View Full Version : Stuxnet returns to Bushehr reactor. Russia warns of nuclear explosion
Serpo
31st January 2011, 11:57 AM
Stuxnet returns to Bushehr reactor. Russia warns of nuclear explosion
DEBKAfile Exclusive Report January 31, 2011, 12:33 PM (GMT+02:00)
Bushehr reactor loaded - still not activated
Iran's atomic energy chief Ali Akbar Salehi said on Jan. 29 that the Bushehr nuclear power plant would be connected to the national grid on April 9. He "forgot" about Tehran's promise to fully activate its first nuclear reactor Tuesday, Jan. 25. debkafile's sources reveal that, Iran's hand was held back at the last minute by Russia's nuclear chief Sergei Kiriyenko. He warned Stuxnet was back and activating the reactor could trigger a nuclear catastrophe costing millions of lives.
Apart from that everything is fine....
http://www.debka.com/
keehah
27th April 2011, 01:11 PM
Update: WAS fine. :-\
___________________
http://www.israelnationalnews.com/static/blogs/20110426020153.jpg
http://blog.alexanderhiggins.com/2011/04/26/rogue-computer-virus-shutting-nuclear-plants-worldwide-20474/
West is at Mercy of Stuxnet, German Analyst Hints (http://theuglytruth.wordpress.com/2011/04/27/west-is-at-mercy-of-stuxnet-german-analyst-hints/)
by Gil Ronen Thu Ugly Truth April 27, 2011
German cyber-security expert Ralph Langner, who helped unravel the Stuxnet virus, told a global audience in March that the worm could be used as a weapon of mass destruction against targets in the West. At the end of his presentation on the subject, Langner arguably seemed to hint at the possibility that Israel is part of the danger, although in correspondence a few months ago he named an unspecific “hacker underground” as the possible threat.
Langner heads an independent German cyber-security firm that bears his name, which specializes in control systems — electronic devices that monitor and regulate other devices. Langner’s website says that his team analyzed Stuxnet as part of “a global effort to decode the mysterious program,” without naming his client.
In a March presentation at Ted2011, an elite yet globally public intellectual platform, Langner spoke admiringly of the ingeniousness behind Stuxnet, but also employed an ominous tone, speaking of “the plot behind Stuxnet” and calling its mode of operation “creepy.”
Stuxnet’s programming is “rocket science,” he said, presenting some lines of code from the cyber-virus before his high-tech audience. “It’s way above everything that we have ever seen before.” The people behind it were “very professional, they knew all the bits and bytes,” he explained. “They probably even knew the shoe size of the operator [at the Natanz plant],” he added.
The virus was designed to work stealthily, Langner added. The idea was to take over the uranium-enrichment cascades at Iran’s Natanz plant “slowly and creepily” and “to drive maintenance engineers crazy.”
“When we started our research on Stuxnet six months ago, it was completely unknown what the purpose of this thing was,” he said. “We started to work on this around the clock because I thought, well, we don’t know what the target is, it could be, let’s say for example, a U.S. power plant or a chemical plant in Germany. So we better find out what the target is soon.”
He went on to describe the risk that Stuxnet could be used to blow up power plants:
“The idea here is not only to fool the operators in the control room. It actually is much more dangerous and aggressive. The idea here is to circumvent a digital safety system…. when they are compromised, then real bad things can happen. Your plant can blow up and and neither your operators nor your safety system will notice it. That’s scary. But it gets worse – and this is very important, what I am going to say. Think about this: this attack is generic. It doesn’t have anything to do with specifics with centrifuges, with uranium enrichment. So it would work as well, for example in a power plant or in an automobile factory. It is generic. And as an attacker you don’t have to deliver this payload by a USB stick, as we saw it in the case of Stuxnet. You could also use conventional worm technology for spreading. Just spread it as wide as possible. And if you do that, what you end up with is a cyberweapon of mass destruction.”
“That’s the consequence that we have to face,” he said, deliberately, while showing a map that marked Western countries (Israel not included) in green. “So unfortunately, the biggest number of targets for such attacks are not in the Middle East. They are in the United States, in Europe and in Japan. So all the green areas, these are your target-rich environments. We have to face the consquences and we better start to prepare right now.”
The caption on the slide says “This way, Pandora.”
In what was most likely a “pre-ordered” question from the conference presenter at the end of his lecture, Langner was asked if he thought Israel was behind the attack. His response sounded a dramatic tone:
“My opinion is that the Mossad is involved, but that the leading force is not Israel, so that… the leading force behind that is the cyber superpower. There is only one, and that is the United States. Fortunately… fortunately… Because otherwise, our problems would even be bigger.”
The “even bigger” danger Langner is hinting at was deliberately left vague. Based on the presentation alone, and the concluding sentence, it seems possible that he thinks Israel could use the worm against Western targets. Why the German consultant thinks Israel would want to do this, one can only speculate.
However, in a correspondence with cyber-security firm Symantec some six months ago, Langner named a “hacker underground” as the possible threat:
“You fail to understand that the hacker underground has been studying control systems for years without any success. You fail to understand that this community will eagerly dismantle Stuxnet as a blueprint for how to cyber-attack installations from the cookie plant next door to power plants.”
