This page has been archived and commenting is disabled.
Cyberwarfare Threat To Nuclear, Banking and Financial System
Cyberwarfare Threat To Nuclear, Banking and Financial System
- Legacy of stuxnet is risk posed to technology dependent world
- 20 countries have launched cyberwarfare programmes since exposure of Stuxnet in 2010
- Stuxnet virus targeted safety mechanisms in Iran’s nuclear reactors in 2010
- Virus launched to sabotage Iran’s nuclear program was also used for mass spying
- All types of digital systems at risk, including financial, banking and gold providers
- Direct ownership of physical gold, unlike digital currency, not vulnerable to cyber warfare
A new book detailing the development, operation and ramifications of the deployment of the notorious Stuxnet virus shows that it has created a far more risky world.
The book, Countdown to Zero Day, by Wired magazine writer Kim Zetter, shows that – apart from being an extremely irresponsible and dangerous act of sabotage – the deployment of Stuxnet against Iran has led to an acceleration in development of cyberwarfare.
In a must-read article in the Irish Times, respected technology journalist, Karlin Lillington reviews the book which presents some fascinating insights into the whole Stuxnet affair which she describes as “the world’s first digital weapon”.
Most unnerving is the fact that twenty different countries have announced digital warfare programmes since the exposure of Stuxnet in 2010.
The U.S. had been demanding that other countries refrain from engaging in cyber warfare techniques until it emerged that the U.S. itself, along with Israel, had deployed the extremely destructive virus against Iran. The NSA had been authorised to launch Computer Network Attacks (CNA’s) for over a decade.
Zetter’s book gives a fascinating insight into how the virus operates. It was launched via a USB key rather than via the internet. The developers had identified glitches in Microsoft’s operating systems which were not publicly known and used these flaws against their target.
The virus secretly collected data on the operation of centrifuges in nuclear reactors for thirty days. Then it began interfering with the operation of the centrifuges in such a way that it would damage the reactors while reporting back the data of the previous thirty days so that engineers could not identify any problem.

Normally, Iranian engineers would need to decommission around 800 centrifuges in a year. Stuxnet caused such havoc that they were forced to change 2000 in a two month period.
The virus then spread rapidly into the systems of contractors working in the power stations who unwittingly infected systems all around the world. In all, over 100,000 computers were infected which Zetter says laid the groundwork for a mass espionage program.
Lillington writes
“Zetter says the attackers also failed to eventually kill the code and stop log files in Stuxnet from communicating back to the command and control server, even after it was apparent the worm had spread beyond Iran. She argues this was to keep the backdoors into millions of computers globally that were obtained in this way, which would form the basis for subsequent mass surveillance programmes.”
Zetter believes that the launch of Stuxnet by the U.S. and Israel was particularly foolish because its
“development also meant the US lost moral ground for demanding other countries not use cyberwarfare techniques … And, inevitably, it launched many more digital warfare programmes across the world.”
She warns that it
“ignores the fact that our systems are just as vulnerable, because U.S. systems are the most connected systems in the world.”
Indeed, our modern western financial and banking system with its massive dependency on single interface websites, servers and the internet faces serious risks that few analysts have yet to appreciate and evaluate.
We previously referred to Russian Prime Minister Medvedev’s allusion to cyber warfare when he stated the Russia’s response to U.S. attempts to have it locked out of the SWIFT system that the Russian response “economically and otherwise – will know no limits.”
Dormant malware, apparently of Russian origin had previously been discovered buried in the software that runs the Nasdaq stock exchange according to Bloomberg.
Given that a military confrontation is not desired by Russia it is likely that cyber-warfare will be part of Russian arsenal in any confrontation with the U.S. and NATO countries.
Hacking is becoming more common and recent months have seen the hacking of Sony Pictures, allegedly by North Korea, and the hacking of Instagram, Tinder and Facebook.
Banks have been hacked, stock exchanges have been hacked and critical infrastructure, including nuclear have been hacked in recent years. It is likely that many of these small scale attacks have been merely testing of defenses.
Even one of the largest and most powerful banks in the world, JP Morgan has been hacked.
