Sunday, May 29, 2011

Hacking in the U.S.A

[ed.  Government definitions of cyber terrorism here:]

by Kim Zetter

If you want to see a top Pentagon official squirm, tune into CNBC’s cyberwar documentary Thursday night, and watch Deputy Defense Secretary William Lynn face an uncomfortably direct question about the Stuxnet worm.

In “CodeWars: America’s Cyber Threat,” correspondent Melissa Lee asks Lynn outright: “Was the U.S. involved in any way in the development of Stuxnet?”

Lynn’s response is long enough that an inattentive viewer might not notice that it doesn’t answer the question.

“The challenges of Stuxnet, as I said, what it shows you is the difficulty of any, any attribution and it’s something that we’re still looking at, it’s hard to get into any kind of comment on that until we’ve finished our examination,” Lynn replies.

“But sir, I’m not asking you if you think another country was involved,” Lee presses. “I’m asking you if the U.S. was involved. If the Department of Defense was involved.”

“And this is not something that we’re going to be able to answer at this point,” Lynn finally says.

The sophisticated Stuxnet worm was released on systems in Iran in June 2009 and again in March and April 2010, and was designed to specifically target programmable logic controllers used in industrial control systems made by Siemens. The worm was programmed to launch its attack only on Siemens systems that had a specific configuration — a configuration believed to exist at Iran’s Natanz plant, where weapons-grade uranium is being enriched.

Read more: