The film explains how Iran responded to Stuxnet
by ramping up its own cyber warfare capabilities and going after civilian targets.
virus, widely believed to have been developed by the United States and Israel, was discovered in 2010, although researchers at Symantec Corp have uncovered a version deployed two years earlier.
He figured out that Stuxnet
was only going after a specific industrial controller, manufactured by Siemens and configured to run a series of nuclear centrifuges.
The power of Stuxnet
technology is that the Iranians can't know what other malware may have been planted in their computers, or what new capabilities America's cyberwarriors may have developed.
However, according to a report in semi-official Iranian Fars news agency, "US intelligence officials revealed in April 2012 that the Stuxnet
malware was not only designed to disrupt Iran's nuclear program, but was part of a wider campaign directed from Israel that included the assassination of the country's nuclear scientists.
The version discovered by Symantec researchers -- dubbed Stuxnet
Security experts who reviewed Symantec's 18-page report on Stuxnet
has been described as a watershed event, there has been little academic discussion on whether it constituted a use of force.
Cyber warfare has been one of the most serious concerns for IT security professionals for several years now, especially after the discovery of Stuxnet
He warned that recently uncovered malwares Stuxnet
, Duqu and Flame are just the tip of the iceberg.
Cyber weapons like Stuxnet
that can take control of plants appear to be more of an operational danger than the recently-discovered Flame virus, which seems designed to gather data.
Former IDF chief-of-staff Gabi Ashkenazi summarized official thinking thusly: malware like Stuxnet
and Flame, he said, "buys time, no more than that.