President Obama Ordered Stuxnet Attacks On Iran Nuclear Facilities

Don’t miss (Flashback)!!!:

US To Classify Major Cyber-Attacks As Acts Of War:

The Wall Street Journal, citing three officials who said they had seen the document, reported Tuesday that the strategy would classify major cyber-attacks as acts of war, paving the way for possible military retaliation.

The newspaper said that the strategy was intended in part as a warning to foes that may try to sabotage the US electricity grid, subways or pipelines.

“If you shut down our power grid, maybe we will put a missile down one of your smokestacks,” it quoted a military official as saying.


Obama Order Sped Up Wave of Cyberattacks Against Iran (New York Times, May 1, 2012):

WASHINGTON — From his first months in office, President Obama secretly ordered increasingly sophisticated attacks on the computer systems that run Iran’s main nuclear enrichment facilities, significantly expanding America’s first sustained use of cyberweapons, according to participants in the program.

Mr. Obama decided to accelerate the attacks — begun in the Bush administration and code-named Olympic Games — even after an element of the program accidentally became public in the summer of 2010 because of a programming error that allowed it to escape Iran’s Natanz plant and sent it around the world on the Internet. Computer security experts who began studying the worm, which had been developed by the United States and Israel, gave it a name: Stuxnet.

Read morePresident Obama Ordered Stuxnet Attacks On Iran Nuclear Facilities

US And Israel Created Stuxnet, Lost Control Of It

Confirmed: US and Israel created Stuxnet, lost control of it (Ars Technica, June 1, 2012):

In 2011, the US government rolled out its “International Strategy for Cyberspace,” which reminded us that “interconnected networks link nations more closely, so an attack on one nation’s networks may have impact far beyond its borders.” An in-depth report today from the New York Times confirms the truth of that statement as it finally lays bare the history and development of the Stuxnet virus—and how it accidentally escaped from the Iranian nuclear facility that was its target.

The article is adapted from journalist David Sanger’s forthcoming book, Confront and Conceal: Obama’s Secret Wars and Surprising Use of American Power, and it confirms that both the US and Israeli governments developed and deployed Stuxnet. The goal of the worm was to break Iranian nuclear centrifuge equipment by issuing specific commands to the industrial control hardware responsible for their spin rate. By doing so, both governments hoped to set back the Iranian research program—and the US hoped to keep Israel from launching a pre-emptive military attack.

Read moreUS And Israel Created Stuxnet, Lost Control Of It

Iran Claims To Have Beaten ‘Flame’ Computer Virus

Related info:

Flame Super-Virus Threatening To Cripple Entire Nations Has ‘Hallmarks Of The NSA’


Iran claims to have beaten ‘Flame’ computer virus (Telegraph, May 30, 2012):

Iran claims it has defeated a powerful computer virus that has boasted unprecedented data-snatching capabilities and could eavesdrop on computer users, a senior official said.

Ali Hakim Javadi, Iran’s deputy Minister of Communications and Information Technology, told the official IRNA news agency that Iranian experts have already produced an antivirus capable of identifying and removing “Flame” from computers.

Read moreIran Claims To Have Beaten ‘Flame’ Computer Virus

Flame Super-Virus Threatening To Cripple Entire Nations Has ‘Hallmarks Of The NSA’

Was Flame super-virus created in the US? Cyber weapon threatening to cripple entire nations has ‘hallmarks of the NSA’ (Daily Mail, May 31, 2012):

  • Cyber experts: Spyware too sophisticated to have come from anywhere else

The Flame computer virus which is threatening to bring countries to a standstill is too sophisticated to have been created anywhere other than the U.S., it was claimed today.

As the United Nations prepares to issue its ‘most serious warning’ to guard against the superbug, cyber experts said it carried all the markings of a U.S. espionage operation.

Specifically, they have pointed the finger at the highly secretive National Security Agency.

Read moreFlame Super-Virus Threatening To Cripple Entire Nations Has ‘Hallmarks Of The NSA’

US To Classify Major Cyber-Attacks As Acts Of War

See also:

US: House Passes Authority for Worldwide War (ACLU)

Rep. Ron Paul: ‘The Fate Of The American Republic Is Now Sealed’


Pentagon: All options on table in cyber-attack (AFP, May 31, 2011):

The Pentagon said Tuesday that it would consider all options if the United States were hit by a cyber-attack as it develops the first military guidelines for the age of Internet warfare.

President Barack Obama’s administration has been formalizing rules on cyberspace amid growing concern about the reach of hackers. Major defense contractor Lockheed Martin said it repelled a major cyber-assault a week ago.

The White House on May 16 unveiled an international strategy on cyber-security which said the United States “will respond to hostile acts in cyberspace as we would to any other threat to our country.”

“We reserve the right to use all necessary means — diplomatic, informational, military, and economic — as appropriate and consistent with applicable international law, in order to defend our nation, our allies, our partners and our interests,” the strategy said.

