Generational Dynamics: Forecasting America's Destiny Generational
Dynamics
 Forecasting America's Destiny ... and the World's

 |  HOME  |  WEB LOG  |  COUNTRY WIKI  |  COMMENT  |  FORUM  |  DOWNLOADS  |  ABOUT  | 

Generational Dynamics Web Log for 27-Sep-2010
27-Sep-10 News -- Iran's nuclear plant attacked by Stuxnet computer virus

Web Log - September, 2010

27-Sep-10 News -- Iran's nuclear plant attacked by Stuxnet computer virus

Mideast peace talks extended one more week as settlement freeze expires

Stuxnet computer virus attacks Iran's Bushehr nuclear plant

A major computer virus attack has spread to the Windows computers at Iran's Bushehr nuclear power plant, according to the Telegraph. However, the project manager at Bushehr said that the major systems at the plant have not been damaged.


Iran's Bushehr nuclear power plant
Iran's Bushehr nuclear power plant

Stuxnet is not an ordinary, garden variety computer virus, like the ones that erase your hard drives, steal your bank accounts, or send your browsers to porn sites.

In fact, experts aren't completely sure what it is, or what it's trying to do. One thing they're sure of: This virus wasn't concocted by some hacker sitting at a computer in his basement. This virus MUST have been created by some government or government-level group, using a well-financed highly organized team of programmers, with access to plenty of specialized resources.

This conclusion is reached because of the complexity and large numbers of components in the virus, and because it makes use of stolen encryption certificates and secret technical information that would be available only to high-level intelligence agencies.

Thus, it appears that Stuxnet was designed by one nation to target facilities in another nation, as a kind of guided missile. It's not known which two nations are involved, but the unconfirmed speculation is that the virus was designed by Israel to target Iran.

Here's what is known. Stuxnet has spread virally, around the world. And like any ordinary virus, it installs itself in Windows computers as a so-called "rootkit." Once a virus gets installed in that way, it can do pretty much anything it wants to your computer, and is completely invisible to the computer operator. But Stuxnet doesn't harm most computers.

Stuxnet then searches your computer for a certain kind of software -- industrial control software (ICS) that's used in pipelines or factories or chemical or power plants, according to Symantec.

If this kind of ICS software is on your computer, it then looks to see what kind of factory or plant the software is controlling.

Large factories and plants of this kind are generally not controlled directly by Windows computers. Instead, each device in the plant has its own computer that runs a special kind of software program known as a "programmable logic controller" (PLC). So, the Stuxnet virus looks for Windows software that's communicating with a device running a PLC -- specifically, certain kinds of PLCs made by the giant German company Siemens AG.

Finally, once the virus identifies the right kind of factory or plant, it installs yet another virus into the plant's PLC software. From that point on, the attacker can invisibly control the entire plant or factory.

Whether the target is Bushehr is just a guess. Experts have attempted to reverse engineer the virus to determine what it's doing, but these attempts have been only partially successful. All that's known is that the virus is targeting one or more factories or power plants or pipelines or similar installations that satisfy certain unknown parameters.

Once it finds its target (or targets), it's expected to issue a series of commands that will destroy the plant, according to PC World. This might happen, for example, by making the plant overheat, by making crucial machinery suddenly spin rapidly out of control, or by making dangerous chemicals get dispersed.

The larger picture here is that this is a new kind of warfare -- cyber warfare -- that will become increasingly prevalent. The military is now treating cyber as the "fifth domain," after the other domains -- land, sea, air and space. The bad news is that very few people in the U.S. military are trained to deal with this kind of warfare, but the good news is that the same is true of other countries.

So expect to see stories of this type more frequently. Inasmuch as a virus of this type can effectively destroy an entire factory or power plant, the results could be as spectacular as the detonation of a bomb. And there would be no trace of the bomber, or any way to find out who it is. There may yet be such an outcome from the Stuxnet virus. No one knows.

For the individual Windows computer user, there are a few lessons to be learned here. First, make sure that you subscribe to a computer anti-virus service. Second, make sure that you turn on the option that automatically installs all the regular Windows updates from Microsoft. The Stuxnet virus is able to infect computers because of vulnerabilities in Windows software that the automatic updates are now repairing.

Additional links

The Mideast peace talks will be extended for one more week, as the 10-month moratorium on Israeli settlement building in the West Bank ended on Sunday evening at midnight. Some settlement building began as the ban was ending, but not a great deal yet. The next crucial date will be October 4, when the Arab League meets, and decides whether to approve continued peace talks between the Israelis and the Palestinians. Jerusalem Post

A senior minister in Pakistan's government has been forced to resign after accusing the army of being responsible for the deaths of Benazir Bhutto and some other high profile figures. This entire subject area is a super no-no for discussion in Pakistan, since the army leaders are mostly Sunni Muslims and Benazir Bhutto is from one of Pakistan's leading Shia Muslim families. AP

A new "peace flotilla" has set sail from Cyprus with the intention of breaching Israel's sea blockade of Gaza. This time, the passengers are Jewish activists. Earlier this year, a major international incident was triggered when nine Turkish citizens on a similar flotilla boat were killed in a confrontation with Israel's army. That incident led to a continuing rift between former allies Turkey and Israel. BBC

