Free Republic 2nd Qtr 2024 Fundraising Target: $81,000 Receipts & Pledges to-date: $15,391
19%  
Woo hoo!! And we're now over 19%!! Thank you all very much!! God bless.

Keyword: stuxnet

Brevity: Headers | « Text »
  • Previously undisclosed documents reveal 2020 arson at Iran nuclear facility

    03/28/2024 4:45:44 AM PDT · by bert · 4 replies
    Jerusalem Post ^ | 3/26/2024 | JERUSALEM POST STAFF
    This sabotage operation is not the first one carried out at Iranian nuclear facilities. A workshop belonging to Iran’s Atomic Energy Organization in the Shadabad area of Tehran was set on fire in July 2020, information concealed until now by Iranian officials, according to Iran International who claimed to have viewed judicial documents relating to the arson. The documents confirmed that Iran believes the Mossad orchestrated the fire. The judicial documents were obtained as part of a trove that a network of hacktivists leaked to the source on Thursday. Some of the referenced Iranian government documents are among millions of...
  • Natanz attack hit 50 meters underground, destroyed most of the facility

    04/13/2021 11:51:00 AM PDT · by Mariner · 93 replies
    The Jerusalem Post ^ | April 13th, 2021 | By TZVI JOFFRE, YONAH JEREMY BOB
    The alleged Israeli attack on Iran's Natanz nuclear facility targeted an electrical substation located 40 to 50 meters underground and damaged "thousands of centrifuges," Iranian officials revealed in recent days. Fereydoon Abbasi-Davani, former head of Iran's Atomic Energy Organization, told Iranian media on Monday that the attack hit an electrical substation located deep underground and managed to damage both the power distribution system and the cable leading to the centrifuges in order to cut power to them. The Iranian official stressed that such an operation takes years, saying "the design of the enemy was very beautiful." Davani added that the...
  • Report: New computer virus attacks Iranian 'strategic networks'

    11/01/2018 7:23:09 AM PDT · by SeekAndFind · 19 replies
    American Thinker ^ | 10/31/2018 | Rick Moran
    The Times of Israel is reporting that a new computer virus 'more powerful' than the Stuxnet worm that devastated the Iranian nuclear weapons program in 2010 has been unleashed on Iran's "infrastructure and strategic systems." While the extent of the damage is unknown, the new virus has been described as “more violent, more advanced and more sophisticated" than Stuxnet. That virus, jointly developed by US and Israel, is believed to have set back the Iranian nuclear weapons programs by several months to several years depending on the source. The report came hours after Israel said its Mossad intelligence agency had...
  • #AboutStrzok

    01/27/2018 8:56:14 AM PST · by XEHRpa · 91 replies
    Twitter ^ | 1/18/2018 | HousatonicITServices
    (1) #AboutStrzok This is #PeterStrzok . He is in his 40s. He works for the #FBI . He was the only person to interview @HillaryClinton , with no recording, on her #HRCEmail investigation . (2) #AboutStrzok How many #STRZOK family members are there? There are only 100 total Americans out of 300 million with this name . You can Google this. #PeterStrzok must be unique in such a small family, right? (3) #AboutStrzok The father of #PeterStrzok (ii) is Peter Strzok Sr, and he was in the Army core of engineers. Oh, he was actually a career expert in sanctions...
  • Defense Executive of the Year: [GEN] James Cartwright, [USMC] (Vice-Chairman Joint Chiefs)

    10/09/2007 11:29:21 AM PDT · by PurpleMan · 6 replies · 141+ views
    Government Computer News ^ | 10/08/07 | Sami Lais
    “Start by focusing on the output side of the equation,” he said. “Most metrics and most organizations focus on input: How many transactions did I do today, how many people are in my organization, how much money did I move?” Instead, look at “where you see value on the output side and work from there,” he said.
  • Ex-commander: Nukes on high alert are vulnerable to error

    04/30/2015 11:39:50 PM PDT · by Olog-hai · 21 replies
    Associated Press ^ | Apr. 30, 2015 3:36 AM EDT | Robert Burns
    A former commander of U.S. nuclear forces is leading a call for taking U.S. and Russian nuclear missiles off high alert, arguing that keeping them less ready for prompt launch would reduce the risk of miscalculation in a crisis. It also could keep a possible cyberattack from starting a nuclear war, he said, although neither Washington nor Moscow appears interested in negotiating an agreement to end the practice of keeping nuclear missiles on high alert. Retired Gen. James Cartwright said in an interview that “de-alerting” nuclear arsenals could foil cyber intruders by reducing the chance of firing a weapon in...
  • Obama pardons [Ret. Gen.] James Cartwright in leak case

