
	by Tom Burghardt
	November 6, 2011
	from 
	GlobalResearch Website
	
	 
	
		
			| 
			 
			Tom Burghardt is a researcher 
			and activist based in the San Francisco Bay Area. 
			 
			In addition to 
			publishing in Covert Action Quarterly and Global Research, , he is a 
			Contributing Editor with Cyrano's Journal Today. 
			 
			His articles can be 
			read on Dissident Voice, The Intelligence Daily, Pacific Free Press, 
			Uncommon Thought Journal, and the whistleblowing website WikiLeaks. 
			
			 
			He is the editor of Police State America: U.S. Military "Civil 
			Disturbance" Planning, distributed by AK Press and has contributed 
			to the new book from Global Research, The Global Economic Crisis: 
			The Great Depression of the XXI Century.  | 
		
	
	
	 
	
	
	As evidence mounts that the U.S. secret state is launching cyber weapons 
	against official enemies, while carrying out wide-ranging spy ops against 
	their "friends," Gen. Keith Alexander, the dual-hatted overlord of 
	the National Security Agency and 
	
	U.S. Cyber Command, says that the Obama 
	administration is "working on a system" that will "help" ISPs thwart 
	malicious attacks.
	
	Speaking at the Security Innovation Network (SINET) "Showcase 2011" shindig 
	at the National Press Club in Washington, Alexander told security grifters 
	eager to gouge taxpayers for another piece of lucrative "cybersecurity" pie:
	
	
		
		"What I'm concerned about are the 
		destructive attacks. Those are the things yet to come that cause us a 
		lot of concern."
	
	
	That's rather rich coming from the head of a 
	secretive Pentagon satrapy suspected of designing and launching the 
	
	destructive Stuxnet virus which targeted Iran's civilian nuclear program.
	
	According to fresh evidence provided by IT security experts it now appears 
	that the same constellation of shadowy forces which unleashed Stuxnet are at 
	it again with the newly discovered 
	
	Duqu spy Trojan.
	
	In a follow-up analysis, Kaspersky Lab researcher Alex Gostev
	
	wrote that,
	
		
		"the highest number of Duqu incidents have 
		been recorded in Iran. This fact brings us back to the Stuxnet story and 
		raises a number of issues."
	
	
	Not least of which is the continuing 
	demonization of the Islamic Republic by an unholy alliance of U.S. 
	militarists, their Israeli pit bulls and congressional shills hyping the 
	"Iran threat."
 
	
	 
	
	
	War Drums 
	Beating
	
	With the United States and the other capitalist powers incapable of digging 
	the world economy out from under the slow-motion meltdown sparked by 2008's 
	market collapse, and with tens of millions of enraged citizens rejecting 
	austerity measures that will further enrich financial elites at their 
	expense, 
	
		
		Will the Obama administration "go for broke" 
		and set-off a new conflagration in the Middle East?
	
	
	Ratcheting up bellicose rhetoric, John Keane, 
	a retired four-star general, former Vice Chief of Staff of the U.S. Army now 
	currently perched on the board of General Dynamics, a major purveyor of 
	cyber attack tools for the government, 
	
	told the House Homeland Security 
	Committee October 26, 
	
		
		"We've got to put our hand around their 
		throat now. Why don't we kill them? We kill other people who are running 
		terrorist operations against the United States."
	
	
	
	
	AFP reported that "Iran made a formal protest" 
	over Keane's remarks which urged,
	
		
		"the targeted assassination of members of 
		its elite Quds Force military special operations unit," 
	
	
	...over a fairy-tale plot allegedly cooked-up by 
	Tehran, which employed a failed used-car salesman, a DEA snitch and members 
	of the Zetas drug gang in a scheme to assassinate the Saudi ambassador in 
	Washington.
	
	While the plot lines are as preposterous as allegations prior to the 2003 
	Iraq invasion that Saddam Hussein's regime was involved in 
	the 9/11 attacks, 
	one cannot so easily dismiss the propaganda value of such reports by 
	administration "information warriors." 
	
	 
	
	The same can be said of the series of controlled 
	leaks emanating from London, Tel Aviv and Washington urging immediate air 
	strikes against Iran's nuclear facilities.
	
