'저는 그들의 땅을 지키기 위하여 싸웠던 인디안들의 이야기를 기억합니다. 백인들이 그들의 신성한 숲에 도로를 만들기 위하여 나무들을 잘랐습니다. 매일밤 인디안들이 나가서 백인들이 만든 그 길을 해체하면 그 다음 날 백인들이 와서 도로를 다시 짓곤 했습니다. 한동안 그 것이 반복되었습니다. 그러던 어느날, 숲에서 가장 큰 나무가 백인들이 일할 동안 그들 머리 위로 떨어져 말과 마차들을 파괴하고 그들 중 몇몇을 죽였습니다. 그러자 백인들은 떠났고 결코 다시 오지 않았습니다….' (브루스 개그논)





For any updates on the struggle against the Jeju naval base, please go to savejejunow.org and facebook no naval base on Jeju. The facebook provides latest updates.

Saturday, March 5, 2011

Text Fwd: StratCom & Stuxnet

* Text fwd from Frank Cordaro on March 5, 2011



StratCom & Stuxnet
By Loring Wirbel ,
Citizens for Peace in Space, Colorado Springs, Colorado

Lost amid the rash of media reports on the protests engulfing the
Middle East and North Africa was a little February news item noting
that the Bushehr nuclear power plant in Iran was at risk of a nuclear
meltdown. The predicted danger, it turns out, was not the result of
poor construction or the fault of an ill-trained crew. It was instead
an unintended ‘side effect’ of an attack launched by Israel with the
help of StratCom’s “Cyber Command” to cripple Iran’s nuclear
capabilities with a computer worm—a rogue program similar to a virus.
The so-called “Stuxnet” worm was specifically designed to interrupt
the operation of centrifuges at the Natanz uranium enrichment plant,
but now has been confirmed to have spread to other Iranian nuclear
facilities, including Bushehr.

Given that a major nuclear accident carries the potential to kill
dozens, if not hundreds, of Iranians, it is odd that some people
regard an offensive cyber attack using the Stuxnet worm as a
preferable alternative to an Israeli military air strike on Iranian
nuclear sites. But that’s the funny thing about the U.S.’s alleged
‘defensive’ military capabilities. Time and again—with chemical
weapons, missile defense and now with cyber-warfare, capabilities that
are considered defensive and somewhat benign wind up being used in
very offensive ways. And the end result may not be that much
different than a full-frontal military assault.

Stuxnet was one of the first worms in history designed to attack
computers used in factories, instead of desktop and laptop computers
used by consumers. In fact, Stuxnet’s malicious payload was specific
enough that it only caused harm when it encountered computers built by
Siemens for industrial-process control. Even when Siemens computers
are present, Stuxnet only disrupts operations of certain kinds of
pumps and motors that might be used in a uranium enrichment plant.
One analyst called this a “highly-targeted sniper type of computer
attack.”
So we shouldn’t expect much collateral damage, right?

Wrong.

READ MORE AT

Peace,
Mark Vasina, President
Nebraskans for Peace
941 'O' Street, Suite 1026 | Lincoln, NE 68508
Website: www.nebraskansforpeace.org
Email: nfpstate@nebraskansforpeace.org

No comments:

Post a Comment