Our surveillance of Stuxnet starting 2009
in Iran in 2009, we were working with
Anonymous against Iran and had many
operations going on in Iran.
The year stuxnet deployed.
@Geraldanthro - the primary sabotage operations against
Project "Olympic Games"
Anonymous had an Iranian spy in its ranks
causing problems and ask us to ferret him
out, it was a rocky relationship, we turned
up two spys embedding text in jpgs.
We tracked their IPs and the IPs of anonymous
members they were trying to recruit.
The Anonymous Commodore was furious
said we exceeded our authority and fired us.
All data deleted to NSA standards.
We continued operations against Iran
independently. And we ran into Stuxnet
on some servers in 2009, of course
we didn't know that.
"Server in Iran compromised.
Who is launching the scan? Is it a random script kiddie
A sophisticated attacker may actually use some simple
And port 5900 (VNC) appears to be the main attack method.
Discovered Targets: 1867
First Reported: xx.xx.xx
Most Recent Report: xx.xx.xx
.It is a "Ministry of Jahad" server...."
It was and suspected
it was Anonymous an ally and didn't
interfere or even investigate the penetration
as we had our hands full with our own
operations, using around 100,000 BSU's.
Bot Surveillance Units. 06/2009.
And documented the discovery here.
The next month paradigm Intel and
BSUs indicated Iran was under cyber
attack from Israel.
And reported it.
Iran was so perplexed they fired top
nuclear scientist and knew their nuclear
PCs were in trouble, PC reported every thing
was OK, while centrifuges were spinning
out of control, self destructing. It got so bad
they had man with walkie-talkie setting watching
the centrifuges radioing just what he was seeing.
President Obama accelerated the "Olympic Games"
operation in Jan 2010, by deploying a more improved
President Obama Green Lighted the "Olympic Games"
project 5 months after taking office.
Launched downrange was Stuxnet ver. 1
Iran was accelerating nuclear operations,
Two month later the U.S. released an untested version
Pres. Bush 5 years "Olympic Games" zero known
Stuxnet (juiced up version Mar/Apr 2010) was
cyber attacks revealing the Green movements
The next year we flushed out the stuxnet paradigm.
Stuxnet 1.0 as of yet undiscovered, a recon program.
Stuxnet 2,0 the one that was discovered that we
all know and love. How it functions is Art.
RT @craiu: Microsoft's reaction to Flame shows
seriousness of 'Holy Grail' hack - http://bit.ly/KO4hkT
And stuxnet family, all by same group,
how they fit together.
And document our discoveries. 2010
Stuxnet 3,0 or flame as Kasperty calls it.
we discovered, documented and calculated
its capabilities, 2 yrs before Kaspersky did.
Stuxnet/flame puts USA in same position
Flame and Stuxnet were elements of a
OPSEC PREVENTS MORE.
Flame authors use old anti-forensic technique to destroy potential
How did anti-virus vendors miss identifying a 20 Mb
His book (@SangerNYT) also says that Stuxnet was
Kaspersky and Symantec are two years
research from two yrs ago.
How many @Microsoft zero-days will be discovered
RT @mikko: I'm afraid we've seen only the very
An extension of stuxnet paradigm is the
"Why a "kill date" of June 24, 2012, for
stuxnet?" date of attack on Iran? G
Internet Anthropologist Think Tank:
Smoking Gun, Stuxnet architect.
Our key to proof of Israel involvement:
Flame's Authenticode signature:
If stuxnet etal have penetrated so deep
and comprehensively in to Irans IT
network then to Russia and China
are also an open book.
Even we grossly underestimated US
cyber offensive capabilities so to
may the world be grossly underestimating US
Our index of our research into stuxnet
Tactical Internet Systems analyst.