	The Guardian 
	
	reported that,
	
		
		"Britain's armed forces are stepping up their 
	contingency planning for potential military action against Iran amid 
	mounting concern about Tehran's nuclear enrichment program."
	
	
	Chillingly, 
	
		
		"the Ministry of Defence believes the US may 
		decide to fast-forward plans for targeted missile strikes at some key 
		Iranian facilities. British officials say that if Washington presses 
		ahead it will seek, and receive, UK military help for any mission, 
		despite some deep reservations within the coalition government."
	
	
	On the same day that MoD's sanctioned leak 
	appeared in the British press, Haaretz
	
	disclosed that,
	
		
		"Prime Minister Benjamin Netanyahu and 
		Defense Minister Ehud Barak are trying to muster a majority in the 
		cabinet in favor of military action against Iran, a senior Israeli 
		official has said. According to the official, there is a 'small 
		advantage' in the cabinet for the opponents of such an attack."
		
		"Strategic Affairs Minister Moshe Ya'alon said he preferred an American 
		military attack on Iran to an Israeli one. 'A military move is the last 
		resort,' he said."
	
	
	The Associated Press 
	
	reported that as Netanyahu 
	moved to persuade his cabinet to,
	
		
		"authorize a military strike against Iran's 
		suspected nuclear weapons program," Israel successfully test-fired "a 
		missile believed capable of carrying a nuclear warhead to Iran."
	
	
	Adding to the disinformational witch's brew, The 
	Washington Post 
	
	reported that,
	
		
		"a new spike in anti-Iran rhetoric and 
		military threats by Western powers is being fueled by fears that Iran is 
		edging closer to the nuclear 'breakout' point, when it acquires all the 
		skills and parts needed to quickly build an atomic bomb if it chooses 
		to," anonymous "Western diplomats and nuclear experts said Friday."
	
	
	Post stenographer Joby Warrick informed us that 
	a,
	
		
		"Western diplomat who had seen drafts of the 
		report" told him "it will elaborate on secret intelligence collected 
		since 2004 showing Iranian scientists struggling to overcome technical 
		hurdles in designing and building nuclear warheads."
	
	
	And late last week Reuters 
	
	disclosed that,
	
		
		"A senior U.S. military official said on 
		Friday Iran had become the biggest threat to the United States and 
		Israel's president said the military option to stop the Islamic republic 
		from obtaining nuclear weapons was nearer."
		
		"'The biggest threat to the United States and to our interests and to 
		our friends... has come into focus and it's Iran,' said the U.S. 
		military official, addressing a forum in Washington." 
	
	
	Conveniently, 
	
		
		"reporters were allowed to cover the event 
		on condition the official not be identified."
	
	
	While some critics argue that Israel does not 
	presently have the capacity to launch such an attack, and that,
	
		
		"the volume of the war hysteria is being 
		turned up with one purpose in mind: the Israelis want the US to do their 
		dirty work for them," such reasoning is hardly reassuring.
	
	
	Indeed, as the World Socialist Web Site 
	
	points 
	out, 
	
		
		"the Israeli government has already made 
		advanced preparations for an attack on Iran."
		
		"On the military front," analyst Peter Symonds warned that "Israeli 
		warplanes last week conducted a long-range exercise - of the type 
		required to reach Iran - using a NATO airbase on the Italian island of 
		Sardinia." 
	
	
	In other words, the IDF drill was not a "rogue" 
	exercise unilaterally conducted by Israel, but further evidence of 
	Washington's,
	
		
		"desperate bid to offset 
		its economic 
		decline by securing its hegemony over the energy-rich regions of the 
		Middle East and Central Asia."
	
	
	In the context of escalating tensions over 
	Iran's nuclear enrichment program, seeded by manufactured "terror" plots, 
	the imperialist powers may choose the "cyber" route prior to launching 
	devastating missile and bomber strikes against Iranian military 
	installations and civilian infrastructure.
	
	Pentagon planners now believe that attack tools have reached the point where 
	blinding Iran's air defenses while sowing chaos across population centers 
	with power outages and the shutdown of financial services may now be a 
	viable option.
	
	This is not idle speculation. 
	
