Stuxnet worm 'targeted high-value Iranian assets'

Moderators: Elvis, DrVolin, Jeff

Re: Stuxnet worm 'targeted high-value Iranian assets'

Postby seemslikeadream » Sat Apr 16, 2011 4:32 pm

US, Israel 'behind Stuxnet' virus: Iran officer

(AFP) – 8 hours ago

TEHRAN — The United States and Israel are behind the computer worm Stuxnet designed to hurt Iran's controversial nuclear programme, state news agency IRNA reported Saturday quoting a military officer.

"Investigations and studies show that the source of Stuxnet originates from America and the Zionist regime," the commander of the Iranian civil defence organisation, Gholam Reza Jalali, said.

Jalali was the first Iranian official to accuse Tehran's two arch-foes over the Stuxnet virus. German computer experts and some Western media reports had indicated that the United States and Israel were behind it.

Stuxnet was publically identified last June and it reportedly mutated and wreaked havoc on computerised industrial equipment in Iran in the following months.

The worm was reportedly targeting Bushehr nuclear power plant, where several technical problems have been blamed for delays in getting the facility fully operational.

Jalali said once the worm mounts on a system, it begins to gather information and then sends reports from the infected machines to designated Internet addresses.

"After following up the reports that were sent, it became clear that the final destinations (of these reports) were the Zionist regime and the American state of Texas," he was quoted as saying by IRNA.

In March, a German computer security expert Ralph Langer said he believes the United States and Israel's Mossad had unleashed the Stuxnet worm on Iran's nuclear programme.

But it was the New York Times which reported first in January that US and Israeli intelligence services collaborated to develop the computer worm to sabotage Iran's efforts to make a nuclear bomb.

In November 2010, Iranian President Mahmoud Ahmadinejad admitted that uranium enrichment -- the most controversial part of Tehran's nuclear programme - had suffered problems caused by the malware but added the issues had been resolved.

Iran's nuclear ambitions are at the heart of a conflict between Tehran and the West, which accuse the Islamic republic of seeking to develop a weapons capability under the cover of a civilian nuclear drive.

Tehran vehemently denies the charges.
Mazars and Deutsche Bank could have ended this nightmare before it started.
They could still get him out of office.
But instead, they want mass death.
Don’t forget that.
User avatar
seemslikeadream
 
Posts: 32090
Joined: Wed Apr 27, 2005 11:28 pm
Location: into the black
Blog: View Blog (83)

Re: Stuxnet worm 'targeted high-value Iranian assets'

Postby JackRiddler » Thu Jun 02, 2011 2:41 pm


http://www.counterpunch.org/ross06022011.html

June 2, 2011
Ex-Head of IAEA Says Iran is Not a "Clear and Present Danger"
"No Shred of Evidence" Iran Building Nukes


By SHERWOOD ROSS


The former Director-General of the International Atomic Energy Agency(IAEA) said in a new published report that he had not seen "a shred of evidence" that Iran was "building nuclear-weapons facilities and using enriched materials."

Mohamed ElBaradei, the Nobel Peace Prize recipient who spent 12 years at the IAEA, told investigative journalist Seymour Hersh, "I don't believe Iran is a clear and present danger. All I see is the hype about the threat posed by Iran."

El Baradei, who is now a candidate for the presidency of Egypt, added, "The core issue is mutual lack of trust. I believe there will be no solution until the day that the United States and Iran sit down together to discuss the issues and put pressure on each other to find a solution."

El Baradei's remarks are contained in an article by Hersh titled "Iran And The Bomb," published in the June 6th issue of The New Yorker magazine.

Hersh points out that the last two U.S. National Intelligence Estimates (N.I.E.s) on Iranian nuclear progress "have stated that there is no conclusive evidence that Iran has made any effort to build the bomb since 2003."

An N.I.E. Report supposedly represents the best judgment of the senior offices from all the major American intelligence agencies.

The latest report, which came out this year and remains highly classified, is said by Hersh to reinforce the conclusion of the last N.I.E. Report of 2007, that "Iran halted weaponization in 2003."

A retired senior intelligence officer, speaking of the latest N.I.E. Report, told Hersh, "The important thing is that nothing substantially new has been learned in the last four years, and none of our efforts---informants, penetrations, planting of sensors---leads to a bomb."

Hersh revealed that over the past six years, soldiers from the Joint Special Operations Force, working with Iranian intelligence assets, "put in place cutting-edge surveillance techniques" to spy on suspected Iran facilities. These included:

# Surreptitiously removing street signs and replacing them with signs containing radiation sensors.

# Removing bricks from buildings suspected of containing nuclear enrichment activities and replacing them "with bricks embedded with radiation-monitoring devices."

# Spreading high-powered sensors disguised as stones randomly along roadways where a suspected underground weapon site was under construction.

# Constant satellite coverage of major suspect areas in Iran.

Going beyond these spy activities, two Iranian nuclear scientists last year were assassinated and Hersh says it is widely believed in Tehran that the killers were either American or Israeli agents.

Hersh quotes W. Patrick Lang, a retired Army intelligence officer and former ranking Defense Intelligence Agency(DIA) analyst on the Middle East as saying that after the disaster in Iraq, "Analysts in the intelligence community are just refusing to sign up this time for a lot of baloney."

The DIA is the military counterpart of the Central Intelligence Agency(CIA).

Hersh writes that Obama administration officials "have often overstated the available intelligence about Iranian intentions." He noted that Dennis Ross, a top Obama adviser on the region, told a meeting of the American Israel Public Affairs Committee that Iran had "significantly expanded its nuclear program."

Hersh noted further that last March, Robert Einhorn, the special arms control adviser to Secretary of State Hillary Clinton, told the Arms Control Assn. The Iranians "are clearly acquiring all the necessary elements of a nuclear-weapons capability."

Additionally, Senator Joseph Lieberman, a strong Israel supporter, told Agence France-Presse, "I can't say much in detail but it's pretty clear that they're(Iran) continuing to work seriously on a nuclear-weapons program."

Hersh recalled that "As Presidential candidates in 2008, both Barack Obama and Hillary Clinton had warned of an Iranian nuclear arsenal, and occasionally spoke as if it were an established fact that Iran had decided to get the bomb."

But last March, Lieutenant General James Clapper, the Director of National Intelligence which creates the N.I.E. Assessments, told the Senate Armed Services Committee that Iran had not decided to re-start its nuclear weapons work. When asked by Committee Chairman Carl Levin, "What is the level of confidence that you have (in that estimate)? Is that a high level?" Clapper replied, "Yes, it is."

At a round of negotiations in Istanbul five months ago, Iranian officials told Western diplomats that the United States and its allies need to acknowledge Iran's right to enrich uranium and that they must lift all sanctions against Iran.

Clinton adviser Einhorn has said that because of those sanctions Iran may have lost as much as $60 billion in energy investments and that Iran had also lost business in such industries as shipping, banking, and transportation. "The sanctions bar a wide array of weapons and missile sales to Iran, and make it more difficult for banks and other financial institutions to do business there," Hersh writes.

However, Hersh says, "The general anxiety about the Iranian regime is firmly grounded" even if there is no hard evidence it is working to build a nuclear weapon. "President Mahmoud Ahmadinejad has repeatedly questioned the Holocaust and expressed a desire to see the state of Israel eliminated, and he has defied the 2006 United Nations resolution calling on Iran to suspend its nuclear-enrichment program."

He goes on to write that while IAEA inspectors "have expressed frustration with Iran's level of cooperation and cited an increase in production of uranium...they have been unable to find any evidence that enriched uranium has been diverted to an illicit weapons program."

One approach to resolving the Iran nuclear issue has been suggested by former ranking American diplomat Thomas Pickering, a retired ambassador who served in Russia, Israel, Jordan and India, and who has been active in the American Iranian Council, devoted to the normalization of relations with Iran.

According to Hersh, Pickering has been involved "in secret, back-channel talks with...some of the key advisers close to Ahmadinejad" and has long sought a meeting with President Obama. Hersh quotes one of Pickering's colleagues as saying if Obama were to grant a meeting, Pickering would tell him: "Get off your no-enrichment policy, which is getting you nowhere. Stop your covert activities. Give the Iranians a sign that you're not pursuing regime change. Instead, the Iranians see continued threats, sanctions, and covert operations."

The website Politico.com reports in its May 31 issue that a senior Administration intelligence official asserted Hersh's article was nothing more than "a slanted book report."

Sherwood Ross is a Miami, Fla.-based public relations consultant who also writes on political and military affairs. Contact him at sherwoodross10@gmail.com.
We meet at the borders of our being, we dream something of each others reality. - Harvey of R.I.

To Justice my maker from on high did incline:
I am by virtue of its might divine,
The highest Wisdom and the first Love.

TopSecret WallSt. Iraq & more
User avatar
JackRiddler
 
Posts: 16007
Joined: Wed Jan 02, 2008 2:59 pm
Location: New York City
Blog: View Blog (0)

Re: Stuxnet worm 'targeted high-value Iranian assets'

Postby hanshan » Thu Jun 02, 2011 4:14 pm

...

yeah, this is worth repeating:


The former Director-General of the International Atomic Energy Agency(IAEA) said in a new published report that he had not seen "a shred of evidence" that Iran was "building nuclear-weapons facilities and using enriched materials."

Mohamed ElBaradei, the Nobel Peace Prize recipient who spent 12 years at the IAEA, told investigative journalist Seymour Hersh, "I don't believe Iran is a clear and present danger. All I see is the hype about the threat posed by Iran."




....
hanshan
 
Posts: 1673
Joined: Fri Apr 22, 2005 5:04 pm
Blog: View Blog (0)

Re: Stuxnet worm 'targeted high-value Iranian assets'

Postby JackRiddler » Fri Jun 10, 2011 1:08 pm


http://www.guardian.co.uk/commentisfree ... reat-peace


Iran is not in breach of international law

There is no evidence that the country is building nuclear weapons. The west's strategy has helped create the standoff

Richard Dalton
The Guardian, Thursday 9 June 2011

Image
A view of what is believed to be a uranium-enrichment facility near Qom, Iran. Photograph: Digital Globe/Reuters


It has been exactly a year since the last UN security council resolution imposed extra sanctions on Iran. International debate is resuming on the country's continued failure to heed UN decisions, and a new report by the International Atomic Energy Agency rightly draws attention to the questions Iran has not answered about experiments it has made on nuclear bomb technology.

