Welcome to DU! The truly grassroots left-of-center political community where regular people, not algorithms, drive the discussions and set the standards. Join the community: Create a free account Support DU (and get rid of ads!): Become a Star Member Latest Breaking News General Discussion The DU Lounge All Forums Issue Forums Culture Forums Alliance Forums Region Forums Support Forums Help & Search

bananas

(27,509 posts)
Wed Feb 26, 2014, 01:22 AM Feb 2014

Exclusive: New thesis on how Stuxnet infiltrated Iran nuclear facility

Source: Christian Science Monitor

The Stuxnet worm that attacked Iran's nuclear facility at Natanz came to light nearly four years ago, but how it got there remains a mystery. A possible new explanation, outlined Tuesday, cites the supply chain as the key.

<snip>

Presented by Critical Intelligence, a cyber security firm based in Idaho Falls, Idaho, the tale of cyber infiltration comes nearly four years after the covert operation was discovered. It’s already been fairly well documented that the United States and Israel created the Stuxnet worm, which ultimately infected and destroyed about 1,000 fuel-refining centrifuges at Natanz. The surreptitious attack sowed confusion within Iran’s uranium-fuel-enrichment program, which the US suspects is aimed at creating a nuclear bomb, and delayed it for years.

But how did Stuxnet get in there? As early as 2004, US intelligence agencies identified an Iranian company, NEDA Industrial Group, that had oversight of the Natanz facility’s computerized industrial control systems, says the Critical Intelligence report, citing documents gleaned from federal court cases, leaked State Department cables, and nuclear proliferation reports.

Documents suggest that the US was monitoring NEDA’s efforts to procure components that may be needed for a nuclear weapons program, says Sean McBride, lead author of the report and director of analysis for Critical Intelligence. The report is the first to name NEDA in connection with Stuxnet.

<snip>

Read more: http://www.csmonitor.com/World/Security-Watch/2014/0225/Exclusive-New-thesis-on-how-Stuxnet-infiltrated-Iran-nuclear-facility

7 replies = new reply since forum marked as read
Highlight: NoneDon't highlight anything 5 newestHighlight 5 most recent replies
Exclusive: New thesis on how Stuxnet infiltrated Iran nuclear facility (Original Post) bananas Feb 2014 OP
Interesting..... thanks for posting that groundloop Feb 2014 #1
Plausible. nt bemildred Feb 2014 #2
When this is done to an American company Kelvin Mace Feb 2014 #3
It's already been done to dozens of American companies. jeff47 Feb 2014 #4
This wasn't exacty the same thing as you mention Kelvin Mace Feb 2014 #5
Data was deleted in several cases. jeff47 Feb 2014 #6
I still draw a major distinction between Kelvin Mace Feb 2014 #7

groundloop

(11,517 posts)
1. Interesting..... thanks for posting that
Wed Feb 26, 2014, 09:24 AM
Feb 2014

This particular theory makes sense, I work with industrial control systems and fully understand the difficulty in pulling off something like this. Someone had to know the particular system in use pretty darned well.
 

Kelvin Mace

(17,469 posts)
3. When this is done to an American company
Wed Feb 26, 2014, 12:11 PM
Feb 2014

it will be called "an act of war" and we will bomb someone.

jeff47

(26,549 posts)
4. It's already been done to dozens of American companies.
Wed Feb 26, 2014, 02:00 PM
Feb 2014

There were the reports of China hacking US "high-tech" companies a few years ago. Israel is rumored to do massive amounts of industrial espionage, but it's difficult to separate "real" claims from antisemitism. Heck, France stole technology from Boeing and other defense companies in the 1990s.

 

Kelvin Mace

(17,469 posts)
5. This wasn't exacty the same thing as you mention
Wed Feb 26, 2014, 02:49 PM
Feb 2014

Spying on us and hacking web sites is not the same thing as doing actual physical damage to something.

Stealing airplane blueprints from Boeing is not the same thing as infecting the software of centrifuges at a uranium processing facility so that they spin out of control and damage themselves.

Fortunately, no one was injured, but the potential was certainly there.

There is a distinction between "espionage" and "sabotage".

jeff47

(26,549 posts)
6. Data was deleted in several cases.
Wed Feb 26, 2014, 04:29 PM
Feb 2014

That would be sabotage.

(Not terribly effective since backups existed)

Fortunately, no one was injured, but the potential was certainly there.

Not really - there is an expected failure rate on those centrifuges. A significant portion are expected to break, even if there is not a deliberate effort to damage.

As a result, they are constructed and operated such that failures won't hurt people.
 

Kelvin Mace

(17,469 posts)
7. I still draw a major distinction between
Wed Feb 26, 2014, 06:34 PM
Feb 2014

deleting/stealing data and causing something to operate in such a way as to cause physical damage.

If the Iraqis infected computers in the U.S. and caused similar damage, we would be all up in their grill with missiles, bombers and drones.

Latest Discussions»Latest Breaking News»Exclusive: New thesis on ...