Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated:
1
00:00:47,820 --> 00:00:52,520
Through the darkness of the pathways
that we march,
2
00:00:52,800 --> 00:00:59,780
evil and good live side by side, and
this is the nature of life.
3
00:01:16,560 --> 00:01:23,100
We are in an unbalanced, an unequivalent
confrontation between democracies who
4
00:01:23,100 --> 00:01:29,260
are obliged to play by the rules and
entities who think democracy is a joke.
5
00:01:31,000 --> 00:01:37,140
You can't convince fanatics by saying,
hey, hatred
6
00:01:37,140 --> 00:01:39,740
paralyzes you, love relifts you.
7
00:01:40,820 --> 00:01:45,300
There are different rules that we have
to play by.
8
00:02:00,810 --> 00:02:05,710
Today, two of Iran's top nuclear
scientists were targeted by hit squads.
9
00:02:07,470 --> 00:02:14,010
Today's attack has all the hallmarks of
major strategic sabotage. Iran
10
00:02:14,010 --> 00:02:17,290
immediately accused the U .S. and Israel
of trying to damage its nuclear
11
00:02:17,290 --> 00:02:18,290
program.
12
00:02:28,040 --> 00:02:35,000
I want to categorically deny any United
States involvement in any kind
13
00:02:35,000 --> 00:02:38,500
of act of violence inside Iran.
14
00:02:38,800 --> 00:02:43,260
Covert actions can help, can assist.
15
00:02:44,440 --> 00:02:47,880
They are needed. They are not all the
time essentials.
16
00:02:48,340 --> 00:02:52,260
They in no way can replace their
political wisdom.
17
00:02:53,390 --> 00:02:57,310
Were the assassinations in Iran related
to the Stuxnet computer attacks?
18
00:02:58,850 --> 00:03:00,430
Next question, please.
19
00:03:35,190 --> 00:03:37,990
I don't know.
20
00:03:38,680 --> 00:03:44,760
No one knows who's behind the worm and
the exact nature of its mission, but
21
00:03:44,760 --> 00:03:49,860
there are fears Iran will hold Israel or
America responsible and seek
22
00:03:49,860 --> 00:03:53,460
retaliation. It's not impossible that
some group of hackers did it, but the
23
00:03:53,460 --> 00:03:56,920
security experts that are studying this
really think this required the resources
24
00:03:56,920 --> 00:03:57,920
of a nation state.
25
00:04:03,720 --> 00:04:05,360
Okay, good.
26
00:04:06,200 --> 00:04:07,200
Here we go.
27
00:04:08,329 --> 00:04:11,630
What impact, ultimately, did the Duxnet
attack have?
28
00:04:11,830 --> 00:04:12,830
Can you say?
29
00:04:13,670 --> 00:04:15,730
I don't want to get into the detail.
30
00:04:16,350 --> 00:04:21,970
The event has already happened. Why
can't we talk more openly and publicly
31
00:04:21,970 --> 00:04:24,830
Duxnet? Yeah. I mean, my answer is
because it's classified.
32
00:04:25,670 --> 00:04:30,790
I won't knowledge, you know, knowingly
offer up anything I consider classified.
33
00:04:31,250 --> 00:04:35,750
I know that you can't talk much about
Duxnet because Duxnet is officially
34
00:04:35,750 --> 00:04:37,800
classified. You're right on both those
counts.
35
00:04:38,540 --> 00:04:41,840
But there has been a lot reported about
it in the press.
36
00:04:42,180 --> 00:04:47,940
I don't want to comment on this. I read
it in the newspapers, in the media like
37
00:04:47,940 --> 00:04:51,340
you, but I'm unable to elaborate upon
it.
38
00:04:51,640 --> 00:04:55,740
People might find it frustrating not to
be able to talk about it when it's in
39
00:04:55,740 --> 00:04:56,820
the public domain, but...
40
00:04:58,120 --> 00:05:00,240
I find it frustrating. Yeah, I'm sure
you do.
41
00:05:00,640 --> 00:05:02,360
I don't answer that question.
42
00:05:02,600 --> 00:05:03,800
Unfortunately, I can't comment.
43
00:05:04,020 --> 00:05:07,160
I do not know how to answer that. Two
answers before we even get started. I
44
00:05:07,160 --> 00:05:09,600
don't know, and if I did, we wouldn't
talk about it anyway.
45
00:05:09,980 --> 00:05:11,920
But how can you have a debate if
everything is secret?
46
00:05:12,140 --> 00:05:14,020
I think right now that's just where we
are.
47
00:05:14,420 --> 00:05:19,420
No one wants to... Countries aren't
happy about confessing or owning up to
48
00:05:19,420 --> 00:05:22,780
they did because they're not quite sure
where they want the system to go.
49
00:05:23,480 --> 00:05:27,020
And so whoever was behind Stuxnet hasn't
admitted they were behind it.
50
00:05:31,050 --> 00:05:35,590
Asking officials about Stuxnet was
frustrating and surreal, like asking the
51
00:05:35,590 --> 00:05:36,950
emperor about his new clothes.
52
00:05:38,090 --> 00:05:43,210
Even after the cyber weapon had
penetrated computers all over the world,
53
00:05:43,210 --> 00:05:47,090
was willing to admit that it was loose
or to talk about the dangers it posed.
54
00:05:48,010 --> 00:05:52,110
What was it about the Stuxnet operation
that was hiding in plain sight?
55
00:05:53,630 --> 00:05:56,630
Maybe there was a way the computer code
could speak for itself.
56
00:05:58,130 --> 00:05:59,990
Stuxnet first surfaced in Belarus.