As ambassadors to Iran during the past decade, we have all followed closely the development of this crisis. It is unacceptable that the talks have been deadlocked for such a long time.

The Arab world and the Middle East are entering a new epoch in which no country is immune from change. The Islamic Republic of Iran faces the disaffection of a significant part of its population, and this period of uncertainty offers opportunities to reconsider the west's established position on the nuclear question.

In terms of international law, the position of Europe and the United States may be less assured than is generally believed. Basically, it is embodied in a set of security council resolutions authorising coercive measures in case of "threats to the peace".

But what constitutes the threat? Is it the enrichment of uranium in Iranian centrifuges? This is certainly a sensitive activity, in a highly sensitive region. The international community's concerns are legitimate and Iran has a moral duty to answer them. In principle, however, nothing in international law or in the non-proliferation treaty forbids uranium enrichment. Several other countries, parties or not to the treaty, enrich uranium without being accused of "threatening the peace". And in Iran, this activity is submitted to inspections by the IAEA inspections. These inspections, it's true, are albeit constrained by an agreement on safeguards dating from the 70s. But the IAEA has never uncovered any attempted diversion of nuclear material to military use.

So is Iran attempting to build a nuclear weapon? For at least three years, the US intelligence community has discounted this hypothesis. The US director of national intelligence, James Clapper, testified last February to Congress: "We continue to assess [whether] Iran is keeping open the option to develop nuclear weapons … We do not know, however, if Iran will eventually decide to build nuclear weapons."

Most experts, even in Israel, view Iran as striving to become a "threshold country", technically able to produce a nuclear weapon but abstaining from doing so for now. Again, nothing in international law forbids this ambition. Several other countries are close to, or have already reached, such a threshold, with a commitment not to acquire nuclear weapons. Nobody seems to bother them.

We often hear that Iran's refusal to negotiate seriously left our countries no other choice but to drag it in 2006 to the security council. Here too, things are not quite that clear. In 2005 Iran was ready to discuss an upper limit for the number of its centrifuges and to maintain its rate of enrichment far below the high levels necessary for weapons. Tehran also expressed its readiness to allow intrusive inspections, even in non-declared sites. But at that time Europe and the US wanted to compel Iran to ditch its enrichment programme entirely.

Iranians assume that this is still the European and US goal, and that for this reason the security council insists on suspension of all Iranian enrichment activities. But the goal of "zero centrifuges operating in Iran, permanently or temporarily" is unrealistic, and has contributed greatly to the present standoff.

Some may ask why we should offer the Iranian regime an opening that may help to restore its internal and international legitimacy. Should we not wait for a more palatable successor? It's a legitimate question, but we shouldn't overestimate the influence of nuclear negotiation on internal developments in Iran. Ronald Reagan used to call the USSR the "evil empire", but that did not stop him from negotiating intensely with Mikhail Gorbachev on nuclear disarmament.

The failure of the last round of negotiation in January shows that the current deadlock will be difficult to break. The more discreet and technical negotiations are, the better chance they will have to progress. And we already know that any solution will have to build on the quality of the inspection system. Either we trust the IAEA's ability to supervise all its member states, including Iran, or we do not. And if we do not, we must ask why, if the organisation is effective only with its most virtuous members, we should continue to maintain it.

The next step should be for the two sides in this conflict to ask the IAEA what additional tools it needs to monitor Iran's nuclear programme fully, and to provide credible assurances that all its connected activities are purely peaceful. The agency's answer would offer a basis for the next round of pragmatic negotiations.


• This article was co-written by Richard Dalton and five other former ambassadors to Iran: Paul von Maltzahn (Germany), Steen Hohwü-Christensen (Sweden), Guillaume Metten (Belgium), François Nicoullaud (France) and Roberto Toscano (Italy)

guardian.co.uk © Guardian News and Media Limited 2011

We meet at the borders of our being, we dream something of each others reality. - Harvey of R.I.

To Justice my maker from on high did incline:
I am by virtue of its might divine,
The highest Wisdom and the first Love.

TopSecret WallSt. Iraq & more
User avatar
JackRiddler
 
Posts: 16007
Joined: Wed Jan 02, 2008 2:59 pm
Location: New York City
Blog: View Blog (0)

Re: Stuxnet worm 'targeted high-value Iranian assets'

Postby semper occultus » Fri Jun 10, 2011 5:05 pm

...so if there's no nukes what other pretext can they possibly bomb them for .....?

Cliff May peddles Iran-Al Qaeda link, again
January 10th, 2011
Ali Gharib

www.lobelog.com

Cliff May, who is making gains in the national standings for top U.S. counter-Jihadi, is at it again with his demagoguery about Iran.

May’s latest column for Scripps Howard and the National Review contains some advice for recently elevated Republican House Committee chairs. (You can listen to it!) He gives a “very brief briefing” on the Islamo-threat and, because Iran is the top priority of neoconservatives (especially May’s Foundation for Defense of Democracies), May starts off his briefing with this little-known fact: “In 1979, there was a revolution in Iran.”

Then May gets into it:
"Iran is a predominately Shia country but its revolution inspired the rise of militant groups among the more numerous Sunni Muslims of the broader Middle East as well. Al-Qaeda is only the best known.

Sunni jihadis and Shia jihadis are rivals, not enemies. They cooperate and collaborate against common enemies — us, for example. The evidence for this is abundant."

Report highlights alleged Iran force's Al-Qaeda links
May 4 06:26 PM US/Eastern
www.breitbart.com

A Congressional panel released a report Wednesday that alleges that Iran's elite Al-Quds force offers support to Al-Qaeda, adding a new dimension to the militant threat to the United States.
In its report to the Congressional Anti-Terrorism Caucus, the strategic advisory firm Kronos highlighted what it says are increasingly strong links between the Islamic Revolutionary Guard Corps force and Al-Qaeda.
( my google skills & patience aren't sufficient to get a hit on Kronos )

The report was released by the caucus after US troops killed Osama bin Laden in a raid in Pakistan that raised fresh doubts about Pakistan's willingness or ability to track down Al-Qaeda suspects.

"Iran has quietly forged a strong working relationship with core al-Qaeda?s leaders," said the report's author Michael S. Smith II.
"This relationship has been established to counter American influence in the Middle East and South Asia," according to his report.

"Through it, Iran will likely also help Al-Qaeda mobilize terrorists to carry out attacks against the US and our allies, providing the support required to extend Al-Qaeda's operational reach," the report added.

Smith argued that not enough attention has been paid to the links between the two entities because of a "pervasive" belief that Shiite and non-Arab Iran will work with the Sunni Arab militants of Al-Qaeda.

The ties date back to the 1990s when Al-Quds members worked with the Iranian-backed Hezbollah to train and equip bin Laden's holy warriors. He cites the 9/11 Commission Report for operational linkages between the two.
"Since 9/11, these partnerships have become all the more pronounced. Hundreds of al-Qaeda members, along with family members of core al-Qaeda leaders like Osama bin Laden, have found refuge inside Iran," he wrote.

In appealing for US policy makers to address the links, Smith warned that "if left unchecked, Iran's relationship with Al-Qaeda could cost America and our allies dearly."

The congressional caucus's Andy Polk said in an email to AFP that: "With the death of Bin Laden, and with Iran's Quds Force being listed as part of the new sanctions against Syria, this is an interesting and timely report."

Smith told AFP that a member of the House of Representative's permanent select committee on intelligence indicated there is "mounting interest" in the apparent links between Al-Quds and Al-Qaeda.

The member, who he did not name, suggested that Kronos could help by presenting a report about that relationship based on open-source materials, one that could be discussed with intelligence and defense officials.

Later, he said, a caucus representative contacted him and offered to distribute such a report to the nearly 100 members of Congress affiliated with the ATC.


this week a BBC radio documentary takes up the theme - focusing on the Iranian's sanction-busting arms procurement network fuelling the Afghan insurgency - in particular a recent tactical shift to sniper rifles.
Oddly according to the journalist Allan Urry one of the key players in the European end was a former Royal Marine Andrew Faulkner

Iran's illegal arms trade: 'Hypocritical and dangerous'
7 June 2011
Allan Urry

www.bbc.co.uk

Evidence is mounting that Iran is supplying weapons to the Taliban - and that British and other foreign troops are dying in Afghanistan as a result.

Image

<snip>

The BBC has seen a letter from the UK Mission to the United Nations, addressed to the chairman of the Security Council committee on Iran, which states without hesitation that Tehran supplied the rockets to the Taliban.

"These rockets originated in Iran and were being transferred to the Taliban at the behest of the Iranian regime," writes Philip Parham, Charge d'Affaires to the UK Mission.

And this is only one of a number of recent incidents which provide damning evidence of Tehran's involvement in arms smuggling to Afghanistan and elsewhere.

One such case involved former Royal Marine Andrew Faulkner, who was jailed for two-and-a-half years last year after he admitted trying to smuggle high specification rifle sights to Iran.

Not long ago the weapon of choice for Taliban fighting UK troops in Afghanistan was the improvised explosive device (IED), but in the last 15 months there has been an increase in the number of soldiers shot dead by Taliban marksmen.
The sniper scopes Mr Faulkner tried to smuggle were stopped before they reached Tehran, but his arrest led HM Revenue and Customs to a Europe-wide illegal arms racket.

The UN has become so concerned about Iranian links to illegal arms deals - both imports that violate the arms embargo, and exports that violate international sanctions on Iran - it has set up a special panel of experts to advise the Security Council.

Head of that committee is Salome Zourabichvili, who admits diplomatic efforts to halt the deals have not been 100% successful.

"It has been clear to us from what we've seen... that [there is a] continuous trend of Iran violating the sanctions and continuing to supply weapons to different non state organisations."

Analysts believe Iran has been offering help and assistance to Hamas and Hezbollah and recent evidence put before the US Congress suggests links with al-Qaeda.

A leaked copy of a report for the panel for the Security Council sanctions committee says: "Iran's circumvention of sanctions across all areas, in particular the use of front companies, concealment methods in shipping, financial transactions and the transfer of conventional arms and related material is wilful and continuing."

The letter written by Philip Parham of the UK Mission to the UN, calls on the Security Council to investigate further, but there is no sign of urgent action.

Later this month, the sanctions committee will meet and is expected to discuss the panel of experts' report - however, again, it is expected no action will be taken.
User avatar
semper occultus
 
Posts: 2974
Joined: Wed Feb 08, 2006 2:01 pm
Location: London,England
Blog: View Blog (0)

Re: Stuxnet worm 'targeted high-value Iranian assets'

Postby Project Willow » Tue Sep 27, 2011 12:57 am

National Propaganda Radio regurgitates stuxnet on 9/26, but with this enticing quote:

"Thinking about it for another minute, if it's not aliens, it's got to be the United States."


NPR wrote:Security Expert: U.S. 'Leading Force' Behind Stuxnet

by Tom Gjelten

September 26, 2011

One year ago, German cybersecurity expert Ralph Langner announced that he had found a computer worm designed to sabotage a nuclear facility in Iran. It's called Stuxnet, and it was the most sophisticated worm Langner had ever seen.
German cybersecurity expert Ralph Langner warns that U.S. utility companies are not yet prepared to deal with the threat presented by the Stuxnet computer worm, which he says the U.S. developed.
Courtesy of Langner Communications

German cybersecurity expert Ralph Langner warns that U.S. utility companies are not yet prepared to deal with the threat presented by the Stuxnet computer worm, which he says the U.S. developed.

In the year since, Stuxnet has been analyzed as a cyber-superweapon, one so dangerous it might even harm those who created it.

In the summer of 2010, Langner and his partners went to work analyzing a malicious software program that was turning up in some equipment. Langner Communications is a small firm in Hamburg, Germany, but Langner and the two engineers with whom he works know a lot about industrial control systems. What they found in Stuxnet left them flabbergasted.

"I'm in this business for 20 years, and what we saw in the lab when analyzing Stuxnet was far beyond everything we had ever imagined," Langner says.

It was a worm that could burrow its way into an industrial control system, the kind of system used in power plants, refineries and nuclear stations. Amazingly, it ignored everything it found except the one piece of equipment it was seeking; when the worm reached its target, it would destroy it.

Langner says that the more his team analyzed the Stuxnet worm, the more they knew they were onto something big.

... rest at the link.


http://www.npr.org/2011/09/26/140789306/security-expert-u-s-leading-force-behind-stuxnet

Yeah, we gots a big one.
User avatar
Project Willow
 
Posts: 4798
Joined: Sat May 07, 2005 9:37 pm
Location: Seattle
Blog: View Blog (1)

Re: Stuxnet worm 'targeted high-value Iranian assets'

Postby JackRiddler » Sat Jan 14, 2012 5:14 am

.

And now, Jan. 2012, in the days after the latest assassination of an Iranian physicist, and with all the media-magnified hysteria about the Straits of Hormuz, comes another round of legend building and/or revelation...

Mossad posed as American spies to recruit for Jundallah - at least, according to Foreign Policy magazine citing anonymous US intel sources.
viewtopic.php?f=8&t=33881

seemslikeadream wrote:
False Flag
A series of CIA memos describes how Israeli Mossad agents posed as American spies to recruit members of the terrorist organization Jundallah to fight their covert war against Iran.
BY MARK PERRY | JANUARY 13, 2012

Buried deep in the archives of America's intelligence services are a series of memos, written during the last years of President George W. Bush's administration, that describe how Israeli Mossad officers recruited operatives belonging to the terrorist group Jundallah by passing themselves off as American agents. According to two U.S. intelligence officials, the Israelis, flush with American dollars and toting U.S. passports, posed as CIA officers in recruiting Jundallah operatives -- what is commonly referred to as a "false flag" operation.

The memos, as described by the sources, one of whom has read them and another who is intimately familiar with the case, investigated and debunked reports from 2007 and 2008 accusing the CIA, at the direction of the White House, of covertly supporting Jundallah -- a Pakistan-based Sunni extremist organization. Jundallah, according to the U.S. government and published reports, is responsible for assassinating Iranian government officials and killing Iranian women and children.

But while the memos show that the United States had barred even the most incidental contact with Jundallah, according to both intelligence officers, the same was not true for Israel's Mossad. The memos also detail CIA field reports saying that Israel's recruiting activities occurred under the nose of U.S. intelligence officers, most notably in London, the capital of one of Israel's ostensible allies, where Mossad officers posing as CIA operatives met with Jundallah officials.

The officials did not know whether the Israeli program to recruit and use Jundallah is ongoing. Nevertheless, they were stunned by the brazenness of the Mossad's efforts.

"It's amazing what the Israelis thought they could get away with," the intelligence officer said. "Their recruitment activities were nearly in the open. They apparently didn't give a damn what we thought."

Interviews with six currently serving or recently retired intelligence officers over the last 18 months have helped to fill in the blanks of the Israeli false-flag operation. In addition to the two currently serving U.S. intelligence officers, the existence of the Israeli false-flag operation was confirmed to me by four retired intelligence officers who have served in the CIA or have monitored Israeli intelligence operations from senior positions inside the U.S. government.

The CIA and the White House were both asked for comment on this story. By the time this story went to press, they had not responded. The Israeli intelligence services -- the Mossad -- were also contacted, in writing and by telephone, but failed to respond. As a policy, Israel does not confirm or deny its involvement in intelligence operations.

There is no denying that there is a covert, bloody, and ongoing campaign aimed at stopping Iran's nuclear program, though no evidence has emerged connecting recent acts of sabotage and killings inside Iran to Jundallah. Many reports have cited Israel as the architect of this covert campaign, which claimed its latest victim on Jan. 11 when a motorcyclist in Tehran slipped a magnetic explosive device under the car of Mostafa Ahmadi Roshan, a young Iranian nuclear scientist. The explosion killed Roshan, making him the fourth scientist assassinated in the past two years. The United States adamantly denies it is behind these killings.

According to one retired CIA officer, information about the false-flag operation was reported up the U.S. intelligence chain of command. It reached CIA Director of Operations Stephen Kappes, his deputy Michael Sulick, and the head of the Counterintelligence Center. All three of these officials are now retired. The Counterintelligence Center, according to its website, is tasked with investigating "threats posed by foreign intelligence services."

The report then made its way to the White House, according to the currently serving U.S. intelligence officer. The officer said that Bush "went absolutely ballistic" when briefed on its contents.

"The report sparked White House concerns that Israel's program was putting Americans at risk," the intelligence officer told me. "There's no question that the U.S. has cooperated with Israel in intelligence-gathering operations against the Iranians, but this was different. No matter what anyone thinks, we're not in the business of assassinating Iranian officials or killing Iranian civilians."

Israel's relationship with Jundallah continued to roil the Bush administration until the day it left office, this same intelligence officer noted. Israel's activities jeopardized the administration's fragile relationship with Pakistan, which was coming under intense pressure from Iran to crack down on Jundallah. It also undermined U.S. claims that it would never fight terror with terror, and invited attacks in kind on U.S. personnel.

"It's easy to understand why Bush was so angry," a former intelligence officer said. "After all, it's hard to engage with a foreign government if they're convinced you're killing their people. Once you start doing that, they feel they can do the same."

A senior administration official vowed to "take the gloves off" with Israel, according to a U.S. intelligence officer. But the United States did nothing -- a result that the officer attributed to "political and bureaucratic inertia."

"In the end," the officer noted, "it was just easier to do nothing than to, you know, rock the boat." Even so, at least for a short time, this same officer noted, the Mossad operation sparked a divisive debate among Bush's national security team, pitting those who wondered "just whose side these guys [in Israel] are on" against those who argued that "the enemy of my enemy is my friend."

The debate over Jundallah was resolved only after Bush left office when, within his first weeks as president, Barack Obama drastically scaled back joint U.S.-Israel intelligence programs targeting Iran, according to multiple serving and retired officers.

The decision was controversial inside the CIA, where officials were forced to shut down "some key intelligence-gathering operations," a recently retired CIA officer confirmed. This action was followed in November 2010 by the State Department's addition of Jundallah to its list of foreign terrorist organizations -- a decision that one former CIA officer called "an absolute no-brainer."

Since Obama's initial order, U.S. intelligence services have received clearance to cooperate with Israel on a number of classified intelligence-gathering operations focused on Iran's nuclear program, according to a currently serving officer. These operations are highly technical in nature and do not involve covert actions targeting Iran's infrastructure or political or military leadership.

"We don't do bang and boom," a recently retired intelligence officer said. "And we don't do political assassinations."

Israel regularly proposes conducting covert operations targeting Iranians, but is just as regularly shut down, according to retired and current intelligence officers. "They come into the room and spread out their plans, and we just shake our heads," one highly placed intelligence source said, "and we say to them -- 'Don't even go there. The answer is no.'"

Unlike the Mujahedin-e Khalq, the controversial exiled Iranian terrorist group that seeks the overthrow of the Tehran regime and is supported by former leading U.S. policymakers, Jundallah is relatively unknown -- but just as violent. In May 2009, a Jundallah suicide bomber blew himself up inside a mosque in Zahedan, the capital of Iran's southeastern Sistan-Baluchistan province bordering Pakistan, during a Shiite religious festival. The bombing killed 25 Iranians and wounded scores of others.

The attack enraged Tehran, which traced the perpetrators to a cell operating in Pakistan. The Iranian government notified the Pakistanis of the Jundallah threat and urged them to break up the movement's bases along the Iranian-Pakistani border. The Pakistanis reacted sluggishly in the border areas, feeding Tehran's suspicions that Jundallah was protected by Pakistan's intelligence services.

The 2009 attack was just one in a long line of terrorist attacks attributed to the organization. In August 2007, Jundallah kidnapped 21 Iranian truck drivers. In December 2008, it captured and executed 16 Iranian border guards -- the gruesome killings were filmed, in a stark echo of the decapitation of American businessman Nick Berg in Iraq at the hands of al Qaeda's Abu Musab al-Zarqawi. In July 2010, Jundallah conducted a twin suicide bombing in Zahedan outside a mosque, killing dozens of people, including members of the Islamic Revolutionary Guard Corps.

The State Department aggressively denies that the U.S. government had or has any ties to Jundallah. "We have repeatedly stated, and reiterate again that the United States has not provided support to Jundallah," a spokesman wrote in an email to the Wall Street Journal, following Jundallah's designation as a terrorist organization. "The United States does not sponsor any form of terrorism. We will continue to work with the international community to curtail support for terrorist organizations and prevent violence against innocent civilians. We have also encouraged other governments to take comparable actions against Jundallah."

A spate of stories in 2007 and 2008, including a report by ABC News and a New Yorker article, suggested that the United States was offering covert support to Jundallah. The issue has now returned to the spotlight with the string of assassinations of Iranian nuclear scientists and has outraged serving and retired intelligence officers who fear that Israeli operations are endangering American lives.

