Cyberwarfare

We may be entering an era when cyberwar is a real threat, at least to some. I was a computer programmer in 1958-59 but that is the stone age of computing. The machine I programmed was An IBM 650 which was so primitive that it did not use hexadecimal code. This was even before FORTRAN was written so I claim no current expertise. Later, after medical school, I took some computer science courses and learned to program in Pascal and C. Still later, I learned Visual Basic but never got very far in C++ so I am pretty much a neophyte in Object Oriented Programming. The term, often abbreviated to OOP, is a way of creating small pieces of code that can be reused over and over without rewriting it and the attendant risk of error. It is also faster. This also applies to modular programming and the differences are explained in the wiki entry.

It now appears that a new “worm” has been created by someone that is capable of attacking the Iranian nuclear program. Roger Simon is the only one I have seen so far discussing it and its implications. This involves small devices called PLCs, or “Programmable Logic Controllers” some of which run your washing machine. They are the heart of computer controlled machinery, such as the 30,000 Iranian centrifuges that are purifying Uranium 235. What if all those 30,000 centrifuges went crazy, spinning so fast that they self destructed ?

This brings up the subject of Stuxnet, a computer “worm.” It attacks one specific system, the Siemens company’s SCADA systems. It happens that Siemens designed and built the SCADA systems that run its nuclear program. What a coincidence !

Has the war with Iran already begun ? Maybe.

But just as television news was transformed by technology before the Iranian Revolution in 1979, and politics was transformed by social networking before it appeared that Twitter would bring about a second Iranian Revolution, process and progress need crystallizing events, where the political and cultural significance of technological innovation becomes indisputable.

Such a moment came in July with the discovery of a worm known as Stuxnet, which sought out a particular version of the Siemens’ SCADA (supervisory control and data acquisition) systems that control power grids and industrial plants. According to Ralph Langner, an expert in industrial control systems who published a study of the worm last week, Stuxnet was capable of taking over SCADA controls in order to deliver a kinetic attack by causing critical systems to physically malfunction. The systems infected weren’t randomly targeted: a majority are in Iran.

It’s an interesting idea. A lot of Windows 7 code was written by Israeli engineers. Maybe their target is more than the nuclear program.

Stuxnet is an even more dramatic transformational event: warfare is never going to be the same, at least while the underlying protocols governing the Internet create these kinds of systemic vulnerabilities. But even if there was agreement to rewrite these protocols starting tomorrow, such a project would take a decade. So, let the damage assessment begin. Who knows? By demonstrating how Iran could so very easily experience a Chernobyl-like catastrophe, or the entire destruction of its conventional energy grid, the first round of the “war” may have already been won.

Unfortunately, the Chinese have been working very hard at the same sort of thing and we had a determined cyberattack on the Pentagon e-mail system two years ago. This may be what war looks like in the future.

UPDATE: Some body is noticing.

Tags: , ,

Comments are closed.