Thursday, November 21, 2024
Useful Resources for Brilliant Manufacturing, Operational & Industrial Intelligence Technology Enthusiasts!

Keeping an Eye on Technology Futures, No Hidden Agendas, New Attitudes, No Platitudes!

Jim Pinto's Connections for Growth & Success

Stuxnet Cyberwarfare

by Jim Pinto | from Pinto's Archive


The computer worm Stuxnet was detected in mid-2010, mainly in Iran. It was precisely calibrated to disrupt nuclear centrifuges, clearly aimed at Iran’s nuclear program. This wiped out about 20% of Iran's nuclear centrifuges and delayed (though it didn't destroy) Iran's ability to make their first nuclear arms. Iran admitted that it had run into "technological difficulties" that could delay a bomb till 2015.

Cyber analysts say that Stuxnet includes two major components. One sends nuclear centrifuges spinning wildly out of control, while the other secretly records what normal operations look like and then plays those readings back to plant operators so it appears that everything is operating normally while the centrifuges are actually tearing themselves apart. The attacks are not over; some believe the code contains seeds for yet more disruption.

The fast-spreading malicious computer program is a prime example of clandestine digital warfare and is the first to attack industrial systems. But unlike other cyber attacks, this malware did not stay invisible; it somehow turned up in other industrial processes around the world - India, Indonesia and other countries. If Iran was the primary target, perhaps these other locations were just prototype tests, or decoys?

It's interesting to note that automation companies sell their equipment around the world, to anyone who will buy. These products can be used by anyone to develop and test Stuxnet or equivalent malware programs.

It's an open secret that Israel originated Stuxnet; when asked whether Israel was behind the attack, Israelis break into wide smiles - without, of course, admitting anything. America will not admit to any involvement. Just recently (Jan. 2011) the Israeli intelligence agency, as well as Hillary Clinton, separately announced that they believed Iran's efforts had been set back by several years. They stopped short of admitting to using Stuxnet.

Stuxnet was clearly preemptive cyber warfare, used for national security, utilizing a combination of "humint" (human intelligence) and "elint" (electronic intelligence) to prevent the impending threat of nuclear weapons. The point is that Israel, operating under clearly declared threats of nuclear attack, finds that a preemptive cyber attack is justified.

From the American standpoint, Wikileaks and other sources have shown that Saudi Arabia and others in the Mid-East region have become uncomfortable with Iran's belligerence and were putting pressure on the US to "do" something. And Stuxnet was launched - though no one will admit who was responsible.


I like to e-hear from you and will ALWAYS respond.
Please e-send your news, views and stews, your tips and alerts.
If smell something fishy in your pond, please e-let Jim know and I'll check it out.

If you have comments or suggestions for Growth & Success News, please contact me directly at : Jim@JimPinto.com