Jennifer Lake's Blog

July 13, 2011

Stx and Stuxnet

Filed under: 1 — jenniferlake @ 3:59 am
Tags: , , , ,

I’m not one to overlook the obvious. Stx, the Shiga toxin that is spreading in Germany, and the Stuxnet virus which may have unhinged Fukushima, have too small an alphabet pool. A short list of words I can make out of ‘Stuxnet’ almost sounds like a bad memo : ‘next stunt use Stx’, which rearranges the word ‘stuxnet’ twice with an extra ‘s’ (stuxnetstuxnets, using all letters). A word that begins and ends with the same letter can represent a circle in a linear form… therefore ‘closing the circle’ to become a never-ending round.

But apart from whatever added meaning I might ‘see’ in alphabet language, there is an unmistakable parallel, and very real possibilities that the events are two parts of one operation just as the September 11 attack was followed by anthrax –again, with symbolic relatedness.

Ralph Langner, the German computer engineer who cracked the Stuxnet attack code, gave a presentation in February 2011 at the Longbeach TED seminar, http://www.youtube.com/watch?v=CS01Hmjv1pQ  . I’ll quote him loosely: “This was a directed attack… Stuxnet’s code was [searching for] a target, and if [no target is found], Stuxnet does nothing… The attack code..is structured in two digital bombs… we saw they were very professionally engineered… people obviously all had insider information, they knew all the bits and bytes for attack… the payload is..way above anything we have ever seen before… [but] this is very important, think about this, [the] attack was generic… You can use conventional technology to spread it as widely as possible… and the target-rich areas are in the United States, Europe, and Japan.”

Mr. Langner, with my editing, has succinctly described the Stx-encoded E.coli. If not for his pre-Fukushima presentation, I would not have articulated the comparison as accurately. Instead, with his words, two halves of a thought creature reunited as one entity. Stx and Stuxnet.

The mythologist Joseph Campbell insisted that all humans are led by symbols. Abiding his views, we can know when events are speaking the language of power. I’m still working on a page about the Stx outbreak, elucidating a description of biowarfare through the details of scientific progress in genetics, but a bit of information came to my attention that corporate “food and beverage” controls are liable to use Siemens systems –and I thought of Stuxnet and found Langner’s video.  It flows with predictable Order even when I don’t see it until I’m running and looking back over my shoulder.

About these ads

12 Comments »

  1. Ahh!! Well Done my friend!
    They are SOO connected!
    Excellent connexions.
    Enough to get my brain firing again during school holidays!
    I did a post back in March on the Fukushima/stuxnet connection if you didn’t see it:
    http://thirteenthmonkey.blogspot.com/2011/03/worm-in-works.html

    and then this one
    http://thirteenthmonkey.blogspot.com/2011/03/israel-fukushima.html

    Funny isn’t it how virus’ both work on the same precept? maybe we are all part of the “borg” now?
    Excellent post!
    Cheers A13

    Comment by A13 — July 13, 2011 @ 5:02 am | Reply

    • Thanks A, your work is immeasurably helpful. I had ‘bits and bytes’ and a general stirring –then it fell into place. I hope we’re not borg yet but certain to be under spiritual seige, seriously besieged. Time to rally.

      Comment by jenniferlake — July 13, 2011 @ 1:41 pm | Reply

  2. An interesting video. Pandora’s Box, indeed.

    Comment by Wally D. — July 13, 2011 @ 3:56 pm | Reply

  3. this is what i see.

    stuxnet

    st/uxn/et

    stet/uxn

    test/nux

    TEST NUKES

    Comment by chris — July 21, 2011 @ 10:10 am | Reply

  4. Hi Jennifer,

    Here’s my take on Langner and his talk at TED:

    Langner comes onto the stage at Ted, immediately says something like: “They don’t want Iran to
    get the bomb,” (as a rationale for building a cyber terrorist weapon) seeming to mean: “And who could blame them for THAT?”