Exactly a year ago, in June 2014, JP Morgan Chase were hacked by unknown parties who stole the personal details of 83 million customers.
A concerted attack on the western financial system would likely include attempts at disabling various exchanges including stock markets and foreign exchange markets. Banks could be attacked in such a way that bank balances, which are merely digital figures, could be erased.
Should banks be hacked and customers deposit accounts compromised then the vista of potential bail ins becomes a real one.
The vulnerability of investment providers, banks and the global banking system – reliant as they have become on single interface websites, servers, computer systems, information technology and the internet – is very slowly being realised.
Academic and independent research and indeed the modern and historical record shows how physical gold is a safe haven asset – provided you have direct ownership of coins and bars and are not dependent on single websites and technology.
An allocation of some of one’s portfolio to physical gold is insurance against technological and systemic risks posed to all virtual wealth today – whether that be digital bitcoin and gold or electronic currencies in deposit accounts.
These risks have never been seen before and are largely unappreciated and ignored by brokers, financial advisors, bankers and the majority of people.
Having all your eggs in a deposit account or with one single investment, or indeed gold broker or storage provider, is no longer prudent.
Must Read Guide: 7 Key Gold Must Haves
- GoldCore's blog
- 10691 reads
- Printer-friendly version
- Send to friend
- advertisements -




A "False Flag" Cyberattack would be far more difficult to detect than Freefalling Buildings, no? Does Anyone really believe that tiny assbackwards North Korea, with about 1,100 IP's for the Entire nation, hacked Sony? Can I cite any evidence though? Nope!
what happened to hardwired software code. i know they use it in some military applications. i dont know why they still store sensitive information on eraseable hard drives?
... er ... the centrifuges are separating the good stuff from the dull stuff and are far away from a reactor in the fuel cycle. For a lot of reasons (starting with the law) almost all reactors are immune from cyber attacks.
- Ned
Right. I think that they wrote this a tad clumsily. I think that, In this case, when they wrote "reactors", they did not mean tanks of water with fuel rods sitting in them, generating heat. They meant centrifuges. Lots of things are reactors. Cylinders in an automobile engine are chemical reactors. Beer fermenters are biological reactors. Centrifuges are physical reactors.
Reminds me of a forgotten time.
https://en.wikipedia.org/wiki/Kill_Switch_%28The_X-Files%29
The rabbit hole goes quite deep:
http://truthsector.net/2015/04/14/japans-311-in-miyagi-and-fukushima-whe...
That took a lot of work.
What's that you say, CRIMINALS, not so smart?...I knew it!...Just a matter of time!
leave my computer alone CRIMINALS!!
In a cocaine-induced manic fit of imagined invincibility, sociopathic global bankers decide to fund the creation of a virus that ends up making banking too dangerous for 7 billion people. So 7 billion resort to using paper money, coin, and barter, just like before the global bankers. Mother Nature wins again.
One nice thing about "believing" that your god is all-powerful and is in no way connected to the Universe or your Planet is that such a belief allows you to steal all you like from the Commons, by damaging Mother Nature. When (not if) you succeed in stealing so much that Mother Nature can no longer feed you, then your god can, in the blink of an eye, undo all that damage.
What a "belief system"! (I choose to follow whatever "belief" allows me to steal the most.)
Since so many Californians (including immigrants) "believe", perhaps they will start holding mass public prayers for an all-powerful god to bring them more water. And, of course, since there are not 3 million, but 39 million, of them, an all-powerful god might be able to hear them better, and might care more about rescuing them.
Similarly, since the bankers who funded Stuxnet also "believe", perhaps they will start holding prayers, and an all-powerful god will put Planet Earth on his Daytimer, zip over here, and undo their Stuxnet; and their 7 billion customers will return.
(Of course, I wouldn't expect bankers to hold MASS PUBLIC prayers. Not with 7 billion customers furious with them. Bankers aren't that kind of people. But maybe bankers could get some of their many eager politicians to organize mass public prayers. In fact, why not start organizing such prayers TODAY! :-)
In fact, somebody should work toward that goal.
(Steal Jamie Dimon's money first)