This page permanently redirects to gemini://gemini.techrights.org/2012/06/05/stuxnet-created-by-govt/.
Posted in Microsoft, Security, Windows at 3:58 am by Dr. Roy Schestowitz
Coup OS
Summary: Confirmation that Stuxnet was created by bureaucrats for their political purposes comes from sources with special government relationships
TECHRIGHTS wrote about Stuxnet many times before, e.g.:
Iran Shows the Downside of Using Proprietary SoftwareRalph Langner Says Windows Malware Possibly Designed to Derail Iran’s Nuclear ProgrammeWindows Viruses Can be Politically Motivated SometimesWho Needs Windows Back Doors When It’s So Insecure?Windows Insecurity Becomes a Political IssueWindows, Stuxnet, and Public StoningStuxnet Grows Beyond Siemens-Windows InfectionsHas BP Already Abandoned Windows?Reports: Apple to Charge for (Security) UpdatesWindows Viruses Can be Politically Motivated SometimesNew Flaw in Windows Facilitates More DDOS AttacksSiemens is Bad for Industry, Partly Due to MicrosoftMicrosoft Security Issues in The British Press, Vista and Vista 7 No PanaceaMicrosoft’s Negligence in Patching (Worst Amongst All Companies) to Blame for StuxnetMicrosoft Software: a Darwin Test for IncompetenceBad September for Microsoft Security, Symantec Buyout RumoursMicrosoft Claims Credit for Failing in SecurityMany Windows Servers Being Abandoned; Minnesota Goes the Opposite Direction by Giving Microsoft Its DataWindows Users Still Under Attack From Stuxnet, Halo, and ZeusSecurity Propaganda From Microsoft: Villains Become HeroesSecurity Problems in iOS and WindowsEye on Security: BBC Propaganda, Rootkits, and Stuxnet in Iran’s Nuclear FacilitiesEye on Security: ClamAV Says Windows is a Virus, Microsoft Compromises Mac OS X, and Stuxnet Runs WildWindows Kernel Vulnerability for Thanksgiving, Insecurity Used for Surveillance AgainCablegate Reveals Government Requesting Access to Microsoft Data, Kill SwitchesUse Microsoft Windows, Get Assassinated
This whole fiasco has been a good advocacy tool for GNU/Linux and software freedom. Security is a matter of national security. It is now confirmed that governments themselves used proprietary software from Microsoft to impose subversive will upon others. To quote:
=> ↺ confirmed
In 2011, the US government rolled out its “International Strategy for Cyberspace,” which reminded us that “interconnected networks link nations more closely, so an attack on one nation’s networks may have impact far beyond its borders.” An in-depth report today from the New York Times confirms the truth of that statement as it finally lays bare the history and development of the Stuxnet virus—and how it accidentally escaped from the Iranian nuclear facility that was its target.
Here is another take on the subject:
=> ↺ another take on the subject
Now, a stunning article in this morning’s New York Times recounts in surprising detail the origins of the cyber weaponry development and deployment program – code named Olympic Games – launched under President George W. Bush, and continued under the administration of Barack Obama. The article is based on a book to be published by Crowne on Tuesday, titled Confront and Conceal: Obama’s Secret Wars and Surprising Use of American Power,” to be published by Crown on Tuesday.For those that have followed the Stuxnet saga over the years, the article will answer some of the most intriguing questions that have arisen, including the following: * Who was in charge? According to the article, the Stuxnet project was a U.S. initiative, rather than an Israeli-led mission. The reason the Israeli’s were invited to the table was to encourage them to rely on cyber attacks rather than physical attacks in order to slow down Iranian nuclear advances. * How did Stuxnet work? The worm was based on information obtained from an initial “beacon” penetration, which then mapped and broadcast complete Natanz facility computer/centrifuge control designs to the software’s handlers. Stuxnet was then installed on to the air gapped system via the usual network vulnerability – a USB port, via an infected thumb drive. * How did Stuxnet escape into the wild? A programming error to a module of uncertain authorship (e.g., U.S. or Israeli) allowed Stuxnet to migrate onto an engineer’s laptop. When that laptop was later connected to the Internet, it moved out and found other Siemens systems to infect.
The Goodbye Microsoft Web site had another take on it. The whole accusation that such allegations were a mere “conspiracy theory” is no more. Now it’s a fact. While the FBI conveniently names Russian people “cyber criminals” it is actually the US government that arguably engages in cyber crime, with external costs to the private sector, too. It’s all just a matter of perspective. Those who control the source code control the users.
=> ↺ had another take on it | ↺ FBI conveniently names Russian people “cyber criminals”
“I don’t have / won’t have use of WMA or Flash,” writes one reader, “but this segment of this NPR show supposedly has some critique of Microsoft as being completely insecure… I got that 2nd/3rd hand… I have contacted them to complain about Flash / WMA and asked that they use a universal format instead… It’s buried in the site, but there is a link for the MP3… It was a disappointing set of interviews. None even touched on the unique vulnerability of Microsoft products.”
=> ↺ this NPR show | ↺ a link for the MP3
Notice how all the latest Stuxnet coverage hardly ever mentions Microsoft or Windows. It’s criminally poor journalism. █
Share in other sites/networks: These icons link to social bookmarking sites where readers can share and discover new web pages.
Permalink Send this to a friend
=> Permalink | ↺ Send this to a friend
=> Techrights
➮ Sharing is caring. Content is available under CC-BY-SA.
text/gemini;lang=en-GB
This content has been proxied by September (3851b).