Share on Reddit It was January , and investigators with the International Atomic Energy Agency had just completed an inspection at the uranium enrichment plant outside Natanz in central Iran, when they realized that something was off within the cascade rooms where thousands of centrifuges were enriching uranium. Natanz technicians in white lab coats, gloves, and blue booties were scurrying in and out of the "clean" cascade rooms, hauling out unwieldy centrifuges one by one, each sheathed in shiny silver cylindrical casings. Any time workers at the plant decommissioned damaged or otherwise unusable centrifuges, they were required to line them up for IAEA inspection to verify that no radioactive material was being smuggled out in the devices before they were removed. The technicians had been doing so for more than a month.
|Published (Last):||24 March 2010|
|PDF File Size:||12.15 Mb|
|ePub File Size:||19.33 Mb|
|Price:||Free* [*Free Regsitration Required]|
The most menacing malware in history are strong words. We read that computer security has grown into a multibillion-dollar industry just due to keeping pace with the hackers, viruses and spyware programs that are constantly being created.
Is this an example of negative digital progress? Along with progress that is good and propels the world forward in computer skills and abilities comes the negative aspect of hackers and those who are set on making money utilizing the very tools that are being developed.
Something as normal as inserting a flash drive was the catalyst for Stuxnet. The shear sophistication of this malware was a puzzle to be solved by computer experts. What was it, how did it come to be and how to fix it?
All critical questions for computer experts. Thought leaders are constantly developing new and improved hardware and software and criminals are constantly developing malicious viruses to hack in to computers and do damage or steal information.
It was a nightmare to fix! Hours of clean up time were spent to repair the damage. And, now we see the same thing happening with our tablets, iPads, and cell phones. Think of the money the company spends to detect the virus and fix the problem.
I think most every business is vulnerable to such an attack. It seems like with big brother watching our every move and invasions of our private information and digital devices, one has to be so careful what one shares on the Internet or via digital communication.
In reading about Stuxnet I imagined that there are many malware viruses created by our government for spying on other countries or for use in the military for the purpose of trying to prevent terrorism in the U. But, on the other hand, how much data does our government have the right to have on us?
How digital detectives deciphered Stuxnet, the most menacing malware in history
A November article  in Foreign Policy magazine claims existence of detecctives earlier, much more sophisticated attack on the centrifuge complex at Natanz, focused on increasing centrifuge failure rate over a long time period by stealthily inducing uranium hexafluoride gas overpressure incidents. Institute for Science and International Security. Retrieved 6 October According to The Washington PostIAEA cameras installed in the Natanz facility recorded the stkxnet dismantling and removal of approximately —1, centrifuges during the time the Stuxnet worm was reportedly active at the plant. In response to the infection, Iran assembled a team to combat it. Iranian technicians, however, were able to quickly replace the centrifuges and the report concluded that uranium enrichment was likely only briefly disrupted.
HOW DIGITAL DETECTIVES DECIPHERED STUXNET PDF