home bbs files messages ]

Just a sample of the Echomail archive

Cooperative anarchy at its finest, still active today. Darkrealms is the Zone 1 Hub.

   CONTROVERSIAL      Controversial Topics, current events, at      415 messages   

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]

   Message 49 of 415   
   BOB KLAHN to ALL   
   Was attacking Iran's computers a good id   
   17 Jan 11 21:47:28   
   
    Well, it's out, the worm that attacks industrial controls was,   
    supposedly, developed by the US and Israel to damage Iran's nuke   
    program. The former head of the Mossad said Iran's program has   
    been set back maybe 4 years. Though he did not mention the worm.   
      
    Ok is this a good idea? Last I heard the US intel agencies said   
    Iran does not have a nuke weapon program. Has that changed? If   
    not, why is the US believing foreign sources, and not the US   
    sources?   
      
    Why is the US taking risks like that for Israel, and Saudi   
    Arabia, and other Arab, actually Sunni, countries? And the risks   
    may well be greater than realized.   
      
    I first heard of the Stuxnet worm on NPR, some weeks back. Then   
    it was just speculation that Israel had developed it, low level   
    speculation. The real issue was, it was turning up in industrial   
    systems.   
      
    See, the worm attacks industrial controls made by Siemans corp.   
    Siemans is a German company that makes a wide variety of   
    products, but is big in industrial controls. There are two   
    general types of industrial controls. One is a control that is   
    designed solely for industrial operations, and has little   
    similarity to any computer that you would have contact with.   
    That is the kind I am mostly familiar with.   
      
    The other is a PC with softward and interfaces for industrial   
    operations. It is typically run with some form of Windows.   
      
    Now, I do not know which they are using for those centrifuges.   
    If they are the PC controlers, then the worm is very likely a   
    complex version of the typical computer malware. Since it was   
    said to be spread through flash drives I suspect that is what   
    they are dealing with.   
      
    If it's the pure industrial type, it is unlikely the worm is in   
    the controller itself, but in the computer that programs the   
    controller. That would take a truly high level worm. Which may   
    be why the Stuxnet is considered so complex. The programming   
    computer would have an altered program it would feed into the   
    controller, and that is how it would do the damage.   
      
    Either way, once the worm is discovered, I doubt it will take   
    much to alter it to attack controls for systems other than   
    nuclear related.   
      
    What would be the effect if factories all over the country, all   
    over the world, suddenly started haveing breakdowns due to an   
    altered version of the worm? If I were asked to create one, I   
    would probably just have a time delay after it's inserted, to   
    create difficulty in tracking it down. Then I might just have it   
    freeze all the control outputs on at one time.   
      
    If a machine is running, and suddenly the controls freeze up   
    with the machine in motion, the results can be disasterous.   
    Things don't move out of the way when they should, don't detect   
    positions right, don't stop when things go wrong.   
      
    I would freeze them on because turning them off might stop the   
    machine, which could prevent or lessen the damage.   
      
    With the PC type control the hacker has more flexibility. He can   
    put in options to seek out the best way to do damage. If it's on   
    the web he can even have it send back I/O info to find the best   
    way to do the most damage.   
      
    Now, this worm is out there, and not just in Iran. So, how long   
    till hackers get hold of it. Wanna bet they don't already have   
    it?   
      
    And if Iran wants revenge, how many hackers can they buy for   
    maybe a few million dollars? Maybe $20 Mill?   
      
    On top of that, we have justified Chinese cyber attacks on our   
    systems. We did it, why can't they? Cyberwarfare may well have   
    begun, and we are the aggressors.   
      
    Now as to the motives, that's another message.   
      
   BOB KLAHN bob.klahn@sev.org   http://home.toltbbs.com/bobklahn   
      
   ... There is a current shortage of plowshares and a vast surplus of swords.   
   --- Via Silver Xpress V4.5/P [Reg]   
    * Origin: Doc's Place BBS Fido Since 1991 docsplace.tzo.com (1:123/140)   

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]


(c) 1994,  bbs@darkrealms.ca