lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <CAH8yC8=tb6EOoi+06qPEU8QiLcWYRUN+BYrjZxb_sOhiNk6MQg@mail.gmail.com>
Date: Mon, 4 Jun 2012 14:52:51 -0400
From: Jeffrey Walton <noloader@...il.com>
To: FunSec List <funsec@...uxbox.org>, 
	Full Disclosure <full-disclosure@...ts.grok.org.uk>
Subject: Obama Order Sped Up Wave of Cyberattacks Against
	Iran

https://www.nytimes.com/2012/06/01/world/middleeast/obama-ordered-wave-of-cyberattacks-against-iran.html

WASHINGTON — From his first months in office, President Obama secretly
ordered increasingly sophisticated attacks on the computer systems
that run Iran’s main nuclear enrichment facilities, significantly
expanding America’s first sustained use of cyberweapons, according to
participants in the program.
Hasan Sarbakhshian/Associated Press

Mr. Obama decided to accelerate the attacks — begun in the Bush
administration and code-named Olympic Games — even after an element of
the program accidentally became public in the summer of 2010 because
of a programming error that allowed it to escape Iran’s Natanz plant
and sent it around the world on the Internet. Computer security
experts who began studying the worm, which had been developed by the
United States and Israel, gave it a name: Stuxnet.

At a tense meeting in the White House Situation Room within days of
the worm’s “escape,” Mr. Obama, Vice President Joseph R. Biden Jr. and
the director of the Central Intelligence Agency at the time, Leon E.
Panetta, considered whether America’s most ambitious attempt to slow
the progress of Iran’s nuclear efforts had been fatally compromised.
...

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