The exploited software is conveniently developed and controlled by Iran’s adversaries. In another episode of the geopolitical sabotage show,
“In January 1982, President Ronald Reagan approved a CIA plan to sabotage the economy of the Soviet Union through covert transfers of technology that contained hidden malfunctions, including software that later triggered a huge explosion in a Siberian natural gas pipeline, according to a memoir by a Reagan White House official.”
True or not, the risk of software Trojan horses in the big energy game was recognized pretty early. The lesson here is, potentially dangerous technology ought to be matched by a comprehensive security protocol.
Yep, don't run your centrifuges on windows 98 is probably sound advice.
>In January 1982, President Ronald Reagan approved a CIA plan to sabotage the economy of the Soviet Union through covert transfers of technology that contained hidden malfunctions..
“In January 1982, President Ronald Reagan approved a CIA plan to sabotage the economy of the Soviet Union through covert transfers of technology that contained hidden malfunctions, including software that later triggered a huge explosion in a Siberian natural gas pipeline, according to a memoir by a Reagan White House official.”
True or not, the risk of software Trojan horses in the big energy game was recognized pretty early. The lesson here is, potentially dangerous technology ought to be matched by a comprehensive security protocol.