	 
	
	During the run-up to the 2003 Iraq invasion, 
	the National Journal 
	
	disclosed that Central Command,
	
		
		"considered a computerized attack to disable 
		the networks that controlled Iraq's banking system, but they backed off 
		when they realized that those networks were global and connected to 
		banks in France."
	
	
	Facing growing opposition at home and abroad to 
	endless wars and imperial adventures, would 
	the Obama
	administration have 
	such qualms today?
 
	
	 
	
	 
	
	
	Attack Tools Already 
	in Play
	
	As Antifascist Calling 
	
	previously reported, when the Duqu virus was 
	discovered last month, 
	
	analysts at Symantec believed that the remote access 
	Trojan (RAT), 
	
		
		"is essentially the precursor to a future 
		Stuxnet-like attack."
		
		"The threat was written by the same authors (or those who have access to 
		the Stuxnet source code) and appears to have been created since the last 
		Stuxnet file was recovered," researchers averred.
	
	
	Since their initial reporting, Symantec, drawing 
	on research from 
	CrySyS lab at the Budapest University of Technology and 
	Economics in Hungary, the organization which discovered the malware, 
	reported they located an installer file in the form of a Microsoft Word 
	document which exploits a previously unknown zero-day vulnerability.
	
	Like Stuxnet, Duqu's stealthiness is directly proportional to its uncanny 
	ability to capitalize on what are called zero-day exploits hardwired into 
	it's digital DNA; security holes that are unknown to everyone until the 
	instant they're used in an attack.
	
	Similar to other dubious commodities traded on our dystopian "free markets," 
	zero-days are bits of tainted code sought by criminal hackers, financial and 
	industrial spies and enterprising security agencies that can sell for up to 
	$250,000 a pop on the black market.
	
	When Stuxnet appeared in dozens of countries last year, targeting what are 
	called programmable logic controllers (PLCs) on industrial computers 
	manufactured by Siemens that control everything from water purification and 
	food processing to oil refining and potentially deadly chemical processes, 
	researchers found it was designed to harm only one specific target: 
	
		
		PLCs processing uranium fuel at a nuclear 
		facility in Iran.
	
	
	As Wired Magazine 
	
	reported, when Symantec 
	analysts who had been picking Stuxnet apart convinced internet service 
	providers who controlled "servers in Malaysia and Denmark" where the virus 
	"phoned home" each time it infected a new machine, to reroute the virus to a 
	secure "sinkhole," they were in for a shock.
	
		
		"Out of the initial 38,000 infections," 
		journalist Kim Zetter wrote, "about 22,000 were in Iran. Indonesia was a 
		distant second, with about 6,700 infections, followed by India with 
		about 3,700 infections. The United States had fewer than 400. Only a 
		small number of machines had Siemens Step 7 software installed - just 
		217 machines reporting in from Iran and 16 in the United States."
		
		"The sophistication of the code," Wired averred, "plus the fraudulent 
		certificates, and now Iran at the center of the fallout made it look 
		like Stuxnet could be the work of a government cyberarmy - maybe even a 
		United States cyberarmy.
		
		"This made Symantec's sinkhole an audacious move," Zetter wrote. "In 
		intercepting data the attackers were expecting to receive, the 
		researchers risked tampering with a covert U.S. government operation."
	
	
	
	
	Writing in the Journal of Strategic Studies, 
	Thomas Rid, a former RAND Corporation employee and "Reader in War Studies at 
	Kings College in London," who has close ties to the Western military 
	establishment, observed in relation to Stuxnet that network,
	
		
		"sabotage, first, is a deliberate attempt to 
		weaken or destroy an economic or military system. All sabotage is 
		predominantly technical in nature, but of course may use social 
		enablers."
		
		"The resources and investment that went into Stuxnet could only be 
		mustered by a 'cyber superpower', argued Ralph Langner, a German control 
		system security consultant who first extracted and decompiled the attack 
		code."
	
	
	In 
	
	an interview with National Public Radio, 
	Langer said that the "level of expertise" behind Stuxnet,
	
		
		"seemed almost alien. But that would be 
		science fiction, and Stuxnet was a reality."
		
		"Thinking about it for another minute, if it's not aliens, it's got to 
		be the United States."
		
