Free Republic 3rd Quarter Fundraising Target: $88,000 Receipts & Pledges to-date: $77,199
Woo hoo!! And now less than $11k to go and only $2k to the yellow!! We can do this. Thank you all very much!! God bless.

Keyword: stuxnet

Brevity: Headers | « Text »
  • Mysterious Stuxnet copycat discovered

    06/02/2016 10:29:27 PM PDT · by Utilizer · 12 replies
    iTnews (AUS) ^ | Jun 3 2016 9:43AM (AUS) | Allie Coyne
    Security researchers have uncovered new malware targeting industrial control systems that uses similar techniques to those employed by the infamous Stuxnet worm. Infosec firm FireEye today published a report on the 'Irongate' malware it discovered at the end of last year. The researchers found the malware within the database of the Google-owned VirusTotal website, which allows users and security researchers to submit suspicious files for scanning by antivirus software. Two samples of Irongate had been uploaded in 2014 by different sources, the researchers said, but had not been flagged as malicious by any antivirus vendors' scanners. FireEye only discovered the...
  • Bill and Hillary Clinton fight new demand for email server

    07/03/2015 11:23:30 AM PDT · by mandaladon · 53 replies
    Politico ^ | 3 Jul 2015 | JOSH GERSTEIN
    Lawyers for former President Bill Clinton and former Secretary of State Hillary Clinton have moved to block a conservative lawyer's effort to pry into emails stored on the Clintons' private server. In a motion filed Thursday evening in federal court in West Palm Beach, Fla., the Clintons' attorneys ask that conservative gadfly Larry Klayman be temporarily barred from demanding information in connection with a racketeering lawsuit he filed in March against the couple and the Clinton Foundation. The suit alleges that the Clintons used the private email server to frustrate Freedom of Information Act requests Klayman filed for records about...
  • Israel-Linked Spy Virus Discovered At Hotels Used For Iran Nuclear Talks

    06/10/2015 1:11:53 PM PDT · by Theoria · 26 replies
    NPR ^ | 10 June 2015 | Eyder Peralta
    Earlier this spring, the cybersecurity firm Kaspersky was testing an advanced antivirus software on one of its computers when it stumbled on something big: As the Moscow-based company puts it, it was "one of the most skilled, mysterious and powerful" spy viruses in the world. The piece of software was so sophisticated that it left few traces. It didn't leave files on the disk drive, and to stay hidden, it burrowed inside a computer's kernel memory, which is the place where a computer's most basic software is kept.Kaspersky says it assigned a team to watch its movements, and the team...
  • Report: US cyberattack on North Korea was ineffective

    05/29/2015 7:29:13 PM PDT · by markomalley · 14 replies
    The Hill ^ | 5/29/15 | Mark Hensch
    An American cyberattack on North Korea half a decade ago was fruitless overall, sources say. The National Security Agency (NSA) led a mission in 2010 to damage North Korea’s nuclear weapons program, Reuters reported on Friday. Operatives tried using a variant of the Stuxnet computer virus deployed against Iran that same year, the news service said, with developers crafting a version that would activate once it reached Korean-language settings on targeted machines. Operatives hoped the virus would disable centrifuges for enriching uranium, much like it had when used against Iran, Reuters said, but the cyberattack stumbled when it encountered North...
  • Iran Nuclear Facilities Hacked, Stations Made To Play AC/DC

    08/08/2014 12:30:42 PM PDT · by Ernest_at_the_Beach · 68 replies ^ | August 8, 2014 10:36 PDT | Seth Fitzgerald
    The Stuxnet virus reportedly created by the combined forces of the American and Israeli governments ravaged Iran's nuclear program between 2009 and 2010, destroying thousands of machines and effectively crippling the country's nuclear efforts.But this wasn't enough for the attackers. They wanted to show what real power was like.And so they made the facilities' hijacked work stations play AC/DC."There was also some music playing randomly on several of the workstations during the middle of the night with the volume maxed out," wrote an Iranian scientist in an email. "I believe it was the American band AC-DC Thunderstruck. It was...
  • As Stuxnet Anniversary Approaches, New SCADA Attack Is Discovered