    01/17/2017 2:21:41 PM PST · by GIdget2004 · 20 replies
    The Hill ^ | 01/17/2017 | Katie Bo Williams
    President Obama on Tuesday pardoned retired Gen. James Cartwright, the former vice chairman of the Joint Chiefs of Staff accused of lying to the FBI about his conversations with reporters regarding U.S. efforts to cripple Iran's nuclear program. Cartwright pleaded guilty in October to one felony count of making false statements during the FBI's investigation into leaks about the government's role in a highly classified operation known as Operation Olympic Games. The clandestine effort -- untaken with Israel -- deployed a computer virus known as Stuxnet that destroyed Iranian centrifuges. New York Times journalist David Sanger exposed the operation in...
  • 'Obama's Favorite General' Stripped Of Security Clearance Amid Leak Investigation

    09/25/2013 10:36:28 AM PDT · by Nachum · 41 replies
    Business Insider ^ | 9/24/13 | Paul Szoldra
    Retired Marine Gen. James "Hoss" Cartwright has reportedly lost his security clearance as an investigation into his involvement in national security leaks continues, Foreign Policy reports. Cartwright, a retired four-star general who served for 40 years and last served on the Joint Chiefs, has been the subject of an ongoing investigation into an alleged leak of classified information of the "Stuxnet" virus that targeted and temporarily disabled Iran's nuclear facilities in 2010. The general's legal team has called that assertion "preposterous." Gordon Lubold of FP reports that multiple current and former administration sources said Cartwright lost his clearance earlier this...
  • Sec Gates Tries To Whitewash Reasons Gen. Hoss Cartwright Passed Over To Be Chairman of JCS

    06/08/2011 10:03:14 PM PDT · by Tea Party Reveler · 9 replies
    Military Corruption Dot Com ^ | 06-05-2011 | Major Glenn MacDonald US Army (ret.)
    GATES TRIES TO WHITEWASH TRUTH AS TO WHY "HOSS" CARTWRIGHT PASSED OVER FOR CHAIRMAN OF JOINT CHIEFS OF STAFF JOB "OBAMA'S FAVORITE GENERAL" NO MORE - ALL THAT "SUCKING UP" TO HUSSEIN AND BIDEN DID NO GOOD - ARMY'S GEN. MARTIN DEMPSEY GETS KEY POSITION - SECRETARY OF DEFENSE REFUSES TO DISCUSS CARTWRIGHT'S ALLEGED "WOMANIZING" - IG PROBE - ALCOHOLIC FEMALE AIDE SEEN DRUNK AND PASSED OUT ON HOSS'S BED DURING OFFICIAL VISIT OVERSEAS © 2011 MilitaryCorruption.com Dr. Joseph Goebbels, Nazi wartime propaganda chief, once said: "Tell a lie often enough, and people will believe it." Well, we are not...
  • Obama has commuted Chelsea Manning’s prison sentence

    01/17/2017 1:31:47 PM PST · by BradtotheBone · 275 replies
    Yahoo ^ | 01/17/2016
    President Obama has commuted the 35-year sentence of former Army intelligence analyst Chelsea Manning for leaking classified information in 2010 to WikiLeaks.
  • Retired US general pleads guilty to lying in Iran probe (lied to FBI)

    10/18/2016 3:50:13 AM PDT · by BeadCounter · 16 replies
    Middle East Eye ^ | 18 October 2016 | AFP
    James Cartwright, formerly vice chairman to Joint Chiefs of Staff, was accused of lying to investigators A retired top US general pleaded guilty on Monday to making a false statement during an FBI probe into a classified intelligence leak about a cyber attack against Iran's nuclear programme in 2010. Marine Corps General James Cartwright, 67, formerly the vice chairman to the Joint Chiefs of Staff, was accused of lying to investigators when he said he had not confirmed classified information to New York Times journalist David Sanger. Sanger wrote a book describing a joint US and Israeli operation that deployed...
  • Ex-Pentagon general target of leak investigation, sources say

    06/27/2013 4:09:49 PM PDT · by John W · 39 replies
    nbcnews.com ^ | June 27, 2013 | Michael Isikoff
    Legal sources tell NBC News that the former second-highest-ranking officer in the U.S. military is now the target of a Justice Department investigation into an alleged leak of classified information about a covert U.S. cyberattack on Iran’s nuclear program. According to legal sources, retired Marine Gen. James “Hoss” Cartwright, the former vice chairman of the Joint Chiefs of Staff, has been notified that he’s under investigation for allegedly leaking information about a massive attack using a computer virus named Stuxnet on Iran’s nuclear facilities. Gen. Cartwright, 63, becomes the latest alleged leaker targeted by the Obama administration, which has already...
  • Retired U.S. general pleads guilty to lying to FBI in 'Stuxnet' leak case

    10/17/2016 3:15:25 PM PDT · by mac_truck · 24 replies
    Reuters ^ | 10/17/2016 | Julia Harte
    A retired U.S. Marine Corps general who last served as vice chairman of the Joint Chiefs of Staff pleaded guilty on Monday in a federal court to making false statements to the FBI during an investigation into leaks of classified information. Four-star General James Cartwright was questioned by the Federal Bureau of Investigation in 2012 over a book written by New York Times reporter David Sanger, which exposed a malicious computer software program known as "Stuxnet" designed to disrupt Iran's nuclear program. Cartwright also in 2012 confirmed classified information about an unnamed country to Daniel Klaidman, then a reporter for...
  • Mysterious Stuxnet copycat discovered