57
00:06:00,810 --> 00:06:04,830
I started with a call to the man who
discovered it when his clients in Iran
58
00:06:04,830 --> 00:06:08,870
began to panic over an epidemic of
computer shutdowns.
59
00:06:09,470 --> 00:06:12,590
Had you ever seen anything quite so
sophisticated before?
60
00:06:28,890 --> 00:06:32,150
It was firstly in my practice.
61
00:07:36,560 --> 00:07:41,340
On a day -to -day basis, basically, we
are sifting through a massive haystack
62
00:07:41,340 --> 00:07:43,620
looking for that verbal needle.
63
00:07:44,260 --> 00:07:48,640
We get millions of pieces of new
malicious threats, and there are
64
00:07:48,640 --> 00:07:50,380
attacks going on every single day.
65
00:07:50,860 --> 00:07:54,460
And not only are we trying to protect
people and their computers and their
66
00:07:54,460 --> 00:07:59,540
systems and countries' infrastructure
from being taken down by those attacks,
67
00:07:59,720 --> 00:08:03,720
but more importantly, we have to find
the attacks that matter. And we're
68
00:08:03,720 --> 00:08:04,720
about that many.
69
00:08:05,540 --> 00:08:07,080
impact is extremely important.
70
00:08:19,380 --> 00:08:22,680
Twenty years ago, the antivirus
companies, they were hunting for
71
00:08:22,680 --> 00:08:27,000
viruses because there were not so many.
So we had like a tenth of a dozen a
72
00:08:27,000 --> 00:08:32,840
month, and there was just a little
number. Now we collect millions of
73
00:08:32,840 --> 00:08:39,539
attacks. every month this room we call a
woodpecker's room or virus lab
74
00:08:39,539 --> 00:08:44,020
and this is where virus analysts we call
them woodpeckers because they are
75
00:08:44,020 --> 00:08:49,600
packing the worms network worms and
viruses we see like three different
76
00:08:49,600 --> 00:08:55,220
of actors behind cyber attacks they are
traditional cyber criminals those guys
77
00:08:55,220 --> 00:09:01,360
are interested only in illegal profit
and quick and dirty money activists or
78
00:09:01,360 --> 00:09:05,560
hacktivists They are hacking for fun or
hacking to push some political message.
79
00:09:05,820 --> 00:09:08,160
And the third group is nation -state.
80
00:09:08,380 --> 00:09:12,600
They are interested in high -quality
intelligence or sabotage activity.
81
00:09:14,320 --> 00:09:18,180
Security companies not only share
information, but we also share binary
82
00:09:18,500 --> 00:09:22,620
So when this threat was found by a
Belarusian security company on one of
83
00:09:22,620 --> 00:09:26,200
customers' machines in Iran, the sample
was shared amongst the security
84
00:09:26,200 --> 00:09:27,200
community.
85
00:09:27,480 --> 00:09:31,180
When we try to name threats, we just try
to pick some sort of string, some sort
86
00:09:31,180 --> 00:09:31,909
of word.
87
00:09:31,910 --> 00:09:33,610
that are inside of the binary.
88
00:09:34,890 --> 00:09:37,310
In this case, there were a couple of
words in there.
89
00:09:37,670 --> 00:09:40,170
We took pieces of each, and that formed
Stuxnet.
90
00:09:42,670 --> 00:09:45,770
I got the news about Stuxnet from one of
my engineers.
91
00:09:46,210 --> 00:09:52,050
He came to my office, opened the door,
and he said, So, Eugene, of course you
92
00:09:52,050 --> 00:09:54,710
know we are waiting for something really
bad.
93
00:09:55,090 --> 00:09:56,090
It happened.
94
00:10:03,910 --> 00:10:07,590
some sense of what it was like in the
lab at that time. Was there a palpable
95
00:10:07,590 --> 00:10:10,310
sense of amazement that you had
something really different there?
96
00:10:10,550 --> 00:10:14,610
Well, I wouldn't call it amazement. It
was kind of a talk.
97
00:10:14,850 --> 00:10:17,770
It went beyond our worst fears, our
worst nightmares.
98
00:10:18,210 --> 00:10:24,430
And this continued. The more we
analyzed, the more we researched, the
99
00:10:24,430 --> 00:10:26,430
bizarre the whole story got.
100
00:10:27,050 --> 00:10:29,910
We look at so much malware every day
that we can just look at the code and
101
00:10:29,910 --> 00:10:33,090
straight away you can say, okay, there's
something bad going on here and I need
102
00:10:33,090 --> 00:10:36,530
to investigate that. And that's the way
it was when we looked at Success for the
103
00:10:36,530 --> 00:10:39,250
first time. We opened it up and there
was just bad things everywhere.
104
00:10:39,510 --> 00:10:42,770
Just like, okay, this is bad and that's
bad and, you know, we need to
105
00:10:42,770 --> 00:10:46,190
investigate this. And just suddenly we
had like 100 questions straight away.
106
00:10:48,420 --> 00:10:51,400
The most interesting thing that we do is
the detective work, where we try to
107
00:10:51,400 --> 00:10:54,780
track down who's behind a threat, what
are they doing, what's their motivation,
108
00:10:54,920 --> 00:10:56,660
and try to really stop it at the root.
109
00:10:57,240 --> 00:11:01,280
And it is kind of all -consuming. You
get this new puzzle, and it's very
110
00:11:01,280 --> 00:11:05,140
difficult to put it down. You know, work
until like 4 a .m. in the morning and
111
00:11:05,140 --> 00:11:08,820
figure these things out. And I was in
that zone where I was very consumed by
112
00:11:08,820 --> 00:11:11,600
this, very excited about it, very
interested to know what was happening.
113
00:11:12,380 --> 00:11:17,120
And Eric was also in that same sort of
zone. So the two of us were like back
114
00:11:17,120 --> 00:11:18,120
forth all the time.