    06/27/2014 11:56:26 AM PDT · by Citizen Zed · 5 replies
    Dark Reading ^ | 6-27-2014 | Sara Peters
    Nearly four years since Stuxnet broke onto the scene, F-Secure has discovered another series of attacks against industrial control systems -- this time aiming at mostly European organizations. The attackers' ultimate motives are unclear. Researchers suspect they are simply gathering intelligence in preparation for a more serious attack. The attackers are infecting SCADA and ICS systems with the HAVEX remote access tool (mostly used for information gathering), using a unique infection vector. Once HAVEX is installed, it calls back to its command-and-control servers -- which are mostly unrelated third-party websites and blogs that the attackers have compromised -- and receives...
  • 'Stuxnet has infected Russian nuclear plant and International Space Station'

    11/12/2013 6:24:23 AM PST · by tamarijp · 28 replies
    The Jerusalem Post ^ | 11/12/2013 | Sara Miller
    An internet security specialist says that Stuxnet, the computer malware that targeted Iran's nuclear facilities in 2010 and widely attributed to Israel and the US, has spiraled out of control and attacked a Russian nuclear plant and the International Space Station.
  • Retired U.S. General Is Focus of Inquiry Over Iran Leak (Stuxnet Patsy?)

    06/28/2013 4:59:57 AM PDT · by Titus-Maximus · 13 replies
    New York Times ^ | 6/28/2013 | NY Times
    WASHINGTON — The former second-ranking officer in the United States military, retired Gen. James E. Cartwright of the Marines, is a target of an investigation into the leak of classified information about American cyberattacks on Iran’s nuclear program, a person familiar with the investigation confirmed Thursday night. The leak investigation, being carried out by the United States attorney for Maryland, Rod J. Rosenstein, was announced by Attorney General Eric H. Holder Jr. after articles in The New York Times described an ambitious series of cyberattacks under the code name Olympic Games that were intended to slow Iran’s progress toward a...
  • Justice Dept. targets general in leak probe

    06/27/2013 7:33:23 PM PDT · by Brad from Tennessee · 13 replies
    Washington Post ^ | June 27, 2013 | By Greg Miller, Sari Horwitz
    A retired four-star Marine Corps general who served as the nation’s second-ranking military officer is a target of a Justice Department investigation into a leak of information about a covert U.S.-Israeli cyberattack on Iran’s nuclear program, a senior Obama administration official said. Retired Gen. James E. “Hoss” Cartwright served as deputy chairman of the Joint Chiefs of Staff and was part of President Obama’s inner circle on a range of critical national security issues before he retired in 2011. The administration official said that Cartwright is suspected of revealing information about a highly classified effort to use a computer virus...
  • Column One: Obama and the ‘official truth’

    05/17/2013 7:16:37 PM PDT · by smoothsailing · 26 replies
    Jerusalem Post ^ | 5-16-2013 | Caroline B. Glick - OP/ED
    May 16, 2013 Column One: Obama and the ‘official truth’ Caroline B. Glick Nakoula Basseley Nakoula has been sitting in a US federal prison in Texas since his photographed midnight arrest by half a dozen deputy sheriffs at his home in California for violating the terms of his parole. As many reporters have noted, the parole violation in question would not generally lead to anything more than a court hearing. But in Nakoula’s case, it led to a year in a federal penitentiary. Because he wasn’t really arrested for violating the terms of his parole. Nakoula was arrested for producing...
  • U.S.-Israeli cyberattack on Iran was ‘act of force,’ NATO study found

    03/26/2013 2:32:26 PM PDT · by LibWhacker · 8 replies
    Washington Times ^ | 3/24/13 | Shaun Waterman
    The 2009 cyberattack by the U.S. and Israel that crippled Iran’s nuclear program by sabotaging industrial equipment constituted “an act of force” and was likely illegal under international law, according to a manual commissioned by NATO’s cyber defense center in Estonia. “Acts that kill or injure persons or destroy or damage objects are unambiguously uses of force,” according to “The Tallinn Manual on the International Law Applicable to Cyber Warfare.” Michael N. Schmitt, the manual’s lead author, told The Washington Times that “according to the U.N. charter, the use of force is prohibited, except in self-defense.” Under the charter, states...
  • Israeli Source Confirms Iran’s Fordow Nuclear Plant Exploded

    01/28/2013 4:04:11 AM PST · by sheikdetailfeather · 43 replies
    Israel National News ^ | 1/28/2013 | Chana Ya'ar
    An Israeli intelligence source has confirmed Iran’s Fordow underground nuclear uranium enrichment facility sustained major damage in a “mega explosion” that occurred last week. Fordow, which contains at least 2,700 centrifuges for uranium enrichment, is located deep beneath a mountain near the Iranian city of Qom. Some 200 workers were trapped inside the facility at the time, according to a report published Monday by The Times, a UK-based newspaper.
  • Israeli Source Confirms Iran’s Fordow Nuclear Plant Exploded

