CIA – Artifex.News https://artifex.news Stay Connected. Stay Informed. Sat, 21 Sep 2024 04:04:22 +0000 en-US hourly 1 https://wordpress.org/?v=6.6.2 https://artifex.news/wp-content/uploads/2023/08/cropped-Artifex-Round-32x32.png CIA – Artifex.News https://artifex.news 32 32 How CIA, Mossad Used A Computer Virus To Dismantle Iran’s Nuclear Program https://artifex.news/israel-iran-hezbollah-stuxnet-how-cia-mossad-developed-a-digital-weapon-to-target-iran-nuclear-site-6614789/ Sat, 21 Sep 2024 04:04:22 +0000 https://artifex.news/israel-iran-hezbollah-stuxnet-how-cia-mossad-developed-a-digital-weapon-to-target-iran-nuclear-site-6614789/ Read More “How CIA, Mossad Used A Computer Virus To Dismantle Iran’s Nuclear Program” »

]]>

Stuxnet did not confine itself to Iran. It spread to other countries, including India.

New Delhi:

It’s June, 2009. The streets of Tehran have erupted in protests over the results of a presidential election. The incumbent Mahmoud Ahmadinejad has emerged victorious with an overwhelming majority against Mir-Hossein Mousavi. Protesters alleged a fraudulent victory. Among them is a woman named Neda Agha-Soltan, who on her way to join the main protests, parked her car at some distance from the gathering and stepped out as the vehicle’s air conditioner was not working. As she breathed in the fresh air, a sniper belonging to a government-funded militia took aim and shot her square in the chest. She was dead.

While this was unfolding in Tehran, around 300 kilometres to the south at the Natanz nuclear facility, the heart of Iran’s nuclear program – ‘strange’ things were happening. Just days after Neda’s death, the CIA reportedly received approval to initiate a cyber operation against this facility. The operation involved uploading a sophisticated piece of malware, known as Stuxnet, directly onto Iranian hardware. This malware had been in development for years, a collaborative effort between the United States and Israel, and represented the world’s first digital weapon.

Stuxnet: The Genesis

Stuxnet was not a new presence in Iran’s nuclear infrastructure; it had been causing disruptions for years. However, this new version was designed to deliver a decisive blow. 

The story of Stuxnet’s development and deployment began years earlier. The inception of Stuxnet can be traced back to the early 2000s, during a period of heightened tension between Iran and Western nations over Iran’s nuclear ambitions. The Bush administration, concerned about Iran’s potential to develop nuclear weapons, sought unconventional methods to impede Tehran’s progress. Thus, the covert operation codenamed ‘Olympic Games’ was born. This initiative, involving close collaboration between the CIA, the NSA, and Israel’s Mossad, aimed to create a digital weapon capable of physically disrupting Iran’s nuclear enrichment capabilities.

Stuxnet was not an ordinary piece of malware. Its design reflected a level of sophistication unprecedented in the realm of cyber weapons. The malware targeted Siemens Step7 software, used to control industrial equipment, specifically focusing on the centrifuges at Iran’s Natanz uranium enrichment facility. These centrifuges, essential for enriching uranium, operated at high speeds and required precise control to function correctly.

Stuxnet: The Execution

The US built a replica of Iran’s nuclear facility in its Oak Ridge facility in the state of Tennessee, where they meticulously studied the centrifuges to understand how to sabotage them without detection. In 2007, the first version of Stuxnet was released, targeting these centrifuges by preventing the release of pressure through the valves, causing the uranium gas to solidify and the centrifuges to spin out of control and ultimately self-destruct.

Latest and Breaking News on NDTV

Photo Credit: Oak Ridge National Laboratory

Iran’s nuclear facility was air-gapped, meaning its network was offline, so Stuxnet had to be introduced via an inside agent using a USB drive. The malware operated undetected, using a rootkit to hide its presence and stolen digital certificates to appear as legitimate commands. Despite its effectiveness, initial versions of Stuxnet only slowed Iran’s progress, and did not sabotage it entirely.

In response, US researchers developed a more aggressive version of Stuxnet, using four zero-day exploits and stolen private keys to sign its commands. This version could spread rapidly, even across air-gapped networks, and reprogram the centrifuges to destroy themselves while masking the sabotage as hardware malfunctions.

Stuxnet: The Implications

An insider at Natanz introduced this new version of Stuxnet, and it quickly spread throughout the facility’s network. However, its aggressive nature led to unintended consequences: the malware spread beyond Natanz, infecting computers across Iran and eventually the globe. The CIA, realising the uncontrollable spread of Stuxnet, decided to continue with the operation, hoping it would remain undetected within Natanz.

Latest and Breaking News on NDTV

Photo Credit: Google Earth

Their hopes were dashed when cybersecurity firm Symantec discovered Stuxnet and published a detailed report on the malware. Iran soon realised the extent of the cyber attack and took measures to protect their nuclear program. Despite the setbacks caused by Stuxnet, Iran vowed to continue its nuclear ambitions.

One of the earlier hints of Stuxnet’s existence emerged in June 2010 when a Belarusian cybersecurity firm discovered an unusual piece of malware on an Iranian computer. As cybersecurity experts from around the world began analysing the code, they were astounded by its complexity and purpose. 