115
00:11:18,340 --> 00:11:22,960
Liam and I continued to grind at the
code, sharing pieces, comparing notes,
116
00:11:23,220 --> 00:11:24,660
bouncing ideas off of each other.
117
00:11:25,080 --> 00:11:27,640
We realized that we needed to do what we
call deep analysis.
118
00:11:27,940 --> 00:11:33,060
Pick apart the threat, every single
byte, every single zero one, and
119
00:11:33,060 --> 00:11:34,620
everything that was inside of it.
120
00:11:35,340 --> 00:11:36,620
And just give you some context.
121
00:11:36,900 --> 00:11:40,380
We can go through and understand every
line of code for the average threat in
122
00:11:40,380 --> 00:11:44,640
minutes. And here we are one month into
this threat, and we're just starting to
123
00:11:44,640 --> 00:11:46,860
discover what we call the payload, or
its whole purpose.
124
00:11:49,520 --> 00:11:53,240
When looking at the Stuxnet code, 20
times the size of the average piece of
125
00:11:53,240 --> 00:11:57,960
code, but contains almost no bugs inside
of it. And that's extremely rare,
126
00:11:58,120 --> 00:12:00,080
because code always has bugs inside of
it.
127
00:12:00,540 --> 00:12:04,420
This wasn't the case with Stuxnet. It's
dense, and every piece of code does
128
00:12:04,420 --> 00:12:07,220
something, and does something right in
order to conduct its attack.
129
00:12:09,160 --> 00:12:13,380
One of the things that surprised us, was
that Sexnet utilized what's called a
130
00:12:13,380 --> 00:12:18,640
zero -day exploit, or basically a piece
of code that allows it to spread without
131
00:12:18,640 --> 00:12:19,640
you having to do anything.
132
00:12:19,760 --> 00:12:23,520
You don't have to, for example, download
a file and run it. A zero -day exploit
133
00:12:23,520 --> 00:12:27,260
is an exploit that nobody knows about
except the attacker. So there's no
134
00:12:27,260 --> 00:12:30,620
protection against it. There's been no
patch released. There's been zero days
135
00:12:30,620 --> 00:12:33,320
protection, you know, against it.
136
00:12:34,260 --> 00:12:38,680
That's what attackers value, because
they know 100 % if they have this.
137
00:12:38,940 --> 00:12:41,260
Zero -day exploits. They can get in
wherever they want.
138
00:12:41,860 --> 00:12:43,000
They're actually very valuable.
139
00:12:43,220 --> 00:12:45,640
You can sell these in the underground
for hundreds of thousands of dollars.
140
00:12:47,060 --> 00:12:50,320
Then we became more worried because
immediately we discovered more zero
141
00:12:50,840 --> 00:12:53,140
And again, these zero -days are
extremely rare.
142
00:12:53,400 --> 00:12:57,520
Inside Stuxnet, we had four zero -days,
and for the entire rest of the year, we
143
00:12:57,520 --> 00:13:01,660
only saw 12 zero -days used. It blows
everything else out of the water. We've
144
00:13:01,660 --> 00:13:04,060
never seen this before. Actually, we've
never seen it since either.
145
00:13:04,280 --> 00:13:07,860
Seeing one in a malware you could
understand because...
146
00:13:08,280 --> 00:13:11,040
You know, the malware authors are making
money. They're stealing people's credit
147
00:13:11,040 --> 00:13:13,400
cards and making money. So it's worth
their while to use it. But seeing four
148
00:13:13,400 --> 00:13:17,660
zero days could be worth half a million
dollars right there used in one piece of
149
00:13:17,660 --> 00:13:22,040
malware. This is not your ordinary
criminal gang doing this. This is
150
00:13:22,040 --> 00:13:25,540
bigger. It's definitely not traditional
crime, not hacktivism.
151
00:13:26,800 --> 00:13:27,800
Who else?
152
00:13:28,560 --> 00:13:34,460
It was evident on a very early stage
that just given the sophistication of
153
00:13:34,460 --> 00:13:35,460
malware,
154
00:13:36,480 --> 00:13:41,820
suggested that there must have been a
nation state involved, at least one
155
00:13:41,820 --> 00:13:43,440
state involved in the development.
156
00:13:43,980 --> 00:13:47,560
When we look at code that's coming from
what appears to be a state attacker or
157
00:13:47,560 --> 00:13:49,780
state -sponsored attacker, usually
they're scrubbed clean.
158
00:13:50,060 --> 00:13:52,380
They don't leave little bits behind.
159
00:13:52,740 --> 00:13:54,040
They don't leave little hints behind.
160
00:13:54,440 --> 00:13:57,260
But in Stuxnet, there were actually a
few hints left behind.
161
00:13:59,160 --> 00:14:04,100
One was that in order to get low -level
access to Microsoft Windows, Stuxnet
162
00:14:04,100 --> 00:14:05,100
needed to use a digital certificate.
163
00:14:05,870 --> 00:14:10,950
which certifies that this piece of code
came from a particular company.
164
00:14:11,970 --> 00:14:15,030
Now, those attackers obviously couldn't
go to Microsoft and say, hey, test our
165
00:14:15,030 --> 00:14:16,950
code out for us and give us a digital
certificate.
166
00:14:17,710 --> 00:14:22,490
So they essentially stole them from two
companies in Taiwan.
167
00:14:22,850 --> 00:14:25,670
And these two companies have nothing to
do with each other except for their
168
00:14:25,670 --> 00:14:28,110
close proximity in the exact same
business park.
169
00:14:30,810 --> 00:14:34,530
Digital certificates are guarded very,
very closely.