    01/28/2013 3:26:42 AM PST · by dennisw · 33 replies
    israelnationalnews ^ | 1/28/2013 | By Chana Ya'ar
    Israeli intelligence source confirms underground nuclear facility sustained major damage in a “mega explosion” last week. An Israeli intelligence source has confirmed Iran’s Fordow underground nuclear uranium enrichment facility sustained major damage in a “mega explosion” that occurred last week. Fordow, which contains at least 2,700 centrifuges for uranium enrichment, is located deep beneath a mountain near the Iranian city of Qom. Some 200 workers were trapped inside the facility at the time, according to a report published Monday by The Times, a UK-based newspaper. The report quoted an Israeli official as saying “We’re still in the early stages of...
  • Iran media report new cyberattack by Stuxnet worm

    12/26/2012 8:15:10 AM PST · by Olog-hai · 4 replies
    Associated Press ^ | Dec 25, 2012 9:10 AM EST
    An Iranian semi-official news agency says there has been another cyberattack by the sophisticated computer worm Stuxnet, this time on the industries in the country’s south. … (Provisional civil defense chief Ali Akbar) Akhavan says Iranian computer experts were able to “successfully stop” the worm. …
  • Alarm In Tehran & Moscow Over Bushehr Nuclear Reactor’s Near-Explosion

    12/02/2012 7:38:52 PM PST · by drewh · 39 replies
    Debkafiles ^ | December 1, 2012, 13:13
    Iran’s nuclear reactor at Bushehr was shut down for fear of an explosion. Saturday Dec. 1, an authoritative Russian nuclear industry source revealed the cause of its malfunction: “Indicators showed that some small external parts were… in the [Bushehr] reactor vessel….” They were identified as “bolts beneath the fuel cells.” Moscow sources report this information came from a source in the office of Sergei Kiriyenko, head of the Russian nuclear energy authority Rosatom, which supervised the construction of Iran’s first atomic reactor at Bushehr. According to our intelligence sources, Russian scientists and engineers were rushed from Moscow to Bushehr when...
  • The leaker in chief

    08/17/2012 2:51:24 PM PDT · by ScaniaBoy · 30 replies
    Carlone ^ | August 16, 2012 | Caroline Glick
    Last month, provoked by the Obama White House's penchant for routinely using top secret information to advance its political fortunes on the backs of US allies, agents and armed forces, Latma produced an English-language song we called Tell on Me, to the tune of the immortal words of Ben E. King's masterpiece Stand By Me. If you missed it then, here it is again. Tell on Me: The ballad of US agents I mention our work because this week a courageous group of former US Special Operations fighters posted a video where they spell out precisely how Obama's leaks imperil...
  • Transparent Incompetence (Oliver North rips Obama)

    06/14/2012 5:19:58 PM PDT · by jazusamo · 16 replies
    Creators Syndicate ^ | June 15, 2012 | Oliver North
    WASHINGTON — Senior members of Congress — both Republicans and Democrats — are reacting with shock and awe at the tsunami of national security leaks emanating from the Obama administration. Sen. John McCain, R-Ariz., ranking Republican on the Senate Armed Services Committee, told Greta Van Susteren on Fox News Channel that the unauthorized disclosures of classified information are "the most egregious breach of national security" he ever has seen. Sen. Dianne Feinstein, D-Calif., chairwoman of the Senate Select Committee on Intelligence, told reporters this week, "The accelerating pace of such disclosures, the sensitivity of the matters in question and...
  • New York Times v. Obama

    06/13/2012 2:53:27 PM PDT · by 2ndDivisionVet · 10 replies ^ | June 12, 2012 | Dick Morris
    Both can’t be telling the truth. One is lying. The New York Times says that the national-security leaks that exposed our cyber-war against Iran and how our drone strikes against terrorists operate came from “aides” to the president and “members of the president’s national security team who were in the [White House Situation Room]” during key discussions, as well as current American officials involved with the program who spoke anonymously because “the effort remains highly classified.” The author of one of the Times stories, David Sanger, writes that some of his sources would be fired for divulging classified material to...
  • Oh No You Didn't: Mossad Agents Claim Obama Lying About Stuxnet