"This certainly isn't the first time this has happened, though it's the worst case I've heard of," former Centcom chief and retired Gen. Joe Hoar said of the Israeli operation upon being informed of it. "But while false-flag operations are hardly new, they're extremely dangerous. You're basically using your friendship with an ally for your own purposes. Israel is playing with fire. It gets us involved in their covert war, whether we want to be involved or not."

The Israeli operation left a number of recently retired CIA officers sputtering in frustration. "It's going to be pretty hard for the U.S. to distance itself from an Israeli attack on Iran with this kind of thing going on," one of them told me.

Jundallah head Abdolmalek Rigi was captured by Iran in February 2010. Although initial reports claimed that he was captured by the Iranians after taking a flight from Dubai to Kyrgyzstan, a retired intelligence officer with knowledge of the incident told me that Rigi was detained by Pakistani intelligence officers in Pakistan. The officer said that Rigi was turned over to the Iranians after the Pakistani government informed the United States that it planned to do so. The United States, this officer said, did not raise objections to the Pakistani decision.

Iran, meanwhile, has consistently claimed that Rigi was snatched from under the eyes of the CIA, which it alleges supported him. "It doesn't matter," the former intelligence officer said of Iran's charges. "It doesn't matter what they say. They know the truth."

Rigi was interrogated, tried, and convicted by the Iranians and hanged on June 20, 2010. Prior to his execution, Rigi claimed in an interview with Iranian media -- which has to be assumed was under duress -- that he had doubts about U.S. sponsorship of Jundallah. He recounted an alleged meeting with "NATO officials" in Morocco in 2007 that raised his suspicions. "When we thought about it we came to the conclusion that they are either Americans acting under NATO cover or Israelis," he said.

While many of the details of Israel's involvement with Jundallah are now known, many others still remain a mystery -- and are likely to remain so. The CIA memos of the incident have been "blue bordered," meaning that they were circulated to senior levels of the broader U.S. intelligence community as well as senior State Department officials.

What has become crystal clear, however, is the level of anger among senior intelligence officials about Israel's actions. "This was stupid and dangerous," the intelligence official who first told me about the operation said. "Israel is supposed to be working with us, not against us. If they want to shed blood, it would help a lot if it was their blood and not ours. You know, they're supposed to be a strategic asset. Well, guess what? There are a lot of people now, important people, who just don't think that's true."



JackRiddler wrote:.

This article cites exclusively anonymous sources. I urge caution in interpreting the statements or doping out the agendas of "anonymous intelligence officials" when not even their agencies are specified. Are these guys career agents, contract agents, or appointed officials of an administration? Their current status could be as public or corporate employees, or as independent consultants. They could be military or civilian, and those of them said to be retired may merely be "retired." All you know is that they are "intelligence," a job that usually involves constructing legends and constant lying, even about who you are.

What is their clearance? You don't know. You can surmise their careers depend on pretending their knowledge is complete and perfect even when they know it's not. Each sits in a compartment within a labyrinthine mansion of many rooms (as Angleton put it), generally sealed off from seeing fully into other compartments. They may be in conflict, or they may be acting roles in a made-up conflicts. They may be genuine critics of Israeli influence who are right in all they say, or they may be dupes deceived into delivering a legend. You don't get to know.

All you can know with some certainty is that agents calling themselves CIA recruited Jundallah members to carry out violent sabotage and atrocities in Iran, during the period right after the US Congress allocated $400 million toward covert actions to destabilize Iran (as announced on ABC News, no less), a time when the US was also recruiting other groups to act against Iran.

You can also be certain that Israel wants the US to join it in a war on Iran, or for the US to wage one on its own. Israeli politicians have reached a stage when they do not seem to care if they are blamed for the war, as long as the US goes all in and backs them up to the bitter end.

You can be certain that elements within USG want a war on Iran, and that other USG elements are decidedly against a war and have so far been able to prevent it. The USG elements who want a war on Iran generally want the ability to disown it, and I have no doubt this was the faction to which we can assign Bush (whom the article tellingly exonerates of evil intentions).

Beyond that you cannot know to whom the anonymous sources from unknown agencies are pitching their interpretations by speaking to Foreign Policy. All of the following are possible: the recruiters of Jundallah were Mossad (or contract agents) acting independently of CIA, as the article claims; they were Mossad authorized to pose as CIA by CIA, and also willing to be portrayed as doing so against the CIA's will; they were Mossad and non-CIA US elements posing as CIA; CIA is now pinning it on Mossad with or without the Mossad's agreement; they were originally CIA but later Mossad, etc. etc.

Based on political psychology, I agree with Alice that these actions cannot be targeted with sufficient precision to degrade Iran's military strength or end the alleged nuclear arms program that they do not actually have. The point of the atrocities against Iran commissioned from Jundallah is to enrage the Iranian rulers and provoke violent reactions, to get a pretext for war or at least to further blacken Iran's image.

.
We meet at the borders of our being, we dream something of each others reality. - Harvey of R.I.

To Justice my maker from on high did incline:
I am by virtue of its might divine,
The highest Wisdom and the first Love.

TopSecret WallSt. Iraq & more
User avatar
JackRiddler
 
Posts: 16007
Joined: Wed Jan 02, 2008 2:59 pm
Location: New York City
Blog: View Blog (0)

Re: Stuxnet worm 'targeted high-value Iranian assets'

Postby seemslikeadream » Wed Feb 27, 2013 1:06 am

February 26, 2013, 9:53PM
Researchers Find Stuxnet Older Than Previously Believed

by Anne Saita
Researchers on Tuesday said they have proof the Stuxnet worm used to cripple Iran's nuclear program has been in the wild two years longer than first believed. There's now evidence the military-grade malware's origins date back to 2005, and possibly earlier.

According to an 18-page report, members of the Symantec Security Response team found an earlier version of the highly sophisticated malcode called "Stuxnet 0.5." Until today, the earliest version dated back to 2007. Discovered in July 2010, the virus was developed to surreptitiously disrupt the Natanz uranium enrichment facility in Iran.

Widely considered among the most complicated coding in the malware world, Stuxnet honed in on computers running Siemens software at 14 known industrial sites. The malware shut off valves that supplied uranium hexafluoride gas into centrifuges, thereby damaging a uranium enrichment systems by letting pressure build until the gas solidified.

"In addition, the code will take snapshots of the normal running state of the system, and then replay normal operating values during an attack so that the operators are unaware that the system is not operating normally," according to Symantec researchers. "It will also prevent modification to the valve states in case the operator tries to change any settings during the course of an attack cycle."

In analyzing the oldest known version of Stuxnet, researchers found the worm was in development as early as November 2005 and released in the wild two years later. It was programmed to stop communicating with its command-and-control servers on Jan. 11, 2009 and stop spreading via infected USB keys on July 4 of the same year. But a number of dormant infections were detected last year around the world, almost half in Iran and 21 percent in the United States.

Later versions became far more aggressive in propogating and exploiting vulnerabilities. It also appears to be originally developed by people with access to Flamer source code, unlike later versions built on the Tilded platform.

"The existence of unrecovered versions of Stuxnet, both before version 0.5 and especially between versions 0.5 and 1.001, are likely," according to a blog post.

The researchers have not been able to determine who was behind the complex cyber weapon tied to espionage and warfare. Fingers last summer pointed to the United States and Israel, which have been highly critical of Iran's nuclear program.
Mazars and Deutsche Bank could have ended this nightmare before it started.
They could still get him out of office.
But instead, they want mass death.
Don’t forget that.
User avatar
seemslikeadream
 
Posts: 32090
Joined: Wed Apr 27, 2005 11:28 pm
Location: into the black
Blog: View Blog (83)

Re: Stuxnet worm 'targeted high-value Iranian assets'

Postby seemslikeadream » Mon Sep 02, 2019 2:55 pm

Revealed: How a secret Dutch mole aided the U.S.-Israeli Stuxnet cyberattack on Iran
Kim Zetter and Huib Modderkolk

For years, an enduring mystery has surrounded the Stuxnet virus attack that targeted Iran’s nuclear program: How did the U.S. and Israel get their malware onto computer systems at the highly secured uranium-enrichment plant?

The first-of-its-kind virus, designed to sabotage Iran’s nuclear program, effectively launched the era of digital warfare and was unleashed some time in 2007, after Iran began installing its first batch of centrifuges at a controversial enrichment plant near the village of Natanz.

The courier behind that intrusion, whose existence and role has not been previously reported, was an inside mole recruited by Dutch intelligence agents at the behest of the CIA and the Israeli intelligence agency, the Mossad, according to sources who spoke with Yahoo News.

An Iranian engineer recruited by the Dutch intelligence agency AIVD provided critical data that helped the U.S. developers target their code to the systems at Natanz, according to four intelligence sources. That mole then provided much-needed inside access when it came time to slip Stuxnet onto those systems using a USB flash drive.

The Dutch were asked in 2004 to help the CIA and Mossad get access to the plant, but it wasn’t until three years later that the mole, who posed as a mechanic working for a front company doing work at Natanz, delivered the digital weapon to the targeted systems. “[T]he Dutch mole was the most important way of getting the virus into Natanz,” one of the sources told Yahoo.

Neither the CIA nor the Mossad responded to inquiries from Yahoo News about the information. The AIVD declined to comment on its involvement in the operation.

The now famous covert operation known as “Olympic Games” was designed not to destroy Iran’s nuclear program outright but to set it back for a while to buy time for sanctions and diplomacy to take effect. That strategy was successful in helping to bring Iran to the negotiating table, and ultimately resulted in an agreement with the country in 2015.

The revelation of Dutch involvement harkens back to a time when there was still extensive cooperation and strong, multilateral agreement among the U.S. and its allies about how to deal with the Iranian nuclear program — a situation that changed last year after the Trump administration pulled out of the hard-won nuclear accord with Tehran.

The Olympic Games operation was primarily a joint U.S.-Israel mission that involved the NSA, the CIA, the Mossad, the Israeli Ministry of Defense and the Israeli SIGINT National Unit, Israel’s equivalent of the NSA. But the U.S. and Israel had assistance from three other nations, according to sources, hence the covert codename that gave nod to the five-ring symbol of the world’s most famous international sporting event. Two of the three participating players were the Netherlands and Germany. The third is believed to be France, although U.K. intelligence also played a role.

Germany contributed technical specifications and knowledge about the industrial control systems made by the German firm Siemens that were used in the Iranian plant to control the spinning centrifuges, according to sources. France is believed to have provided intelligence of a similar sort.