    Then at the end of his talk, by mutual agreement obviously, a TED guy or someone comes on to
    the stage and asks Langner exactly one question–whether he believes Mossad is totally responsible
    for building Stuxnet. To which Langner responds, after a chuckle (paraphrased): “Well, yeah Mossad’s involved but it’s really the world’s cyber superpower which is responsible.”–meaning the United States.

    And then, after doing his TED talk on Stuxnet, the cyber-terrorist-virus weapon, he assures us that we
    should be glad it was the Mossad (Israel) and the United States.

    Then a few days after Langner’s TED: kaboom Stuxnet does Japan. I guess Langner would advise us
    that again, we should be glad it’s only good old guys, Israel and the US.

    Come on, people, Langner’s just doing PR, bravado and threats for the dark side, as if to say: “Yeah,
    we did it and you ain’t seen nothing, yet.”

    Truman Green
    Surrey BC

    Comment by Truman Green — July 22, 2011 @ 8:02 pm | Reply

  5. If I may continue a bit…Here’s Langner being quoted by writer Jaakov Katz in the Jerusalem Post
    12/15/2010:

    “It will take two years for Iran to get back on track,” Langner said in a telephone interview from his
    office in Hamburg, Germany. “This was nearly as effective as a military strike, but even better since
    there are no fatalities and no full-blown war. From a military perspective, this was a huge success.”

    Thus my claim that Langner’s doing PR for the perps. I’d strongly recommend that readers read the whole Jerusalem Post article for a bit of perspective on Langner-Stuxnet.

    Truman Green
    Surrey BC Canada

    Comment by Truman green — July 22, 2011 @ 8:30 pm | Reply

    • Yes– interesting how that last bit at the TED had a staged quality. Other things I’ve read recently repeatedly distance the Mossad from the Israeli state, as if the Mossad is a US asset. hmm. huh. hmm… Still, Langner’s JPost and TED presentation predate these two events (meltdowns and E.coli) and don’t require certain knowledge of events for him to articulate possibilities. The perps, whoever they are in terms of names and faces, get to walk and let the axe fall where it may –better than a military strike in spades. This time, major casualties and no blood on anyone’s hands. Isn’t NOW the bloodless revolution…
      I can’t disagree, Tru. All that predigested food-for-thought goes down pretty smooth.
      *
      JPost:..”expert speculates IDF creator of virus”…[Langner]“and we can also conclude that even one nation-state would not have been able to do this on its own.” The JPost adds that “Widespread speculation has named Israel’s Military Intelligence Unit 8200..as the possible creator of the software, as well as the United States. Langner said that in his opinion at least two countries –possibly Israel and the United States– were behind Stuxnet.”
      The Christian Science Monitor ran a story the same day: http://www.csmonitor.com/USA/2010/1215/Stuxnet-virus-could-be-altered-to-attack-US-facilities-report-warns?cmpid=addthis_email&sms_ss=email&at_xt=4dacb55090188a62%2C0
      [CSM] “Stuxnet..is the type of cyberweapon that could broadly harm the United States..[and] could do enough widespread damage to critical infrastructure –including water, power, transportation, and other services– that ‘it threatens..modern society,’ said a little-noticed report issued by the Congressional Research Service Dec.9.’”
      More than two months earlier, Oct.1, 2010 the CSMonitor ran this:
      “The New York Times reported Thursday that Stuxnet contains a file named ‘Myrtus’ which may reveal the virus’s origin in a DaVinci Code-esque fashion. The ‘Robert Langdon’ on the case is..Ralph Langner… Mr.Langner noted that it may be an allusion to the Hebrew word for Esther..” [suggesting neutralizing preemptive attack as an honorific to the Biblical heroine] http://www.csmonitor.com/World/terrorism-security/2010/1001/Clues-emerge-about-genesis-of-Stuxnet-worm
      —but ‘Esther’ is also one-half of the Lederberg pair that discovered the crossing genes of E.coli. Is Langner a Renaissance Man enough to know an ancient Hebrew allusion or is somebody feeding him information for PR purposes? –very thoughtfully considered Truman. Thanks for prodding.
      *
      It’s not passing without note that Hamburg, where Langner maintains his office, is the scene of the O104 outbreak: [May 25]“..researchers first took notice last Thursday, when a clinic in Hamburg notified them of a host of patients suffering from hemolytic uremic syndrome..” http://news.sciencemag.org/scienceinsider/2011/05/german-scientists-finger-rare.html