170
00:14:35,020 --> 00:14:38,340
Behind multiple doors, and they require
multiple people to unlock.
171
00:14:39,940 --> 00:14:43,400
And they need to provide both biometrics
and as well passphrases.
172
00:14:44,200 --> 00:14:47,140
It wasn't like those certificates were
just sitting on a machine connected to
173
00:14:47,140 --> 00:14:47,619
the internet.
174
00:14:47,620 --> 00:14:49,280
Some human asset had to be involved.
175
00:14:49,940 --> 00:14:54,360
Spies, like a cleaner who comes in at
night and has stolen these certificates
176
00:14:54,360 --> 00:14:55,360
from these companies.
177
00:14:59,140 --> 00:15:03,000
It did feel like walking onto the set of
this James Bond movie and...
178
00:15:03,480 --> 00:15:07,440
You've been embroiled in this thing that
you'd never expected.
179
00:15:10,240 --> 00:15:14,400
We continued to search and we continued
to search in the code and eventually we
180
00:15:14,400 --> 00:15:16,960
found some other breadcrumbs left that
we were able to follow.
181
00:15:17,720 --> 00:15:21,860
There was doing something with Siemens,
Siemens software, possibly Siemens
182
00:15:21,860 --> 00:15:25,380
hardware. We'd never ever seen that in
any malware before, something targeting
183
00:15:25,380 --> 00:15:27,840
Siemens. We didn't even know why they
would be doing that.
184
00:15:29,420 --> 00:15:34,540
But after Googling very quickly, we
understood it was targeting Siemens
185
00:15:34,780 --> 00:15:39,960
It was targeting a very specific
hardware device, something called a PLC,
186
00:15:39,960 --> 00:15:41,040
programmable logic controller.
187
00:15:41,480 --> 00:15:48,140
The PLC is kind of a very small computer
attached to physical equipment like
188
00:15:48,140 --> 00:15:50,320
pumps, like valves, like motors.
189
00:15:50,820 --> 00:15:57,580
So this little box is running a digital
program, and the actions of this
190
00:15:57,580 --> 00:16:02,050
program... turns that motor on or off or
sets a specific speed.
191
00:16:02,630 --> 00:16:06,290
Those program logic controllers control
things like power plant, power grid.
192
00:16:06,610 --> 00:16:10,190
This is used in factories, it's used in
critical infrastructure.
193
00:16:10,950 --> 00:16:14,370
Critical infrastructure is everywhere
around us.
194
00:16:14,650 --> 00:16:18,850
Transportation, telecommunication,
financial services, healthcare.
195
00:16:19,450 --> 00:16:25,850
So the payload of TaxNet was designed to
attack some very important part
196
00:16:25,850 --> 00:16:27,230
of our world.
197
00:16:27,760 --> 00:16:31,720
the payload is going to be important
what happens there could be very
198
00:16:31,720 --> 00:16:38,720
the next very big surprise came when we
infected our lab
199
00:16:38,720 --> 00:16:45,700
system we figured out that the malware
was probing the controllers it was quite
200
00:16:45,700 --> 00:16:51,060
picky on its target it didn't try to
manipulate any given controller in a
201
00:16:51,060 --> 00:16:56,580
network that it would see it went
through several checks and when those
202
00:16:56,580 --> 00:16:59,070
failed It would not implement the
attack.
203
00:17:01,770 --> 00:17:05,730
It was obviously probing for a specific
target.
204
00:17:07,089 --> 00:17:11,730
You've got to put this in context that
at the time we already knew, well, this
205
00:17:11,730 --> 00:17:14,869
is the most sophisticated piece of
malware that we have ever seen.
206
00:17:15,770 --> 00:17:22,150
So it's kind of strange. Somebody takes
that huge effort to hit one specific
207
00:17:22,150 --> 00:17:24,990
target. Well, that must be quite a
significant target.
208
00:17:28,910 --> 00:17:33,530
So at Symantec, we have probes on
networks all over the world watching for
209
00:17:33,530 --> 00:17:34,530
malicious activity.
210
00:17:35,250 --> 00:17:39,030
We'd actually seen infections of stuff
all over the world, in the U .S., in
211
00:17:39,030 --> 00:17:42,170
Australia, in the U .K., in France,
Germany, all over Europe.
212
00:17:42,630 --> 00:17:45,190
It spread to any Windows machine in the
entire world.
213
00:17:45,530 --> 00:17:49,950
You know, we had these organizations
inside the United States who were in
214
00:17:49,950 --> 00:17:53,710
of industrial control facilities saying,
we're infected, what's going to happen?
215
00:17:54,170 --> 00:17:58,330
We didn't know if there was a deadline
coming up where this threat would
216
00:17:58,330 --> 00:18:02,650
and suddenly would turn off all
electricity plants around the world or
217
00:18:02,650 --> 00:18:05,210
start shutting things down or launching
some attack.
218
00:18:05,890 --> 00:18:11,270
We knew that Stuxnet could have very
dire consequences and we were very
219
00:18:11,270 --> 00:18:16,130
about what the payload contained and
there was an imperative speed that we
220
00:18:16,130 --> 00:18:18,830
to race and try and beat this ticking
bomb.
221
00:18:20,540 --> 00:18:23,340
Eventually, we were able to refine the
statistics a little bit and we saw that
222
00:18:23,340 --> 00:18:27,880
Iran was the number one infected country
in the world. That immediately raised
223
00:18:27,880 --> 00:18:28,699
our eyebrows.
224
00:18:28,700 --> 00:18:32,780
We had never seen a threat before where
it was predominantly in Iran.
225
00:18:33,860 --> 00:18:37,200
And so we began to follow what was going
on in the geopolitical world, what was
226
00:18:37,200 --> 00:18:38,240
happening in the general news.
