Stuxnet and Details
Stuxnet
was a 500-Kb computer worm that infiltrated many computer systems (Hoolloway,
2015). It
is currently agreed upon that this worm was designed
as a cyber weapon to attack the development of Iran's nuclear program (Holloway, 2015). Everyone seems to think that this was an
attack orchestrated by The State. In this case, The State would be two states:
The United States and Israel [(Holloway, 2015) and (Alazab et al, 2014)].
Alazab et al (2014) does mention the National Security Agency and that does
agree with what Holloway (2015) states, even though Holloway states that in a heavier
manner. Holloway (2015) says that Edward Snowden (Gallagher, 2013) said that
was the case in 2013. Edward Snowden
actually worked for the NSA for a time (Gallagher, 2013). Alazab et al (2014)
says that it was the NSA plus the Unit 8200, which would be the Israelian
counterpart for the NSA. Operation Olympic Games would be the name of this
operation according to Alazab et al (2014). Stuxnet would have been inserted
into the communications and control systems at the Natanz nuclear facility
(Alazab et al, 2014). The impact was apparently only delay in the processing of
Uranium enrichment through the facility because it managed to destroy a few
centrifuges (Alazab et al, 2014). A programming error revealed the software in time
to stop part of the operation (Alazab et al, 2014). They used Siemens software
based on Windows to control all (Holloway, 2015). Stuxnet apparently makes the
controlling mechanism not know when the centrifuging is getting out of
boundaries, so that it may go quicker or slower than it is supposed to go
(Zetter, 2014). If it goes quicker, it destroys the gear that centrifuges
(Mueller et al, 2012). If it goes slower, it does not do all that it has to do
to the Uranium for it to be in acceptable conditions of use (Mueller et al,
2012).
The
Operation Olympic Games would have been perpetrated by a Type I criminal
group, following the typology found in Alazab et al (2014). Furthermore, they
should be a hierarchical group and therefore one of structure of the type hub
(Alazab et al, 2014).
References
Broadhurst, R., Grabosky, P., Alazab, M., & Chon, S.
(2014). Organizations and Cyber crime: An Analysis of the Nature of Groups
engaged in Cyber Crime. International Journal of Cyber Criminology, 8(1), 1 -
20. Full access: http://www.cybercrimejournal.com/broadhurstetalijcc2014vol8issue1.pdf
Holloway, M., 2015. Stuxnet Worm Attack on Iranian Nuclear
Facilities. Available at:
http://large.stanford.edu/courses/2015/ph241/holloway1/ [Accessed August 13,
2017].
Gallagher, K.M., 2013. NSA whistleblower Edward
Snowden: “I don”t want to live in a society that does these sort of things’.
Available at: https://www.youtube.com/watch?v=5yB3n9fu-rM [Accessed August 13,
2017].
Mueller, P. & Yadegari, B., 2012. The Stuxnet
Worm, Available at:
https://www2.cs.arizona.edu/~collberg/Teaching/466-566/2012/Resources/presentations/2012/topic9-final/report.pdf.
Zetter, K., 2014. An Unprecedented Look at Stuxnet,
the World’s First Digital Weapon. Available at:
https://www.wired.com/2014/11/countdown-to-zero-day-stuxnet/ [Accessed August
13, 2017].
Comments
Post a Comment