But the Dutch were in a unique position to perform a different role — delivering key intelligence about Iran’s activities to procure equipment from Europe for its illicit nuclear program, as well as information about the centrifuges themselves. This is because the centrifuges at Natanz were based on designs stolen from a Dutch company in the 1970s by Pakistani scientist Abdul Qadeer Khan. Khan stole the designs to build Pakistan’s nuclear program, then proceeded to market them to other countries, including Iran and Libya.

The Dutch intelligence agency, known as AIVD, along with U.S. and British intelligence, infiltrated Khan’s supply network of European consultants and front companies who helped build the nuclear programs in Iran and Libya. That infiltration didn’t just involve old-school tradecraft but also employed offensive hacking operations being developed as part of the burgeoning field of digital espionage.

AIVD’s cyber capabilities are well known now — last year it was revealed that AIVD was responsible for tipping off the FBI to the 2016 hack of the Democratic National Committee, knowledge it had acquired because its operatives had hacked into computers belonging to the Russian hacking group known as Cozy Bear in 2014 and were watching in 2015 when the Russians broke into computers at the U.S. State Department and the DNC.

But during the early days of Iran’s nuclear program, AIVD’s hacking team was small and still developing.

The Iranian program, which had been on the back burner for years, kicked into high gear in 1996, when Iran secretly purchased a set of blueprints and centrifuge components from Khan. In 2000, Iran broke ground at Natanz with plans to build a facility that would hold 50,000 spinning centrifuges for enriching uranium gas. That same year, AIVD hacked the email system of a key Iranian defense organization in an effort to obtain more information about Iran’s nuclear plans, according to sources.

Israeli and Western intelligence agencies secretly monitored the progress at Natanz over the next two years, until August 2002, when an Iranian dissident group publicly exposed the Iranian program at a press conference in Washington, D.C., using information provided by the intelligence agencies. Inspectors for the International Atomic Energy Agency, the United Nations body that monitors nuclear programs around the world, demanded access to Natanz and were alarmed to discover that the Iranian program was much further along than believed.

Iran was pressed into agreeing to halt all activity at Natanz while the IAEA sought to obtain more information about the nuclear program, and the suspension continued throughout all of 2004 and most of 2005. But it was only a matter of time before operations at Natanz resumed, and the CIA and the Mossad wanted to be inside when they did.

The request to the Dutch for help with this came toward the end of 2004, when a Mossad liaison working out of the Israeli Embassy in the Hague and a CIA official based at the U.S. Embassy met with a representative from AIVD. There was no talk yet about inserting a digital weapon into the control systems at Natanz; the aim at that time was still just intelligence.

But the timing wasn’t random. In 2003, British and U.S. intelligence had landed a huge coup when they intercepted a ship containing thousands of centrifuge components headed to Libya — components for the same model of centrifuges used at Natanz. The shipment provided clear evidence of Libya’s illicit nuclear program. Libya was persuaded to give up the program in exchange for the lifting of sanctions, and also agreed to relinquish any components already received.

By March 2004, the U.S., under protest from the Dutch, had seized the components from the ship and those already in Libya and flown them to the Oak Ridge National Lab in Tennessee and to a facility in Israel. Over the next months, scientists assembled the centrifuges and studied them to determine how long it might take for Iran to enrich enough gas to make a bomb. Out of this came the plot to sabotage the centrifuges.

The Dutch intelligence agency already had an insider in Iran, and after the request from the CIA and Mossad came in, the mole decided to set up two parallel tracks — each involving a local front company — with the hope that one would succeed getting into Natanz.

Establishing a dummy company with employees, customers and records showing a history of activity, takes time, and time was in short supply. In late 2005, Iran announced it was withdrawing from the suspension agreement, and in February 2006 it began to enrich its first batch of uranium hexaflouride gas in a pilot plant in Natanz. The Iranians ran into some problems that slowed them down, however, and it wasn’t until February 2007 that they formally launched the enrichment program by installing the first centrifuges in the main halls at Natanz.

By then, development of the attack code was already long under way. A sabotage test was conducted with centrifuges some time in 2006 and presented to President George Bush, who authorized the covert operation once he was shown it could actually succeed.

By May 2007, Iran had 1,700 centrifuges installed at Natanz that were enriching gas, with plans to double that number by summer. But sometime before the summer of 2007, the Dutch mole was inside Natanz.

The first company the mole established had failed to get into Natanz — there was a problem with the way the company was set up, according to two of the sources, and “the Iranians were already suspicious,” one explained.

The second company, however, got assistance from Israel. This time, the Dutch mole, who was an engineer by training, managed to get inside Natanz by posing as a mechanic. His work didn’t involve installing the centrifuges, but it got him where he needed to be to collect configuration information about the systems there. He apparently returned to Natanz a few times over the course of some months.

“[He] had to get … in several times in order to collect essential information [that could be used to] update the virus accordingly,” one of the sources told Yahoo News.

The sources didn’t provide details about the information he collected, but Stuxnet was meant to be a precision attack that would only unleash its sabotage if it found a very specific configuration of equipment and network conditions. Using the information the mole provided, the attackers were able to update the code and provide some of that precision.

There is, in fact, evidence of updates to the code occurring during this period. According to the security firm Symantec, which reverse-engineered Stuxnet after it was discovered, the attackers made updates to the code in May 2006 and again in February 2007, just as Iran began installing the centrifuges at Natanz. But they made final changes to the code on Sept. 24, 2007, modifying key functions that were needed to pull off the attack, and compiled the code on that date. Compiling code is the final stage before launching it.

The code was designed to close exit valves on random numbers of centrifuges so that gas would go into them but couldn’t get out. This was intended to raise the pressure inside the centrifuges and cause damage over time and also waste gas.

This version of Stuxnet had just one way to spread — via a USB flash drive. The Siemens control systems at Natanz were air-gapped, meaning they weren’t connected to the internet, so the attackers had to find a way to jump that gap to infect them. Engineers at Natanz programmed the control systems with code loaded onto USB flash drives, so the mole either directly installed the code himself by inserting a USB into the control systems or he infected the system of an engineer, who then unwittingly delivered Stuxnet when he programmed the control systems using a USB stick.

Once that was accomplished, the mole didn’t return to Natanz again, but the malware worked its sabotage throughout 2008. In 2009 the attackers decided to change tactics and launched a new version of the code in June that year and again in March and April 2010. This version, instead of closing valves on the centrifuges, varied the speed at which the centrifuges spun, alternatively speeding them up to a level beyond which they were designed to spin and slowing them down. The aim was to both damage the centrifuges and undermine the efficiency of the enrichment process. Notably, the attackers had also updated and compiled this version of the attack code back on Sept. 24, 2007, when they had compiled the code for the first version — suggesting that intelligence the Dutch mole had provided in 2007 may have contributed to this version as well.

By the time this later version of the code was unleashed, however, the attackers had lost the inside access to Natanz that they had enjoyed through the mole — or perhaps they simply no longer needed it. They got this version of Stuxnet into Natanz by infecting external targets who brought it into the plant. The targets were employees of five Iranian companies — all of them contractors in the business of installing industrial control systems in Natanz and other facilities in Iran — who became unwitting couriers for the digital weapon.

“It’s amazing that we’re still getting insights into the development process of Stuxnet [10 years after its discovery],” said Liam O’Murchu, director of development for the Security Technology and Response division at Symantec. O’Murchu was one of three researchers at the company who reversed the code after it was discovered. “It’s interesting to see that they had the same strategy for [the first version of Stuxnet] but that it was a more manual process. ... They needed to have someone on the ground whose life was at risk when they were pulling off this operation.”

O’Murchu thinks the change in tactics for the later version of Stuxnet may be a sign that the capabilities of the attackers improved so that they no longer needed an inside mole.

“Maybe … back in 2004 they didn’t have the ability to do this in an automated way without having someone on the ground,” he said. “Whereas five years later they were able to pull off the entire attack without having an asset on the ground and putting someone at risk.”

But their later tactic had a different drawback. The attackers added multiple spreading mechanisms to this version of the code to increase the likelihood that it would reach the target systems inside Natanz. This caused Stuxnet to spread wildly out of control, first to other customers of the five contractors, and then to thousands of other machines around the world, leading to Stuxnet’s discovery and public exposure in June 2010.

Months after Stuxnet’s discovery, a website in Israel indicated that Iran had arrested and possibly executed several workers at Natanz under the belief that they helped get the malware onto systems at the plant. Two of the intelligence sources who spoke with Yahoo News indicated that there indeed had been loss of life over the Stuxnet program, but didn’t say whether this included the Dutch mole.

While Stuxnet didn’t significantly set back the Iranian program — due to its premature discovery — it did help buy time for diplomacy and sanctions to bring Iran to the negotiating table. Stuxnet also changed the nature of warfare and launched a digital arms race. It led other countries, including Iran, to see the value in using offensive cyber operations to achieve political aims — a consequence the U.S. has been dealing with ever since.

Gen. Michael Hayden, former head of the CIA and the NSA, acknowledged its groundbreaking nature when he likened the Stuxnet operation to the atomic bombs dropped on Hiroshima and Nagasaki.

“I don’t want to pretend it’s the same effect,” he said, “but in one sense at least, it’s August 1945.”