    06/10/2012 11:35:58 AM PDT · by ColdOne · 34 replies ^ | 6/10/12 | Joel B. Pollak
    Israeli officials who were placed at risk by the Obama administration's leaks about the Stuxnet virus are disputing American claims that the cyber-weapon was jointly developed by the U.S. and Israel. Rather, they say, Israeli intelligence first started developing cyberspace warfare against Iran, only convincing the U.S.--with some difficulty--to join in. The Israelis allege that President Barack Obama claimed credit for Stuxnet to boost his re-election campaign. The source for the new claim is Yossi Melman, a journalist for Israel's left-wing Ha'aretz daily (via Israel Matzav): The Israeli officials actually told me a different version. They said that it was...
  • Senate Democrats blast national security leak on Iran cyberattack

    06/05/2012 6:38:48 PM PDT · by jakerobins · 8 replies
    Senate Democrats on Tuesday blasted leaks to the press about a cyberattack against Iran and warned the disclosure of President Obama’s order could put the United States at risk of a retaliatory strike. Sen. Dianne Feinstein (D-Calif.), chairwoman of the Intelligence Committee, said the leak about the attack on Iran’s nuclear program could “to some extent” provide justification for copycat attacks against the United States. “This is like an avalanche. It is very detrimental and, candidly, I found it very concerning,” Feinstein said. “There’s no question that this kind of thing hurts our country.”
  • Obama Leaks Risk National Security For Political Gain

    06/04/2012 6:46:59 PM PDT · by raptor22 · 10 replies
    Security: From leaks about Osama bin Laden to those detailing cyberattacks on Iran, a disturbing pattern of publicly disclosing classified material to give Barack Obama a political boost is emerging. Under this president, our enemies don't need spies. The fact that the Allies in World War II had the ability to intercept and decode German and Japanese military transmissions, leading to critical military victories at Midway and elsewhere, remained a secret until long after World War II was over, and it didn't matter who knew it. "Loose lips sink ships" was then more than a clever wartime slogan. The pattern...
  • U.S. Team and Israel developed Iran Worm

    06/03/2012 3:23:48 PM PDT · by JOHN ADAMS · 12 replies
    Wall Street Journal ^ | June 3, 2012 | Siobhan Gorman
    facebook twitter linked in Email Print Save ↓ More By SIOBHAN GORMAN WASHINGTON—The U.S. is pursuing a wide-ranging, high-tech campaign against Iran's nuclear program that includes the cybersabotage project known as Stuxnet, which was developed by the Central Intelligence Agency in conjunction with Idaho National Laboratory, the Israeli government, and other U.S. agencies, according to people familiar with the efforts. The covert CIA effort also includes persistent drone surveillance and cyberspying on Iranian scientists, they said.
  • US officials leak claims of credit for Stuxnet in partnership with Israel

    06/01/2012 11:48:11 AM PDT · by SeekAndFind · 13 replies
    Hotair ^ | 06/01/2012 | Ed Morrissey
    The US and Israel partnered on the Stuxnet worm years ago in a top-secret attempt to slow down the Iranian development of nuclear weapons, according to current and former US officials. After a New York Times report this morning exposed the partnership, the Washington Post got confirmation from its sources. Interestingly, both newspapers emphasize Barack Obama’s role in the cyberattack strategy, while pushing the fact that George Bush actually ordered the program into existence to lower paragraphs. Here’s the New York Times: From his first months in office, President Obama secretly ordered increasingly sophisticated attacks on the computer systems that...
  • "Flame" virus a creation of the U.S. Government?

    06/01/2012 11:18:38 AM PDT · by mamelukesabre · 3 replies
    Check the comments for links to various stories that popped up on the internet this morning.
  • Powerful "Flame" cyber weapon found in Middle East

    05/28/2012 10:43:14 AM PDT · by bkopto · 24 replies
    Yahoo News ^ | 5/28/2012 | Jim Finkle
    Security experts have discovered a new data-stealing virus dubbed Flame they say has lurked inside thousands of computers across the Middle East for as long as five years as part of a sophisticated cyber warfare campaign. It is the most complex piece of malicious software discovered to date, said Kaspersky Lab security senior researcher Roel Schouwenberg, whose company discovered the virus. The results of the Lab's work were made available on Monday. Schouwenberg said he did not know who built Flame. If the Lab's analysis is correct, Flame could be the third major cyber weapon uncovered after the Stuxnet virus...
  • Iranian Intel official says 'Stuxnet virus infected 16,000 computers'

