Instilling rigor and imagination in analysis Countering the Iranian Nuclear Threat Stuxnet and its Broader Implications Randolph H. Pherson Mary C. Boardman.

Slides:



Advertisements
Similar presentations
NERC Critical Infrastructure Protection Advisory Group (CIP AG) Electric Industry Initiatives Reducing Vulnerability To Terrorism.
Advertisements

Iran’s Nuclear Program: Status and Implications Olli Heinonen Belfer Center for Science and International Affairs Harvard Kennedy School 19 November, 2013.
By Hiranmayi Pai Neeraj Jain
 Today there are no formal diplomatic relations between Iran and The US  Do not exchange ambassadors -Iran maintains an interests section at the Pakistani.
Oh, I almost forgot, it packs a 150 to 170 kiloton nuclear punch It’s about the size of an office trash can Let’s start with a modern nuclear.
Stuxnet Richard Renner. James Bond virus Facts Earliest copy recovered from June KB in size First public knowledge July % of infected.
Week 7 Oct Virus in the news charges-firms-with-tech-support-scams phphttp://
PEOPLE’S REPUBLIC OF HACKING By: Lani N, Ashley R, Michael R, Gregory R.
Viruses,Hacking and Backups By Grace Mackay 8K Viruses Hacking and Hackers Backups.
CONTROL SYSTEMS AND CYBER SECURITY 2600 MEETING JUNE 6,2014 MICHAEL TOECKER Mikhail Turcher, big fanci pantsie.
HALDEBIQUE Geoffroy ROYER Johan  Crime motivated attacks  Hacktivism  Cyber Warfare.
Status of Iran’s Nuclear Program and Negotiations David Albright ISIS November 3, 2013 Nuclear Weapon Issues in the 21st Century Sponsored by the American.
Viruses and Malicious Code
Novel Information Attacks From “Carpet Bombings” to “Smart Bombs”
Stuxnet – Getting to the target Liam O Murchu Operations Manager, Symantec Security Response 1 Feb 2011.
Foreign Policy Proposal: Iranian Diplomacy Jenny Wang Tom McCauley.
CYBER CRIME AND SECURITY TRENDS
 Discovered in June/July 2010  Targeted Siemens software and equipment running Microsoft Windows  First malware for SCADA systems to spy and subvert.
IRAN: NUCLEAR PROGRAM SAKI AMAGAI AND KYORY PARK.
Copyright © 2014 Pearson Education, Inc. 1 IS Security is a critical aspect of managing in the digital world Chapter 10 - Securing Information Systems.
Nuclear Weapons By: Adebayo Amusu Foreign Policy.
The 21 st Century Begins Present Chapter 32.
How Stuxnet changed the landscape for plant engineers Richard Trout, Director for Client Solutions, Trout I.T.
A sophisticated Malware Arpit Singh CPSC 420
By: Sharad Sharma, Somya Verma, and Taranjit Pabla.
Isdefe ISXXXX XX Your best ally Panel: Future scenarios for European critical infrastructures protection Carlos Martí Sempere. Essen.
Jonathan Baulch  A worm that spreads via USB drives  Exploits a previously unknown vulnerability in Windows  Trojan backdoor that looks for a specific.
Iran Iran so far away…. Iran used to be Persia Until 1935 Became an Islamic Republic in 1979.
WEBSENSE ® SECURITY LABS™ 2006 Semi-Annual Web Security Trends Report OWASP Presentation November 9, 2006 Jim Young (301)
What is a virus??????? A virus is an of some sort sent to you that will usually shut down or corrupt your computer. It will then send the virus.
SECURITY IN NATIONAL NUCLEAR DEVELOPMENT S.M. Anwaruddin Beloit College, Beloit, WI Abstract One of the most complicated issues in the current international.
Information Warfare Playgrounds to Battlegrounds.
