Israel Tested Stuxnet Worm with US Cooperation, Says NY Times
by Tzvi Ben Gedalyahu, INN
Israel, with cooperation from the United States, reconstructed Iran’s centrifuges in Dimona, where it tested the Stuxnet worm that has set back Iran’s nuclear program at least five years, The New York Times reported Sunday. The wildly successful virus attack has virtually achieved the same time delay as those envisioned by various scenarios of military attacks.
The clandestine operation at the nuclear center in southern Israel began at least two years ago and has severely affected Iran’s uranium enrichment program far more than previously reported, the article stated, based on various sources from Israel, the United States and Britain.
One American intelligence expert told the Times, “To check out the worm, you have to know the machines. The reason the worm has been effective is that the Israelis tried it out.” Then-President George W. Bush gave the go-ahead for US-Israel cooperation for the project in 2008, sources said.
Israel apparently obtained the centrifuges used in uranium-enriching plants in Iran and successfully tested the Stuxnet virus. The worm is the most advanced Cybernet weapon ever known. It not only knocked Iran’s spinning centrifuges out of control, it also arranged that the computer feedback to engineers showed that everything was running as normal.
The success of the lethal worm appears to be far greater than previously estimated. “Israeli officials grin widely when asked about its effects,” the Times reported.
Surprising statements in the past two weeks by American and Israeli officials have offered clear indications of the Israeli-American achievement. U.S. Secretary of State Hillary Clinton said that Iran’s nuclear program has been set back several years, ostensibly because of America-backed sanctions.
Outgoing Mossad intelligence agency director Meir Dagan and Strategic Affairs Minister Moshe Yaalon said Iran’s technical problems at its nuclear sites have pushed back the time clock for an Iranian nuclear weapon at least until 2015.
By that time, Iran’s struggling economy, marked by spiraling inflation, could undermine the regime of Iranian President Mahmoud Ahmadinejad.
by David Lev
Follow Israel news on Twitter and Facebook.
A secret report by the International Atomic Energy Agency leaked on Tuesday said that Iran had been forced to suspend activity on enriching uranium, because of “technical problems” that have surfaced in thousands of centrifuges at its Natanz nuclear reactor.
The centrifuges, which are used in the enrichment project, were taken out of service, with the entire enrichment project there on hold, the report said – indicating, observers said, that Iran’s problems with the particularly malignant Stuxnet computer virus were not yet over.
A weekend article in The New York Times quoted German security expert Ralph Langer as saying that the Stuxnet virus, which he identified in September as the worm that has caused major problems at Iran’s Bushehr nuclear plant, was still alive and well, despite Iranian denials. But instead of just disabling centrifuges, the virus can also “confuse” frequency convertors that control all sorts of mechanical and industrial processes, Langer wrote – giving Stuxnet not one, but two “warheads” that could cause severe damage to infrastructure, including water, gas and electric systems.
The virus is also far more virulent than had been thought, Langer said; it was designed to attack control systems manufactured by Germany’s Siemens, which are in use in infrastructure throughout the world. The Times article quoted a U.S. security expert who said that “computer security organizations were not adequately conveying the potential for serious industrial sabotage that Stuxnet foretells,” implying that many of the world’s power plants, water facilities, and other basic infrastructure that are dependent on automated control systems, are at serious risk.
But while that is possible, says Israeli security expert Rafael Sutnick, there seemed to be little likelihood that Stuxnet would “leak out” to other facilities, based on what we know about it so far.
“Whoever unleashed it on Iran seems to have a tight rein on it,” Sutnick said. “So far, Iran is the only place we’ve seen the virus active, indicating that it was a specific target and did not reach the country’s computer network by chance or accident. Whoever designed this knew what they were doing, and the experts who have analyzed the code say that years of work went into designing it. So I don’t see it disabling infrastructure randomly.”
His comments again raise the question of just who might have produced the virus. Already in September, experts were saying that Stuxnet appeared to have been far too sophisticated to have been designed by amateur hackers, and the latest information published by Langer seems to confirm this. Which brings around what has become a perennial question in the Stuxnet saga: If Iran, as Sutnick and other experts say, is being deliberately targeted, does that mean that Israeli experts designed the virus?
“No one knows, and no one will probably ever know,” says Sutnick. “It’s interesting that the IAEA report mentions the Natanz facility as having been compromised. Natanz was built eight meters underground and was topped with dozens of meters of reinforced concrete and earth in 2004, in anticipation of a possible attack by Israeli or American ‘bunker buster’ bombs.
“In other words, Natanz was designed to be the most secure Iranian nuclear site – but it has proven to be as vulnerable as an open computer network, apparently.” Whether Israel was behind the attack is impossible to know, he said – but there’s no doubt that the IAEA report has made Israelis happy.