Stuxnet Persuasive Speech

1040 Words 4 Pages
“We are anonymous. We are a legion. We do not forgive. We do not forget. Expect us.” There’s no bomb going off, shots are not being fired, but they say they are fighting a war, daily. Anonymous, their battleground is the internet, they support human rights and freedom. Their attacks have taken down, a website like the Central Intelligence Agency (CIA), Corporations, foreign governments, including the Federal Bureau of Investigation (FBI). What happens behind the curtains, for governments that want information to be on the top of the chain of command, to stop a movie release that showed their leader assassinated. Who are they? and what happens next?
Who are they? They are people with knowledge of information technology. There are many types
…show more content…
n.d, p. 5). “It was like a computer trojan or virus, which infected the system in Iran, and simply damaged the systems and would simply destroy it.” stated Eugene Kaspersky from Kaspersky Lab (as cited in Zetter, K. n.d. p. 34). People believe the Stuxnet was created by Israel and United States to infiltrated the Iranians nuclear program. Stuxnet took over the control of centrifuges that spin nuclear material at Iran’s enrichment facilities (Zetter, K. n.d, p. 23). On November of 2010, the International Atomic Energy Agency said “Iran has suspended all work at its nuclear facilities without explaining why.(as cited in Zetter, K. n.d. p. 45)” Many intelligence agencies accredited to Stuxnet. Iran responded to the hack by assembling the Iranian Revolutionary Guard making it the 2nd largest online army (Clarke, R. A., & Knake, R. K 2010, p. …show more content…
United States accuses China of hacking companies, NASA operations and take total control of The New York Times (Andress, J., Winterfeld, S., & Rogers, R. 2011, p.5).. This century the best weapon is information, who ever uses it has the upper hand. On November of 2011, a group of hackers from China hacked their way in to Jet Propulsion Laboratory, and took over control of 23 space missions some of the destinations include Mars, Jupiter, and Saturn. In March of 2011, the Department of Defense (DOD), revealed 24,000 documents were copied by hackers. Private companies like The New York Times, was the target of hackers after publishing an article of how wealthy, the family of the Prime Minister of China Weng Hei Bau (Andress, J., Winterfeld, S., & Rogers, R. 2011, p.65). The company hired Mendicant for their services, a company that offers cyber security, the company confirms the origin of the attack came from a municipal building in China, which is home to People’s Liberation Army of China Unit 61389 (Andress, J., Winterfeld, S., & Rogers, R. 2011,

Related Documents