Kim Zetter is a journalist and the author of Countdown to Zero Day: Stuxnet and the Launch of the World’s First Digital Weapon. Huib Modderkolk is a journalist with the Dutch newspaper de Volkskrant who broke the story last year of AIVD’s hack of Cozy Bear; he is also the author of Het is oorlog: maar niemand die het ziet (The Invisible War), to be published this week in the Netherlands.
https://news.yahoo.com/revealed-how-a-s ... NlYwNzcg--


seemslikeadream » Wed Oct 27, 2010 12:53 am wrote:
THE ONLINE THREAT
Should we be worried about a cyber war?
by Seymour M. Hersh
NOVEMBER 1, 2010

On April 1, 2001, an American EP-3E Aries II reconnaissance plane on an eavesdropping mission collided with a Chinese interceptor jet over the South China Sea, triggering the first international crisis of George W. Bush’s Administration. The Chinese jet crashed, and its pilot was killed, but the pilot of the American aircraft, Navy Lieutenant Shane Osborn, managed to make an emergency landing at a Chinese F-8 fighter base on Hainan Island, fifteen miles from the mainland. Osborn later published a memoir, in which he described the “incessant jackhammer vibration” as the plane fell eight thousand feet in thirty seconds, before he regained control.
The plane carried twenty-four officers and enlisted men and women attached to the Naval Security Group Command, a field component of the National Security Agency. They were repatriated after eleven days; the plane stayed behind. The Pentagon told the press that the crew had followed its protocol, which called for the use of a fire axe, and even hot coffee, to disable the plane’s equipment and software. These included an operating system created and controlled by the N.S.A., and the drivers needed to monitor encrypted Chinese radar, voice, and electronic communications. It was more than two years before the Navy acknowledged that things had not gone so well. “Compromise by the People’s Republic of China of undestroyed classified material . . . is highly probable and cannot be ruled out,” a Navy report issued in September, 2003, said.
The loss was even more devastating than the 2003 report suggested, and its dimensions have still not been fully revealed. Retired Rear Admiral Eric McVadon, who flew patrols off the coast of Russia and served as a defense attaché in Beijing, told me that the radio reports from the aircraft indicated that essential electronic gear had been dealt with. He said that the crew of the EP-3E managed to erase the hard drive—“zeroed it out”—but did not destroy the hardware, which left data retrievable: “No one took a hammer.” Worse, the electronics had recently been upgraded. “Some might think it would not turn out as badly as it did, but I sat in some meetings about the intelligence cost,” McVadon said. “It was grim.”
The Navy’s experts didn’t believe that China was capable of reverse-engineering the plane’s N.S.A.-supplied operating system, estimated at between thirty and fifty million lines of computer code, according to a former senior intelligence official. Mastering it would give China a road map for decrypting the Navy’s classified intelligence and operational data. “If the operating system was controlling what you’d expect on an intelligence aircraft, it would have a bunch of drivers to capture radar and telemetry,” Whitfield Diffie, a pioneer in the field of encryption, said. “The plane was configured for what it wants to snoop, and the Chinese would want to know what we wanted to know about them—what we could intercept and they could not.” And over the next few years the U.S. intelligence community began to “read the tells” that China had access to sensitive traffic.

FROM THE ISSUECARTOON BANKE-MAIL THIS
The U.S. realized the extent of its exposure only in late 2008. A few weeks after Barack Obama’s election, the Chinese began flooding a group of communications links known to be monitored by the N.S.A. with a barrage of intercepts, two Bush Administration national-security officials and the former senior intelligence official told me. The intercepts included details of planned American naval movements. The Chinese were apparently showing the U.S. their hand. (“The N.S.A. would ask, ‘Can the Chinese be that good?’ ” the former official told me. “My response was that they only invented gunpowder in the tenth century and built the bomb in 1965. I’d say, ‘Can you read Chinese?’ We don’t even know the Chinese pictograph for ‘Happy hour.’ ”)
Why would the Chinese reveal that they had access to American communications? One of the Bush national-security officials told me that some of the aides then working for Vice-President Dick Cheney believed—or wanted to believe—that the barrage was meant as a welcome to President Obama. It is also possible that the Chinese simply made a mistake, given the difficulty of operating surgically in the cyber world.
Admiral Timothy J. Keating, who was then the head of the Pacific Command, convened a series of frantic meetings in Hawaii, according to a former C.I.A. official. In early 2009, Keating brought the issue to the new Obama Administration. If China had reverse-engineered the EP-3E’s operating system, all such systems in the Navy would have to be replaced, at a cost of hundreds of millions of dollars. After much discussion, several current and former officials said, this was done. (The Navy did not respond to a request for comment on the incident.)
Admiral McVadon said that the loss prompted some black humor, with one Navy program officer quoted as saying, “This is one hell of a way to go about getting a new operating system.”
The EP-3E debacle fuelled a longstanding debate within the military and in the Obama Administration. Many military leaders view the Chinese penetration as a warning about present and future vulnerabilities—about the possibility that China, or some other nation, could use its expanding cyber skills to attack America’s civilian infrastructure and military complex. On the other side are those who argue for a civilian response to the threat, focussed on a wider use of encryption. They fear that an overreliance on the military will have adverse consequences for privacy and civil liberties.
In May, after years of planning, the U.S. Cyber Command was officially activated, and took operational control of disparate cyber-security and attack units that had been scattered among the four military services. Its commander, Army General Keith Alexander, a career intelligence officer, has made it clear that he wants more access to e-mail, social networks, and the Internet to protect America and fight in what he sees as a new warfare domain—cyberspace. In the next few months, President Obama, who has publicly pledged that his Administration will protect openness and privacy on the Internet, will have to make choices that will have enormous consequences for the future of an ever-growing maze of new communication techniques: Will America’s networks be entrusted to civilians or to the military? Will cyber security be treated as a kind of war?
ven as the full story of China’s EP-3E coup remained hidden, “cyber war” was emerging as one of the nation’s most widely publicized national-security concerns. Early this year, Richard Clarke, a former White House national-security aide who warned about the threat from Al Qaeda before the September 11th attacks, published “Cyber War,” an edgy account of America’s vulnerability to hackers, both state-sponsored and individual, especially from China. “Since the late 1990s, China has systematically done all the things a nation would do if it contemplated having an offensive cyber war capability,” Clarke wrote. He forecast a world in which China might unleash havoc:

Within a quarter of an hour, 157 major metropolitan areas have been thrown into knots by a nationwide power blackout hitting during rush hour. Poison gas clouds are wafting toward Wilmington and Houston. Refineries are burning up oil supplies in several cities. Subways have crashed in New York, Oakland, Washington, and Los Angeles. . . . Aircraft are literally falling out of the sky as a result of midair collisions across the country. . . . Several thousand Americans have already died.

