How Obama and Bush accelerated The Stuxnet Attacks (Olympic Games) On Iranian Natanz Plant?
It looks like, Stuxnet cyberattacks, developed by U.S. and Israeli agencies, was designed to gain access to the industrial computer controls in Iran’s Natanz nuclear plant. And it shows U.S. President Barack Obama was eager to stop or at-least slow down Iran’s effort toward building a nuclear bomb without launching a traditional military attack.
Overall, the Stuxnet cyber-attacks destroyed nearly 1,000 of Iran’s 6,000 centrifuges — fast-spinning machines that enrich uranium, an essential step toward making a nuclear bomb. According to David E. Sanger at The Times, the U.S. National Security Agency and a secret Israeli cyberunit developed the Stuxnet worm, code-named Olympic Games.
President Obama once planned shutting down the cyberattacks after Stuxnet began compromising other computers, but later on decided to keep the project running.
The Times said the article was based on 18 months of interviews with current and former US, European and Israeli officials, and was adapted from the book “Confront and Conceal: Obama’s Secret Wars and Surprising Use of American Power,” by David Sanger, set to be published next week.
“This is the first attack of a major nature in which a cyberattack was used to effect physical destruction,” said Michael Hayden a former director of the CIA and NSA, who did not reveal his own knowledge of “Olympic Games”.
Getting Stuxnet into Natanz therefore required a worker at the plant to carry it in on a USB thumb drive.
“That was our holy grail,” one of the architects of the plan told David E Sanger, the author of the new book, Confront and Conceal: Obama’s Secret Wars and Surprising Use of American Power.
“It turns out there is always an idiot around who doesn’t think much about the thumb drive in their hand.”
Stuxnet Worm accidentally became public in the summer of 2010, probably on someone’s laptop once connected to the outside Internet, it did what it was designed not to do: spread in public. says Nate Anderson.
Gholam Reza Jalali, who heads an Iranian military unit in charge of fighting sabotage, said: ‘This virus penetrated some fields. One of them was the oil sector. ‘Fortunately, we detected and controlled this single incident.’
“As we’ve said many times and the president and secretary made clear, cyber domain is a domain that we need to constantly evaluate and constantly assess and try to improve the range of capabilities that we have in cyberspace,” said pentagon spokesman, Captain John Kirby.
DON’T MISS: Hit List
- Is Flame, Flamer, or sKyWIper really such an amazingly advanced cyber-weapon?
In a most destructive cyber-attack on Iran since the notorious Stuxnet virus, a high-ranking Iranian military official confirmed Iran’s oil industry was briefly attacked by a data-mining virus called …
- How Kids are writing malicious code designed to hack social networking and gaming sites – kiddie Trojans?
Oh, how times have changed. children as young as eleven years write malicious computer code to hack accounts on social networking sites and gaming sites to steal data and virtual currency from friends…
- Why on earth Chinese hackers target US newspapers: NYT and The Wall Street Journal?
The Wall Street Journal (WSJ) is the next U.S. media giants after the New York Times (NYT) to admit, it was attacked by Chinese hackers since the NYT ran it’s investigative report on the wealth of Pre…
- Why is China worried over cyber espionage: cyberspace a new battlefield?
China’s Foreign Minister Yang Jiechi denied accusations that China’s military was behind high-profile cyber attacks on Western websites. He called for “rules and cooperation”, instead of a cyberspace …
- A Tough Fight to Win: Microsoft files lawsuits against Malicious Advertising
Microsoft is now taking the legal route to take on developers of scareware applications. The company has filed lawsuits against five companies which they claim indulge in such practices.
I am a tech reporter and have been writing about technology, digital marketing, Internet and startups at CEOWORLD Magazine since January 2010. Specialist areas of my research includes e-commerce, Android, smartphone adoption, and apps in general. I'm currently based in the New York City. If you have any tips or feedback, contact me via email: email@example.com