{"id":773,"date":"2010-10-01T11:39:11","date_gmt":"2010-10-01T17:39:11","guid":{"rendered":"http:\/\/bendreth.com\/?p=773"},"modified":"2010-10-01T11:39:11","modified_gmt":"2010-10-01T17:39:11","slug":"another-step-along-the-road-to-cyberwar","status":"publish","type":"post","link":"https:\/\/bendreth.com\/?p=773","title":{"rendered":"Another step along the road to cyberwar"},"content":{"rendered":"<p>We&#8217;ve had computer worms before, but Stuxnet is the first I&#8217;ve heard of that was written to deliberately target something other than just another computer &#8211; that is, to affect the real world.<\/p>\n<p>There are good discussions <a href=\"http:\/\/www.cs.columbia.edu\/~smb\/blog\/\/2010-09\/2010-09-27.html\">here<\/a>, <a href=\"http:\/\/www.wired.com\/threatlevel\/2010\/09\/stuxnet\/\">here<\/a>, <a href=\"http:\/\/www.informit.com\/articles\/article.aspx?p=1636983\">here<\/a>, <a href=\"http:\/\/frank.geekheim.de\/?p=1189\">here<\/a>, <a href=\"http:\/\/www.theusreport.com\/the-us-report\/2010\/9\/29\/secondary-effects-of-stuxnet-on-iran-nuke-program-may-be-far.html\">here<\/a>, and <a href=\"http:\/\/www.weeklystandard.com\/blogs\/how-stuxnet-scaring-tech-world-half-death\">here<\/a> that are worth reading.<\/p>\n<p><em>I<\/em> certainly don&#8217;t know who wrote it or why, nor do I have the geopolitical knowledge to forecast many of the consequences that can be expected. It is an escalation of the state of conflict between computer security and system attackers.<\/p>\n<p>It appears that the people behind Stuxnet are well-funded and very capable. One wonders if they have any other development efforts in progress, or if there are other similar groups at work already.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>We&#8217;ve had computer worms before, but Stuxnet is the first I&#8217;ve heard of that was written to deliberately target something other than just another computer &#8211; that is, to affect [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[7,12,13],"tags":[],"class_list":["post-773","post","type-post","status-publish","format-standard","hentry","category-in-the-news","category-software","category-technology"],"_links":{"self":[{"href":"https:\/\/bendreth.com\/index.php?rest_route=\/wp\/v2\/posts\/773","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/bendreth.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/bendreth.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/bendreth.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/bendreth.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=773"}],"version-history":[{"count":0,"href":"https:\/\/bendreth.com\/index.php?rest_route=\/wp\/v2\/posts\/773\/revisions"}],"wp:attachment":[{"href":"https:\/\/bendreth.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=773"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/bendreth.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=773"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/bendreth.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=773"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}