Stuxnet

0 views
Skip to first unread message

Ron Smith

unread,
Nov 9, 2010, 12:30:43 PM11/9/10
to Political Ninjas
Did the U.S. create software to affect Iran's nuclear capability?

If we did, good for us, I say!  My only complaint is that it wasn't quite good enough to avoid being detected.

Lawrence Terrill

unread,
Nov 10, 2010, 6:59:31 AM11/10/10
to politica...@googlegroups.com
I find the suggestion that our military might have intentionally created this code and turned it loose quite disturbing. Malware is much like chemical warfare. At best, you've given your enemy a template to use against the same vulnerabilities that exist in your own infrastructure. At worse, you've screwed up the design, the wind changes, and you've inadvertently attacked yourself. 

And in the end, it was never going to 'disable' Iran's ability to manufacture nuclear material. It is at worst a nagging inconvenience that will slow them down a bit. In that sense it seems to mirror the Obama administration in general.



--
You received this message because you are subscribed to the Google Groups "Political Ninjas" group.
To post to this group, send email to politica...@googlegroups.com.
To unsubscribe from this group, send email to political_ninj...@googlegroups.com.
For more options, visit this group at http://groups.google.com/group/political_ninjas?hl=en.

Ron Smith

unread,
Nov 10, 2010, 11:10:14 AM11/10/10
to Political Ninjas
I agree with you on the dangers but, as far as being just an
inconvenience, sometimes it only takes a little slow down to have a
big impact on the outcome. Look at the SCUD missiles launched during
Desert Storm. There has been no proof or evidence or claims of
sabotage but, when I was getting out of the military after Desert
Storm, they offered me a position with a cyber-warfare unit to try to
get me to reenlist and they hinted that there might have been "some
reason" that all those SCUD missiles failed or went off target. I
sometimes regret not taking that position because it probably would
have been a very cool job.

On Nov 10, 5:59 am, Lawrence Terrill <nin...@theterrills.com> wrote:
> I find the suggestion that our military might have intentionally created this code and turned it loose quite disturbing. Malware is much like chemical warfare. At best, you've given your enemy a template to use against the same vulnerabilities that exist in your own infrastructure. At worse, you've screwed up the design, the wind changes, and you've inadvertently attacked yourself.
>
> And in the end, it was never going to 'disable' Iran's ability to manufacture nuclear material. It is at worst a nagging inconvenience that will slow them down a bit. In that sense it seems to mirror the Obama administration in general.
>
> On Nov 9, 2010, at 11:30 AM, Ron Smith wrote:
>
>
>
> > Did the U.S. create software to affect Iran's nuclear capability?
>
> >http://www.csmonitor.com/USA/2010/0921/Stuxnet-malware-is-weapon-out-...

carl george

unread,
Nov 10, 2010, 11:14:59 AM11/10/10
to politica...@googlegroups.com
Well this is the same military that didn't encrypt the signal to the
drones and people living in caves figured out that they could watch on
$100 tv's, so I don't give the military that much credit here.
Reply all
Reply to author
Forward
0 new messages