Force Protection. What is Force Protection? Force protection (FP) is a term used by the US military to describe preventive measures taken to mitigate.
MALWARE : STUXNET CPSC 420 : COMPUTER SECURITY PRINCIPLES Somya Verma Sharad Sharma Somya Verma Sharad Sharma.
The Impact of Sanctions on Iran By Vinayak Ganeshan and Matt Nguyen Research Staff.
Lessons from Stuxnet Matthew McNeill. Quick Overview Discovered in July 2011 Sophisticated worm - many zero-day exploits, Siemens programmable logic controller.
Briefing on Iranian Nuclear Weapons Program. Background Marine Gen.Anthony Zinni, the former U.S. Central Commander, predicted in 2000 that Iran was anywhere.
Nuclear Weapons Number of operational warheads in the U.S. nuclear stockpile, according to the Pentagon. The figure is down from a peak of 31,225.
Nuclear Energy and Nuclear Proliferation of Iran.
AGENDA NCSIP Mandate IT Security Threats Specific Action Items Additional Initiatives.
© 2015 albert-learning.com Iran’s Nuclear Program IRAN’S NUCLEAR PROGRAM.
Information Warfare Playgrounds to Battlegrounds.
Iran.
Homeland Security, First Edition © 2012 Pearson Education, Inc. All rights reserved. Intelligence and Counterintelligence and Terrorism CHAPTER 8.
Flame: Modern Warfare Matthew Stratton. What is Flame? How it was found What are its capabilities How it is similar to Stuxnet and Duqu Implications.
Nuclear weapons Presented by Alex, Maggy and Jonas.
Computer Policy and Security Report to Faculty Council Jeanne Smythe ATN Director for Computing Policy March 26,2004.
BACKGROUND ON ATOMIC WEAPONRY. WHAT IS AN ATOM BOMB? “A general name given to any weapon in which the explosion results from the energy released by a.
Information Systems Design and Development Security Risks Computing Science.
NEXT GENERATION ATTACKS & EXPLOIT MITIGATIONS TECHNIQUES ID No: 1071 Name: Karthik GK ID: College: Sathyabama university.
BY: AUSTIN NEIGH. WHAT IS CYBER WARFARE? Hacking that is politically motivated to conduct sabotage or espionage Form of information warfare Typically.
Travis Deyarmin. In This Presentation  What is Stuxnet  What is Flame  Compare/Contrast  Who is Responsible  Possible Repercussions.
How a presumably military grade malware sabotaged the Iranian nuclear program W32.Stuxnet Presenter: Dolev Farhi |
By: Taysha Johnson. What is an insider threat? 1.A current or former employee, contractor, or other business partner who has or had authorized access.
Iran has rejected a proposal to have much of its low-enriched uranium converted into fuel abroad and has suggested an alternative. Countries want Iran.
GOVT Module 16 Defense Policy.
W32.Stuxnet How a presumably military grade malware sabotaged the Iranian nuclear program Presenter: Dolev Farhi |
Stuxnet By Shane Serafin.
Cybersecurity Case Study STUXNET worm
Intensive Production – Assessment 1
CIS 560 Innovative Education-- snaptutorial.com
CIS 560 Possible Is Everything/snaptutorial.com
CIS 560Competitive Success/tutorialrank.com
CIS 560 Education for Service-- tutorialrank.com.
Propagation, behavior, and countermeasures
Object Oriented Programming and Software Engineering CIS016-2
NERC Critical Infrastructure Protection Advisory Group (CIP AG)
PGE Chris Nolke, Director of Cybersecurity
By Arisara Sangsopapun
Deterrence Below The Weapons Threshold Cristina Varriale
Presentation transcript:

Instilling rigor and imagination in analysis Countering the Iranian Nuclear Threat Stuxnet and its Broader Implications Randolph H. Pherson Mary C. Boardman

Background International Atomic Energy Agency (IAEA) reports every three months on Iranian nuclear program. It focuses on: Fifteen nuclear facilities Nine outside facilities using nuclear material A November 2011 report claimed computer modeling relevant to constructing a nuclear weapon was found. Iranian Foreign Minister Akbar Salehi, claimed the report was baseless and fabricated. It was seen as an indicator of nuclear weapons development. Copyright 2012 Pherson Associates, LLC. All Rights Reserved. 2

Background, cont’d The Iranian government claims the nuclear program is for peaceful purposes only; however: Iran announced the move of some uranium enrichment facilities to an underground bunker near the city of Qom, in June It will triple the amount of medium-enriched uranium for production, an important step to production of weapons-grade uranium. Most analysts: Believe Iran will have enough nuclear raw material for 2-3 nuclear weapons. Estimate Iran can build a nuclear weapon in 1-3 years. Copyright 2012 Pherson Associates, LLC. All Rights Reserved. 3

The Stuxnet Virus First discovered in July 2010 by Belarus-based security in computers belonging to an Iranian client. Initially, it was thought Stuxnet was designed to steal nuclear secrets, instead it was designed to target a specific location in the code for a Programmable Logic Controller (PLC). It allowed attackers to change settings for critical factory operations, eventually causing failure. It is the first computer virus or worm known to have targeted industrial systems. It directed an attack on PLC controllers used at Bushehr and Natanz uranium enrichment facilities. Copyright 2012 Pherson Associates, LLC. All Rights Reserved. 4

Figure 1. Aerial View of Natanz Uranium Enrichment Facility Copyright 2012 Pherson Associates, LLC. All Rights Reserved. 5

How the Stuxnet Virus Works Stuxnet contained a double digital warhead, simultaneously deployed in a single worm. o One was designed to cripple turbines at Bushehr nuclear reactor, the other to destroy nuclear centrifuges at Natanz. o The first wave of Stuxnet launched on 22 June 2009, although it took months to discover and longer to determine cause. Stuxnet secretly recorded normal operations before initiating attack, then played recordings back to maintain the appearance of normality during attack. Stuxnet recorded information on the location and type of each computer infected to track progress and determine success. Copyright 2012 Pherson Associates, LLC. All Rights Reserved. 6

The Stuxnet Virus Effects The virus reversed uranium enrichment at Natanz. There were 12,000 identified infections traced back to five infection points, linked to specific industrial organizations in Iran. Iran hit hard, perpetrator most likely nation state. United States and Israel suspected as most likely perpetrators. Both had motives and capability to launch attack. Copyright 2012 Pherson Associates, LLC. All Rights Reserved. 7

Implications Meir Dagan, retiring Mossad chief, told Knesset in January 2011 that Iran had technical difficulties in its nuclear program. Could prevent Iran from building a nuclear bomb until Approximately 1,000 centrifuges had to be replaced at Natanz between late 2009 and early Less than 6,000 of 9,000 centrifuges were operational in late Copyright 2012 Pherson Associates, LLC. All Rights Reserved. 8

Figure 2. President Ahmadinejad Tours Natanz Copyright 2012 Pherson Associates, LLC. All Rights Reserved. 9

Implications Stuxnet worm was open source, anyone can customize and launch the virus. PLC security was low, not seen as potential target. The Stuxnet attack alerted industrial control specialists that attacks could continue. Challenge is ensuring future industrial control system software is not vulnerable to another Stuxnet Virus or a more sophisticated worm. Likely to require a complete reassessment of security systems and processes, including federal technology standards and nuclear regulations. Copyright 2012 Pherson Associates, LLC. All Rights Reserved. 10

Implications Stuxnet code could be reconfigured as a dirty digital bomb to infect software programs used in military weapons systems. The computer virus infected the cockpits of America’s Predator and Reaper drones reported in October o Iran may have launched the virus in retaliation for Stuxnet attack. o Virus was thought to be logging virtual pilots’ keystrokes at Creech Air Force Base in Nevada as they remotely flew Predator and Reaper missions over Afghanistan and other warzones. o If true, perpetrators may be able to redirect drones and weapons. Later reported as a nuisance “credentials stealer” and not a “keylogger.” Copyright 2012 Pherson Associates, LLC. All Rights Reserved. 11

Briefing Organization What are the implications for us? Who is responsible? What is the extent of the damage? How do we protect against future attacks? Can we detect the virus if it is in our system? Do we or any of our stakeholders have these systems? How likely are copycat crimes, and what would the nature of these be? How much knowledge of the system is needed? Can we convert this into a business opportunity? 12 Copyright 2012 Pherson Associates, LLC. All Rights Reserved.