Impact On Iran’s Nuclear Program

Stuxnet’s impact on Iran’s nuclear program was significant but not immediately catastrophic. By 2009, Iran had installed over 7,000 centrifuges at Natanz, but Stuxnet caused approximately 1,000 of these to fail. The disruptions forced Iran to temporarily halt its enrichment activities and replace the damaged equipment, delaying its nuclear ambitions by several months to years.

The Iranian government, initially oblivious to the cause of the centrifuge failures, eventually recognised the cyber intrusion. Publicly, Iran downplayed the impact of Stuxnet, but internally, it spurred significant investment in cybersecurity measures and the development of offensive cyber capabilities.

Over the following years, targeted assassinations of key Iranian nuclear scientists further crippled their program. Car bombings and other attacks eliminated many of the leaders involved, including the director of the Natanz facility.

Stuxnet: Global Fallout

Stuxnet did not confine itself to Iran. It spread to other countries, including India, Indonesia, and Pakistan, affecting industrial systems worldwide. In India, several critical infrastructure facilities,  reportedly infecting as many as 80,000 computers. Several power plants and manufacturing units were also found to be vulnerable to similar attacks.

In 2013, India adopted the National Cyber Security Policy which focused on “protection of information infrastructure and preservation of the confidentiality, integrity and availability of information in cyberspace”. The following year, the Centre announced the formation of the National Critical Information Infrastructure Protection Centre to further safeguard India’s cyber security space. 
 

Waiting for response to load…



Source link

]]>
Indigenous Women Fight To Search 1950s CIA-Funded Human Experiments Site https://artifex.news/indigenous-women-fight-to-search-1950s-cia-funded-human-experiments-site-6457357/ Sat, 31 Aug 2024 03:06:42 +0000 https://artifex.news/indigenous-women-fight-to-search-1950s-cia-funded-human-experiments-site-6457357/ Read More “Indigenous Women Fight To Search 1950s CIA-Funded Human Experiments Site” »

]]>

Between 1831 and 1996, some 150,000 Indigenous children were taken from their homes.

Montreal:

A group of Indigenous women are hoping to stop the bulldozers at a former Montreal hospital which they believe could hold the truth about children still missing from a grisly half-century-old CIA experiment.

They have spent the last two years trying to delay the construction project by McGill University and the Quebec government.

“They took our children and had all kinds of things done to them. They were experimenting on them,” said Kahentinetha, an 85-year-old activist from the Mohawk community of Kahnawake, southwest of Montreal, who goes by just one name.

The activists are relying on archives and testimonies that suggest the site contains unmarked graves of children formerly interned at the Royal Victoria Hospital and Allan Memorial Institute, a neighbouring psychiatric hospital.

In the 1950s and 1960s, behind the austere walls of the old psychiatric institute, the US Central Intelligence Agency funded a human experiments program called MK Ultra.

During the Cold War, the program aimed to develop procedures and drugs to effectively brainwash people.

Experiments were conducted in Britain, Canada and the United States, subjecting people — including Indigenous children in Montreal — to electroshocks, hallucinogenic drugs, and sensory deprivation.

“They wanted to erase us,” said Kahentinetha.

A leading figure in the Indigenous rights movement who has travelled to Britain and the United States to denounce colonialism, she called this fight “the most important of (her) life.”

“We want to know why they did this and who’s going to take the blame for it,” she said.

Sniffer dogs

In the fall of 2022, the mothers obtained an injunction to suspend work on a new university campus and research centre at the site — a project worth Can$870 million (US$643 million).

Fellow activist Kwetiio, 52, who also uses just one name, said they insisted on arguing the case themselves without lawyers, “because in our ways, no one speaks for us.”

Last summer, sniffer dogs and specialized probes were brought in to search the property’s expansive and dilapidated buildings. They managed to identify three areas of interest for excavations.

But, according to McGill and the government’s Societe Quebecoise des Infrastructure (SQI), “no human remains have been discovered.”

The Mohawk mothers accuse the university and the government infrastructure agency of breaching an agreement by selecting the archaeologists who did the search and then ending their work too soon.

“They gave themselves the power to lead the investigation of crimes that were potentially committed by their own employees in the past,” says Philippe Blouin, an anthropologist working with the mothers.

Even though their appeal was dismissed earlier this month, they have vowed to continue their fight.

“People should know history, so that it does not repeat itself,” said Kwetiio.

In recent years, Canada has opened its eyes to past atrocities.

Generations of Indigenous children were sent to residential schools where they were stripped of their language, culture and identities in what a 2015 truth and reconciliation report said amounted to “cultural genocide.”

Between 1831 and 1996, some 150,000 Indigenous children were taken from their homes and placed in 139 such schools. Several thousand never returned to their communities.

In May 2021, the discovery of unmarked graves of 215 children at the Kamloops Indian Residential School in British Columbia started a national reflection on this dark chapter of Canadian history, while sparking searches for more graves across Canada.

“It was not only residential schools, it involved hospitals, sanatoriums, churches and orphanages too,” said Kwetiio.

For her, what is most important is shedding light on what happened in order for “things to change,” and to recreate “the harmony that we had before colonialism.”

 

(Except for the headline, this story has not been edited by NDTV staff and is published from a syndicated feed.)

Waiting for response to load…



Source link

]]>