The turning of the worm 125
In a DebkaFile report on the unlikely yet apparently thriving Saudi-Israeli co-operation in the face of the Iranian threat, a clue may be found as to just who is directing operations againt Iran’s nuclear program, and most probably sent it the Stuxnet worm:
Riyadh has signaled its intention for the secret Saudi-Israeli meetings on Iran taking place for more than a year to continue after the changing of the guard at the Mossad… This was one of the first messages Tamir Pardo found on his desk as head of Israel’s external spy agency when he took over from Meir Dagan this week. The Saudis were clearly not put off by any possible awkwardness from the WikiLeaks disclosure that they had been pressing the US to attack Iran’s nuclear sites before it developed a weapon.
The meetings between Saudi General Intelligence Director Prince Muqrin bin Abdaziz and Meir Dagan, most of which were held in the Jordanian capital Amman, dealt extensively with clandestine cooperation between the two agencies and plans for attacking Iran. Arab and Western sources reported that they reached agreement in the course of the year for Israeli fighter-bombers to transit Saudi air space on their way to bombing Iran’s nuclear facilities. The Saudis were even willing to build a new landing strip in the desert with refueling facilities for the use of the warplanes en route to their mission.
Western intelligence experts on Saudi Arabia found special significance in the publication by the Saudi Arab News site of Monday, Nov. 29 of a long report on Meir Dagan and his retirement after eight years as head of Israel’s external espionage agency. The Saudi official media never, ever report on Israeli military or intelligence affairs. …
Still more out of character was the tone of the Arab News report [which admiringly describes] the outgoing Mossad chief … as … “widely seen as responsible for a wave of covert actions including the sabotage of Iranian nuclear projects.”
Western sources found a connection between this comment and the attack 24 hours earlier in the heart of Tehran on two senior Iranian nuclear scientists, killing Prof. Majid Shahriari on the spot and leaving Prof. Feredoun Abbassi-Davani critically injured. …
Pardo’s job is termed “at the heart of Israel’s secret war against Iran.”…
The WikiLeaks disclosure, which also showed the Obama administration rejecting the Gulf Arab rulers’ demand for military action against Iran, may even have spurred the Saudis to insist on carrying on with their backdoor meetings with Israel so as to underline their abiding conviction that Iran’s nuclear program must be wiped out.
And we understand that Meir Dagan did not bow to King Abdullah. In a manner of speaking, the obeisance is being paid the other way about.
Great is the worm, and its ineffable creator 18
Many of our readers are as fascinated by the Stuxnet worm as we are, and as happy that it is sabotaging Iran’s nuclear program.
For those who would like to know more about what it does and how it does it, Ed Barnes at Fox News goes into some detail. Here are quotations from his report:
The target was seemingly impenetrable; for security reasons, it lay several stories underground and was not connected to the World Wide Web. And that meant Stuxnet had to act as sort of a computer cruise missile: As it made its passage through a set of unconnected computers, it had to grow and adapt to security measures and other changes until it reached one that could bring it into the nuclear facility.
When it ultimately found its target, it would have to secretly manipulate it until it was so compromised it ceased normal functions.
Barnes explains more about how it works, and comes to this:
Masking itself from the plant’s security and other systems, the worm then ordered the centrifuges to rotate extremely fast, and then to slow down precipitously. This damaged the converter, the centrifuges and the bearings, and it corrupted the uranium in the tubes. It also left Iranian nuclear engineers wondering what was wrong, as computer checks showed no malfunctions in the operating system.
Time passed, the Iranian nuclear engineers and computer experts continued to be baffled, and the worm grew stronger and stronger, proliferated, and became ever more effective.
Estimates are that this went on for more than a year, leaving the Iranian program in chaos. And as it did, the worm grew and adapted throughout the system. As new worms entered the system, they would meet and adapt and become increasingly sophisticated.
Servers were traced to two unexpected places:
During this time the worms reported back to two servers that had to be run by intelligence agencies, one in Denmark and one in Malaysia. The servers monitored the worms and were shut down once the worm had infiltrated Natanz. Efforts to find those servers since then have yielded no results.
This went on until June of last year, when a Belarusan company working on the Iranian power plant in Beshehr discovered it in one of its machines. It quickly put out a notice on a Web network monitored by computer security experts around the world. Ordinarily these experts would immediately begin tracing the worm and dissecting it, looking for clues about its origin and other details.
But that didn’t happen, because within minutes all the alert sites came under attack and were inoperative for 24 hours.
The Iranian technicians labor on in an atmosphere of dread, fearing for their very lives which have become “a living hell“.
As Iranians struggled with the setbacks, they began searching for signs of sabotage. From inside Iran there have been unconfirmed reports that the head of the plant was fired shortly after the worm wended its way into the system and began creating technical problems, and that some scientists who were suspected of espionage disappeared or were executed. And counter intelligence agents began monitoring all communications between scientists at the site, creating a climate of fear and paranoia.
Even harder to find, and perfectly invulnerable, is the nameless Mind that made the Worm and sent it to do its work.
All praise to it!