// Posted by on 05/28/2015 (7:09 PM)

Is it just me or do these readings remind you of The Terminator  films?  Systems are crashing and the military has a program that will bring the systems back on line.   It is in Terminator 3 where Skynet takes over.  The only thing between total world domination is one lone man,  the lone man that ends up pushing the button that unleashes the wrath of Skynet on us and makes Arnold Schwarzenegger a household name.   Here is the scene from the movie, Skynet takes over.

I mentioned it before and I will say it again, it is all about intentions.  What are the intentions of having such a system as Skynet, (fake, I know) and Stuxnet?  I am hoping that in a room somewhere below ground when the decision is made to unleash such a system onto the world that good is the intention.  It was a good thing that the Iranians were slowed down in their production of  nuclear weapons, right?  It was a covert method that slowed the process down.  I certainly hope this was the intention, but as the article, How Digital Detectives Deciphered Stuxnet, the Most Menacing Malware in History, pointed out, they will not be able to use this method again in the future.  The Iranians know now what to look for.  So do others for that matter.

Does it matter to you all if it was a good guy or a bad guy that caused this?  In the article it was Chien that said, “For us there’s no good guys or bad guys.”  He edited his statement, but what if this attack was aimed at a power plant in the United States or one of our allies?  I think we would have a different opinion of it, I know I would.  I can’t imagine working on this project and seeing the numbers of infected computers and the country of origin.  Those guys may have just walked away from the project, but they kept on.  Now all of the guys know, good and bad.

I had a strange virus on my computer earlier this year.  It corrupted every Word document and 1500 photos on my work computer.  I had some of the files back up on jump drives, but I lost every paper I have ever written for U of R.  I now have back up storage, I am such a goober!  I realize that my computer is not a computer in an Iranian nuclear power plant, but it is proof that malware can be very destructive.  My computer had to be re-imaged and caused quite a stir in the IT department at work.






Categories: Uncategorized


Rosatelli said...

Hi Ginger,

You bring up some wonderful points–if it happened to us, what would we do? Panic! Kim Zetter, the reporter who researched (and continues to research) Stuxnet and other threats to national security on the digital front keeps a column on called “threat level”. She reported today that we designed a similar piece of malware to attack North Korea (, but it failed because the human element was not successful–we couldn’t get the bug into the intranet. I really encourage you to read the article because it continues to build the story about these new types of war, and it’s one that is not often reported on. Zetter also investigated the ability for planes to be remotely controlled by hackers, and a host of other seems that seem very Hollywoodesque, but are quite real. The US opened Pandora’s box when we unleashed nuclear weapons during WWII, translated to the digital, are we playing with fire again?

// 05/29/2015 at 8:47 pm

BonnieG said...

Ginger, no it is not just you; the article reminds me of a sci-fi move plot, as well. I believe it’s safe to say, sci-fi movies have provided perceptive in sites of future technologies. Usually in the movies, the plot depicts virtual technology gone awry, and later resistance movements try to defeat it. So yes, art does imitate life.

We live in a yin and yang society. When bad people create malware good people push back and stop it. Almost as if they are interconnected. So with that being said, along with advanced technology, security threats are inevitable, thereby making malware a never ending vicious cycle.

// 05/30/2015 at 4:10 pm