Bonum Certa Men Certa

The United States and Israel Use Microsoft Windows for Cyberwar With Collateral Damage

Coup OS

Mohammad Mosaddeq



Summary: Confirmation that Stuxnet was created by bureaucrats for their political purposes comes from sources with special government relationships

TECHRIGHTS wrote about Stuxnet many times before, e.g.:

  1. Iran Shows the Downside of Using Proprietary Software
  2. Ralph Langner Says Windows Malware Possibly Designed to Derail Iran's Nuclear Programme
  3. Windows Viruses Can be Politically Motivated Sometimes
  4. Who Needs Windows Back Doors When It's So Insecure?
  5. Windows Insecurity Becomes a Political Issue
  6. Windows, Stuxnet, and Public Stoning
  7. Stuxnet Grows Beyond Siemens-Windows Infections
  8. Has BP Already Abandoned Windows?
  9. Reports: Apple to Charge for (Security) Updates
  10. Windows Viruses Can be Politically Motivated Sometimes
  11. New Flaw in Windows Facilitates More DDOS Attacks
  12. Siemens is Bad for Industry, Partly Due to Microsoft
  13. Microsoft Security Issues in The British Press, Vista and Vista 7 No Panacea
  14. Microsoft's Negligence in Patching (Worst Amongst All Companies) to Blame for Stuxnet
  15. Microsoft Software: a Darwin Test for Incompetence
  16. Bad September for Microsoft Security, Symantec Buyout Rumours
  17. Microsoft Claims Credit for Failing in Security
  18. Many Windows Servers Being Abandoned; Minnesota Goes the Opposite Direction by Giving Microsoft Its Data
  19. Windows Users Still Under Attack From Stuxnet, Halo, and Zeus
  20. Security Propaganda From Microsoft: Villains Become Heroes
  21. Security Problems in iOS and Windows
  22. Eye on Security: BBC Propaganda, Rootkits, and Stuxnet in Iran's Nuclear Facilities
  23. Eye on Security: ClamAV Says Windows is a Virus, Microsoft Compromises Mac OS X, and Stuxnet Runs Wild
  24. Windows Kernel Vulnerability for Thanksgiving, Insecurity Used for Surveillance Again
  25. Cablegate Reveals Government Requesting Access to Microsoft Data, Kill Switches
  26. Use Microsoft Windows, Get Assassinated


This whole fiasco has been a good advocacy tool for GNU/Linux and software freedom. Security is a matter of national security. It is now confirmed that governments themselves used proprietary software from Microsoft to impose subversive will upon others. To quote:

In 2011, the US government rolled out its "International Strategy for Cyberspace," which reminded us that "interconnected networks link nations more closely, so an attack on one nation’s networks may have impact far beyond its borders." An in-depth report today from the New York Times confirms the truth of that statement as it finally lays bare the history and development of the Stuxnet virus—and how it accidentally escaped from the Iranian nuclear facility that was its target.


Here is another take on the subject:

Now, a stunning article in this morning’s New York Times recounts in surprising detail the origins of the cyber weaponry development and deployment program – code named Olympic Games – launched under President George W. Bush, and continued under the administration of Barack Obama. The article is based on a book to be published by Crowne on Tuesday, titled Confront and Conceal: Obama’s Secret Wars and Surprising Use of American Power,” to be published by Crown on Tuesday.

For those that have followed the Stuxnet saga over the years, the article will answer some of the most intriguing questions that have arisen, including the following:

* Who was in charge? According to the article, the Stuxnet project was a U.S. initiative, rather than an Israeli-led mission. The reason the Israeli’s were invited to the table was to encourage them to rely on cyber attacks rather than physical attacks in order to slow down Iranian nuclear advances. * How did Stuxnet work? The worm was based on information obtained from an initial “beacon” penetration, which then mapped and broadcast complete Natanz facility computer/centrifuge control designs to the software’s handlers. Stuxnet was then installed on to the air gapped system via the usual network vulnerability – a USB port, via an infected thumb drive. * How did Stuxnet escape into the wild? A programming error to a module of uncertain authorship (e.g., U.S. or Israeli) allowed Stuxnet to migrate onto an engineer’s laptop. When that laptop was later connected to the Internet, it moved out and found other Siemens systems to infect.



The Goodbye Microsoft Web site had another take on it. The whole accusation that such allegations were a mere "conspiracy theory" is no more. Now it's a fact. While the FBI conveniently names Russian people "cyber criminals" it is actually the US government that arguably engages in cyber crime, with external costs to the private sector, too. It's all just a matter of perspective. Those who control the source code control the users.

"I don't have / won't have use of WMA or Flash," writes one reader, "but this segment of this NPR show supposedly has some critique of Microsoft as being completely insecure... I got that 2nd/3rd hand... I have contacted them to complain about Flash / WMA and asked that they use a universal format instead... It's buried in the site, but there is a link for the MP3... It was a disappointing set of interviews. None even touched on the unique vulnerability of Microsoft products."

Notice how all the latest Stuxnet coverage hardly ever mentions Microsoft or Windows. It's criminally poor journalism.