    02/20/2012 12:54:28 AM PST · by Libloather · 1 replies
    New Kerala ^ | 2/19/12
    Iranian Intel official says 'Stuxnet virus infected 16,000 computers' Tehran, Feb 19 : A senior Iranian intelligence official has claimed that an estimated 16,000 computers were infected by the Stuxnet virus, which targeted the country's nuclear facilities and other industrial sites in 2010. The Iranian state media quoted a deputy intelligence chief identified only as Ahangaran, as saying thousands of computers were infected by Stuxnet, but he did not specify whether worldwide or just in Iran. He also said that Iran is facing difficulties in obtaining anti-malware software because of international sanctions, forcing the country to use its own experts...
  • Experts: Iran Was Able to Clean Out Stuxnet

    02/14/2012 10:51:07 PM PST · by Eleutheria5 · 18 replies
    Arutz Sheva ^ | 15/2/12
    Computer experts from Europe and the United States said on Tuesday that they believe engineers in Iran’s nuclear program were able to completely neutralize their computer systems from the Stuxnet virus which seriously damaged Iranian nuclear equipment about two years ago. According to the experts, the virus was implanted in the computer systems already in 2009 and disrupted...
  • Duqu, Stuxnet malware developed by same group (screwed Iran - big time)

    01/26/2012 6:57:32 PM PST · by Libloather · 29 replies
    Newsbytes ^ | 1/20/12
    Duqu, Stuxnet malware developed by same groupPosted on 20 Jan 2012 at 2:29pm The infamous Trojan software Duqu and Stuxnet were developed by only one group of malware developers, according to Internet security firm Kaspersky Lab. In fact, Kaspersky said the malware development team could already have developed other malwares using the same platform that was flexibly adaptable to specific targets. Kaspersky released a report stating that Duqu and Stuxnet, as well as a number of malware discovered in 2011 were using a development platform called “Tilded,” citing the use of the tilde symbol (“~”) in many of these malware....
  • 'Stuxnet virus used on Iran was 1 of 5 cyberbombs'

    12/30/2011 11:58:54 AM PST · by bkopto · 8 replies
    YNET News ^ | 12/29/2011 | Staff
    The Stuxnet virus that last year damaged Iran's nuclear program was likely one of at least five cyber weapons developed on a single platform whose roots trace back to 2007, according to new research from Russian computer security firm Kaspersky Lab. SNIP Stuxnet has already been linked to another virus, the Duqu data-stealing trojan, but Kaspersky's research suggests the cyber weapons program that targeted Iran may be far more sophisticated than previously known. Kaspersky's director of global research & analysis, Costin Raiu, told Reuters on Wednesday that his team has gathered evidence that shows the same platform that was used...
  • Insight: Did Conficker help sabotage Iran's nuke program? (internet & fake soccer websites)

    12/02/2011 5:16:18 AM PST · by Libloather · 7 replies
    Reuters ^ | 12/02/11 | Jim Finkle
    Insight: Did Conficker help sabotage Iran's nuke program?By Jim Finkle Fri Dec 2, 2011 5:23am EST (Reuters) - A cyber warfare expert claims he has linked the Stuxnet computer virus that attacked Iran's nuclear program in 2010 to Conficker, a mysterious "worm" that surfaced in late 2008 and infected millions of PCs. **SNIP** The operators communicated with Stuxnet-infected computers over the Internet through servers using fake soccer websites that they built as a front for their operation: and If Iranian authorities noticed that traffic, they would be deceived into assuming it was from soccer fans, rather than suspect...
  • First came Stuxnet computer virus, now there's Duqu

    10/19/2011 11:07:47 PM PDT · by fso301 · 5 replies
    The Jerusalem Post ^ | Oct 20, 2011 | REUTERS
    Computer virus similar to Stuxnet detected in Europe; designed to capture keystrokes and gain remote access; US issues public alert. WASHINGTON - First there was the Stuxnet computer virus that wreaked havoc on Iran's nuclear program. Now comes "Duqu," which researchers on Tuesday said appears to be quite similar. Security software firm Symantec said in a report it was alerted by a research lab with international connections on Friday to a malicious code that "appeared to be very similar to Stuxnet." It was named Duqu because it creates files with "DQ" in the prefix. The US Department of Homeland Security...
  • Major Security Firms Detect New Trojan Capable Of Disrupting Power Plants - Infrastructure