Retired Vice-Admiral J. Michael McConnell, Bush’s second director of National Intelligence, has issued similar warnings. “The United States is fighting a cyber war today, and we are losing,” McConnell wrote earlier this year in the Washington Post. “Our cyber-defenses are woefully lacking.” In February, in testimony before the Senate Commerce, Science, and Transportation Committee, he said, “As a consequence of not mitigating the risk, we’re going to have a catastrophic event.”
A great deal of money is at stake. Cyber security is a major growth industry, and warnings from Clarke, McConnell, and others have helped to create what has become a military-cyber complex. The federal government currently spends between six and seven billion dollars annually for unclassified cyber-security work, and, it is estimated, an equal amount on the classified portion. In July, the Washington Post published a critical assessment of the unchecked growth of government intelligence agencies and private contractors. Benjamin Powell, who served as general counsel for three directors of the Office of National Intelligence, was quoted as saying of the cyber-security sector, “Sometimes there was an unfortunate attitude of bring your knives, your guns, your fists, and be fully prepared to defend your turf. . . . Because it’s funded, it’s hot and it’s sexy.”
Clarke is the chairman of Good Harbor Consulting, a strategic-planning firm that advises governments and companies on cyber security and other issues. (He says that more than ninety per cent of his company’s revenue comes from non-cyber-related work.) McConnell is now an executive vice-president of Booz Allen Hamilton, a major defense contractor. Two months after McConnell testified before the Senate, Booz Allen Hamilton landed a thirty-four-million-dollar cyber contract. It included fourteen million dollars to build a bunker for the Pentagon’s new Cyber Command.
American intelligence and security officials for the most part agree that the Chinese military, or, for that matter, an independent hacker, is theoretically capable of creating a degree of chaos inside America. But I was told by military, technical, and intelligence experts that these fears have been exaggerated, and are based on a fundamental confusion between cyber espionage and cyber war. Cyber espionage is the science of covertly capturing e-mail traffic, text messages, other electronic communications, and corporate data for the purpose of gathering national-security or commercial intelligence. Cyber war involves the penetration of foreign networks for the purpose of disrupting or dismantling those networks, and making them inoperable. (Some of those I spoke to made the point that China had demonstrated its mastery of cyber espionage in the EP-3E incident, but it did not make overt use of it to wage cyber war.) Blurring the distinction between cyber war and cyber espionage has been profitable for defense contractors—and dispiriting for privacy advocates.
Clarke’s book, with its alarming vignettes, was praised by many reviewers. But it received much harsher treatment from writers in the technical press, who pointed out factual errors and faulty assumptions. For example, Clarke attributed a severe power outage in Brazil to a hacker; the evidence pointed to sooty insulators.
The most common cyber-war scare scenarios involve America’s electrical grid. Even the most vigorous privacy advocate would not dispute the need to improve the safety of the power infrastructure, but there is no documented case of an electrical shutdown forced by a cyber attack. And the cartoonish view that a hacker pressing a button could cause the lights to go out across the country is simply wrong. There is no national power grid in the United States. There are more than a hundred publicly and privately owned power companies that operate their own lines, with separate computer systems and separate security arrangements. The companies have formed many regional grids, which means that an electrical supplier that found itself under cyber attack would be able to avail itself of power from nearby systems. Decentralization, which alarms security experts like Clarke and many in the military, can also protect networks.
In July, there were reports that a computer worm, known as Stuxnet, had infected thousands of computers worldwide. Victims, most of whom were unharmed, were able to overcome the attacks, although it sometimes took hours or days to even notice them. Some of the computers were inside the Bushehr nuclear-energy plant, in Iran, and this led to speculation that Israel or the United States might have developed the virus. A Pentagon adviser on information warfare told me that it could have been an attempted “semantic attack,” in which the virus or worm is designed to fool its victim into thinking that its computer systems are functioning properly, when in fact they are not, and may not have been for some time. (This month, Microsoft, whose Windows operating systems were the main target of Stuxnet, completed a lengthy security fix, or patch.)
If Stuxnet was aimed specifically at Bushehr, it exhibited one of the weaknesses of cyber attacks: they are difficult to target and also to contain. India and China were both hit harder than Iran, and the virus could easily have spread in a different direction, and hit Israel itself. Again, the very openness of the Internet serves as a deterrent against the use of cyber weapons.
Bruce Schneier, a computer scientist who publishes a widely read blog on cyber security, told me that he didn’t know whether Stuxnet posed a new threat. “There’s certainly no actual evidence that the worm is targeted against Iran or anybody,” he said in an e-mail. “On the other hand, it’s very well designed and well written.” The real hazard of Stuxnet, he added, might be that it was “great for those who want to believe cyber war is here. It is going to be harder than ever to hold off the military.”
A defense contractor who is regarded as one of America’s most knowledgeable experts on Chinese military and cyber capabilities took exception to the phrase “cyber war.” “Yes, the Chinese would love to stick it to us,” the contractor told me. “They would love to transfer economic and business innovation from West to East. But cyber espionage is not cyber war.” He added, “People have been sloppy in their language. McConnell and Clarke have been pushing cyber war, but their evidentiary basis is weak.”
James Lewis, a senior fellow at the Center for Strategic and International Studies, who worked for the Departments of State and Commerce in the Clinton Administration, has written extensively on the huge economic costs due to cyber espionage from China and other countries, like Russia, whose hackers are closely linked to organized crime. Lewis, too, made a distinction between this and cyber war: “Current Chinese officials have told me that we’re not going to attack Wall Street, because we basically own it”—a reference to China’s holdings of nearly a trillion dollars in American securities—“and a cyber-war attack would do as much economic harm to us as to you.”
Nonetheless, China “is in full economic attack” inside the United States, Lewis says. “Some of it is economic espionage that we know and understand. Some of it is like the Wild West. Everybody is pirating from everybody else. The U.S.’s problem is what to do about it. I believe we have to begin by thinking about it”—the Chinese cyber threat—“as a trade issue that we have not dealt with.”
he bureaucratic battle between the military and civilian agencies over cyber security—and the budget that comes with it—has made threat assessments more problematic. General Alexander, the head of Cyber Command, is also the director of the N.S.A., a double role that has caused some apprehension, particularly on the part of privacy advocates and civil libertarians. (The N.S.A. is formally part of the Department of Defense.) One of Alexander’s first goals was to make sure that the military would take the lead role in cyber security and in determining the future shape of computer networks. (A Department of Defense spokesman, in response to a request to comment on this story, said that the department “continues to adhere to all laws, policies, directives, or regulations regarding cyberspace. The Department of Defense maintains strong commitments to protecting civil liberties and privacy.”)
The Department of Homeland Security has nominal responsibility for the safety of America’s civilian and private infrastructure, but the military leadership believes that the D.H.S. does not have the resources to protect the electrical grids and other networks. (The department intends to hire a thousand more cyber-security staff members over the next three years.) This dispute became public when, in March, 2009, Rodney Beckstrom, the director of the D.H.S.’s National Cybersecurity Center, abruptly resigned. In a letter to Secretary Janet Napolitano, Beckstrom warned that the N.S.A. was effectively controlling her department’s cyber operations: “While acknowledging the critical importance of N.S.A. to our intelligence efforts . . . the threats to our democratic processes are significant if all top level government network security and monitoring are handled by any one organization.” Beckstrom added that he had argued for civilian control of cyber security, “which interfaces with, but is not controlled by, the N.S.A.”
General Alexander has done little to reassure critics about the N.S.A.’s growing role. In the public portion of his confirmation hearing, in April, before the Senate Armed Services Committee, he complained of a “mismatch between our technical capabilities to conduct operations and the governing laws and policies.”
Alexander later addressed a controversial area: when to use conventional armed forces to respond to, or even preëmpt, a network attack. He told the senators that one problem for Cyber Command would be to formulate a response based on nothing more than a rough judgment about a hacker’s intent. “What’s his game plan? Does he have one?” he said. “These are tough issues, especially when attribution and neutrality are brought in, and when trying to figure out what’s come in.” At this point, he said, he did not have “the authority . . . to reach out into a neutral country and do an attack. And therein lies the complication. . . . What do you do to take that second step?”
Making the same argument, William J. Lynn III, the Deputy Secretary of Defense, published an essay this fall in Foreign Affairs in which he wrote of applying the N.S.A.’s “defense capabilities beyond the ‘.gov’ domain,” and asserted, “As a doctrinal matter, the Pentagon has formally recognized cyberspace as a new domain of warfare.” This definition raises questions about where the battlefield begins and where it ends. If the military is operating in “cyberspace,” does that include civilian computers in American homes?
Lynn also alluded to a previously classified incident, in 2008, in which some N.S.A. unit commanders, facing penetration of their bases’ secure networks, concluded that the break-in was caused by a disabling thumb drive; Lynn said that it had been corrupted by “a foreign intelligence agency.” (According to press reports, the program was just as likely to be the product of hackers as that of a government.) Lynn termed it a “wakeup call” and a “turning point in U.S. cyber defense strategy.” He compared the present moment to the day in 1939 when President Franklin D. Roosevelt got a letter from Albert Einstein about the possibility of atomic warfare.
But Lynn didn’t mention one key element in the commanders’ response: they ordered all ports on the computers on their bases to be sealed with liquid cement. Such a demand would be a tough sell in the civilian realm. (And a Pentagon adviser suggested that many military computer operators had simply ignored the order.)
A senior official in the Department of Homeland Security told me, “Every time the N.S.A. gets involved in domestic security, there’s a hue and cry from people in the privacy world.” He said, though, that coöperation between the military and civilians had increased. (The Department of Homeland Security recently signed a memorandum with the Pentagon that gives the military authority to operate inside the United States in case of cyber attack.) “We need the N.S.A., but the question we have is how to work with them and still say and demonstrate that we are in charge in the areas for which we are responsible.”
This official, like many I spoke to, portrayed the talk about cyber war as a bureaucratic effort “to raise the alarm” and garner support for an increased Defense Department role in the protection of private infrastructure. He said, “You hear about cyber war all over town. This”—he mentioned statements by Clarke and others—“is being done to mobilize a political effort. We always turn to war analogies to mobilize the people.”
n theory, the fight over whether the Pentagon or civilian agencies should be in charge of cyber security should be mediated by President Obama’s coördinator for cyber security, Howard Schmidt—the cyber czar. But Schmidt has done little to assert his authority. He has no independent budget control and in a crisis would be at the mercy of those with more assets, such as General Alexander. He was not the Administration’s first choice for the cyber-czar job—reportedly, several people turned it down. The Pentagon adviser on information warfare, in an e-mail that described the lack of an over-all policy and the “cyber-pillage” of intellectual property, added the sort of dismissive comment that I heard from others: “It’s ironic that all this goes on under the nose of our first cyber President. . . . Maybe he should have picked a cyber czar with more than a mail-order degree.” (Schmidt’s bachelor’s and master’s degrees are from the University of Phoenix.)
Howard Schmidt doesn’t like the term “cyber war.” “The key point is that cyber war benefits no one,” Schmidt told me in an interview at the Old Executive Office Building. “We need to focus on that fact. When people tell me that these guys or this government is going to take down the U.S. military with information warfare I say that, if you look at the history of conflicts, there’s always been the goal of intercepting the communications of combatants—whether it’s cutting down telephone poles or intercepting Morse-code signalling. We have people now who have found that warning about ‘cyber war’ has become an unlikely career path”—an obvious reference to McConnell and Clarke. “All of a sudden, they have become experts, and they get a lot of attention. ‘War’ is a big word, and the media is responsible for pushing this, too. Economic espionage on the Internet has been mischaracterized by people as cyber war.”
Schmidt served in Vietnam, worked as a police officer for several years on a SWAT team in Arizona, and then specialized in computer-related crimes at the F.B.I. and in the Air Force’s investigative division. In 1997, he joined Microsoft, where he became chief of security, leaving after the 9/11 attacks to serve in the Bush Administration as a special adviser for cyber security. When Obama hired him, he was working as the head of security for eBay. When I asked him about the ongoing military-civilian dispute, Schmidt said, “The middle way is not to give too much authority to one group or another and to make sure that we share information with each other.”
Schmidt continued, “We have to protect our infrastructure and our way of life, for sure. We do have vulnerabilities, and we do talk about worst-case scenarios” with the Pentagon and the Department of Homeland Security. “You don’t see a looming war and just wait for it to come.” But, at the same time, “we have to keep our shipping lanes open, to continue to do commerce, and to freely use the Internet.”