      Comment by jenniferlake — July 22, 2011 @ 10:05 pm | Reply

  6. Notes on the Stuxnet “myrtle” file code, deepening the symbolic association—

    From Robert Graves in ‘The White Goddess’, who mythographically analyzes a Celtic epic called “Battle of the Trees”, tracing the sacred tree lineages:
    “The fifth tree is the yew, the death-tree in all European countries, sacred to Hecate in Greece and Italy. At Rome, when the black bulls were sacrificed.. they were wreathed with yew. The yew is mentioned by Pausanius as the tree beside which Epaminodas found the bronze urn..containing on a tin scroll the secret mysteries of the Great Goddess. On the other side of the urn, appropriately, grew a myrtle, which..was the Greek equivalent of the elder, the death-consonant R… it is likely that the Latin taxus, yew, is connected with toxon, Greek for bow [yew makes the best bows] and with toxicon, Greek for the poison with which arrows were smeared”…[pp193-194]
    “There seems to be a strong connexion between the tree-calendar and the ritual at the Feast of theTabernacles at Jerusalem… The worshippers carried in their right hand an ethrog, a sort of citron, and in their left a lulab, or thyrsus, consisting of intertwined.. palm, willow and myrtle… The ritual of Tabernacles was taken over by the Hebrews with other rites in honour of the Moon-goddess… the meaning of the myrtle was also changed from the shadow of death to the pleasant shade of summer on the authority of Isaiah who praised the tree… The myrtle was sacred to the Love-goddess Aphrodite all over the Mediterranean… nevertheless, it was the tree of death… promising..Life-in-Death; for myrtle was evergreen and was a token of the resurrection of the dead King… The myrtle is connected in Greek myth with the death of kings… R, the last consonant of the alphabet ‘pulls out the pin’ at the last month of [the king's] reign… December, the R month…” [p262]
    “…Jehovah as Q’re..[made of the] radical letters of his name — Q..quince or ethrog, and R, myrtle– were represented in the lulab, or thyrsus, used at the Feast of Tabernacles as a reminder of his annual death and translation to Elysium… ‘Q’re of trees and herbs’..identify him with Nergal, the God of Tuesday on which trees and herbs were first created.” [p340]
    “..[T]he ancient pagan Sea-goddess Marian,..Miriam..Myrrhine, Myrtea, Myrrha, Maria or Marina..[is whom] the Greeks called..Aphrodite… Tall, golden-haired, blue-eyed, pale-faced, the Love-goddess arrives in her scallop-shell at the myrtle grove… Constantine, the first Christian Emperor, officially abolished Mary-worship, but much of the ancient ritual survived… for example…punning on the name Mary connecting it with Hebrew words marah (brine) and mor (myrrh) and recalling the gifts of the Three Wise Men… In the English countryside ‘Mary Gipsy’ was soon identified with the Love-goddess known to the Saxons as ‘The May Bride’…” [p396]

    Comment by jenniferlake — July 23, 2011 @ 7:02 pm | Reply

  7. hello jennifer

    i agree with you and the comments about lagner. There is no way this prancing peacock soaking up applause is the real deal. The red circle he stands in suggests occult design and he clearly has no intention of warning people about the dangers of the israeli military/state, created from the ‘jewish’ criminal network, either through ignorance or corruption or fear the result is the same.