    10/19/2011 2:08:07 PM PDT · by blam · 33 replies
    SHTF Plan ^ | 10-19-2011 | Mac Slavo
    Major Security Firms Detect New Trojan Capable Of Disrupting Power Plants, Oil Refineries and Other Critical Infrastructure Networks Mac Slavo October 19th, 2011 In our October 7, 2011 report There Have Been Intrusions, we noted that DHS Undersecretary Greg Shaffer warned that hackers and foreign governments are “knocking on the backdoor” of the networked systems which connect everything from infrastructure grid control systems to financial networks. It now appears that our interconnected smart grid is actively under attack, as evidenced by a new Stuxnet-style trojan that has been detected by major cyber security leaders Symantec and McAfee. Much like its...
  • Stuxnet Clone Found, Possibly Preparing For Power Plant Attacks

    10/19/2011 3:35:47 AM PDT · by edpc · 31 replies
    ANI via Yahoo News ^ | 19 Oct 2011 | ANI
    Washington, Oct.19 (ANI): Security researchers have detected a new Trojan, scarily similar to the infamous Stuxnet worm, which could disrupt computers controlling power plants, oil refineries and other critical infrastructure networks. The Trojan, dubbed "Duqu" by the security firm Symantec, appears, based on its code, to have been written by the same authors as the Stuxnet worm, which last July was used to cripple an Iranian nuclear-fuel processing plant, Fox News reports.
  • Did Iran Just Retaliate For Stuxnet? Computer Virus Infects US Predator Drone System

    10/07/2011 2:11:42 PM PDT · by SeekAndFind · 8 replies
    Zero Hedge ^ | 10/07/2011 | Tyler Durden
    It was only a matter of time: the weakest link in the otherwise awesome idea that is a remote-controlled military, represented by the thousands of Predator and Reaper drones, has always been its biggest strength: the fact that it is remote-controlled. Which means that with no person on location, the system has always been susceptible to infiltration in the form of intermediation between the offsite pilot and the actual equipment. Such as a virus. And as Wired reports, a viral infestation, the biggest nightmare for the the US drone fleet, has just struck. "A computer virus has infected the cockpits...
  • IAEA: Iran reaches breakthrough in suspected nuclear weapons push

    09/03/2011 9:49:02 PM PDT · by Nachum · 10 replies · 1+ views
    Haaretz ^ | 9/3/11 | Yossi Melman
    The United Nations nuclear watchdog released a report Saturday stating that Iran is pursuing the development of nuclear weapons, adding that the Islamic Republic has upgraded its nuclear facilities in order to defend them from possible cyber attacks. According to the report by the International Atomic Energy Agency, Iran has installed new and improved 2IR as well as 4IR centrifuges, which according to experts, will be immune to cyber attacks that were able to breach the older centrifuges. The centrifuges have allegedly been installed, the report states, in a fortified underground facility for uranium enrichment near the city of Qom.
  • Stuxnet Virus Opens New Era of Cyber War

    08/08/2011 12:41:47 PM PDT · by LibWhacker · 8 replies
    Spiegel ^ | 8/8/11 | Holger Stark
    The Mossad, Israel's foreign intelligence agency, attacked the Iranian nuclear program with a highly sophisticated computer virus called Stuxnet. The first digital weapon of geopolitical importance, it could change the way wars are fought -- and it will not be the last attack of its kind.The complex on a hill near an interchange on the highway from Tel Aviv to Haifa is known in Israel simply as "The Hill." The site, as big as several soccer fields, is sealed off from the outside world with high walls and barbed wire -- a modern fortress that symbolizes Israel's fight for survival...
  • IAF Generals 'Loudly' Demanding Strike on Iran – Report

    08/03/2011 2:11:59 PM PDT · by Eleutheria5 · 50 replies
    Arutz Sheva ^ | 3/8/11 | Gil Ronen
    The commanders of the IDF, especially those in the Air Force, are making "increasingly loud" demands to strike Iran's nuclear program, a German news source reported Wednesday. According to Der Spiegel, the question of how Israel will eventually deal with the threat of a nuclear Iran depends in part on a battle of prestige between the military and the Mossad – the latter being in charge of assassinations, and favoring them as a result. Mossad is behind the killings of three Iranian scientists in the last 18 months, the paper claimed. A fourth scientist was wounded and subsequently appointed to...
  • Two Events --A Hack and Stuxnet-- Are there any Solutions?

