September 26, 2010
Iran has admitted today that Stuxnet malware has infected its industrial computer system.
“An IT official of Iran’s mines and metals ministry told the Mehr news agency that 30,000 computers belonging to industrial units have already been infected by the virus,” reports Deutsche Presse-Agentur  today. “Mahmoud Alyaie told Mehr that the Iranian industrial control systems are made by Siemens and the Stuxnet is designed to attack exactly these systems and transfer classified data abroad.”
“Stuxnet has the ability to take advantage of the programming software to also upload its own code to… an industrial control system,” explains Symantec , the anti-virus software company. “Stuxnet can potentially control or alter how the system operates.” Symantec figures from August show 60 per cent of the computers infected by Stuxnet are located in Iran , up from 25 per cent in July.
On Friday, Max Fisher , writing for The Atlantic Wire, said cybersecurity officials report the malware is “widely disseminated” and “establishes a new precedent in the sophistication and threat of cyberwarfare.” The officials said the software has embedded itself across computer systems at a number of power facilities and factories over the past year. “It’s unknown who created it, to what end, and what exactly Stuxnet would have done if it had not been discovered,” writes Fisher.
- A d v e r t i s e m e n t
The malware is not spread over the internet. It must be manually inserted on a network computer by an external device such as a USB drive.
Since the software is now being used against the primary target of the globalists, Iran, it should be a no-brainer who created it — the Pentagon.
On the other hand, Richard Falkenrath , a principal at Chertoff Group and a Bloomberg Television contributing editor, believes the malware was designed and unleashed by Israel. Falkenrath told Bloomberg that the worm is so sophisticated that only the resources of a nation-state would be able to produce it. See the Bloomberg video here .
In August, the Senate Homeland Security and Governmental Affairs Committee claimed the Pentagon was the victim of a cyber attack.
“This latest revelation underscores the scary reality of how vulnerable we really are to cyber criminals, terrorists, and nation-states seeking to use technology to steal from us or do us harm,” said Sen. Tom Carper  of Delaware.
Carper, who is the chairman of the Homeland Security’s Federal Financial Management Subcommittee, said the attack underscored the need for legislation he co-sponsored with Homeland Security Chairman Joe Lieberman. Carper and Lieberman’s legislation would establish the office of cyber policy in the White House.
The law, if passed, would also establish a National Center for Cybersecurity and Communications within the Department of Homeland Security that would enforce cybersecurity policies across the government and would include mission creep into private sector cybersecurity.
In July, a Senate committee approved the Protecting Cyberspace as a National Asset Act . It would give Obama an internet “kill switch.”
The Wall Street Journal  published an article today warning that “cyber espionage” has increased against governments and companies around the world in the past year.
“More than 100 countries are currently trying to break into U.S. networks, defense officials say. China and Russia are home to the greatest concentration of attacks,” reports the Journal.
In response to the alleged threat of increased cyber tomfoolery, the Pentagon’s Cyber Command is scheduled to be up and running next month.
In May, the Pentagon  said it would consider a military response in the case of a cyber attack against the United States. The Pentagon’s cyber command is now led by Lieutenant General Keith Alexander, head of the National Security Agency.
In addition, the Obama administration has designated cyber security as a “critical national asset” and has stepped up efforts to combat the drastically overstated threat, including the creation of Homeland Security SWAT teams to respond to cyber attacks on critical infrastructure.
The illegal covert war against Iran aside, the hype over the Stuxnet worm provides an excellent opportunity for the government to ramp up its police state efforts against the American people. Most folks are not concerned about ineffectual underwear and barbeque grill propane tank non-bombers, but they stand up and take notice when the lights and water go out.
Is it possible there is a Stuxnet false flag attack right around the corner?