		"For the time being it remains unclear how successful the Stuxnet attack 
		against Iran's nuclear program actually was" Rid noted. "But it is clear 
		that the operation has taken computer sabotage to an entirely new 
		level."
		
		 
		
		 
	
	
		 
	
	 
	
	
	Researcher Vikram Thakur, commenting on the 
	latest Duqu discoveries reported: 
	
		
		"The Word document was crafted in such a way 
		as to definitively target the intended receiving organization." 
		
	
	
	And whom, pray tell, was being targeted by Duqu? 
	Why Iran, of course.
	
		
		"Once Duqu is able to get a foothold in an 
		organization through the zero-day exploit, the attackers can command it 
		to spread to other computers."
	
	
	Thakur wrote,
	
		
		"the Duqu configuration files on these 
		computers," which did not have the ability to connect to the internet 
		and the author's command and control (C&C) server, "were instead 
		configured not to communicate directly with the C&C server, but to use a 
		file-sharing C&C protocol with another compromised computer that had the 
		ability to connect to the C&C server."
		
		"Consequently," Thakur concluded, "Duqu creates a bridge between the 
		network's internal servers and the C&C server. This allowed the 
		attackers to access Duqu infections in secure zones with the help of 
		computers outside the secure zone being used as proxies."
	
	
	As Kaspersky Lab researchers
	
	pointed out, 
	
		
		"in each of the four instances of Duqu 
		infection a unique modification of the driver necessary for infection 
		was used."
		
		"More importantly," analysts averred, "regarding one of the Iranian 
		infections there were also found to have been two network attack 
		attempts exploiting the MS08-067 [MS Word] vulnerability. This 
		vulnerability was used by Stuxnet too."
		
		"If there had been just one such attempt, it could have been written off 
		as typical Kido activity - but there were two consecutive attack 
		attempts: this detail would suggest a targeted attack on an object in 
		Iran."
	
	
	Simply put, before the Pentagon decides to "kill 
	them" as Gen. Keane indelicately put it, battlefield preparations via 
	directed cyber attacks and other forms of sabotage may be part of a 
	preemptive strategy to decapitate Iranian defenses prior to more "kinetic" 
	attacks.
 
	
	 
	
	
	'Boutique Arms 
	Dealers'
	
	Despite media hype about future cuts in the so-called "defense" budget, 
	Defense Industry Daily
	
	disclosed that,
	
		
		"the US military has announced plans 
	to spend billions on technology to secure its networks."
	
	
	According to the Defense Department's FY 2012 budget proposal,
	
		
		"the Pentagon said it plans to spend $2.3 
		billion on cybersecurity capabilities."
	
	
	However, when 
	
	NextGov,
	
		
		"questioned why the Air Force's $4.6 billion 
		2012 budget request for cybersecurity was $2.3 billion more than 
		Defense's servicewide spending proposal, Pentagon officials upped their 
		total figure from $2.3 billion to $3.2 billion."
	
	
	Why the discrepancy? 
	
		
		A "Pentagon spokesperson explained that the 
		service's estimate differed dramatically because the Air Force included 
		'things' that are not typically considered information assurance or 
		cybersecurity."
	
	
	What kind of "things" are we talking about here?
	
	As BusinessWeek 
	
	
	reported in July, firms such as Northrop Grumman, Raytheon, 
	and General Dynamics, 
	
		
		"the stalwarts of the traditional defense 
		industry," are "helping the U.S. government develop a capacity to snoop 
		on or disable other countries' computer networks."
	
	
	Capitalizing on the Defense Department's desire 
	to develop,
	
		
		"hacker tools specifically as a means of 
		conducting warfare," this "shift in defense policy gave rise to a flood 
		of boutique arms dealers that trade in offensive cyber weapons."
	
	
	Investigative journalists Mike Riley and 
	Ashlee 
	Vance averred that,
	
		
		"most of these are 'black' companies that 
		camouflage their government funding and work on classified projects."
	
	
	As last winter's hack of HBGary Federal by 
	Anonymous revealed, "black" firms, including those like 
	
	Palantir which 
	received millions of dollars in start-up funding from the CIA's venture 
	capital arm 
	In-Q-Tel, hacker tools, such as sophisticated Trojans and 
	
	stealthy rootkits, believed to be the route used to introduce the Stuxnet 
	virus, have also been used to target political activists and journalists in 
	the United States at the behest of financial institutions such as the Bank 
	of America and the right-wing U.S. Chamber of Commerce.
	