    07/12/2011 4:07:58 PM PDT · by Ooh-Ah · 4 replies
    Amagines ^ | 07/12/2011 | STEPHEN BRYEN
    Two "events" caught my attention today. One was something that just happened; the other was more about the infamous Stuxnet worm. I am not sure I have good answers to both these events, but I have some ideas, and I think we need to think together about solutions. Let's start with the event that just happened. According to Information Week, "Hacktivist group AntiSec started the week with yet another intrusion on a government contractor, this time targeting Booz Allen Hamilton and posting what it claims are 90,000 military email addresses and passwords from the contractor online." I took a look...
  • Computer security: Is this the start of cyberwarfare?Last year's Stuxnet virus attack...

    06/09/2011 8:30:52 PM PDT · by neverdem · 6 replies
    Nature News ^ | 8 June 2011 | Sharon Weinberger
    Last year's Stuxnet virus attack represented a new kind of threat to critical infrastructure. Just over a year ago, a computer in Iran started repeatedly rebooting itself, seemingly without reason. Suspecting some kind of malicious software (malware), analysts at VirusBlokAda, an antivirus-software company in Minsk, examined the misbehaving machine over the Internet, and soon found that they were right. Disturbingly so: the code they extracted from the Iranian machine proved to be a previously unknown computer virus of unprecedented size and complexity. On 17 June 2010, VirusBlokAda issued a worldwide alert that set off an international race to track down...
  • After Stuxnet Computer Virus: Iran Says It's Discovered 2nd Cyber Attack

    04/25/2011 7:00:20 AM PDT · by IsraelBeach · 24 replies
    The Jerusalem Post ^ | April 25, 2011 | Reuters
    After Stuxnet Computer Virus: Iran Says It's Discovered 2nd Cyber Attack Official says new virus, "Stars," is being investigated; virus' target isn't revealed; official warns that Stuxnet still poses a risk; urges legal action in "cyber wars." TEHRAN - Iran has been targeted by a second computer virus in a "cyber war" waged by its enemies, its commander of civil defense said on Monday. Gholamreza Jalali told the semi-official Mehr news agency that the new virus, called "Stars", was being investigated by experts. Last year, Iran revealed that its computers were attacked by the Stuxnet worm, which attack the Bushehr...

    04/17/2011 6:19:23 AM PDT · by tje · 37 replies
    ContentEnique ^ | 04/15/2011 | Chris
    The latest from the foreign news is that a senior official of Iran’s military has made a statement that their experts have found that the United States of America and Israel are the ones that were behind strange sort of computer virus named Stuxnet which has badly harmed the nuclear program of the state of Iran. Gholam Reza Jalali said in the statement that his team of experts determined that the worm originated from Texas, United States of America and also from the country of Israel. The comments of Jalali have further increased the tensions between the states of Iran...
  • Ralph Langner: Cracking Stuxnet, a 21st-century cyber weapon

    When first discovered in 2010, the Stuxnet computer worm posed a baffling puzzle. Beyond its unusually high level of sophistication loomed a more troubling mystery: its purpose. Ralph Langner and team helped crack the code that revealed this digital warhead's final target -- and its covert origins. In a fascinating look inside cyber-forensics
  • IAEA says Iran's Bushehr delays were caused by pump

    02/28/2011 1:20:57 PM PST · by libstripper · 6 replies
    Reuters ^ | Feb. 28, 2011 | Reuters
    Tehran reportedly told IAEA that mechanical issue forced it to remove fuel from nuclear reactor; expert calls it a "serious problem."
  • Signs of serious trouble at Iran's nuclear reactor

    02/26/2011 4:23:09 PM PST · by Pan_Yan · 41 replies
    Guardian ^ | February 26, 2011 | Julian Borger
    Today, Iran confirmed a UN report that it will have to remove the uranium fuel rod assemblies from the reactor core, a significant setback. The reactor has been under construction since the Shah's era in the 1970's. The fuel assemblies were finally introduced into the reactor four months ago and it was meant to start producing electricity in January, but that deadline was missed. Ali Asghar Soltanieh, Tehran's envoy to the International Atomic Energy Agency, told the ISNA news agency that the fuel was being removed on Russian advice: Based on Russia's request to run tests and technical measures, the...
  • Iran's Nuclear Program Suffers Major Setback

