David Albright who gave BS evidence about Iraq Nuke: "Use Stuxnet on N Korea!"

Author Topic: David Albright who gave BS evidence about Iraq Nuke: "Use Stuxnet on N Korea!"  (Read 5604 times)

0 Members and 1 Guest are viewing this topic.

Offline Dig

  • All eyes are opened, or opening, to the rights of man.
  • Member
  • *****
  • Posts: 63,099
    • Git Ureself Edumacated
Neocons Should Use Stuxnet to Mess With North Korea’s New Uranium Plant
http://www.wired.com/dangerroom/2010/11/could-stuxnet-mess-with-north-koreas-new-uranium-plant/
By Kim Zetter and Spencer Ackerman  November 22, 2010  |  3:49 pm  |  Categories: Nukes
 
The Stuxnet worm may have a new target. While security analysts try to figure out whether the now-infamous malware was built to sabotage Iran’s nuclear program, North Korea has unveiled a new uranium enrichment plant that appears to share components with Iran’s facilities. Could Pyongyang’s centrifuges be vulnerable to Stuxnet? While U.S. officials are trying to figure out how to respond to North Korea’s unveiling of a new uranium enrichment plant, there are clues that a piece of malware believed to have hit Iran’s nuclear efforts could also target the centrifuges Pyongyang’s preparing to spin. Some of the equipment used by the North Koreans to control their centrifuges — necessary for turning uranium into nuclear-bomb-ready fuel — appear to have come from the same firms that outfitted the Iranian nuclear program, according to David Albright, the president of the Institute for Science and International Security and a long-time watcher of both nuclear programs. “The computer-control equipment North Korea got was the same Iran got,” Albright told Danger Room. Nearly two months before the Yongbyon revelation, Albright published a study covering the little that’s publicly known about the North’s longstanding and seemingly stalled efforts at enriching its own uranium. (.pdf) Citing unnamed European intelligence officials, Albright wrote that the North Korean control system “is dual use, also used by the petrochemical industry, but was the same as those acquired by Iran to run its centrifuges.” Albright doesn’t know for sure that the North Koreans’ control system is exactly like the one the Iranians use. Siegfried Hecker, the U.S. nuclear scientist invited by Pyongyang to view the Yongbyon facility, wasn’t allowed to check out the control room thoroughly, and his report about what he saw merely says that the control room is “ultra-modern,” decked out with flat-screen computer panels.  Nor is Albright to specify which company manufactured the control system — something that determines whether Stuxnet would have any potency. “But that’s really what the Stuxnet virus is taking over,” Albright says, “the control equipment, giving directions to the frequency converters.”



Who is this dweeb warmongering Nazi psycho from hell?



David Albright
http://en.wikipedia.org/wiki/David_Albright

David Albright, M.S., is the founder of the non-governmental Institute for Science and International Security (ISIS), its current president, and author of several books on proliferation of atomic weapons. Albright holds a Master of Science in physics from Indiana University and a M.Sc. in mathematics from Wright State University. He has taught physics at George Mason University in Virginia.

From 1990 to 2001, Albright was a member of the Colorado State Health Advisory Panel, participating in its assessment of the toxicological and radiological effects on the population near the Rocky Flats atomic weapons production site.

1992-97, David Albright was associated with the International Atomic Energy Agency's Action Team. In June 1996, he was invited to be the first non-governmental inspector of Iraq's nuclear program and questioned Iraqi officials about that country's uranium enrichment program.

In 2001 Albright prepared an analysis, for CNN, of documents found in an abandoned Al Qaeda safe house in Kabul believed to have been used by Abu Khabbab, who they described as "Osama bin Laden's top chemical and biological weapons commander."[1] Albright, confirmed the abandoned documents included plans for a nuclear bomb, and extensive training notes on the handling of radiological material.

In 2006 David Albright received the prestigious Joseph A. Burton Forum Award from the American Physical Society, a professional society of American physicists. He was cited “For his tireless and productive efforts to slow the transfer of nuclear weapons technology. He brings a unique combination of deep understanding, objectivity, and effectiveness to this vexed area.”[1]

A report by David Albright was quoted in a June 15, 2008 article in the Washington Post[2]. He stated in a leaked copy of a draft report (to be released in full the week of June 15, 2008) that a nuclear weapons smuggling ring—which sold bomb-related parts to Libya, North Korea, and Iran—possessed plans to an advanced nuclear device, compact enough to fit on a ballistic missile used by Iran and a dozen other developing countries. It was unknown if these plans had been shared with any regime; and the plans had recently been destroyed.[3]
All eyes are opened, or opening, to the rights of man. The general spread of the light of science has already laid open to every view the palpable truth, that the mass of mankind has not been born with saddles on their backs, nor a favored few booted and spurred, ready to ride them legitimately

Offline birther truther tenther

  • Member
  • *****
  • Posts: 2,727
  • Against all forms of tyranny
Stuxnet now admitted to be a preemptive superweapon in the Pentagon arsenal.

Offline Dig

  • All eyes are opened, or opening, to the rights of man.
  • Member
  • *****
  • Posts: 63,099
    • Git Ureself Edumacated
Stuxnet now admitted to be a preemptive superweapon in the Pentagon arsenal.