227
00:18:38,500 --> 00:18:43,780
And at that time, there were actually
multiple explosions of gas pipelines
228
00:18:43,780 --> 00:18:44,780
in and out of Iran.
229
00:18:45,920 --> 00:18:46,920
Unexplained explosions.
230
00:18:48,590 --> 00:18:52,350
And, of course, we did notice that at
the time there had been assassinations
231
00:18:52,350 --> 00:18:53,350
nuclear scientists.
232
00:18:54,510 --> 00:18:55,810
So that was worrying.
233
00:18:56,550 --> 00:18:58,890
We knew there was something bad
happening.
234
00:18:59,630 --> 00:19:02,910
Did you get concerned for yourself? I
mean, did you begin to start looking
235
00:19:02,910 --> 00:19:04,250
your shoulder from time to time?
236
00:19:04,470 --> 00:19:07,790
Yeah, definitely looking over my
shoulder and being careful about what I
237
00:19:07,790 --> 00:19:08,790
about on the phone.
238
00:19:09,510 --> 00:19:14,270
I was pretty confident my conversations
on the phone were being listened to.
239
00:19:14,470 --> 00:19:16,430
We were only half joking.
240
00:19:16,960 --> 00:19:22,100
when we would look at each other and
tell each other things like, look, I'm
241
00:19:22,100 --> 00:19:26,260
suicidal if I show up dead on Monday.
You know, it wasn't me.
242
00:19:35,260 --> 00:19:39,000
We've been publishing information about
sexnet all through that summer.
243
00:19:40,360 --> 00:19:45,140
And then in November, the industrial
control system sort of expert in Holland
244
00:19:45,140 --> 00:19:46,200
contacted us.
245
00:19:47,310 --> 00:19:50,750
And he said, all of these devices that
would be inside of an industrial control
246
00:19:50,750 --> 00:19:55,710
system hold a unique identifier number
that identifies the make and model of
247
00:19:55,710 --> 00:19:56,710
that device.
248
00:19:57,970 --> 00:20:02,510
And we actually had a couple of these
numbers in the code that we didn't know
249
00:20:02,510 --> 00:20:03,510
what they were.
250
00:20:04,090 --> 00:20:07,450
And so we realized maybe what he was
referring to was the magic numbers we
251
00:20:08,070 --> 00:20:11,490
And then when we searched for those
magic numbers in that context, we saw
252
00:20:11,490 --> 00:20:15,130
what had to be connected to this
industrial control system that was being
253
00:20:15,130 --> 00:20:18,980
targeted. were something called
frequency converters from two specific
254
00:20:18,980 --> 00:20:21,540
manufacturers, one of which was in Iran.
255
00:20:22,000 --> 00:20:25,920
And so at this time, we absolutely knew
that the facility that was being
256
00:20:25,920 --> 00:20:30,040
targeted had to be in Iran, and it had
equipment made from Iranian
257
00:20:30,040 --> 00:20:31,040
manufacturers.
258
00:20:31,640 --> 00:20:35,300
When we looked up those frequency
converters, we immediately found out
259
00:20:35,300 --> 00:20:37,700
were actually export -controlled by the
Nuclear Regulatory Commission.
260
00:20:38,320 --> 00:20:41,860
And that immediately led us then to some
nuclear facility.
261
00:20:59,920 --> 00:21:04,160
This was more than a computer story, so
I left the world of the antivirus
262
00:21:04,160 --> 00:21:08,300
detectives and sought out journalist
David Sanger, who specialized in the
263
00:21:08,300 --> 00:21:11,960
strange intersection of cyber, nuclear
weapons, and espionage.
264
00:21:13,160 --> 00:21:18,240
The emergence of the code is what put me
on alert that an attack was underway.
265
00:21:19,720 --> 00:21:24,980
And because of the covert nature of the
operation, not only were official
266
00:21:24,980 --> 00:21:28,960
government spokesmen unable to talk
about it, they didn't even know about
267
00:21:30,159 --> 00:21:36,260
Eventually, the more I dug into it, the
more I began to find individuals
268
00:21:36,260 --> 00:21:41,740
who had been involved in some piece of
it or who had witnessed some piece of
269
00:21:41,860 --> 00:21:47,040
And that meant talking to Americans,
talking to Israelis, talking to
270
00:21:47,040 --> 00:21:53,560
because this was obviously the first,
biggest, and most sophisticated example
271
00:21:53,560 --> 00:21:59,200
a state or two states using a cyber
weapon for offensive purposes.
272
00:22:02,890 --> 00:22:07,810
I came to this with a fair bit of
history, understanding the Iranian
273
00:22:07,810 --> 00:22:08,810
program.
274
00:22:09,070 --> 00:22:12,630
How did Iran get its first nuclear
reactor?
275
00:22:13,230 --> 00:22:19,870
We gave it to them, under the Shah,
because the Shah was considered an
276
00:22:19,870 --> 00:22:20,870
ally.
277
00:22:21,710 --> 00:22:25,310
Thank you again for your warm welcome,
Mr. President.
278
00:22:26,060 --> 00:22:29,960
During the Nixon administration, the U
.S. was very enthusiastic about
279
00:22:29,960 --> 00:22:32,580
supporting the Shah's nuclear power
program.
280
00:22:33,460 --> 00:22:37,780
And at one point, the Nixon
administration was pushing the idea that
281
00:22:37,780 --> 00:22:43,120
and Iran should build a joint plant
together in Iran.
282
00:22:44,440 --> 00:22:49,220
There's at least some evidence that the
Shah was thinking about acquisition of
283
00:22:49,220 --> 00:22:51,280
nuclear weapons because he saw...
