06.05.12

Gemini version available ♊︎

The United States and Israel Use Microsoft Windows for Cyberwar With Collateral Damage

Posted in Microsoft, Security, Windows at 3:58 am by Dr. Roy Schestowitz

Coup OS

Mohammad Mosaddeq

Summary: Confirmation that Stuxnet was created by bureaucrats for their political purposes comes from sources with special government relationships

TECHRIGHTS wrote about Stuxnet many times before, e.g.:

  1. Iran Shows the Downside of Using Proprietary Software
  2. Ralph Langner Says Windows Malware Possibly Designed to Derail Iran’s Nuclear Programme
  3. Windows Viruses Can be Politically Motivated Sometimes
  4. Who Needs Windows Back Doors When It’s So Insecure?
  5. Windows Insecurity Becomes a Political Issue
  6. Windows, Stuxnet, and Public Stoning
  7. Stuxnet Grows Beyond Siemens-Windows Infections
  8. Has BP Already Abandoned Windows?
  9. Reports: Apple to Charge for (Security) Updates
  10. Windows Viruses Can be Politically Motivated Sometimes
  11. New Flaw in Windows Facilitates More DDOS Attacks
  12. Siemens is Bad for Industry, Partly Due to Microsoft
  13. Microsoft Security Issues in The British Press, Vista and Vista 7 No Panacea
  14. Microsoft’s Negligence in Patching (Worst Amongst All Companies) to Blame for Stuxnet
  15. Microsoft Software: a Darwin Test for Incompetence
  16. Bad September for Microsoft Security, Symantec Buyout Rumours
  17. Microsoft Claims Credit for Failing in Security
  18. Many Windows Servers Being Abandoned; Minnesota Goes the Opposite Direction by Giving Microsoft Its Data
  19. Windows Users Still Under Attack From Stuxnet, Halo, and Zeus
  20. Security Propaganda From Microsoft: Villains Become Heroes
  21. Security Problems in iOS and Windows
  22. Eye on Security: BBC Propaganda, Rootkits, and Stuxnet in Iran’s Nuclear Facilities
  23. Eye on Security: ClamAV Says Windows is a Virus, Microsoft Compromises Mac OS X, and Stuxnet Runs Wild
  24. Windows Kernel Vulnerability for Thanksgiving, Insecurity Used for Surveillance Again
  25. Cablegate Reveals Government Requesting Access to Microsoft Data, Kill Switches
  26. Use Microsoft Windows, Get Assassinated

This whole fiasco has been a good advocacy tool for GNU/Linux and software freedom. Security is a matter of national security. It is now confirmed that governments themselves used proprietary software from Microsoft to impose subversive will upon others. To quote:

In 2011, the US government rolled out its “International Strategy for Cyberspace,” which reminded us that “interconnected networks link nations more closely, so an attack on one nation’s networks may have impact far beyond its borders.” An in-depth report today from the New York Times confirms the truth of that statement as it finally lays bare the history and development of the Stuxnet virus—and how it accidentally escaped from the Iranian nuclear facility that was its target.

Here is another take on the subject:

Now, a stunning article in this morning’s New York Times recounts in surprising detail the origins of the cyber weaponry development and deployment program – code named Olympic Games – launched under President George W. Bush, and continued under the administration of Barack Obama. The article is based on a book to be published by Crowne on Tuesday, titled Confront and Conceal: Obama’s Secret Wars and Surprising Use of American Power,” to be published by Crown on Tuesday.

For those that have followed the Stuxnet saga over the years, the article will answer some of the most intriguing questions that have arisen, including the following:

* Who was in charge? According to the article, the Stuxnet project was a U.S. initiative, rather than an Israeli-led mission. The reason the Israeli’s were invited to the table was to encourage them to rely on cyber attacks rather than physical attacks in order to slow down Iranian nuclear advances.
* How did Stuxnet work? The worm was based on information obtained from an initial “beacon” penetration, which then mapped and broadcast complete Natanz facility computer/centrifuge control designs to the software’s handlers. Stuxnet was then installed on to the air gapped system via the usual network vulnerability – a USB port, via an infected thumb drive.
* How did Stuxnet escape into the wild? A programming error to a module of uncertain authorship (e.g., U.S. or Israeli) allowed Stuxnet to migrate onto an engineer’s laptop. When that laptop was later connected to the Internet, it moved out and found other Siemens systems to infect.

The Goodbye Microsoft Web site had another take on it. The whole accusation that such allegations were a mere “conspiracy theory” is no more. Now it’s a fact. While the FBI conveniently names Russian people “cyber criminals” it is actually the US government that arguably engages in cyber crime, with external costs to the private sector, too. It’s all just a matter of perspective. Those who control the source code control the users.

“I don’t have / won’t have use of WMA or Flash,” writes one reader, “but this segment of this NPR show supposedly has some critique of Microsoft as being completely insecure… I got that 2nd/3rd hand… I have contacted them to complain about Flash / WMA and asked that they use a universal format instead… It’s buried in the site, but there is a link for the MP3… It was a disappointing set of interviews. None even touched on the unique vulnerability of Microsoft products.”

Notice how all the latest Stuxnet coverage hardly ever mentions Microsoft or Windows. It’s criminally poor journalism.

Share in other sites/networks: These icons link to social bookmarking sites where readers can share and discover new web pages.
  • Reddit
  • email

Decor ᶃ Gemini Space

Below is a Web proxy. We recommend getting a Gemini client/browser.

Black/white/grey bullet button This post is also available in Gemini over at this address (requires a Gemini client/browser to open).

