Stuxnet virus was created as a strategic plan to end and disable the Iranian nuclear plant that was called Busheur. It is alleged that the virus was created and spread by the governments of Israel and United States of America (Nakashima, Ellen, Greg Miller, and Julie Tate, 1). Systems that might have assisted to quickly build an Iranian nuclear bomb were effectively damaged and crippled by the nasty software. Stuxnet was first discovered in July 2010 when approximately 60% of infections were reported from Iran (Etalle, 3). While the United States and Israel did lead an aggressive international political campaign to get Iran to halt its ...view middle of the document...
According to the perspective of many technology observers and national security, the emergence of this worm is a risk that threatens or causes harms many activities that are deemed critical to the functioning of the modern society.
According to the perspective of many technology observers and national security, the emergence of this worm is a risk that threatens or causes harms many activities that are deemed critical to the functioning of the modern society (Theohary, Rollins & Paul, 1). The virus did not affect the functioning of a windows computer performance because it was designed to affect some specific models of programmable logic controllers. Some of the targeted computers were those that were made by Siemens and used in many automated systems like chemical plants, nuclear power plants, refineries and many others. If the computer that has been infected by the virus did not have a PLC software then the software did not have any effect. However if the target software was available, it would infect it. The virus also managed to access the PLCs and changed bits of some data on it. It was not easy to detect any changes in the PLCS because most of the end users did not understand the programming bit of the devices (Etalle, 10).The analysis of the virus indicated that it was very much specific in its operations which lead to the suggestion that it was specifically programmed and formulated to affect PLCs that were located in specific regions. This fact further explains that the developers had a target group (Etalle, 10).
Once the virus gained control with the Siemens PLC software, it compromised the frequency converters that the PLCs controlled. The converters regulated the speed of the motors through the alteration of the feed power.
Although the Iranian government denied that the worm had advance effects on its nuclear program, a nuclear inspectors report suggested that the reactors were not operational for about one week in November, 2010 (Theohary, Rollins & Paul, 1). This indicates that indeed the virus had great effects. There was a decrease in the operational centrifuges between 2009 and 2010 in Natanz. This is also attributed to the effects that were caused by Stuxnet virus. The government of Iran denied any damages to its developed nuclear program. However the results on the ground suggests otherwise. The pleading query is whether or not virus attack trespassed privacy and integrity.
Tehran had previously accused of its involvement in high level possession and enrichment in uranium that is supposedly utilized to create nuclear bombs. However these were mere speculation since there was no concrete evidence that was directed to making that conclusion. Due to this fact this attack is and should be considered as infringement of integrity through disabling of nuclear power plants and therefore disabling all the operations of other industries related to nuclear production in the country (chad, 2). Disabling the operations of...