Recent Techrights' Posts

Things to Like About London
Many important or "powerful" people leave near there
The Significance of the Timing of the Ridiculous Letters From Brett Wilson LLP, Acting on Behalf of People From Microsoft
A preliminary look at the timeline and what it tells us
 
The So-called 'IT' Industry Became Somewhat of a Fraud Where People Equate Usage and Power Wasted With "Value" or "Success"
When did 'IT' become a weapon rather than technology/science?
Links 23/02/2025: Democracy Backsliding and German Election
Links for the day
Joining APRIL(.org), AGM weekend, Paris, 15-16 March 2025
Reprinted with permission from Daniel Pocock
Links 23/02/2025: Zuckerberg Despised, US Government Does Not Obey Judges, France Grapples With Terrorism
Links for the day
Links 23/02/2025: Apple Back Doors, Ukraine Updates, and Gemini Leftovers
Links for the day
Recent Improvements in Techrights
minimalism works fine when the main goal is to relay information
Slopwatch: Brian Fagioli, Brittany Day (linuxsecurity.com), and Microsoft Misinformation, False Marketing
Serial Sloppers
Censored: Debian Zizian transgender vigilante comparisons in open source Linux communities
Reprinted with permission from Daniel Pocock
Over at Tux Machines...
GNU/Linux news for the past day
IRC Proceedings: Saturday, February 22, 2025
IRC logs for Saturday, February 22, 2025
Links 22/02/2025: OpenAI Plans to Possibly Abandon Microsoft, Facebook Doubles Execs' Bonuses While Sacking Thousands
Links for the day
Gemini Links 22/02/2025: Weekend Chill and Programming Thoughts
Links for the day
Politicians Ought to Invite Dr. Richard Stallman and Prof. Eben Moglen to Speak About Policies, Licensing, Digital Sovereignty
Is there something in Europe other than RMS' talk this coming Monday (that we're not yet aware of)?
Good Explanation of Why IBM Has Chosen to Conceal Mass Layoffs (of 'Expensive' Staff) as "R.T.O." (Even For People Who Never Worked at the Office to Which They're Ordered to "Return")
Many remaining IBM (or Red Hat) workers in Europe are in "cheaper" places such as Brno
Microsoft's Serial Strangler and Matthew J. Garrett Join Forces in Trying to Gag Techrights (for Exposing Microsoft Corruption and Crimes Against Women)
Whose terrible idea was it?
Links 22/02/2025: Labour Department Investigates Microsoft Infosys Amid Mass Layoffs, Large Law Firms Caught Red Handed With LLM Slop (Defrauding Clients and Courts)
Links for the day
Gemini Links 22/02/2025: Analog Stuff, Sigil, and SSGs
Links for the day
Microsoft's Market Share in Cameroon Falls to New Lows
This means a lot of Android users (iOS is about 4 times smaller), but Android does not mean freedom
Over at Tux Machines...
GNU/Linux news for the past day
IRC Proceedings: Friday, February 21, 2025
IRC logs for Friday, February 21, 2025
The Streisand Effect is Real
So don't be evil. Also, don't strangle women.
Links 21/02/2025: Linux Foundation Openwashing, Microsoft Copilot Goes Down
Links for the day
Links 21/02/2025: Doomscrolling and European Ham Radio Show
Links for the day
Free University of Bozen-Bolzano Proud to Host Free Software Talk by Richard Stallman
ahead of Monday's talk
Slopwatch: Anti-Linux Machine-Generated FUD (LLM Slop) From GBHackers, CybersecurityNews, and Guardian Digital, Inc (Google News Promotes Slop Plagiarism, Misinformation)
Companies that lie try to drown out the signal with falsehoods
Links 21/02/2025: TikTok Layoffs, WebOS Software Patents in Bad Hands
Links for the day
Gemini Links 21/02/2025: Web Browsers, Mechanical Shortcuts, and Internet Hygiene
Links for the day
Richard Stallman 'Only' Founded the FSF
there's no reason to be upset at the FSF for keeping their founder in the Board
Techrights Disconnected From the United States Two Years Ago
Did people really need to wait for the US government to become this hostile towards the media before recognising the threat?
Before Trying Censorship by Extortion the Serial Strangler From Microsoft Literally Begged Us to Delete Pages
This is very clearly just a broad campaign of intimidation
Hype Watch: Weeks After Microsoft Disappointed Investors With "Hey Hi" It's Trying Some "Quantum" Hype (Adding Impractical Vapourware to Accompany This Hype and Even LLM Slop in 'News' Clothing)
Remember "metaverse"? What happened to media hype about "blockchain" and "IoT"?
Report About February Mass Layoffs at Microsoft (Third Wave of Microsoft Layoffs in 2025) Comes Back From the Dead
Yesterday we wrote about an article in CRN (reporting Microsoft layoffs) being removed without any reasons specified
Links 21/02/2025: Myanmar Scam Centre and Disruptions at USPTO
Links for the day
Over at Tux Machines...
GNU/Linux news for the past day
IRC Proceedings: Thursday, February 20, 2025
IRC logs for Thursday, February 20, 2025