
NSA computers
To this day it remains one of the most sophisticated and mysterious offensive operations ever launched: Stuxnet, the computer virus specifically engineered to attack Iran’s nuclear reactors. Discovered in 2010 and now widely believed to be a collaboration between the U.S. and Israel, its existence raised an urgent question: Just what is the U.S. government doing to attack its opponents in the cyber-realm?
Stuxnet’s origins have never been officially acknowledged, and the extent of American meddling in malware is still unknown. But for the past few years there’s been something new developing within the U.S. military that has taken “cyber” from a theoretical idea to a deliberate—if secretive—part of U.S. policy. The first ripple came in January 2013, when the Washington Post reported that the Pentagon was significantly expanding its cybersecurity forces across all the service branches. By that October, the U.S. Army had launched two teams of technical experts dedicated purely to the cyber realm. Just a year later, the number was up to 10.
The growth has been snowballing. Last year, […]
The problem with stuxnet is that our opponents have turned it around and used it against us. It is quite possible that our industrial infrastructure if completely infected with something that can be triggered at any moment.
And we take what they have turned around on us and probably turn it back towards them again… there’s no end to this craziness with this kind of thinking. Work for justice and equality for all peoples and this will eventually become unnecessary–if we survive that long.