    06/02/2016 10:29:27 PM PDT · by Utilizer · 12 replies
    iTnews (AUS) ^ | Jun 3 2016 9:43AM (AUS) | Allie Coyne
    Security researchers have uncovered new malware targeting industrial control systems that uses similar techniques to those employed by the infamous Stuxnet worm. Infosec firm FireEye today published a report on the 'Irongate' malware it discovered at the end of last year. The researchers found the malware within the database of the Google-owned VirusTotal website, which allows users and security researchers to submit suspicious files for scanning by antivirus software. Two samples of Irongate had been uploaded in 2014 by different sources, the researchers said, but had not been flagged as malicious by any antivirus vendors' scanners. FireEye only discovered the...
  • Bill and Hillary Clinton fight new demand for email server

    07/03/2015 11:23:30 AM PDT · by mandaladon · 55 replies
    Politico ^ | 3 Jul 2015 | JOSH GERSTEIN
    Lawyers for former President Bill Clinton and former Secretary of State Hillary Clinton have moved to block a conservative lawyer's effort to pry into emails stored on the Clintons' private server. In a motion filed Thursday evening in federal court in West Palm Beach, Fla., the Clintons' attorneys ask that conservative gadfly Larry Klayman be temporarily barred from demanding information in connection with a racketeering lawsuit he filed in March against the couple and the Clinton Foundation. The suit alleges that the Clintons used the private email server to frustrate Freedom of Information Act requests Klayman filed for records about...
  • Israel-Linked Spy Virus Discovered At Hotels Used For Iran Nuclear Talks

    06/10/2015 1:11:53 PM PDT · by Theoria · 26 replies
    NPR ^ | 10 June 2015 | Eyder Peralta
    Earlier this spring, the cybersecurity firm Kaspersky was testing an advanced antivirus software on one of its computers when it stumbled on something big: As the Moscow-based company puts it, it was "one of the most skilled, mysterious and powerful" spy viruses in the world. The piece of software was so sophisticated that it left few traces. It didn't leave files on the disk drive, and to stay hidden, it burrowed inside a computer's kernel memory, which is the place where a computer's most basic software is kept.Kaspersky says it assigned a team to watch its movements, and the team...
  • Report: US cyberattack on North Korea was ineffective

    05/29/2015 7:29:13 PM PDT · by markomalley · 14 replies
    The Hill ^ | 5/29/15 | Mark Hensch
    An American cyberattack on North Korea half a decade ago was fruitless overall, sources say. The National Security Agency (NSA) led a mission in 2010 to damage North Korea’s nuclear weapons program, Reuters reported on Friday. Operatives tried using a variant of the Stuxnet computer virus deployed against Iran that same year, the news service said, with developers crafting a version that would activate once it reached Korean-language settings on targeted machines. Operatives hoped the virus would disable centrifuges for enriching uranium, much like it had when used against Iran, Reuters said, but the cyberattack stumbled when it encountered North...
  • Iran Nuclear Facilities Hacked, Stations Made To Play AC/DC

    08/08/2014 12:30:42 PM PDT · by Ernest_at_the_Beach · 68 replies
    nextpowerup.com ^ | August 8, 2014 10:36 PDT | Seth Fitzgerald
    The Stuxnet virus reportedly created by the combined forces of the American and Israeli governments ravaged Iran's nuclear program between 2009 and 2010, destroying thousands of machines and effectively crippling the country's nuclear efforts.But this wasn't enough for the attackers. They wanted to show what real power was like.And so they made the facilities' hijacked work stations play AC/DC."There was also some music playing randomly on several of the workstations during the middle of the night with the volume maxed out," wrote an Iranian scientist in an email. "I believe it was the American band AC-DC Thunderstruck. It was...
  • As Stuxnet Anniversary Approaches, New SCADA Attack Is Discovered

    06/27/2014 11:56:26 AM PDT · by Citizen Zed · 5 replies
    Dark Reading ^ | 6-27-2014 | Sara Peters
    Nearly four years since Stuxnet broke onto the scene, F-Secure has discovered another series of attacks against industrial control systems -- this time aiming at mostly European organizations. The attackers' ultimate motives are unclear. Researchers suspect they are simply gathering intelligence in preparation for a more serious attack. The attackers are infecting SCADA and ICS systems with the HAVEX remote access tool (mostly used for information gathering), using a unique infection vector. Once HAVEX is installed, it calls back to its command-and-control servers -- which are mostly unrelated third-party websites and blogs that the attackers have compromised -- and receives...
  • 'Stuxnet has infected Russian nuclear plant and International Space Station'

    11/12/2013 6:24:23 AM PST · by tamarijp · 30 replies
    The Jerusalem Post ^ | 11/12/2013 | Sara Miller
    An internet security specialist says that Stuxnet, the computer malware that targeted Iran's nuclear facilities in 2010 and widely attributed to Israel and the US, has spiraled out of control and attacked a Russian nuclear plant and the International Space Station.