It looks like you're using an Ad Blocker.

Please white-list or disable AboveTopSecret.com in your ad-blocking tool.

Thank you.

 

Some features of ATS will be disabled while you continue to use an ad-blocker.

 

Here's how the Stuxnet Virus could be used against the U.S.

page: 1
2

log in

join
share:

posted on Jun, 3 2012 @ 10:14 PM
link   

Here's how the Stuxnet Virus could be used against the U.S.

Source

WASHINGTON: The cat is out of the bag: The United States is the first known country to carry out a sustained cyber attack with the intent of destroying another country's infrastructure.

ATS thread regarding this confirmation - Here

cont..


Not only has the Stuxnet technology been instantly democratized but it's also highly susceptible to being reverse engineered. In March, he aired his concerns with 60 Minutes' Steve Kroft, before America's role in creating Stuxnet was confirmed:
Kroft: Sounds a little bit like Pandora's box.
McGurk: Yes.
Kroft: Whoever launched this attack--
McGurk: They opened up the box. They demonstrated the capability. They showed the ability and the desire to do so. And it's not something that can be put back.
Kroft: If somebody in the government had come to you and said, "Look, we're thinking about doing this. What do you think?" What would you have told them?
McGurk: I would have strongly cautioned them against it because of the unintended consequences of releasing such a code.

What sort of unintended consequences? According to McGurk, it has given countries "like Russia and China, not to mention terrorist groups and gangs of cybercriminals for hire, a textbook on how to attack key U.S. installations." Those types of installations include U.S. nuclear power reactors, electric companies, and other industrial facilities controlling everything from chemicals to baby formula, according to McGurk


Scary!
So they released stuxnet and not it may just come back to bite them in the A$$! Imagine the virus spreading though the electricity grid, or nuclear facilities, or defensive computer systems.... Thats what they are going through in Iran right now.

This could be a disaster and maybe is a consequence of Obama wanting to increase the push of cyberattacks on Iran.. maybe they missed something in the code and used it too early!


Also, researching a little bit here..
Checked an ATS thread regarding Stuxnet and the US from July 2011:
U.S. Government Fears Stuxnet Virus, Challenges Cyber-Defense. In the article from the thread:

The Stuxnet worm may strike again, U.S. officials warn, possibly posing a significant threat to government attempts to improve cyber-defense measures.

Cyber-security experts testified on Tuesday before the House Energy and Commerce Committee, saying the infamous virus is capable of morphing to attack industrial compounds across the world.
source

So wait.. they were scared of it about it posing a significant threat a year ago?! They release it, and now it could devastate US computers same as it did in Iran. OR, possibly they are using it as a false flag to have Stuxnet 'attack' the US computers (Select ones that don't have sensitive data on them) and tell the public that defensive computers were hacked and downed, or personal data was stolen and that is deemed an act of war?! Wouldn't suprise mein the slightest!


Thoughts?!



posted on Jun, 3 2012 @ 10:27 PM
link   
I believe it was Israel and the US behind this worm. The more scary part about it to me is that an Israeli company (Magal Security) is in charge of the security for US nuke sites.



posted on Jun, 3 2012 @ 10:32 PM
link   



posted on Jun, 3 2012 @ 11:14 PM
link   

The same New York Times article confirms that after wrecking the Siemens' controllers at Natanz, STUXNET "inadvertently" escaped into the wild. Now anyone who knows how computer malware operates understands full well that malware does not stay confined in any system for very long. It is impossible to keep malware confined in a single system if the operators do not know it is there and take steps to isolate it. In the case of Natanz, STUXNET was inserted into the computers by a bribed technician via a memory stick, then immediately escaped back out on a scientist's laptop.


Source




top topics
 
2

log in

join