The recent sea incident and subsequent legal battle between China and Japan over Japan's jailing of the captain of a Chinese fishing trawler in disputed waters is straining relations with China's neighbors, who fear similar treatment, as China becomes more nationalistic and belligerent. The result is improved relations between the U.S. and Asian countries. Bloomberg

(Comments: For reader comments, questions and discussion, see the 27-Sep-10 News -- Iran's nuclear plant attacked by Stuxnet computer virus thread of the Generational Dynamics forum. Comments may be posted anonymously.) (27-Sep-2010) Permanent Link
Receive daily World View columns by e-mail
Donate to Generational Dynamics via PayPal

Web Log Pages

Current Web Log

Web Log Summary - 2016
Web Log Summary - 2015
Web Log Summary - 2014
Web Log Summary - 2013
Web Log Summary - 2012
Web Log Summary - 2011
Web Log Summary - 2010
Web Log Summary - 2009
Web Log Summary - 2008
Web Log Summary - 2007
Web Log Summary - 2006
Web Log Summary - 2005
Web Log Summary - 2004

Web Log - December, 2016
Web Log - November, 2016
Web Log - October, 2016
Web Log - September, 2016
Web Log - August, 2016
Web Log - July, 2016
Web Log - June, 2016
Web Log - May, 2016
Web Log - April, 2016
Web Log - March, 2016
Web Log - February, 2016
Web Log - January, 2016
Web Log - December, 2015
Web Log - November, 2015
Web Log - October, 2015
Web Log - September, 2015
Web Log - August, 2015
Web Log - July, 2015
Web Log - June, 2015
Web Log - May, 2015
Web Log - April, 2015
Web Log - March, 2015
Web Log - February, 2015
Web Log - January, 2015
Web Log - December, 2014
Web Log - November, 2014
Web Log - October, 2014
Web Log - September, 2014
Web Log - August, 2014
Web Log - July, 2014
Web Log - June, 2014
Web Log - May, 2014
Web Log - April, 2014
Web Log - March, 2014
Web Log - February, 2014
Web Log - January, 2014
Web Log - December, 2013
Web Log - November, 2013
Web Log - October, 2013
Web Log - September, 2013
Web Log - August, 2013
Web Log - July, 2013
Web Log - June, 2013
Web Log - May, 2013
Web Log - April, 2013
Web Log - March, 2013
Web Log - February, 2013
Web Log - January, 2013
Web Log - December, 2012
Web Log - November, 2012
Web Log - October, 2012
Web Log - September, 2012
Web Log - August, 2012
Web Log - July, 2012
Web Log - June, 2012
Web Log - May, 2012
Web Log - April, 2012
Web Log - March, 2012
Web Log - February, 2012
Web Log - January, 2012
Web Log - December, 2011
Web Log - November, 2011
Web Log - October, 2011
Web Log - September, 2011
Web Log - August, 2011
Web Log - July, 2011
Web Log - June, 2011
Web Log - May, 2011
Web Log - April, 2011
Web Log - March, 2011
Web Log - February, 2011
Web Log - January, 2011
Web Log - December, 2010
Web Log - November, 2010
Web Log - October, 2010
Web Log - September, 2010
Web Log - August, 2010
Web Log - July, 2010
Web Log - June, 2010
Web Log - May, 2010
Web Log - April, 2010
Web Log - March, 2010
Web Log - February, 2010
Web Log - January, 2010
Web Log - December, 2009
Web Log - November, 2009
Web Log - October, 2009
Web Log - September, 2009
Web Log - August, 2009
Web Log - July, 2009
Web Log - June, 2009
Web Log - May, 2009
Web Log - April, 2009
Web Log - March, 2009
Web Log - February, 2009
Web Log - January, 2009
Web Log - December, 2008
Web Log - November, 2008
Web Log - October, 2008
Web Log - September, 2008
Web Log - August, 2008
Web Log - July, 2008
Web Log - June, 2008
Web Log - May, 2008
Web Log - April, 2008
Web Log - March, 2008
Web Log - February, 2008
Web Log - January, 2008
Web Log - December, 2007
Web Log - November, 2007
Web Log - October, 2007
Web Log - September, 2007
Web Log - August, 2007
Web Log - July, 2007
Web Log - June, 2007
Web Log - May, 2007
Web Log - April, 2007
Web Log - March, 2007
Web Log - February, 2007
Web Log - January, 2007
Web Log - December, 2006
Web Log - November, 2006
Web Log - October, 2006
Web Log - September, 2006
Web Log - August, 2006
Web Log - July, 2006
Web Log - June, 2006
Web Log - May, 2006
Web Log - April, 2006
Web Log - March, 2006
Web Log - February, 2006
Web Log - January, 2006
Web Log - December, 2005
Web Log - November, 2005
Web Log - October, 2005
Web Log - September, 2005
Web Log - August, 2005
Web Log - July, 2005
Web Log - June, 2005
Web Log - May, 2005
Web Log - April, 2005
Web Log - March, 2005
Web Log - February, 2005
Web Log - January, 2005
Web Log - December, 2004
Web Log - November, 2004
Web Log - October, 2004
Web Log - September, 2004
Web Log - August, 2004
Web Log - July, 2004
Web Log - June, 2004


Copyright © 2002-2016 by John J. Xenakis.