The worm that turned: How Stuxnet helped heat up cyberarms race IRIB Iranian TV via Reuters TV file Workers are seen in what was described by Iranian state television as the control room at a uranium enrichment facility in Natanz, Iran, in this image taken from video released on Feb. 15. By Robert Windrem, Senior investigative producer, NBC News When the worm dubbed “Stuxnet” wriggled into public view in July 2010, computer security experts recognized almost immediately that it was no ordinary piece of malware. “This particular attack targets the industrial supervisory software SCADA,” Juraj Malcho, head of the Virus Lab at the Slovakia-based security firm ESET, wrote at the time. “In short, this is an example of malware-aided industrial espionage.”
A Cyberworm that Knows No Boundaries Iran's announcement that a computer worm called Stuxnet had infected computers that controlled one of its nuclear processing facilities marked a signal event in cyber attacks. Although such attacks were known to be theoretically possible, the incident proved that a cyberworm could successfully infiltrate a system and produce physical damage. Furthermore, the sophisticated nature of the worm and the resources that would have been required to design, produce, and implant it strongly suggest a state-sponsored effort.
We can't crush Iran - Foreign policy This month’s Vanity Fair has a feature on Israeli leader Benjamin Netanyahu. “An Israeli strike against Tehran’s nuclear facilities gone awry may pose the single greatest peril to his political future, which may be the biggest guarantee — more than American opposition to any move or the effectiveness of sanctions — that it won’t happen,” the article reads. Indeed, gradually and without fanfare, the possibility of a military strike against Iran, which only a few months ago seemed imminent, has lately receded from view. It seems that perhaps the U.S. and Israel came to their senses and realized that an attack on Iran would be disastrous. The turning tide against a military strike is underscored by three new reports on the problems of an attack.
Gaza and Israel: The Road to War, Paved by the West JERUSALEM — AS fires rockets at Israeli cities and follows up its extensive airstrikes with a ground operation in the , the most immediate cause of this latest war has been ignored: Israel and much of the international community placed a prohibitive set of obstacles in the way of the “national consensus” government that was formed in early June. That government was created largely because of Hamas’s desperation and isolation. The group’s alliance with Syria and Iran was in shambles. Its affiliation with the Muslim Brotherhood in became a liability after a July 2013 coup replaced an ally, President Mohamed Morsi, with a bitter adversary, Gen. Abdel Fattah el-Sisi. Hamas’s coffers dried up as General Sisi closed the tunnels that had brought to Gaza the goods and tax revenues on which it depended.
Improving Critical Infrastructure Cybersecurity The White House Office of the Press Secretary For Immediate Release February 12, 2013 By the authority vested in me as President by the Constitution and the laws of the United States of America, it is hereby ordered as follows: Ex-Pentagon general target of leak investigation, sources say James Cartwright, a retired general and trusted member of President Barack Obama's national security team, has been informed that he's the target of a Justice Department criminal investigation into a leak about a covert cyberattack on Iran's nuclear program. NBCs Mike Isikoff reports. By Michael Isikoff, National Investigative Correspondent, NBC News Legal sources tell NBC News that the former second ranking officer in the U.S. military is now the target of a Justice Department investigation into a politically sensitive leak of classified information about a covert U.S. cyber attack on Iran’s nuclear program. According to legal sources, Retired Marine Gen. James “Hoss” Cartwright, the former vice chairman of the Joint Chiefs of Staff, has received a target letter informing him that he’s under investigation for allegedly leaking information about a massive attack using a computer virus named Stuxnet on Iran’s nuclear facilities.
FBI intent on sniffing out those who leaked possible US Stuxnet role Federal investigators in the US are tightening the screws on former senior government officials who might have leaked info about the Stuxnet worm, according to The Washington Post. Last June, Attorney General Eric H. Holder Jr. started the inquiry into loose lips. Bipartisanship and Iran Several days ago, a letter was sent to President Obama urging a harder-line on Iran, including ever-harsher sanctions and more aggressive threats of war in the event that the current negotiations fail to produce a quick and total resolution. What makes the letter notable is that it was not sent by AIPAC (at least not nominally), but rather by 44 Senators, exactly half of whom (22) are Democrats. That includes liberal Senate stalwarts such as Ron Wyden, Jeff Merkley, and Sherrod Brown. Here is the supremely hawkish essence of their letter: This implication is clear: a military attack by the U.S. on Iran is at least justified, if not compelled, if a satisfactory agreement is not quickly reached regarding Iran’s nuclear program. Note, too, the Iraq-War-replicating framework that it is Iran’s burden to prove that they are peaceful rather than the aggressor-parties’ burden to prove they are doing something wrong.