Decor ✐ Cross-references

Black/white/grey bullet button Pages that cross-reference this one, if any exist, are listed below or will be listed below over time.

Decor ▢ Respond and Discuss

Black/white/grey bullet button If you liked this post, consider subscribing to the RSS feed or join us now at the IRC channels.

DecorWhat Else is New


  1. HMRC Does Not Care About Tax Fraud Committed by UK Government Contractor, Sirius 'Open Source'

    The tax crimes of Sirius ‘Open Source’ were reported to HMRC two weeks ago; HMRC did not bother getting back to the reporters (victims of the crime) and it’s worth noting that the reporters worked on UK government systems for many years, so maybe there’s a hidden incentive to bury this under the rug



  2. Our IRC at 15th Anniversary

    So our IRC community turns 15 today (sort of) and I’ve decided to do a video reflecting on the fact that some of the same people are still there after 15 years



  3. IRC Proceedings: Thursday, June 01, 2023

    IRC logs for Thursday, June 01, 2023



  4. Links 02/06/2023: NixOS 23.05 and Rust 1.70.0

    Links for the day



  5. Gemini Links 02/06/2023: Flying High With Gemini and Gogios Released

    Links for the day



  6. Links 01/06/2023: KStars 3.6.5 and VEGA ET1031 RISC-V Microprocessor in Use

    Links for the day



  7. Gemini Links 01/06/2023: Scam Call and Flying High With Gemini

    Links for the day



  8. Links 01/06/2023: Spleen 2.0.0 Released and Team UPC Celebrates Its Own Corruption

    Links for the day



  9. IRC Proceedings: Wednesday, May 31, 2023

    IRC logs for Wednesday, May 31, 2023



  10. Tux Machines Closing the Door on Twitter Because Twitter is Dead (for a Lot of People)

    Tux Machines recently joined millions of others who had already quit Twitter, including passive posting (fully or partly automated)



  11. Links 31/05/2023: Inkscape’s 1.3 Plans and New ARM Cortex-A55-Based Linux Chip

    Links for the day



  12. Gemini Links 31/05/2023: Personality of Software Engineers

    Links for the day



  13. Links 31/05/2023: Armbian 23.05 Release and Illegal UPC

    Links for the day



  14. IRC Proceedings: Tuesday, May 30, 2023

    IRC logs for Tuesday, May 30, 2023



  15. Gemini Protocol About to Turn 4 and It's Still Growing

    In the month of May we had zero downtime (no updates to the system or outages in the network), which means Lupa did not detect any errors such as timeouts and we’re on top of the list (the page was fixed a day or so after we wrote about it); Gemini continues to grow (chart by Botond) as we’re approaching the 4th anniversary of the protocol



  16. Links 31/05/2023: Librem Server v2, curl 8.1.2, and Kali Linux 2023.2 Release

    Links for the day



  17. Gemini Links 31/05/2023: Bayes Filter and Programming Wordle

    Links for the day



  18. [Meme] Makes No Sense for EPO (Now Connected to the EU) and Staff Pensions to be Tied to the UK After Brexit

    It seems like EPO staff is starting to have doubts about the safety of EPO pensions after Benoît Battistelli sent money to reckless gambling (EPOTIF) — a plot that’s 100% supported by António Campinos and his enablers in the Council, not to mention the European Union



  19. Working Conditions at EPO Deteriorate and Staff Inquires About Pension Rights

    Work is becoming a lot worse (not even compliant with the law!) and promises are constantly being broken, so staff is starting to chase management for answers and assurances pertaining to finances



  20. Links 30/05/2023: Orc 0.4.34 and Another Rust Crisis

    Links for the day



  21. Links 30/05/2023: Nitrux 2.8.1 and HypoPG 1.4.0

    Links for the day



  22. Gemini Links 30/05/2023: Bubble Version 3.0

    Links for the day



  23. Links 30/05/2023: LibreOffice 7.6 in Review and More Digital Restrictions (DRM) From HP

    Links for the day



  24. Gemini Links 30/05/2023: Curl Still Missing the Point?

    Links for the day



  25. IRC Proceedings: Monday, May 29, 2023

    IRC logs for Monday, May 29, 2023



  26. MS (Mark Shuttleworth) as a Microsoft Salesperson

    Canonical isn’t working for GNU/Linux or for Ubuntu; it’s working for “business partners” (WSL was all along about promoting Windows)



  27. First Speaker in Event for GNU at 40 Called for Resignation/Removal of GNU's Founder

    It’s good that the FSF prepares an event to celebrate GNU’s 40th anniversary, but readers told us that the speakers list is unsavoury, especially the first one (a key participant in the relentless campaign of defamation against the person who started both GNU and the FSF; the "FSFE" isn't even permitted to use that name)



  28. When Jokes Became 'Rude' (or Disingenuously Misinterpreted by the 'Cancel Mob')

    A new and more detailed explanation of what the wordplay around "pleasure card" actually meant



  29. Site Updates and Plans Ahead

    A quick look at or a roundup of what we've been up to, what we plan to publish in the future, what topics we shall focus on very soon, and progress moving to Alpine Linux



  30. Links 29/05/2023: Snap and PipeWire Plans as Vendor Lock-in

    Links for the day


RSS 64x64RSS Feed: subscribe to the RSS feed for regular updates

Home iconSite Wiki: You can improve this site by helping the extension of the site's content

Home iconSite Home: Background about the site and some key features in the front page

Chat iconIRC Channel: Come and chat with us in real time

Recent Posts