they did not emerge from customs. We were finally told that they were being detained. We asked public officials to intervene, and demonstrated at the airport. All to no avail. After 26 hours the two men were put on a plane to return them home. Despite their absence, we gathered that evening to share our anger and disappointment, and to affirm our conviction to keep supporting the village. From my own interactions with him, I know that Awdah, who was just 31, was dedicated to the principles of nonviolent resistance to end the occupation. Yinon Levi, identified in videos shooting at the villagers and killing Awdah, is a settler famous for his zeal in terrorizing Palestinians. President Joe Biden had him sanctioned in 2024 for his alleged role in violence against Palestinian civilians. President Donald Trump lifted that sanction on the first day of his second term. When the Israeli authorities finally showed up to the scene where Awdah had been murdered, Levi himself pointed out the people that he wanted arrested. Amazingly, his wishes were granted. Eid Suleiman and 13 others are in detention in Ofer prison as of this writing. Levi was briefly detained overnight and released to house arrest, but no one, not the villagers nor the settlers, expects him to suffer any serious consequences. No consequences is what killed my friend. Israel won't impose them, nor the United States. Neither will our American Jewish legacy institutions, who, while claiming to support a two-state solution, have never seriously criticized the expansion of the occupation. In my final in-person conversation with Awdah last August, he confided he was struggling with what to tell his children. 'I can't tell them that everything will be OK and I can't say that they'll be fine.' I'd never seen sadness disrupt his optimism. And I never expected that his children would be fatherless within a year. David J. Cooper is rabbi emeritus at Kehilla Community Synagogue, which he co-founded with Rabbi Burt Jacobson in 1984.

Google Will Use AI to Guess People's Ages Based on Search History
Google Will Use AI to Guess People's Ages Based on Search History

WIRED

timean hour ago

  • WIRED

Google Will Use AI to Guess People's Ages Based on Search History

Aug 2, 2025 6:30 AM Plus: A former top US cyber official loses her new job due to political backlash, Congress is rushing through a bill to censor lawmakers' personal information online, and more. Photo-Illustration:Last week, the United Kingdom began requiring residents to verify their ages before accessing online pornography and other adult content, all in the name of protecting children. Almost immediately, things did not go as planned—although, they did go as expected. As experts predicted, UK residents began downloading virtual private networks (VPNs) en masse, allowing them to circumvent age verification, which can require users to upload their government IDs, by making it look like they're in a different country. The UK's Online Safety Act is just one part of a wave of age-verification efforts around the world. And while these laws may keep some kids from accessing adult content, some experts warn that they also create security and privacy risks for everyone. Russia's state-backed hacking group Turla is known for its bold, creative attacks, such as masking their communications via satellite or piggybacking on other hackers' attacks to avoid detection. The group, which is part of the Russian FSB intelligence agency, is now using its access to the country's internet providers to trick foreign officials into downloading spyware that breaks encryption, allowing Turla's hackers to access their private information. And that's not all. Each week, we round up the security and privacy news we didn't cover in depth ourselves. Click the headlines to read the full stories. And stay safe out there. Google Will Start Estimating Your Age Based on Browsing Data Google is rolling out an AI-powered age-estimation system to apply content protections to Search and YouTube, even for users who haven't provided their age. The system is launching in the EU, where digital safety regulations mandate that platforms take steps to protect minors from potentially harmful content. Instead of relying solely on user-input data, Google says it will infer age using a 'variety of signals' and other metadata to determine if a user should be shown restricted results. Privacy advocates say the move risks inaccuracies and raises questions about transparency and consent. Google claims the changes align with regulatory expectations and will help protect younger users from inappropriate content. Still, the idea that platforms can algorithmically infer personal traits like age—and restrict content based solely on those assumptions—adds a new wrinkle to long-standing debates over moderation, censorship, and digital privacy. Army Revokes Former CISA Director's West Point Appointment After Political Backlash Just 24 hours after naming Jen Easterly as West Point's Distinguished Chair in Social Sciences, the Army rescinded the appointment following far-right criticism. The former Cybersecurity and Infrastructure Security Agency (CISA) director and academy alum had been lauded for her decades of service. But backlash erupted online after activist Laura Loomer claimed Easterly had ties to the Biden-era Disinformation Governance Board. Nina Jankowicz, who served as executive director of the board, denied having worked with Easterly in a post on BlueSky, calling the episode yet another example of how we're all living in 'the stupidest timeline.' Nevertheless, Army secretary Dan Driscoll canceled Easterly's contract and ordered a full review of West Point's hiring policies. The Army also suspended the practice of allowing outside groups to help select faculty. The reversal marks the second high-profile clash involving former CISA leaders and political pressure following Donald Trump's revocation of Chris Krebs' security clearance earlier this year. Congress Fast-Tracks Bill Letting Lawmakers Censor Info About Their Homes and Travel A bipartisan bill from US senators Amy Klobuchar and Ted Cruz could let lawmakers demand the removal of online posts showing their home addresses or travel plans, Rolling Stone reports. The proposal, which could pass by unanimous consent, is framed as a response to growing threats against public officials—especially after the assassination of Minnesota legislator Melissa Hortman last month. Watchdogs joined dozens of media outlets in warning that the bill could chill reporting and enable selective censorship. While the legislation includes a nominal exemption for journalists, critics say it remains vague enough to allow members of Congress to sue outlets or demand takedowns of legitimate news stories. 'The Cruz-Klobuchar bill would not provide [lawmakers] the protection they seek but would create a powerful new tool that would result in censorship of public discussion and press accountability for their actions,' Daniel Schuman of the American Governance Institute told Rolling Stone. He urged Congress to go 'back to the drawing board' and try crafting a bill that protects all Americans' privacy 'without undermining accountability for public officials.' Google Bug Let People Quietly Censor Articles From Search An alarming vulnerability in Google's Refresh Outdated Content tool allowed bad actors to selectively scrub individual URLs from search results, 404 Media reports. And there was no hacking required. Journalist Jack Poulson discovered the bug when two of his investigative pieces, including one about a tech CEO's domestic violence arrest, vanished from Google, even when searched by exact title in quotes. The exploit involved repeatedly submitting URLs with minor capitalization tweaks. This reportedly confused Google's indexing engine, which responded by de-listing not just the altered URLs but the original live articles too. Google confirmed the flaw and quietly rolled out a fix, saying it impacted only a 'tiny fraction of web pages.' Free press advocates warn the vulnerability could've enabled targeted, silent censorship, especially by powerful actors using reputation management tactics. 'If your article doesn't appear in Google search results,' Poulson said, 'in many ways it just doesn't exist.'

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into a world of global content with local flavor? Download Daily8 app today from your preferred app store and start exploring.
app-storeplay-store