Looks like they are gearing up for an official "green light" due to monthly provoked BS on the NK border heating up again...

http://forum.prisonplanet.com/index.php?topic=193009.0



So now any country (and later "network", then "lone gunman") they wish to f**k with utilizing first strike cyber terror...they are just going to go forward. What totally pathetic cowardly scumbuckets...no congressional authority, nothing...they just feel like it.

Just a small step stone away from full IBM automated and unmanned sense and response insanity!
All eyes are opened, or opening, to the rights of man. The general spread of the light of science has already laid open to every view the palpable truth, that the mass of mankind has not been born with saddles on their backs, nor a favored few booted and spurred, ready to ride them legitimately

Offline EvadingGrid

  • Toxophillite
  • Global Moderator
  • Member
  • *****
  • Posts: 12,542
  • Rat Catcher
    • Mystery Babylon - MP3 Archive
Pre-emptive = We are the bad guys


We few, we happy few, we band of brothers; For he today that sheds his blood with me, Shall be my brother;

Global Gulag

Offline birther truther tenther

  • Member
  • *****
  • Posts: 2,727
  • Against all forms of tyranny
Pre-emptive = We are the bad guys

It is not "we" it is "they".

I don't work for the Pentagon, military-industrial complex, or the banksters.

Offline citizenx

  • Member
  • *****
  • Posts: 9,086
I don't think those idiots know for a fact that they have set back Iran's nuclear program one whit.

But then that might not have been the point. Merely instigating some fights?

Offline Satyagraha

  • Global Moderator
  • Member
  • *****
  • Posts: 8,149

Do nuclear centrifuges use Siemens' controllers? Did the North Koreans have to keep their default hard-coded passwords?
Stuxnet took advantage of Siemens' convenient easy-to-remember default password that their customers were forbidden to change.
What's the FIRST THING you do when you buy a product where it comes with a default password?
You change the password.
But not if you are a Siemens customer... if you change the password then your equipment (and Stuxnet) won't work.

"He that would make his own liberty secure must guard even his enemy from oppression; for if he violates this duty he establishes a precedent that will reach to himself."

~ Thomas Paine, A Dissertation on the First Principles of Government, 1795

Anti_Illuminati

  • Guest
http://defensesystems.com/articles/2010/11/17/digital-conflict-north-korean-cyberwarfare-capabilities.aspx

Is North Korea poised to revolutionize cyber warfare?

North Korea carries out brazen attack on adversary

    * By Kevin Coleman
    * Nov 15, 2010

A recent cyberattack on South Korean government websites that compromised classified documents shows the skill of the adversaries we face in the cyber realm. The event, allegedly carried out by the North Korean army’s elite hacker unit, went all but unnoticed by the vast majority of cyber stakeholders. It is one of several recent cyberattacks of importance attributed to North Korea.

Because of such incidents, our mental models need to change to include derivative events that influence or impact the cyber threat environment. Many intelligence analysts and military planners are attempting to force-fit the cyber domain into models developed for and used during the Cold War.

North Korea now appears to be fully connected to the Internet. That country is rated among the top 10 in cyber capabilities and among the top five in cyber ambitions. About 1,024 IP addresses reserved for North Korea are active, and social networking site feeds operate from locations outside the country on China’s national Internet.

In the incident being examined, Lee Jung-Hyun, South Korean lawmaker of the ruling Grand National Party, reported Oct. 14 to his country’s parliament that a "considerable volume of classified documents" were feared to have been leaked from the defense ministry and the foreign ministry. South Korean military leaders were quick to point to the North Korean army’s 700-strong elite hacker unit as the most likely suspect behind the incident.

Aging North Korean President Kim Jong Il, soon to be 70, has clearly indicated through a series of moves and announcements that he is grooming his youngest son, Kim Jong Un, to be his successor. In January, the Dong-a Ilbo, a South Korean newspaper, reported that the North was teaching its people a song lauding Kim Jong Un to raise his profile.

Kim Jong Un, 27, has been promoted to four-star general and has a senior position in the ruling Worker's Party. Little public information is known about his character. He attended boarding schools and is said to have received a college education in Switzerland. There are conflicting reports as to which institution of higher learning he attended. Some reports say Kim Jong Un attended the International School of Berne, while others indicate he attended the German-speaking Steinholzli Schule.  Kim Jong Un is tech-savvy, which would indicate he is computer literate and therefore possesses a cyber mindset. Growing up in the era of cell phones, iPods, computers and the Internet gives him a tech perspective that is not found in older nation-state leaders around the world.

Switzerland has one of the world’s top education systems and a fairly modern technology infrastructure, as does Germany. That fact is thought to have had a major influence on the mental model Kim Jong Un is following regarding cyber warfare. He would be one of the few global leaders to grow up during the intense technology era of the 1980s and 1990s. This gives him a good understanding of the fundamentals of information warfare and cyber warfare.

Recent research suggests that less than a dozen world leaders leverage the capabilities of social networking sites. Given Kim Jong Un’s age, you can bet he is aware of this technology and probably logged in to one or more of those sites using one of his many aliases. In contrast, it is highly unlikely that his father has ever been on a social networking site.

It is clear that the ruling party in Pyongyang intends to pursue hostilities on the modern battlefield with this and the next generation of leaders. Given Kim Jong Il has put effort, money and resources into IT attack capabilities, his successor will at least continue those efforts. Kim Jong Un's comfort level, general understanding and actual use of modern technology that leverages the Internet are much more current than his father's and, as such, could make the future leader of North Korea tend toward the development and use of cyberattacks as a means of political influence and power projection.