Stuxnet and Details


Stuxnet was a 500-Kb computer worm that infiltrated many computer systems (Hoolloway, 2015). It is currently agreed upon that this worm was designed as a cyber weapon to attack the development of Iran's nuclear program (Holloway, 2015). Everyone seems to think that this was an attack orchestrated by The State. In this case, The State would be two states: The United States and Israel [(Holloway, 2015) and (Alazab et al, 2014)]. Alazab et al (2014) does mention the National Security Agency and that does agree with what Holloway (2015) states, even though Holloway states that in a heavier manner. Holloway (2015) says that Edward Snowden (Gallagher, 2013) said that was the case in 2013.  Edward Snowden actually worked for the NSA for a time (Gallagher, 2013). Alazab et al (2014) says that it was the NSA plus the Unit 8200, which would be the Israelian counterpart for the NSA. Operation Olympic Games would be the name of this operation according to Alazab et al (2014). Stuxnet would have been inserted into the communications and control systems at the Natanz nuclear facility (Alazab et al, 2014). The impact was apparently only delay in the processing of Uranium enrichment through the facility because it managed to destroy a few centrifuges (Alazab et al, 2014). A programming error revealed the software in time to stop part of the operation (Alazab et al, 2014). They used Siemens software based on Windows to control all (Holloway, 2015). Stuxnet apparently makes the controlling mechanism not know when the centrifuging is getting out of boundaries, so that it may go quicker or slower than it is supposed to go (Zetter, 2014). If it goes quicker, it destroys the gear that centrifuges (Mueller et al, 2012). If it goes slower, it does not do all that it has to do to the Uranium for it to be in acceptable conditions of use (Mueller et al, 2012).


The Operation Olympic Games  would have been perpetrated by a Type I criminal group, following the typology found in Alazab et al (2014). Furthermore, they should be a hierarchical group and therefore one of structure of the type hub (Alazab et al, 2014).



References


Broadhurst, R., Grabosky, P., Alazab, M., & Chon, S. (2014). Organizations and Cyber crime: An Analysis of the Nature of Groups engaged in Cyber Crime. International Journal of Cyber Criminology, 8(1), 1 - 20. Full access: http://www.cybercrimejournal.com/broadhurstetalijcc2014vol8issue1.pdf
Holloway, M., 2015. Stuxnet Worm Attack on Iranian Nuclear Facilities. Available at: http://large.stanford.edu/courses/2015/ph241/holloway1/ [Accessed August 13, 2017].
Gallagher, K.M., 2013. NSA whistleblower Edward Snowden: “I don”t want to live in a society that does these sort of things’. Available at: https://www.youtube.com/watch?v=5yB3n9fu-rM [Accessed August 13, 2017].
Mueller, P. & Yadegari, B., 2012. The Stuxnet Worm, Available at: https://www2.cs.arizona.edu/~collberg/Teaching/466-566/2012/Resources/presentations/2012/topic9-final/report.pdf.
Zetter, K., 2014. An Unprecedented Look at Stuxnet, the World’s First Digital Weapon. Available at: https://www.wired.com/2014/11/countdown-to-zero-day-stuxnet/ [Accessed August 13, 2017].


Comments

Popular posts from this blog

Update on the Plan to Save Humanity

Gene Hackman: American Idol, Satanic Rhetoric

The Xhosa