	As researcher Barrett Brown
	
	revealed, 
	
		
		"Team Themis was a consortium made up of 
		HBGary, Palantir, and Berico (with 
		
		Endgame Systems serving as a 'silent 
		partner' and providing assistance from the sidelines) that was set up in 
		order to provide offensive intelligence capabilities to private 
		clients."
	
	
	Although Endgame Systems "went dark" after 
	Anonymous released thousands of HBGary files, The Register 
	
	disclosed that 
	the firm,
	
		
		"helps US intelligence identify and hack 
		into vulnerable networks, and is targeting a similar role in Britain's 
		nascent national cyber security operations."
	
	
	The Register noted that the,
	
		
		"limited publicly information currently 
		available on the firm hints at its further role assisting clandestine 
		government cyber operations by identifying targets and developing 
		exploits."
	
	
	As BusinessWeek revealed, the firm is,
	
		
		"a major supplier of digital weaponry for 
		the Pentagon. It offers a smorgasbord of wares, from vulnerability 
		assessments to customized attack technology, for a dizzying array of 
		targets in any region of the world."
	
	
	Unsurprisingly, this was a major draw for 
	venture capital firms,
	
		
		"Bessemer Venture Partners and Kleiner 
		Perkins Caufield & Byers," who collectively fronted Endgame some $30 
		million. 
	
	
	According to Riley and Vance, 
	
		
		"what really whet the VCs' appetites, 
		though, according to people close to the investors, is Endgame's shot at 
		becoming the premier cyber-arms dealer."
	
	
	While a client list has yet to emerge, it's safe 
	to assume that secret state agencies on both sides of the Atlantic are 
	lining up to purchase Endgame's toxic products.
	
	Although no definitive answer has emerged as to whom might targeting Iran 
	with Duqu, as BusinessWeek revealed Endgame,
	
		
		"deals in zero-day exploits. Some of 
		Endgame’s technology is developed in-house; some of it is acquired from 
		the hacker underground. Either way, these zero days are militarized - 
		they've undergone extensive testing and are nearly fail-safe."
		 
		
		"People who have seen the company pitch its 
		technology - and who asked not to be named because the presentations 
		were private - say Endgame executives will bring up maps of airports, 
		parliament buildings, and corporate offices."
	
	
	According to Riley and Vance, 
	
		
		"the executives then create a list of the 
		computers running inside the facilities, including what software the 
		computers run, and a menu of attacks that could work against those 
		particular systems."
		
		Indeed, "Endgame weaponry comes customized by region - the Middle East, 
		Russia, Latin America, and China - with manuals, testing software, and 
		'demo instructions.' There are even target packs for democratic 
		countries in Europe and other U.S. allies."
		
		"The quest in Washington, Silicon Valley, and around the globe is to 
		develop digital tools both for spying and destroying," BusinessWeek 
		observed. "The most enticing targets in this war are civilian - 
		electrical grids, food distribution systems, any essential 
		infrastructure that runs on computers."
		
		"This stuff is more kinetic than nuclear weapons," Dave Aitel, the 
		founder of a computer security company in Miami Beach called 
		
		Immunity 
		told Riley and Vance. "Nothing says you've lost like a starving city."
	
	
	While Aitel and a host of other "little 
	Eichmanns" who enrich themselves servicing the American secret state refused 
	to discuss his firm's work for the government, a source told the publication 
	that Immunity,
	
		
		"makes weaponized 'rootkits': military-grade 
		hacking systems used to bore into other countries' networks," and that 
		Aitel's clients "include the U.S. military and intelligence agencies."
	
	
	We do not know if, or when, the United States, 
	NATO and Israel will opt for a military "solution" to the so-called "Iranian 
	problem."
	
	We do know however, as the World Socialist Web Site warned, 
	
		
		"as global capitalism lurches from one 
		economic and political crisis to the next, rivalry between the major 
		powers for markets, resources and strategic advantage is plunging 
		humanity towards a catastrophic conflict that would devastate the 
		planet."