Pentagon spokesman Colonel Dave Lapan said Tuesday that the White House policy did not rule out a military response to a cyber-attack.

“A response to a cyber incident or attack on the US would not necessarily be a cyber response,” Lapan told reporters. “All appropriate options would be on the table if we were attacked, be it cyber.”

Lapan said that the Pentagon was drawing up an accompanying cyber defense strategy which would be ready in two to three weeks.

The Wall Street Journal, citing three officials who said they had seen the document, reported Tuesday that the strategy would classify major cyber-attacks as acts of war, paving the way for possible military retaliation.

Read moreUS To Classify Major Cyber-Attacks As Acts Of War

Stuxnet ‘Cyber Superweapon’ Wreaks Havoc in China, Infects Millions of Computers

See also:

Anti-Iran computer bug had powerful backers

Has the West declared cyber war on Iran?


An antivirus expert said the virus has infected over 6 million computer accounts

an-antivirus-expert-said-the-stuxnet-virus-has-infected-over-6-million-computer-accounts
The Stuxnet computer worm has wreaked havoc in China, infecting millions of computers around the country, state media have reported.

A computer virus dubbed the world’s “first cyber superweapon” by experts and which may have been designed to attack Iran’s nuclear facilities has found a new target — China.

The Stuxnet computer worm has wreaked havoc in China, infecting millions of computers around the country, state media reported this week.

Stuxnet is feared by experts around the globe as it can break into computers that control machinery at the heart of industry, allowing an attacker to assume control of critical systems like pumps, motors, alarms and valves.

It could, technically, make factory boilers explode, destroy gas pipelines or even cause a nuclear plant to malfunction.

The virus targets control systems made by German industrial giant Siemens commonly used to manage water supplies, oil rigs, power plants and other industrial facilities.

“This malware is specially designed to sabotage plants and damage industrial systems, instead of stealing personal data,” an engineer surnamed Wang at antivirus service provider Rising International Software told the Global Times.

“Once Stuxnet successfully penetrates factory computers in China, those industries may collapse, which would damage China’s national security,” he added.

Another unnamed expert at Rising International said the attacks had so far infected more than six million individual accounts and nearly 1,000 corporate accounts around the country, the official Xinhua news agency reported.

Read moreStuxnet ‘Cyber Superweapon’ Wreaks Havoc in China, Infects Millions of Computers

Former Top US Officials Fend Off Simulated Cyberattack

cyber-war
“Cyber war!” flashes on the screen at an Internet security conference

(AFP) WASHINGTON — Former top US officials staged a digital doomsday simulation on Tuesday in which a huge cyberattack crashes cellphone networks, slows Web traffic to a crawl and plunges major cities into darkness.

Dubbed “Cyber ShockWave,” the elaborate exercise was held in a Washington hotel room transformed for the day into the White House Situation Room, where the president and his advisers typically meet to address national emergencies.

Former president George W. Bush’s Homeland Security chief Michael Chertoff played the role of National Security Advisor as the “cabinet” sought to respond to a nightmare scenario drawn up by former CIA director Michael Hayden.

As the “crisis” escalated, the officials discussed various actions including calling out the National Guard, nationalizing the utility companies and staging a retaliatory strike if the authors of the cyberattack become known.

“If this is an attack on the United States the president, as commander in chief, has the authority to use the full powers at his disposal,” said former deputy attorney general Jamie Gorelick, in her role as attorney general.

Read moreFormer Top US Officials Fend Off Simulated Cyberattack

U.S. Military to Patrol Internet

Related article and video:Air Force Aims for ‘Full Control’ of ‘Any and All’ Computers

WASHINGTON, June 30 (UPI) — The U.S. military is looking for a contractor to patrol cyberspace, watching for warning signs of forthcoming terrorist attacks or other hostile activity on the Web.

“If someone wants to blow us up, we want to know about it,” Robert Hembrook, the deputy intelligence chief of the U.S. Army’s Fifth Signal Command in Mannheim, Germany, told United Press International.

(…and the place where you can read about any planned terrorist attack is the Internet, of course!)

In a solicitation posted on the Web last week, the command said it was looking for a contractor to provide “Internet awareness services” to support “force protection” — the term of art for the security of U.S. military installations and personnel.

“The purpose of the services will be to identify and assess stated and implied threat, antipathy, unrest and other contextual data relating to selected Internet domains,” says the solicitation.

Hembrook was tight-lipped about the proposal. “The more we talk about it, the less effective it will be,” he said. “If we didn’t have to put it out in public (to make the contract award), we wouldn’t have.”

He would not comment on the kinds of Internet sites the contractor would be directed to look at but acknowledged it would “not (be) far off” to assume violent Islamic extremists would be at the top of the list.

The solicitation says the successful contractor will “analyze various Web pages, chat rooms, blogs and other Internet domains to aggregate and assess data of interest,” adding, “The contractor will prioritize foreign-language domains that relate to specific areas of concern … (and) will also identify new Internet domains” that might relate to “specific local requirements” of the command.

