FAIR USE NOTICE

A Bear Market Economics Blog Site

Follow Every Bear Market Economics blog post on Facebook here

FAIR USE NOTICE

This site may contain copyrighted material the use of which has not always been specifically authorized by the copyright owner. We are making such material available in an effort to advance understanding of environmental, political, human rights, economic, democracy, scientific, and social justice issues, etc. we believe this constitutes a ‘fair use’ of any such copyrighted material as provided for in section 107 of the US Copyright Law.

In accordance with Title 17 U.S.C. Section 107, the material on this site is distributed without profit to those who have expressed a prior interest in receiving the included information for research and educational purposes. For more information go to: http://www.law.cornell.edu/uscode/17/107.shtml

If you wish to use copyrighted material from this site for purposes of your own that go beyond ‘fair use’, you must obtain permission from the copyright owner.

FAIR USE NOTICE FAIR USE NOTICE: This page may contain copyrighted material the use of which has not been specifically authorized by the copyright owner. This website distributes this material without profit to those who have expressed a prior interest in receiving the included information for scientific, research and educational purposes. We believe this constitutes a fair use of any such copyrighted material as provided for in 17 U.S.C § 107.

Read more at: http://www.etupdates.com/fair-use-notice/#.UpzWQRL3l5M | ET. Updates
FAIR USE NOTICE FAIR USE NOTICE: This page may contain copyrighted material the use of which has not been specifically authorized by the copyright owner. This website distributes this material without profit to those who have expressed a prior interest in receiving the included information for scientific, research and educational purposes. We believe this constitutes a fair use of any such copyrighted material as provided for in 17 U.S.C § 107.

Read more at: http://www.etupdates.com/fair-use-notice/#.UpzWQRL3l5M | ET. Updates

All Blogs licensed under Creative Commons Attribution 3.0

Sunday, January 16, 2011

The Most Sophisticated Cyberweapon Ever Deployed is Changing Warfare



January 16, 2011 at 13:43:55

The Most Sophisticated Cyberweapon Ever Deployed is Changing Warfare

By Rob Kall (about the author)

opednews.com


The Stuxnet worm heralds a new way of thinking about war.

The New York Times is reporting that Stuxnet computer worm has destroyed 20% of the nuclear centrifuges in Iran, setting back their Nuclear bomb program by three years. (Other sources estimate 10 percent damaged.)

The article reports that, cooperating with the USA, Israel tested and developed the virus at the secret Dimona facility in the Negev, where Israeli's undiscussed nuclear weapons are developed and stored.

The Times article reported, " In recent days, the retiring chief of Israel's Mossad intelligence agency, Meir Dagan, and Secretary of State Hillary Rodham Clinton separately announced that they believed Iran's efforts had been set back by several years.," and, "It's like a playbook," said Ralph Langner, an independent computer security expert in Hamburg, Germany, who was among the first to decode Stuxnet. "Anyone who looks at it carefully can build something like it." Mr. Langner is among the experts who expressed fear that the attack had legitimized a new form of industrial warfare, one to which the United States is also highly vulnerable."

The Times article reports that the main focus, in development of the Stuxnet virus, was on computer controllers. These devices that are becoming more and more ubiquitous in all kinds of factory equipment, machinery, automobiles, even toys. Wikileaks collection of State Department cables included ones from 2009 expressing concern, as the Times article reports, " urgent efforts in April 2009 to stop a shipment of Siemens controllers, contained in 111 boxes at the port of Dubai, in the United Arab Emirates. They were headed for Iran, one cable said, and were meant to control "uranium enrichment cascades" -- the term for groups of spinning centrifuges."


Iranian Nuclear Facility


Mr Langner, head of a small German computer security company, discovered, after testing the Stuxnet virus, that it was widespread, but only caused damage when it encountered very specific configurations of controllers, ones found in a centrifuge plant. This was precision targeting.

To make the Stuxnet worm work as a precision industrial weapon, it was necessary to acquire some of the more than six foot tall centrifuges so they could be tested. This is where the Israeli Dimona facility played a key role.

Once the virus was deployed, it had partial, not complete success in damaging the Iranian nuclear effort.


In late November, Mahmoud Ahmadinejead reported,

" "[Iran's enemies] succeeded in creating problems for a limited number of our centrifuges with the software they had installed in electronic parts," Ahmadinejad said. "They did a bad thing. Fortunately our experts discovered that, and today they are not able [to do that] anymore."


it is estimated that almost 1000 of the centrifuges were damaged.

The times wrote, as the title states, this is "the most sophisticated cyberweapon ever deployed."

Ced Kurtz, of the Pittsburgh Post-Gazette writes, "Taking out a tenth of the centrifuges at the Iranian facility is comparable to an air strike. Now that is war."

In the past, if a government attacked another nation's factory, that would be considered an act of war.

Now, we are faced with a situation in which the US collaborated with Israel to build a cyberweapon that caused millions, perhaps billions in damage to Iran.

Teheran knew in November that the Stuxnet worm had caused the destruction. Now, with the NY Times report, if not before, Iran is faced with a decision. Will it take the cyberattack as an act of war? If so, will it respond in kind? If so, it is likely that Iran will source cyberweapons where it can find them, as it has sourced weapons construction resources from places like Pakistan and North Korea.

One place Iran may seek powerful cyberweapons is China. There, the Chinese have access to tens of millions if not hundreds of millions of computers which have Green Dam software installed on them. While this is purportedly to protect the young from pornography, it provides a point of easy access to millions of computers, which COULD be used to initiate incredibly power denial of service attacks and other malevolent efforts. It is inconceivable that the US and G20 nation not know the cyberweapon potential of the combined installations of millions of Green Dam Software.

That reality suggests that the Stuxnet worm is a tiny tip of a massive, and fast growing iceberg of Cyberwarfare technologies. It is very likely that before long, tens of millions of computers, very likely including smart phones and notepads, in the US and throughout the world will, unknown to their users, include software code, lying silent, in wait for commands, that will be used to launch attack on targets the computer owners know nothing of, as is done with common computer virus mediated denial of service attacks. The difference will be that these attacks will be government or military initiated.

The question is, will these attacks be considered attacks that signal the start of wars?

Rob Kall is executive editor, publisher and site architect of OpEdNews.com, Host of the Rob Kall Bottom Up Radio Show (WNJC 1360 AM), President of Futurehealth, Inc, more...)

The views expressed in this article are the sole responsibility of the author
and do not necessarily reflect those of this website or its editors.

No comments:

Post a Comment