ow should the power grid be protected? It does remain far too easy for a sophisticated hacker to break into American networks. In 2008, the computers of both the Obama and the McCain campaigns were hacked. Suspicion fell on Chinese hackers. People routinely open e-mails with infected attachments, allowing hackers to “enslave” their computers. Such machines, known as zombies, can be linked to create a “botnet,” which can flood and effectively shut down a major system. Hackers are also capable of penetrating a major server, like Gmail. Guesses about the cost of cyber crime vary widely, but one survey, cited by President Obama in a speech in May, 2009, put the price at more than eight billion dollars in 2007 and 2008 combined. Obama added, referring to corporate cyber espionage, “It’s been estimated that last year alone cyber criminals stole intellectual property from businesses worldwide worth up to one trillion dollars.”
One solution is mandated encryption: the government would compel both corporations and individuals to install the most up-to-date protection tools. This option, in some form, has broad support in the technology community and among privacy advocates. In contrast, military and intelligence eavesdroppers have resisted nationwide encryption since 1976, when the Diffie-Hellman key exchange (an encryption tool co-developed by Whitfield Diffie) was invented, for the most obvious of reasons: it would hinder their ability to intercept signals. In this sense, the N.S.A.’s interests align with those of the hackers.
John Arquilla, who has taught since 1993 at the U.S. Naval Postgraduate School in Monterey, California, writes in his book “Worst Enemies,” “We would all be far better off if virtually all civil, commercial, governmental, and military internet and web traffic were strongly encrypted.” Instead, many of those charged with security have adopted the view that “cyberspace can be defended with virtual fortifications—basically the ‘firewalls’ that everyone knows about. . . . A kind of Maginot Line mentality prevails.”
Arquilla added that America’s intelligence agencies and law-enforcement officials have consistently resisted encryption because of fears that a serious, widespread effort to secure data would interfere with their ability to electronically monitor and track would-be criminals or international terrorists. This hasn’t stopped sophisticated wrongdoers from, say, hiring hackers or encrypting files; it just leaves the public exposed, Arquilla writes. “Today drug lords still enjoy secure internet and web communications, as do many in terror networks, while most Americans don’t.”
Schmidt told me that he supports mandated encryption for the nation’s power and electrical infrastructure, though not beyond that. But, early last year, President Obama declined to support such a mandate, in part, Schmidt said, because of the costs it would entail for corporations. In addition to the setup expenses, sophisticated encryption systems involve a reliance on security cards and on constantly changing passwords, along with increased demands on employees and a ceding of control by executives to their security teams.
General Alexander, meanwhile, has continued to press for more authority, and even for a separate Internet domain—another Maginot Line, perhaps. One morning in September, he told a group of journalists that the Cyber Command needed what he called “a secure zone,” a separate space within the Internet to shelter the military and essential industries from cyber attacks. The secure zone would be kept under tight government control. He also assured the journalists, according to the Times, that “we can protect civil liberties, privacy, and still do our mission.” The General was more skeptical about his ability to please privacy advocates when he testified, a few hours later, before the House Armed Services Committee: “A lot of people bring up privacy and civil liberties. And then you say, ‘Well, what specifically are you concerned about?’ And they say, ‘Well, privacy and civil liberties.’ . . . Are you concerned that the anti-virus program that McAfee runs invades your privacy or civil liberties?’ And the answer is ‘No, no, no—but I’m worried that you would.’ ”
his summer, the Wall Street Journal reported that the N.S.A. had begun financing a secret surveillance program called Perfect Citizen to monitor attempted intrusions into the computer networks of private power companies. The program calls for the installation of government sensors in those networks to watch for unusual activity. The Journal noted that some companies expressed concerns about privacy, and said that what they needed instead was better guidance on what to do in case of a major cyber attack. The N.S.A. issued a rare public response, insisting that there was no “monitoring activity” involved: “We strictly adhere to both the spirit and the letter of U.S. laws and regulations.”
A former N.S.A. operative I spoke to said, of Perfect Citizen, “This would put the N.S.A. into the job of being able to watch over our national communications grid. If it was all dot-gov, I would have no problem with the sensors, but what if the private companies rely on Gmail or att.net to communicate? This could put the N.S.A. into every service provider in the country.”
The N.S.A. has its own hackers. Many of them are based at a secret annex near Thurgood Marshall International Airport, outside Baltimore. (The airport used to be called Friendship Airport, and the annex is known to insiders as the FANX, for “Friendship annex.”) There teams of attackers seek to penetrate the communications of both friendly and unfriendly governments, and teams of defenders monitor penetrations and attempted penetrations of U.S. systems. The former N.S.A. operative, who served as a senior watch officer at a major covert installation, told me that the N.S.A. obtained invaluable on-the-job training in cyber espionage during the attack on Iraq in 1991. Its techniques were perfected during the struggle in Kosovo in 1999 and, later, against Al Qaeda in Iraq. “Whatever the Chinese can do to us, we can do better,” the technician said. “Our offensive cyber capabilities are far more advanced.”
Nonetheless, Marc Rotenberg, the president of the Electronic Privacy Information Center and a leading privacy advocate, argues that the N.S.A. is simply not competent enough to take a leadership role in cyber security. “Let’s put the issue of privacy of communications aside,” Rotenberg, a former Senate aide who has testified often before Congress on encryption policy and consumer protection, said. “The question is: Do you want an agency that spies with mixed success to be responsible for securing the nation’s security? If you do, that’s crazy.”
Nearly two decades ago, the Clinton Administration, under pressure from the N.S.A., said that it would permit encryption-equipped computers to be exported only if their American manufacturers agreed to install a government-approved chip, known as the Clipper Chip, in each one. It was subsequently revealed that the Clipper Chip would enable law-enforcement officials to have access to data in the computers. The ensuing privacy row embarrassed Clinton, and the encryption-equipped computers were permitted to be exported without the chip, in what amounted to a rebuke to the N.S.A.
That history may be repeating itself. The Obama Administration is now planning to seek broad new legislation that would enable national-security and law-enforcement officials to police online communications. The legislation, similar to that sought two decades ago in the Clipper Chip debate, would require manufacturers of equipment such as the BlackBerry, and all domestic and foreign purveyors of communications, such as Skype, to develop technology that would allow the federal government to intercept and decode traffic.
“The lesson of Clipper is that the N.S.A. is really not good at what it does, and its desire to eavesdrop overwhelms its ability to protect, and puts at risk U.S. security,” Rotenberg said. “The N.S.A. wants security, sure, but it also wants to get to capture as much as it can. Its view is you can get great security as long as you listen in.” Rotenberg added, “General Alexander is not interested in communication privacy. He’s not pushing for encryption. He wants to learn more about people who are on the Internet”—to get access to the original internal protocol, or I.P., addresses identifying the computers sending e-mail messages. “Alexander wants user I.D. He wants to know who you are talking to.”
Rotenberg concedes that the government has a role to play in the cyber world. “We privacy guys want strong encryption for the security of America’s infrastructure,” he said. He also supports Howard Schmidt in his willingness to mandate encryption for the few industries whose disruption could lead to chaos. “Howard is trying to provide a reasoned debate on an important issue.”
Whitfield Diffie, the encryption pioneer, offered a different note of skepticism in an e-mail to me: “It would be easy to write a rule mandating encryption but hard to do it in such a way as to get good results. To make encryption effective, someone has to manage and maintain the systems (the way N.S.A. does for D.O.D. and, to a lesser extent, other parts of government). I think that what is needed is more by way of standards, guidance, etc., that would make it easier for industry to implement encryption without making more trouble for itself than it saves.”
More broadly, Diffie wrote, “I am not convinced that lack of encryption is the primary problem. The problem with the Internet is that it is meant for communications among non-friends.”
hat about China? Does it pose such a threat that, on its own, it justifies putting cyber security on a war footing? The U.S. has long viewed China as a strategic military threat, and as a potential adversary in the sixty-year dispute over Taiwan. Contingency plans dating back to the Cold War include calls for an American military response, led by a Navy carrier group, if a Chinese fleet sails into the Taiwan Strait. “They’ll want to stop our carriers from coming, and they will throw whatever they have in cyber war—everything but the kitchen sink—to blind us, or slow our fleet down,” Admiral McVadon, the retired defense attaché, said. “Our fear is that the Chinese may think that cyber war will work, but it may not. And that’s a danger because it”—a test of cyber warfare—“could lead to a bigger war.”
However, the prospect of a naval battle for Taiwan and its escalation into a cyber attack on America’s domestic infrastructure is remote. Jonathan Pollack, an expert on the Chinese military who teaches at the Naval War College in Newport, Rhode Island, said, “The fact is that the Chinese are remarkably risk-averse.” He went on, “Yes, there have been dustups, and the United States collects intelligence around China’s border, but there is an accommodation process under way today between China and Taiwan.” In June, Taiwan approved a trade agreement with China that had, as its ultimate goal, a political rapprochement. “The movement there is palpable, and, given that, somebody’s got to tell me how we are going to find ourselves in a war with China,” Pollack said.
Many long-standing allies of the United States have been deeply engaged in cyber espionage for decades. A retired four-star Navy admiral, who spent much of his career in signals intelligence, said that Russia, France, Israel, and Taiwan conduct the most cyber espionage against the U.S. “I’ve looked at the extraordinary amount of Russian and Chinese cyber activity,” he told me, “and I am hard put to it to sort out how much is planning for warfare and how much is for economic purposes.”
The admiral said that the U.S. Navy, worried about budget cuts, “needs an enemy, and it’s settled on China,” and that “using what your enemy is building to justify your budget is not a new game.”
There is surprising unanimity among cyber-security experts on one issue: that the immediate cyber threat does not come from traditional terrorist groups like Al Qaeda, at least, not for the moment. “Terrorist groups are not particularly good now in attacking our computer system,” John Arquilla told me. “They’re not that interested in it—yet. The question is: Do vulnerabilities exist inside America? And, if they do, the terrorists eventually will exploit them.” Arquilla added a disturbing thought: “The terrorists of today rely on cyberspace, and they have to be good at cyber security to protect their operations.” As terrorist groups get better at defense, they may eventually turn to offense.
Jeffrey Carr, a Seattle-based consultant on cyber issues, looked into state and non-state cyber espionage throughout the recent conflicts in Estonia and Georgia. Carr, too, said he was skeptical that China or Russia would mount a cyber-war attack against the United States. “It’s not in their interest to hurt the country that is feeding them money,” he said. “On the other hand, it does make sense for lawless groups.” He envisaged “five- or six-year-old kids in the Middle East who are working on the Internet,” and who would “become radicalized fifteen- or sixteen-year-old hackers.” Carr is an advocate of making all Internet service providers require their customers to use verifiable registration information, as a means of helping authorities reduce cyber espionage.
Earlier this year, Carr published “Inside Cyber Warfare,” an account, in part, of his research into cyber activity around the world. But he added, “I hate the term ‘cyber war.’ ” Asked why he used “cyber warfare” in the title of his book, he responded, “I don’t like hype, but hype sells.”
hy not ignore the privacy community and put cyber security on a war footing? Granting the military more access to private Internet communications, and to the Internet itself, may seem prudent to many in these days of international terrorism and growing American tensions with the Muslim world. But there are always unintended consequences of military activity—some that may take years to unravel. Ironically, the story of the EP-3E aircraft that was downed off the coast of China provides an example. The account, as relayed to me by a fully informed retired American diplomat, begins with the contested Presidential election between Vice-President Al Gore and George W. Bush the previous November. That fall, a routine military review concluded that certain reconnaissance flights off the eastern coast of the former Soviet Union—daily Air Force and Navy sorties flying out of bases in the Aleutian Islands—were redundant, and recommended that they be cut back.
“Finally, on the eve of the 2000 election, the flights were released,” the former diplomat related. “But there was nobody around with any authority to make changes, and everyone was looking for a job.” The reality is that no military commander would unilaterally give up any mission. “So the system defaulted to the next target, which was China, and the surveillance flights there went from one every two weeks or so to something like one a day,” the former diplomat continued. By early December, “the Chinese were acting aggressively toward our now increased reconnaissance flights, and we complained to our military about their complaints. But there was no one with political authority in Washington to respond, or explain.” The Chinese would not have been told that the increase in American reconnaissance had little to do with anything other than the fact that inertia was driving day-to-day policy. There was no leadership in the Defense Department, as both Democrats and Republicans waited for the Supreme Court to decide the fate of the Presidency.
The predictable result was an increase in provocative behavior by Chinese fighter pilots who were assigned to monitor and shadow the reconnaissance flights. This evolved into a pattern of harassment in which a Chinese jet would maneuver a few dozen yards in front of the slow, plodding EP-3E, and suddenly blast on its afterburners, soaring away and leaving behind a shock wave that severely rocked the American aircraft. On April 1, 2001, the Chinese pilot miscalculated the distance between his plane and the American aircraft. It was a mistake with consequences for the American debate on cyber security that have yet to be fully reckoned. ♦
Mazars and Deutsche Bank could have ended this nightmare before it started.
They could still get him out of office.
But instead, they want mass death.
Don’t forget that.
User avatar
seemslikeadream
 
Posts: 32090
Joined: Wed Apr 27, 2005 11:28 pm
Location: into the black
Blog: View Blog (83)

Previous

Return to General Discussion

Who is online

Users browsing this forum: No registered users and 158 guests