Officials were keen to stress the contract covered only information that could be found by anyone with a computer and Internet connection.

“We’re not interested in being Big Brother,” said LeAnne MacAllister, chief spokeswoman for the command, which runs communications in Europe for the U.S. Army and the military’s joint commands there.

“I would not characterize it as monitoring,” added Hembrook. “This is a research tool gathering information that is already in the public domain.”

Experts say Islamic extremist groups like al-Qaida use the Web for propaganda and fundraising purposes.

________________________________________________________________________________

And these are the real terrorists:

Government Insider: Bush Authorized 9/11 Attacks:
“This (9/11) was all planned. This was a government-ordered operation. Bush personally signed the order. He personally authorized the attacks. He is guilty of treason and mass murder.” -Stanley Hilton

Rumsfeld: Why not another 9/11?:
In a newly-released tape of a 2006 neocon luncheon meeting featuring former War Secretary Donald Rumsfeld, attended by ex-military “message force multiplier” propaganda shills Lt. General Michael DeLong, David L. Grange, Donald W. Sheppard, James Marks, Rick Francona, Wayne Downing, Robert H. Scales and others, Rumsfeld declared that the American people lack “the maturity to recognize the seriousness of the ‘threats’” — and need another 9/11.

USA Military Officers Challenge Official Account of September 11

____________________________________________________________________________________________

Although the extent to which it is employed in operational planning is less clear, most agree that important information about targeting and tactics can be gleaned from extremists’ public pronouncements.

Read moreU.S. Military to Patrol Internet

China’s Cyber-Militia

Chinese hackers pose a clear and present danger to U.S. government and private-sector computer networks and may be responsible for two major U.S. power blackouts.

Computer hackers in China, including those working on behalf of the Chinese government and military, have penetrated deeply into the information systems of U.S. companies and government agencies, stolen proprietary information from American executives in advance of their business meetings in China, and, in a few cases, gained access to electric power plants in the United States, possibly triggering two recent and widespread blackouts in Florida and the Northeast, according to U.S. government officials and computer-security experts.

One prominent expert told National Journal he believes that China’s People’s Liberation Army played a role in the power outages. Tim Bennett, the former president of the Cyber Security Industry Alliance, a leading trade group, said that U.S. intelligence officials have told him that the PLA in 2003 gained access to a network that controlled electric power systems serving the northeastern United States. The intelligence officials said that forensic analysis had confirmed the source, Bennett said. “They said that, with confidence, it had been traced back to the PLA.” These officials believe that the intrusion may have precipitated the largest blackout in North American history, which occurred in August of that year. A 9,300-square-mile area, touching Michigan, Ohio, New York, and parts of Canada, lost power; an estimated 50 million people were affected.

Officially, the blackout was attributed to a variety of factors, none of which involved foreign intervention. Investigators blamed “overgrown trees” that came into contact with strained high-voltage lines near facilities in Ohio owned by FirstEnergy Corp. More than 100 power plants were shut down during the cascading failure. A computer virus, then in wide circulation, disrupted the communications lines that utility companies use to manage the power grid, and this exacerbated the problem. The blackout prompted President Bush to address the nation the day it happened. Power was mostly restored within 24 hours.

There has never been an official U.S. government assertion of Chinese involvement in the outage, but intelligence and other government officials contacted for this story did not explicitly rule out a Chinese role. One security analyst in the private sector with close ties to the intelligence community said that some senior intelligence officials believe that China played a role in the 2003 blackout that is still not fully understood.

Read moreChina’s Cyber-Militia

Air Force Aims for ‘Full Control’ of ‘Any and All’ Computers

The Air Force wants a suite of hacker tools, to give it “access” to — and “full control” of — any kind of computer there is. And once the info warriors are in, the Air Force wants them to keep tabs on their “adversaries’ information infrastructure completely undetected.”

The government is growing increasingly interested in waging war online. The Air Force recently put together a “Cyberspace Command,” with a charter to rule networks the way its fighter jets rule the skies. The Department of Homeland Security, Darpa, and other agencies are teaming up for a five-year, $30 billion “national cybersecurity initiative.” That includes an electronic test range, where federally-funded hackers can test out the latest electronic attacks. “You used to need an army to wage a war,” a recent Air Force commercial notes. “Now, all you need is an Internet connection.”

Read moreAir Force Aims for ‘Full Control’ of ‘Any and All’ Computers

Chinese Cyberattacks Target US Think Tanks

Washington DC (UPI) Mar 07, 2008
Defense-related think tanks and contractors, as well as the Pentagon and other U.S. agencies, were the target of repeated computer network intrusions last year apparently originating in China, the Department of Defense said this week.

In its annual report to lawmakers on China’s military power, the department said the intrusions “appeared to originate in” China but added, “It is unclear if these intrusions were conducted by, or with the endorsement of” the Chinese government or military.

Read moreChinese Cyberattacks Target US Think Tanks