    he employs the same misdirection as noam chomsky

    Comment by chris — July 24, 2011 @ 11:58 am | Reply

    • Chris, I’m going to rack up more information under your comment. I haven’t read or seen enough on Langner’s role to have an opinion about him. The portrayal of his involvement is in the hands of the media and the whole situation predating Fukushima was overripe. The least I could say is that the celebrity he gained was open to exploit.
      *
      finding Stuxnet:
      “..in June 2009, someone had silently unleashed a sophisticated and destructive digital worm..slithering its way through computers in Iran… But it would be nearly a year before the [IAEA] inspectors would learn of this…piece of software that would ultimately make history as the world’s first real cyberweapon. On June 17, 2010, Sergey Ulasen was in his office in Belarus..when a report caught his eye…Ulasen heads an antivirus division of a small computer security firm in Minsk…”
      http://www.wired.com/threatlevel/2011/07/how-digital-detectives-deciphered-stuxnet/2/
      New IAEA Director in 2009, Yukiya Amano, member of the Japanese Foreign diplomatic service since 1972 http://www.iaea.org/About/Policy/Board/yukiya_amano_bio.html; “Mr Amano told reporters: ‘It is certain that the number of nuclear reactors will increase, even if not as quickly as before [the Fukushima meltdowns].’ ” http://www.bbc.co.uk/news/world-asia-pacific-14292167
      *
      Two months earlier, April 2010, Richard Clarke released his book ‘Cyber War!’ warning of an ‘electronic Pearl Harbor’ http://abcnews.go.com/GMA/Books/cyber-war-richard-clarke/story?id=10414617
      At the beginning of 2010, a ‘first’ in national cyber-security authorizing a new data center, began in Utah with $1.5 billion in funding: http://www.deseretnews.com/article/705363940/Utahs-15-billion-cyber-security-center-under-way.html
      *
      from Vanity Fair:
      “A self-replicating computer virus, called a worm, was..searching for small gray plastic boxes called programmable-logic controllers –tiny computers about the size of a pack of crayons, which regulate the machinery in factories, power plants, and construction and engineering projects. These controllers, or P.L.C.s, perform the critical scut work…they open and shut valves…speed and slow..centrifuges, mete out the dollop of cream in each Oreo cookie, and time the change of traffic lights…
      “..a Microsoft researcher named ‘Stuxnet’… the virus was infecting Microsoft’s Windows operating systems using a vulnerability that had never been detected before.. called a ‘zero day’. In the world of computer security, a Windows zero-day vulnerability signals that the author is a pro… The most unsettling thing about the virus was that its components hid themselves as soon as they got into the host To do this, the virus used a digital signature… Digital signatures are like passports for software… Security consultants have for several years expected malware writers to make the leap from forged signatures to genuine stolen ones… a signature somehow obtained from Realtek [Taiwan]..
      …July 15, a tech reporter named Brian Krebs broke the news..on his blog… At this point it had been detected in only a few sites in Europe and the U.S. The largest number of infections by far– more than 15,000 and growing fast– was found in Asia…In the process of being publicly revealed, the virus was given a name, using an anagram of letters found in two parts of its code… Yet someone apparently, was trying to help Stuxnet dodge the bullet of publicity. On July 14, just as news of its existence was starting to spread, Stuxnet’s operators gave it a new self-defense mechanism… a new version of Stuxnet appeared with a new signature from a different company, JMicron –just in time to help the worm continue to avoid detection.” http://www.vanityfair.com/culture/features/2011/04/stuxnet-201104?currentPage=2
      *
      from Brian Krebs:
      “One equally likely scenario that I haven’t heard suggested much yet is that perhaps we are seeing evidence of our country’s own cyber warriors probing the networks of other nations…What’s more, it’s unlikely that a malware threat initially directed at Iran would show up on the radar of U.S.-based anti-virus makers, all of whom are prohibited by U.S. trade sanctions from selling products and services to Iran.”
      “…experts have found several new variants of Stuxnet, while a growing number of more mainstream attacks have been spotted exploiting the underlying Windows flaw.”
      “The worm was originally thought to spread mainly through the use of removable drives, such as USB sticks. But roughly two weeks after news of Stuxnet first surfaced, researchers at Moscow-based Kaspersky Lab discovered that the Stuxnet worm also could spread using an unknown security flaw in the way Windows shares printer resources.”
      “Microsoft has broken several of its own Patch Tuesday records this year, but this month far surpasses them all,” said Joshua Talbot, security intelligence manager, Symantec Security Response. “Perhaps most notable this month is the number of vulnerabilities that facilitate remote code execution. By our count, 35 of the issues fall into this category. These are bugs that could allow an attacker to run any command they wish on vulnerable machines.” http://krebsonsecurity.com/tag/stuxnet/
      *
      from Jeffrey Carr:
      “The best that Ralph Langner, CEO of Langner Communications (and the leading evangelist for this scenario) could point to was an obscure Hebrew word for Myrtus and a biblical reference for a date found in the malware that pertained to Persia; both of which could have been explained in a half dozen alternate ways having nothing to do with either Israel or the U.S. As far as China goes, I’ve identified 5 distinct ties to Stuxnet that are unique to China as well as provided a rationale for the attack… I consider China to be the most likely candidate for Stuxnet’s origin.” http://blogs.forbes.com/firewall/2010/12/14/stuxnets-finnish-chinese-connection/
      *
      “So let’s assume that using Stuxnet, Israel has indeed launched the world’s first precision, military-grade cyber missile. What are the implications?.. The perception that it has both developed capabilities and shown its willingness to engage in cyberwarfare, will serve Israel as a strategic asset even if it never admits to having launched Stuxnet…” http://warincontext.org/2010/09/23/stuxnet-the-trinity-test-of-cyberwarfare/comment-page-1/
      *
      Langner Stuxnet interview: http://www.digitalbond.com/2010/12/15/december-podcast-ralph-langner-stuxnet-interview/
      –this is well worth the listen, straightforward about the dangers explaining how Stuxnet works and how it might be copied. No mention here of Israeli or U.S. involvement in its creation but questions about Siemens and US agencies keeping their investigations under wraps.
      *
      News:
      July 16, “Security computer at San Onofre mysteriously shuts down”…”At first blush, it involves a potential software glitch”.. http://latimesblogs.latimes.com/lanow/2011/07/security-computer-at-san-onofre-mysteriously-shuts-down.html
      —let’s go back to “test nukes”