284
00:22:51,600 --> 00:22:55,320
And we were encouraging him to see Iran
as the so -called policeman of the
285
00:22:55,320 --> 00:22:59,340
Persian Gulf. And the Iranians have
always viewed themselves as naturally
286
00:22:59,340 --> 00:23:01,160
dominant power in the Middle East.
287
00:23:21,720 --> 00:23:28,440
But the revolution which overthrew the
Sharan 79 really curtailed the
288
00:23:28,440 --> 00:23:31,140
program before it ever got any head of
steam going.
289
00:23:32,560 --> 00:23:38,400
Part of our policy against Iran after
the revolution was to deny them nuclear
290
00:23:38,400 --> 00:23:39,400
technology.
291
00:23:41,360 --> 00:23:46,800
when I was involved in the 80s and the
90s, was the U .S. running around the
292
00:23:46,800 --> 00:23:51,920
world and persuading potential nuclear
suppliers not to provide even peaceful
293
00:23:51,920 --> 00:23:53,540
nuclear technology to Iran.
294
00:23:53,820 --> 00:23:59,340
And what we missed was the clandestine
transfer in the mid -1980s from Pakistan
295
00:23:59,340 --> 00:24:00,340
to Iran.
296
00:24:04,160 --> 00:24:08,240
Abdul Qadir Khan is what we would call
the father of the Pakistan nuclear
297
00:24:08,240 --> 00:24:09,240
program.
298
00:24:10,090 --> 00:24:14,590
He had the full authority and confidence
of the Pakistan government from its
299
00:24:14,590 --> 00:24:17,070
inception to the production of nuclear
weapons.
300
00:24:18,370 --> 00:24:24,530
I was a CIA officer for over two
decades, operations officer, worked
301
00:24:24,530 --> 00:24:25,530
most of my career.
302
00:24:25,850 --> 00:24:32,170
The AQ Khan network is so notable
because aside from building the
303
00:24:32,170 --> 00:24:38,870
program for decades, it also was the
means by which other countries,
304
00:24:39,200 --> 00:24:42,120
were able to develop nuclear weapons,
including Iran.
305
00:24:43,040 --> 00:24:47,540
AQ Khan, acting on behalf of the
Pakistani government, negotiated with
306
00:24:47,540 --> 00:24:54,200
in Iran, and then there was a transfer,
which took place through Dubai, of
307
00:24:54,200 --> 00:24:57,860
blueprints for nuclear weapons design,
as well as some hardware.
308
00:24:59,200 --> 00:25:04,440
Throughout the mid -1980s, the Iranian
program was not very well resourced. It
309
00:25:04,440 --> 00:25:05,820
was more of an R &D program.
310
00:25:06,990 --> 00:25:12,350
It wasn't really until the mid-'90s that
it started to take off, when they made
311
00:25:12,350 --> 00:25:14,530
the decision to build a nuclear weapons
program.
312
00:25:21,230 --> 00:25:25,070
You know, we can speculate what, in
their mind, motivated them. I think it
313
00:25:25,070 --> 00:25:28,950
the U .S. invasion of Iraq after Kuwait.
314
00:25:30,510 --> 00:25:33,310
There was an eight -year war between
Iraq and Iran.
315
00:25:33,630 --> 00:25:36,910
We wiped out the Afghan forces in a
matter of weeks.
316
00:25:39,850 --> 00:25:44,290
And I think that was enough to convince
the rulers in Tehran that they needed to
317
00:25:44,290 --> 00:25:46,330
pursue nuclear weapons more seriously.
318
00:25:48,370 --> 00:25:55,250
States like these and their terrorist
allies constitute an axis of evil,
319
00:25:55,250 --> 00:25:56,890
to threaten the peace of the world.
320
00:25:58,490 --> 00:26:04,570
From 2003 to 2005, when they feared that
the U .S. would invade them, they
321
00:26:04,570 --> 00:26:06,450
accepted limits on their nuclear
program.
322
00:26:06,950 --> 00:26:12,170
But by 2006, the Iranians had come to
the conclusion that the U .S. was bogged
323
00:26:12,170 --> 00:26:16,830
down in Afghanistan and Iraq and no
longer had the capacity to threaten
324
00:26:17,050 --> 00:26:20,510
And so they felt it was safe to resume
their enrichment program.
325
00:26:21,800 --> 00:26:26,020
They started producing low -enriched
uranium, producing more centrifuges,
326
00:26:26,020 --> 00:26:30,360
installing them at the large -scale
underground enrichment facility at
327
00:26:50,880 --> 00:26:55,580
Today, with the support of the
president, he made this possible for us.
328
00:26:57,380 --> 00:27:03,660
They say, well, you have to negotiate
with us for 10 years, and then we will
329
00:27:03,660 --> 00:27:06,800
allow you to have 20 of these or not.
330
00:27:07,380 --> 00:27:12,600
Of course, the people of Iran do not
accept it. And today, about 7 ,000 of
331
00:27:12,600 --> 00:27:13,600
teams are working in Tunisia.
332
00:27:36,740 --> 00:27:41,720
Not that many, because I left a few
years ago already, but I was there quite
333
00:27:41,720 --> 00:27:42,760
few times.
334
00:27:46,860 --> 00:27:48,840
Natanzi is just in the middle of the
desert.
335
00:27:50,800 --> 00:27:56,040
When they were building it in secret,
they were calling it a desert irrigation
336
00:27:56,040 --> 00:28:01,200
facility. For the local people, you want
to sell while you are building a big
337
00:28:01,200 --> 00:28:02,200
complex.
338
00:28:04,620 --> 00:28:07,260
There is a lot of artillery and air
force.
339
00:28:07,560 --> 00:28:13,280
It's better protected against attack
from air than any other nuclear
340
00:28:13,280 --> 00:28:14,640
installation I have seen.
