Archive
Critical U.S. Infrastructure at Risk of Cyber Attack, Experts Warn
AP
Oct. 26: The reactor building of the Bushehr nuclear power plant in Iran.
Just as the computers that ran Iran’s nuclear program were sabotaged and crippled by a cyber “super worm” virus, the software used to run much of America’s industrial, transportation and power infrastructure — including nuclear power plants and major airports — is vulnerable to cyber attack, and two software companies have revealed dozens of successful hacks to prove it.
The issue lies in specialized software systems sold by Siemens, Iconics, 7-Technologies and others to power plants and other infrastructure. Called “supervisory control and data acquisition” systems, or SCADA, they run software solely for industrial use.
And it’s just as vulnerable as every other program on your Read more…
Iran Broadens Search for Raw Uranium: Intel
An intelligence assessment by an International Atomic Energy Agency member nation says Iran has broadened its secretive worldwide effort to secure unrefined uranium for its atomic work, the Associated Press reported today (see GSN, Feb. 23).
The finding fits with estimates that indigenous sources of raw uranium were insufficient for the Persian Gulf nation’s nuclear activities, according to AP. The United States and its allies have expressed concern that Iran’s uranium enrichment program could generate nuclear-weapon material, but Tehran has maintained its atomic efforts are geared strictly toward civilian endeavors.
Iranian Foreign Minister Ali Akbar Salehi held an undisclosed meeting in January with high-level managers of mineral extraction in Zimbabwe “to resume negotiations … for the benefit of Iran’s uranium procurement plan,” the document states.
“This follows work carried out by Iranian engineers to map out uranium deposits in Africa and assess the amount of uranium they contain,” according to its two-page summary.
Salehi’s trip is an example of Iranian uranium acquisition activities that could encompass more than Read more…
Iran Pushing to Upgrade Enrichment Gear: IAEA
A forthcoming International Atomic Energy Agency report asserts Iran is pushing to replace thousands of its uranium enrichment centrifuges with newer carbon-fiber machines capable of operating five times faster than their predecessors, the Wall Street Journal reported today (see GSN, Feb. 17).

(Feb. 18) - Iranian President Mahmoud Ahmadinejad unveils an experimental uranium enrichment centrifuge at a ceremony in Tehran last year. A forthcoming International Atomic Energy Agency report says Iran is working to deploy a new line of higher-speed centrifuges, according to diplomats (Behrouz Mehri/Getty Images).
Iran was purging electronics from its Natanz uranium enrichment complex and other atomic facilities after what appears to be an unsuccessful attempt to locate the origin of the Stuxnet computer worm infecting the sites, said diplomats with knowledge of the “militarization report” requested by IAEA Director General Yukiya Amano. Moving in new equipment might take as long as two years, the diplomats said.
Deploying its experimental carbon-fiber in large numbers could enable Iran to produce sufficient material for a nuclear weapon in under 12 weeks, Germany determined in an official assessment. The United States and its allies have expressed concern that Iran’s uranium enrichment program could generate nuclear-weapon material; Tehran has insisted its atomic ambitions are strictly peaceful (David Crawford, Wall Street Journal, Feb. 18).
Meanwhile, the U.S. Treasury Department yesterday blacklisted an Iranian bank believed to be supporting the organization managing Read more…
Scientists Warn Iran Could Produce Enough Nuclear Material for Warhead in 5 Months
ISTANBUL — The U.S. is joining five other world powers for talks with Iran this week publicly confident that international efforts have slowed Tehran’s capacity to make nuclear arms and created more time to press Tehran to accept curbs on its atomic activities.
But while diplomats and officials at the International Atomic Energy Agency — the U.N. nuclear monitor — agree that Iran’s enrichment program has struggled over past years, the Federation of American Scientists warns against complacency.
It notes impressive improvements in the performance of the Iranian machines that enrich uranium — an activity that has provoked U.N. sanctions because it could be used to make nuclear weapons.
Washington’s message is essentially this: Iran is struggling with uranium enrichment, a process that can create both nuclear fuel and fissile warhead material. Significantly, that view is backed by Israel, Iran’s implacable foe and considered to have the Mideast’s best intelligence on Iran’s nuclear strivings.
If true, that leaves more time to negotiate in hopes Iran will come around and give up enrichment — thereby removing the threat of an Israeli or U.S. military strike on Iran’s nuclear Read more…
Four Cyber Threats for 2011
Internet Superweapons to Facebook Crimes, Security Experts Predict New Web Attacks
In late 2010, a new kind of computer worm attacked an Iranian nuclear facility and so altered the course of cyber warfare that the U.S. Senate Committee on Homeland Security and Governmental Affairs marked the attack as the beginning of a new era: The Age of Stuxnet.
And while the Stuxnet worm may be the most identifiable, ominous new threat to cyber security as the new year begins, security experts have predicted 2011 will also be a year of dynamic shifts in online threats in other areas, including social media and political “hacktivism.”
Here are the top four security concerns that cyber experts see coming over the digital horizon:
Cyber War’s Newest Superweapon: Stuxnet and Copycats
Stuxnet was first discovered in July 2010 by a security firm in Belarus, but didn’t make global headlines until months later when Iranian state media announced the Middle East nation had been the target of a coordinated attack.
The worm was “the first of its kind, written to specifically target mission-critical control systems running a specific combination of software and hardware,” a Department of Homeland Security official told ABC News.
But experts said the worm is not limited to any single type of target and can be altered to attack several key components of any nation’s infrastructure, from electricity grids to oil rigs.
“The idea that a piece of malicious code can target physical systems and create real-world impacts is something that’s been speculated in the industry for quite some time and certainly was largely understood to be possible. Stuxnet was the first widespread implementation of that kind of attack,” Ben Greenbaum, senior research manager for cyber security firm Symantec, told ABC News.
Symantec’s number one prediction for 2011 was increased cyber attacks on critical infrastructures just like the nuclear facility in Iran, and Stuxnet is only the beginning. Read more…
You must be logged in to post a comment.