So – does Langner think the threat is Mossad or the “hacker underground”? Is the “hacker underground” he fears Jewish, Muslim, or other? Is there an anti-Semitic tinge to the description of the virus as “creepy” and to its inception as a “plot”? Why is Israel not included in the green areas that could come under the Stuxnet threat? Was he hinting that if Mossad and not the U.S. were the leading force behind Stuxnet, the West’s problems would be bigger? Is he concerned about a targeted attack or an uncontrolled worldwide attack? These are questions that cannot be answered at this point.
Over the decades since Israel’s acquisition of nuclear technology, there has occasionally been speculation over the Jewish state’s options in case it were faced with a lethal attack. One possible course of action that has been floated is known as the “Samson Option,” in which Israel would take down its (past and present) enemies with it, like the Biblical hero.
The New York Times recently reported that the Stuxnet virus could possibly still be infecting Iranian systems and that it may unleash additional havoc on new targets. Iranian civil defense commander Gholamreza Jalali said Monday the Islamic Republic’s nuclear program has fallen prey to a new computer virus called “Stars.”
mick silver
27th April 2011, 01:19 PM
dam it look like thee doing there best to kill every person in the world
Serpo
27th April 2011, 01:27 PM
Article yesterday about a new virus and how it was Israel that made the first one.
cthulu
27th April 2011, 03:29 PM
I bet stuxnet/stars has gone into the US and europe (germany). I wonder if it's infiltrated Israel, though.
Serpo
27th April 2011, 03:34 PM
http://www.themedialine.org/news/news_detail.asp?NewsID=32008
keehah
27th April 2011, 03:43 PM
I bet stuxnet/stars has gone into the US and europe (germany). I wonder if it's infiltrated Israel, though.
This quick German reaction may make even more sense now if the German government listened to the German cyber-security expert:
BBC: Nuclear power plants shut down in Germany
(http://www.bbc.co.uk/news/business-12745899)
[15 March 2011] Germany has temporarily shut down seven of its nuclear reactors while it reconsiders its nuclear strategy.
Chancellor Angela Merkel said that all reactors operational before 1980 would be taken offline, and safety checks carried out on the remaining plants.
The move comes after concerns about radiation leaks at a Japanese plant after last Friday's earthquake.
The EU has also reached agreement on "stress tests" of all European nuclear facilities.
"We want to look at the risk and safety issues in the light of events in Japan," the European energy commissioner Guenther Oettinger said.
'Out of service'
Chancellor Merkel also pointed to the safety concerns behind the German move.
"In light of the situation, we will carry out a safety check of all nuclear plants," she said.
"Those nuclear power plants which began operation before 1980 will be provisionally shut down for the duration of the moratorium. They will be out of service.
"Safety is the priority. Those are the criteria by which we acted today."
All safety questions would be answered by 15 June, she said...
Serpo
27th April 2011, 03:55 PM
.
cthulu
27th April 2011, 04:15 PM
It just amazes me how everything blows back into western forces' faces whenever they try to do something. blow up the ME, kill all these muslims, throw depleted uranium all over the ME, what happens? europe gets taken over by muslims, israel, europe see rising rates of cancer, falling rates of birth.
Throw cyberattacks at the brownies, it winds up attacking japan, us, europe.
Engage in currency wars at bric, western currency/debt gets severely damaged.
How much does it take to see there is some invisible, ginormous force that is reflecting all this power back to the attacker? But hey, keep quoting bible scripture out of context. If you keep telling lies long enough, you'll eventually believe them, right...ruight!?!??!?
:lol
vacuum
27th April 2011, 05:13 PM
I bet stuxnet/stars has gone into the US and europe (germany). I wonder if it's infiltrated Israel, though.
This quick German reaction may make even more sense now if the German government listened to the German cyber-security expert:
BBC: Nuclear power plants shut down in Germany
(http://www.bbc.co.uk/news/business-12745899)
[15 March 2011] Germany has temporarily shut down seven of its nuclear reactors while it reconsiders its nuclear strategy.
Its kind of mind blowing that they arbitrarily shut down seven reactors. Countries don't just have extra capacity sitting idle, so I can't imagine that they could shut down seven reactors without either rolling blackouts, paying steep prices from neighboring countries, or raising energy costs for the population and therefore discouraging heavy usage.
MAGNES
27th April 2011, 05:21 PM
It just amazes me how everything blows back into western forces' faces whenever they try to do something.
This is all Israel and the Jews, all of it, Israeli security involve in Japan just like 9/11,
they have cameras on the reactors melting down, Israel is in a position to know how
bad it is before anyone else and they can make money as well with this knowledge.
Stuxnet is Israel, it is real looks likes, Germany shut down it's reactors immediately,
fearing being a target of Israel, the worm works on Siemens controllers and messes
them up, what it does is prevent them from working, it actually targets safety systems,
so when the reactors began overheating in Japan all systems failed, it could not be
detected before that. If this is real we are all fucked. Japan is fucked and radiation
is coming all over North America. Plutonium Mox blew sky high into the air too, it
is gone, that is clear now too. Israel and Jews poisoning the planet. NeoCons scum.
Powered by vBulletin® Version 4.2.0 Copyright © 2025 vBulletin Solutions, Inc. All rights reserved.