341
00:28:17,480 --> 00:28:19,520
So this is deeply underground.
342
00:28:24,580 --> 00:28:29,300
But then inside, Natanzi is like any
other centrifuge facility. I have been
343
00:28:29,300 --> 00:28:33,340
over the world, from Brazil to Russia,
Japan, so...
344
00:28:33,770 --> 00:28:36,650
They are all alike with their own
features,
345
00:28:37,430 --> 00:28:42,390
their own centrifuges, their own
culture, but basically the process is
346
00:28:43,590 --> 00:28:48,490
And so are the monitoring activities of
the IAEA. They are basic principles. You
347
00:28:48,490 --> 00:28:53,470
want to see what goes in, what goes out,
and then on top of that you make sure
348
00:28:53,470 --> 00:28:57,970
that it produces low -end uranium
instead of anything to do with the
349
00:28:57,970 --> 00:29:00,150
enrichment and nuclear weapon -grade
uranium.
350
00:29:06,510 --> 00:29:12,590
Iran's nuclear facilities are under 24
-hour watch of the United Nations
351
00:29:12,590 --> 00:29:15,990
watchdog, the IAEA, the International
Atomic Energy Agency.
352
00:29:17,250 --> 00:29:23,950
Every single gram of Iranian fissile
material is accounted
353
00:29:23,950 --> 00:29:24,950
for.
354
00:29:26,770 --> 00:29:31,790
They have, like, basically seals that
they put on fissile materials that are
355
00:29:31,790 --> 00:29:33,090
IAEA seals.
356
00:29:33,450 --> 00:29:34,850
You can't break anything.
357
00:29:35,980 --> 00:29:37,480
without getting noticed.
358
00:29:39,680 --> 00:29:45,000
When you look at the uranium which was
there in Natanz, it was a very special
359
00:29:45,000 --> 00:29:48,840
uranium. This is called isotope 236.
360
00:29:49,380 --> 00:29:55,120
And that was a puzzle to us because you
only see this sort of uranium in states
361
00:29:55,120 --> 00:29:56,920
which have had nuclear weapons.
362
00:29:58,580 --> 00:30:01,500
We realized that they had cheated us.
363
00:30:02,080 --> 00:30:03,420
This sort of...
364
00:30:03,710 --> 00:30:08,350
equipment has been bought from what they
call black market they never pointed
365
00:30:08,350 --> 00:30:12,770
out it to aq card at that point of time
366
00:30:12,770 --> 00:30:19,690
what i was surprised was the
367
00:30:19,690 --> 00:30:25,110
sophistication and the quality control
and the way they have the manufacturing
368
00:30:25,110 --> 00:30:30,770
it was really professional it was not
something you know you just create in a
369
00:30:30,770 --> 00:30:34,610
few months time this was a result of a
long process.
370
00:30:41,250 --> 00:30:47,050
The centrifuges, you feed uranium gas in
and you have a cascade, thousands of
371
00:30:47,050 --> 00:30:50,470
centrifuges and from the other end you
get enriched uranium out.
372
00:30:50,950 --> 00:30:54,890
It separates uranium based on spinning
the rotor.
373
00:30:55,330 --> 00:30:57,030
It spins so fast.
374
00:30:57,310 --> 00:31:01,930
300 meters per second. The same as the
velocity of sound.
375
00:31:03,440 --> 00:31:07,780
These are tremendous forces, and as a
result, the rotor, it twists.
376
00:31:08,100 --> 00:31:10,220
It looks like a banana at one point in
time.
377
00:31:11,540 --> 00:31:16,480
So it has to be in balance because any
small vibration, it will blow up.
378
00:31:18,200 --> 00:31:19,840
And here comes another trouble.
379
00:31:20,080 --> 00:31:25,920
You have to raise the temperature, but
these very thin rotor walls, they are
380
00:31:25,920 --> 00:31:29,980
made from carbon fiber, and the other
pieces, they are made from metal.
381
00:31:31,340 --> 00:31:34,400
When you heat carbon fiber, it shrinks.
382
00:31:35,300 --> 00:31:37,620
When you heat metal, it expands.
383
00:31:38,220 --> 00:31:43,560
So you need to balance not only that
they spin, they twist, but the
384
00:31:43,560 --> 00:31:46,420
behavior in such a way that it doesn't
break.
385
00:31:46,840 --> 00:31:48,660
So this has to be very precise.
386
00:31:49,100 --> 00:31:51,720
This is what makes them very difficult
to manufacture.
387
00:31:52,060 --> 00:31:57,040
You can model it, you can calculate it,
but at the very end, it's actually based
388
00:31:57,040 --> 00:31:58,040
on practice.
389
00:31:59,440 --> 00:32:02,800
So it's a piece of art, so to say.
390
00:32:44,120 --> 00:32:46,420
Iranians are very proud of their centric
racism.
391
00:32:46,680 --> 00:32:52,460
There were a lot of public relations
videos given up always in April when
392
00:32:52,460 --> 00:32:54,320
had what they call a national nuclear
day.
393
00:33:09,430 --> 00:33:13,530
Ahmadinejad came into his presidency
saying that if the international
394
00:33:13,530 --> 00:33:16,410
wants to derail us, we will stand up to
it.
395
00:33:17,330 --> 00:33:23,170
If they want us to sign more inspections
and more additional protocols and other
396
00:33:23,170 --> 00:33:24,290
measures, no, we will not.
397
00:33:24,590 --> 00:33:26,310
We will fight for our rights.
398
00:33:27,310 --> 00:33:31,430
Iran is the signatory to the Nuclear Non
-Proliferation Treaty, and under that
399
00:33:31,430 --> 00:33:33,990
treaty, Iran has a right to nuclear
program.