      Comment by jenniferlake — July 24, 2011 @ 11:24 pm | Reply

  8. Last September [2010], Germany’s government decided to postpone a nuclear phase-out :http://www.france24.com/en/20100918-tens-thousands-protest-plans-postpone-phaseout-nuclear-power-electricity-germany
    “In mid-March, Merkel stunned the German public and other governments by announcing an accelerated phase-out of all 17 German nuclear reactors as an immediate reaction to the Fukushima disaster in Japan…’Fukushima has forever changed the way we define risk in Germany’ [Merkel said]… three quarters of Germany’s electricity sources will have to be replaced by green technology within just a few decades… A new grid is needed..” http://e360.yale.edu/feature/germanys_unlikely_champion_of_a_radical_green_energy_path/2401/
    – after this it was reported that Germany was vacillating on the decision –until May.
    then…
    “Environment Minister Norbert Roettgen announced the decision by the centre-right coalition..in the early hours of Monday morning [May 30], describing it as ‘irreversible’…[returning to the] timetable set by the previous Social Democrat–Green coalition government a decade ago.” http://newsinfo.inquirer.net/10554/germany-announces-end-to-nuclear-power-by-2022

    Comment by jenniferlake — July 25, 2011 @ 5:46 pm | Reply


RSS feed for comments on this post. TrackBack URI

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

The Rubric Theme Blog at WordPress.com.

Follow

Get every new post delivered to your Inbox.

Join 70 other followers

%d bloggers like this: