Allahpundit has the details at HotAir.com:
Score one for the geeks with pocket protectors. Let’s just hope the terrorists aren’t sending some of their own to engineering schools.Sounds like it was first injected into computers outside the plant that were being accessed by people who worked inside, e.g., some nuclear technician’s laptop or desktop. If the technician carelessly used his own flash drive on the outside computer, he’d inadvertently transfer Stuxnet to it and then carry it into the building with him, thus avoiding the need for someone to physically infiltrate Natanz. So not only did they devise a plan to virtually bomb the facility from the inside, they likely got one of Iran’s own people to unwittingly deliver the payload:Thus, not only did the coders need a mind-boggling degree of knowledge about the vulnerabilities in more than one software platform, they needed intelligence on Iran’s program so deep that not even the UN had all the details. On top of all that, the worm was programmed to disguise what it was doing so that the engineers on the premises would think the problem with the centrifuges was in the hardware, not the software. No wonder that paranoia at Iran’s nuclear facilities is now allegedly such that the regime’s counterintelligence agents are making life a “living hell” for the nuclear scientists who work there. Stuxnet: The second-greatest story ever told.
- Who Is Behind Computer Worm That Crippled Iran’s Nuke Plants? (foxnews.com)
- You: IAEA report confirms Iran temporarily shut down centrifuges (washingtonpost.com)
- “Worm Causing Trouble? Iran Temporarily Halts Uranium Enrichment At Natanz” and related posts (theyeshivaworld.com)
- Iran’s nuclear plant to go on line by late January (seattletimes.nwsource.com)
- The Stuxnet Worm Turns off Iran’s Nuclear Enrichment Program (redcounty.com)
- Iran: Computer worm didn’t harm nuclear program (seattletimes.nwsource.com)
- Stuxnet ‘hit’ Iran nuclear plans (bbc.co.uk)
Trackback from your site.