Monday, September 1, 2014

Stuxnet and the Iranian Nuclear Program

     In November 2007 and numerous times since then, the United States has attacked Iran's nuclear program via a computer worm known as Stuxnet according to Symantec Corporation.  Recently, Symantec Corporation, which provides internet security, uncovered this young version of the virus.  Prior to this recent discovery by Symantec, the earliest case of cyberwarfare against the Iranian regime was thought to have been launched in 2009. 
     Symantec revealed even more information regarding this virus stain.  They found evidence of early versions of the virus dating all the way back to 2005.  The virus was created to "attack the Natanz facility by opening and closing valves that feed uranium hexafluoride gas into the centrifuges, without the knowledge of the operators"(Finkle).  This method of disruption was very similar to how the United States attacked Iran's facilities a few years later.  The 2005 version of the worm was created when the construction of the Natanz facility in Iran was completed. 
     The preemptivness of the United States to attack the facility is surprising.  At the time, and even today, it is still not very clear to whether Iran is developing nuclear weapons.  It was considerably more unclear back then.  Due to the instability in the region, it is very possible that Iran is building nuclear weapons to protect itself from its enemies.   If the United States has strategic interests that are threatened by a nuclear Iran, then proactive measures are certainly ethical.  There is no doubt that a nuclear Iran would disrupt the Middle East as the balance of power would shift heavily in favor of the Iranians.  In addition, the virus only damaged  centrifuges and did not cause any bodily harm to any Iranian.  This is a far better strategy than launching a military invasion of a nation to prevent the enrichment of weapons grade uranium.  However, if Iran is using these centrifuges for nuclear power, then the cyberwarfare attacks launched by the Untied States are unethical as they prevent Iran from providing much needed electrical power to its people. 
     These engagements in cyberwarfare are undoubtedly indicative of the future of warfare and international politics.  Governments and its people are heavily reliant on computer systems.  Computer systems have become the optimal target for attacks.  Certainly, this is better than warfare where men and women are killed on the battlefield.  However, viruses can be used by governments to attack more than just governments.  Citizens rely on the internet and infrastructure of computer systems in the private sector and for personal use.  Attacks on civilians or even accidental attacks on civilians may become more common place as viruses are increasingly used to wage covert cyberwarfare.  In addition, the amount of individuals that could be affected by cyberware is extremely high due to the interconnectedness of the world thanks to the advent of the Internet.  It is possible many of us will experience first hand the effects of cyberware first hand in our lifetime.



Works Cited

Finkle, Jim. "Researchers Say Stuxnet Was Deployed against Iran in 2007." Reuters. Thomson  Reuters, 26 Feb. 2013. Web. 01 Sept. 2014. <http://www.reuters.com/article/2013/02/26/us-cyberwar-stuxnet-idUSBRE91P0PP20130226>. 

1 comment:

  1. Well written -- good reflections about what the future may hold...

    ReplyDelete