US Hackers Blamed for Venezuela Blackout

▼ Summary
– The New York Times reported, citing US officials, that a cyberattack causing a blackout was the first publicly acknowledged US government hacking operation, and US forces also hacked Venezuelan air defense radar.
– The cyberattack, part of Operation Absolute Resolve, was reportedly restored quickly to avoid fatalities, contrasting with past blackouts attributed to Russia’s Sandworm group in Ukraine.
– A journalist critical of ICE was unexpectedly hired, raising questions about vetting, as the Trump administration rapidly hired thousands of officers from over 220,000 applicants.
– An AI tool for vetting ICE candidates was broken, incorrectly placing around 200 hires into shorter training based on resume keywords like “officer,” rather than their actual experience.
– Activists in Iran are using smuggled Starlink devices to bypass government internet blackouts, though they fear service withdrawal, while Palantir’s ELITE app helps ICE target individuals for deportation using data analytics.
A recent report has confirmed that a major power outage in Venezuela was the direct result of a cyberattack conducted by United States government hackers. This marks the first publicly acknowledged instance of the U.S. carrying out such an operation to disable a nation’s electrical grid. According to officials cited in the report, American forces also utilized hacking capabilities to neutralize Venezuelan air defense systems prior to a military incursion. In a related statement, U.S. Cyber Command expressed pride in supporting the operation, internally named “Absolute Resolve.” Authorities indicated the blackout was intentionally brief, with power restored swiftly to prevent catastrophic failures in critical facilities like hospitals, which relied on backup generators.
This event places the U.S. alongside a very small group of state actors known for executing disruptive cyberattacks against power infrastructure. Previously, only Russia’s Sandworm hacking unit had been confirmed to cause blackouts, with several documented attacks on Ukraine’s grid since 2015. The American operation raises significant questions about the rules of engagement in cyberspace. A former top U.S. cyber official once argued that the nation required the operational freedom to execute such attacks if deemed strategically necessary, comparing the tactic to disabling an adversary’s power and communications during a conflict. The legal and strategic precedent set by this action remains a subject of intense debate, particularly given the ambiguous status of hostilities with Venezuela at the time.
In a separate but revealing incident, the aggressive hiring push within U.S. Immigration and Customs Enforcement (ICE) has exposed serious flaws in its vetting process. A journalist with publicly critical views of the agency unexpectedly received a job offer after a perfunctory application, highlighting potential systemic issues. The administration’s drive to rapidly hire thousands of officers led to over 220,000 applications, straining review procedures. Compounding the problem, an automated tool designed to screen resumes for law enforcement experience malfunctioned. This error incorrectly routed applicants without proper experience into a shortened online training course instead of the mandated eight-week in-person program. While officials stated the issue affected roughly 200 hires who later received full training, the episode underscores the challenges of scaling a sensitive law enforcement agency.
The operational capacity of ICE is further amplified by its partnership with the data analytics firm Palantir. A recently revealed application, known as ELITE, provides agents with a mapping tool that identifies potential deportation targets. The system assigns confidence scores regarding an individual’s location by aggregating data from government and commercial surveillance sources. Critics argue this technology enables a dragnet approach to enforcement, with one senator comparing the process to using a digital map to find the nearest person to arrest rather than focusing on genuine threats to public safety.
Meanwhile, in Iran, citizens facing one of the most severe internet blackouts in history are finding connectivity through smuggled Starlink satellite terminals. Activists report that approximately 50,000 devices are now operating within the country, providing a crucial lifeline to share information about widespread protests and a government crackdown. This access has been vital for documenting events that have resulted in thousands of casualties. However, users express a persistent anxiety that the service could be withdrawn at the discretion of its owner, drawing parallels to its unavailability in other restrictive markets where business interests may influence access. This reliance on a single, privately-controlled infrastructure highlights the fragile nature of circumvention tools in geopolitical conflicts.
(Source: Wired)