    02/26/2011 3:29:28 PM PST · by Neil E. Wright · 13 replies
    AP via Fox News ^ | February 26, 2011 | Associated Press
    TEHRAN, Iran -- In a major setback to Iran's nuclear program, technicians will have to unload fuel from the country's first atomic power plant because of an unspecified safety concern, a senior government official said. The vague explanation raised questions about whether the mysterious computer worm known as Stuxnet might have caused more damage at the Bushehr plant than previously acknowledged. Other explanations are possible for unloading the fuel rods from the reactor core of the newly completed plant, including routine technical difficulties. While the exact reason behind the fuel's removal is unclear, the admission is seen as a major...
  • In setback, Iran to unload fuel from nuclear plant

    02/26/2011 11:47:01 AM PST · by NormsRevenge · 14 replies
    Yahoo ^ | 2/26/11 | Ali Akbar Dareini - AP
    TEHRAN, Iran – In a major setback to Iran's nuclear program, technicians will have to unload fuel from the country's first atomic power plant because of an unspecified safety concern, a senior government official said. The vague explanation raised questions about whether the mysterious computer worm known as Stuxnet might have caused more damage at the Bushehr plant than previously acknowledged. Other explanations are possible for unloading the fuel rods from the reactor core of the newly completed plant, including routine technical difficulties.
  • Feds spy on reporter in leak probe [NYT leak on Iran Stuxnet]

    02/26/2011 8:53:22 AM PST · by Brilliant · 12 replies
    Politico ^ | February 24, 2011 | Josh Gerstein
    Federal investigators trying to find out who leaked information about a CIA attempt to disrupt Iran’s nuclear program obtained a New York Times reporter’s three private credit reports, examined his personal bank records and obtained information about his phone calls and travel, according to a new court filing. The scope and intrusiveness of the government’s efforts to uncover reporter James Risen’s sources surfaced Thursday in the criminal case of Jeffrey Sterling, a former CIA officer facing federal criminal charges for allegedly disclosing classified information. Sterling is accused of giving Risen details about what Risen describes as the CIA’s plan to...
  • Iran unloading fuel from Bushehr reactor

    02/26/2011 7:00:57 AM PST · by fightinJAG · 8 replies
    CNN ^ | Feb. 26, 2011 | Staff
    CNN) -- In a possible setback to its nuclear program, Iran is unloading fuel assemblies from the reactor at a plant already plagued by delays, according to a report issued Friday by the global nuclear watchdog agency. The Russian-built plant in the Persian Gulf city Bushehr was expected to produce 1,000 megawatts of electricity and was considered a showcase for nuclear power to be used for civilian purposes in Iran. It was supposed to be operational by the first quarter of this year. Iran's envoy to the International Atomic Energy Agency (IAEA), however, said the fuel removal was temporary. "Upon...
  • Iran suffers major setback at nuclear plant

    02/26/2011 4:03:46 AM PST · by John W · 14 replies
    The New York Times via MSNBC ^ | February 26, 2011 | WILLIAM J. BROAD and DAVID E. SANGER
    Iran told atomic inspectors this week that it had run into a serious problem at a newly completed nuclear reactor that was supposed to start feeding electricity into the national grid this month, raising questions about whether the trouble was sabotage, a startup problem, or possibly the beginning of the project’s end. In a report on Friday, the International Atomic Energy Agency said Iran told inspectors on Wednesday that it was planning to unload nuclear fuel from its Bushehr reactor — the sign of a major upset. For years, Tehran has hailed the reactor as a showcase of its peaceful...
  • Is Stuxnet a bust? A new report questions the worm's effectiveness

    02/16/2011 7:09:49 AM PST · by SeekAndFind · 6 replies
    American Thinker ^ | 02/16/2011 | Rick Moran
    A new report about the effect of the Stuxnet worm on the Iranian nuclear program is expected to downplay the effect of the computer attack at one of Iran's biggest nuclear facilities. Video taken by cameras installed at the Nantanz processing plant shows that when the worm hit, there was a massive effort to contain the damage, and that it was largely successful.Washington Post: The ISIS report acknowledges that the worm may have undercut Iran's nuclear program in ways that cannot be easily quantified. While scientists were able to replace the broken centrifuge machines this time, Iran is thought to...