Stuxnet: Sophisticated Precision Cyber-Warfare
The New York Times has an interesting article discussing many details surrounding the cyber-worm known as “Stuxnet” and how it was unleashed against the Iranian nuclear program. There have been several articles written on the subject, but this one provides some connections and data points which read more like a movie plot than day-to-day geopolitics. In this case credit/blame is attributed to a joint Israeli-American project.
The biggest single factor in putting time on the nuclear clock appears to be Stuxnet, the most sophisticated cyberweapon ever deployed.”
The article describes the precision with which the attacks unfolded and what were the likely steps taken to prepare for that precision.
As infrastructure and services become more and more dependent upon network interaction it’s pretty easy to imagine how vulnerable these systems become as technology extends other efficiencies of operation. These situations underscore the importance of security as an integral part of system design rather than political rhetoric or as an afterthought which seems all too common in government.
Comments
Tom Ashbrook, host of On Point Radio, interviews co-author of the on the New York Times piece, John Markoff, as well as security expert, Bruce Schneier et al here. Interesting stuff. Tom does a good job, as usual.
Here are the guests in this piece:
John Markoff, senior correspondent covering science and technology for the New York Times. Co-author of the new article, “Israeli Test on Worm Called Crucial in Iran Nuclear Delay.”
James Lewis, senior fellow and director of the technology and public policy program at the Center for Strategic and International Studies.
Bruce Schneier, author and expert on security and technology. Author of “Schneier on Security.”
Eric Chien, researcher at the computer security company Symantec who has been studying the Stuxnet worm.