Stuxnet was 'good idea': former CIA chief

Mar 02, 2012
An Iranian security man stands next to journalists outside the reactor building at the Russian-built Bushehr nuclear power plant in southern Iran in 2010. The Stuxnet computer virus sabotage of Iran's nuclear program was a "good idea" but it lent legitimacy to the use of malicious software as a weapon, according to a former CIA director.

The Stuxnet computer virus sabotage of Iran's nuclear program was a "good idea" but it lent legitimacy to the use of malicious software as a weapon, according to a former CIA director.

"We have entered into a new phase of conflict in which we use a to create physical destruction," retired general Michael Hayden said in an interview with the CBS television show "60 Minutes" to be aired on Sunday.

"This was a good idea, alright?" Hayden said of Stuxnet in excerpts from the interview released by CBS.

"But I also admit this was a big idea, too," he said. "The rest of the world is looking at this and saying 'Clearly, someone has legitimated this kind of activity as acceptable.'

"There are those out there who can take a look at this... and maybe even attempt to turn it to their own purposes," he said.

Hayden served as director of the from 2006 to early 2009. He headed the top secret from 1999 to 2005.

Hayden was no longer CIA director when the Stuxnet attack occurred and CBS said he denied in the interview knowing who was behind it.

Suspicion has fallen on Israel and the United States, which have accused Iran of seeking to develop a weapons capability under the cover of a civilian nuclear drive. Tehran denies the charges.

Sean McGurk, a former cybersecurity official in the , expressed concern that Stuxnet could be redirected by terrorists or a rogue country against power, water or even in the United States.

"You can download the actual source code of Stuxnet now and you can repackage it... point it back to wherever it came from," McGurk told 60 Minutes.

McGurk, the former head of the Department of Homeland Security's National Cybersecurity and Communications Integration Center, said he would have advised against the use of such a weapon.

"They opened the box," he said. "They demonstrated the capability... it's not something that can be put back."

Stuxnet, which was detected in July 2010, targeted computer control systems made by German industrial giant Siemens and commonly used to manage water supplies, oil rigs, power plants and other critical infrastructure.

Most Stuxnet infections were discovered in Iran, giving rise to speculation it was intended to sabotage nuclear facilities there, especially the Russian-built atomic power plant in the southern city of Bushehr.

According to computer security firm Symantec, Stuxnet may have been specifically designed to disrupt the motors that power gas centrifuges used to enrich uranium.

Explore further: Twitter blocks two accounts on its Turkish network

add to favorites email to friend print save as pdf

Related Stories

Symantec warns of new Stuxnet-like virus

Oct 19, 2011

US security firm Symantec has warned of a new computer virus similar to the malicious Stuxnet worm believed to have preyed on Iran's nuclear program.

Computer expert says US behind Stuxnet worm

Mar 03, 2011

A German computer security expert said Thursday he believes the United States and Israel's Mossad unleashed the malicious Stuxnet worm on Iran's nuclear program.

Iran says Duqu malware under 'control'

Nov 13, 2011

Iran said on Sunday it had found a way to "control" the computer malware Duqu, which is similar to Stuxnet virus which in 2010 attacked its nuclear programme and infected more than 30,000 computers.

No apparent Stuxnet impact in US: cyber official

Dec 07, 2010

Computer software targeted by Stuxnet is used in US infrastructure but the virus does not appear to have affected any systems in the United States, a US cybersecurity official said Tuesday.

Recommended for you

LinkedIn membership hits 300 million

Apr 18, 2014

The career-focused social network LinkedIn announced Friday it has 300 million members, with more than half the total outside the United States.

Researchers uncover likely creator of Bitcoin

Apr 18, 2014

The primary author of the celebrated Bitcoin paper, and therefore probable creator of Bitcoin, is most likely Nick Szabo, a blogger and former George Washington University law professor, according to students ...

White House updating online privacy policy

Apr 18, 2014

A new Obama administration privacy policy out Friday explains how the government will gather the user data of online visitors to WhiteHouse.gov, mobile apps and social media sites. It also clarifies that ...

User comments : 1

Adjust slider to filter visible comments by rank

Display comments: newest first

OldBlackCrow
5 / 5 (2) Mar 03, 2012
So, if this is now acceptable ... without Congress declaring war, then we have certainly crossed the line from "defenders of the Constitution " to terrorists. Oh, never mind, we crossed that line ages ago... this is just a new front.

More news stories

TCS, Mitsubishi to create new Japan IT services firm

India's biggest outsourcing firm Tata Consultancy Services (TCS) and Japan's Mitsubishi Corp said Monday they are teaming up to create a Japanese software services provider with annual revenues of $600 million.

Finnish inventor rethinks design of the axe

(Phys.org) —Finnish inventor Heikki Kärnä is the man behind the Vipukirves Leveraxe, which is a precision tool for splitting firewood. He designed the tool to make the job easier and more efficient, with ...

Atom probe assisted dating of oldest piece of earth

(Phys.org) —It's a scientific axiom: big claims require extra-solid evidence. So there were skeptics in 2001 when University of Wisconsin-Madison geoscience professor John Valley dated an ancient crystal ...