400
00:33:34,590 --> 00:33:35,670
We can have enrichment.
401
00:33:36,210 --> 00:33:40,410
Who are you, world powers, to come and
tell us that we cannot have enrichment?
402
00:33:40,830 --> 00:33:46,890
This was his mantra, and it galvanized
the public.
403
00:33:50,130 --> 00:33:55,850
By 2007, 2008, the U .S. government was
in a very bad place with the Iranian
404
00:33:55,850 --> 00:33:56,850
program.
405
00:33:57,870 --> 00:34:02,910
President Bush recognized that he could
not even come out in public and declare
406
00:34:02,910 --> 00:34:06,390
that the Iranians were building a
nuclear weapon because by this time he
407
00:34:06,390 --> 00:34:09,710
gone through the entire WMD fiasco in
Iraq.
408
00:34:10,370 --> 00:34:13,050
He could not really take military
action.
409
00:34:13,489 --> 00:34:17,690
Condoleezza Rice said to him at one
point, you know, Mr. President, I think
410
00:34:17,690 --> 00:34:22,110
you've invaded your last Muslim country,
even for the best of reasons.
411
00:34:24,230 --> 00:34:28,030
He didn't want to let the Israelis
conduct a military operation.
412
00:34:28,989 --> 00:34:35,670
It's 1938, and Iran is Germany, and it's
racing to
413
00:34:35,670 --> 00:34:37,510
arm itself with atomic bombs.
414
00:34:38,409 --> 00:34:41,850
Iran's nuclear ambitions must be
stopped.
415
00:34:42,469 --> 00:34:44,050
They have to be stopped.
416
00:34:44,270 --> 00:34:50,330
We all have to stop it now. That's the
one message I have for you today. Thank
417
00:34:50,330 --> 00:34:51,330
you.
418
00:34:51,830 --> 00:34:54,570
Israel was saying they were going to
bomb Iran.
419
00:34:54,909 --> 00:34:59,930
And the government here in Washington
did all sorts of scenarios about what
420
00:34:59,930 --> 00:35:02,710
would happen if that Israeli attack
occurred.
421
00:35:03,030 --> 00:35:05,130
They were all very ugly scenarios.
422
00:35:05,690 --> 00:35:10,830
Our belief was that if they went on
their own, knowing the limitations,
423
00:35:10,830 --> 00:35:14,810
a very good air force, all right, but
it's small and the distances are great
424
00:35:14,810 --> 00:35:20,010
the target's dispersed and hardened, all
right, if they would have attempted a
425
00:35:20,010 --> 00:35:21,010
raid.
426
00:35:21,290 --> 00:35:26,850
On a military plane, we would have been
assuming that they were assuming we
427
00:35:26,850 --> 00:35:28,510
would finish that which they started.
428
00:35:28,870 --> 00:35:32,970
In other words, there will be many of us
in government thinking that the purpose
429
00:35:32,970 --> 00:35:37,130
of the raid wasn't to destroy the
Iranian nuclear system, but the purpose
430
00:35:37,130 --> 00:35:39,270
raid was to put us at war with Iran.
431
00:35:40,270 --> 00:35:44,570
Israel is very much concerned about
Iran's nuclear program more than the
432
00:35:44,570 --> 00:35:49,390
States. It's only natural because of the
size of the country, because we live in
433
00:35:49,390 --> 00:35:53,510
this neighborhood. America lives
thousands and thousands of miles away
434
00:35:53,510 --> 00:36:00,190
Iran. The two countries agreed on the
goal. There is no page between
435
00:36:00,190 --> 00:36:05,330
us that Iran should not have a nuclear
military capability.
436
00:36:06,010 --> 00:36:07,750
There are some differences.
437
00:36:08,380 --> 00:36:12,620
on how to achieve it and when action is
needed.
438
00:36:22,000 --> 00:36:27,020
We are taking very seriously leaders of
countries who call to the destruction
439
00:36:27,020 --> 00:36:29,860
and annihilation of our people.
440
00:36:30,120 --> 00:36:33,940
If Iran will get nuclear weapons now or
in the future.
441
00:36:35,120 --> 00:36:40,580
It means that for the first time in
human history, Islamic zealots,
442
00:36:40,580 --> 00:36:47,220
zealots, will get their hand on the most
dangerous, devastating weapon.
443
00:36:47,740 --> 00:36:50,080
And the world should prevent this.
444
00:36:51,960 --> 00:36:57,580
The Israelis believe that the Iranian
leadership has already made the decision
445
00:36:57,580 --> 00:37:00,780
to build nuclear weapons when they think
they can get away with it.
446
00:37:01,440 --> 00:37:06,160
The view in the U .S. is that the
Iranians haven't made that final
447
00:37:06,960 --> 00:37:09,180
To me, that doesn't make any difference.
448
00:37:09,440 --> 00:37:12,380
I mean, it really doesn't make any
difference, and it's probably unknowable
449
00:37:12,380 --> 00:37:17,200
unless you can put, you know, Supreme
Leader Khamenei on the couch and
450
00:37:17,200 --> 00:37:22,080
him. I think, you know, from our
standpoint, stopping Iran from getting
451
00:37:22,080 --> 00:37:25,940
threshold capacity is, you know, the
primary policy objective.
452
00:37:27,690 --> 00:37:31,630
Once they have the material, once they
have the capacity to produce nuclear
453
00:37:31,630 --> 00:37:33,030
weapons, then the game is lost.
454
00:37:39,290 --> 00:37:43,470
President Bush once said to me, he says,
Mike, I don't want any president ever
455
00:37:43,470 --> 00:37:47,990
to be faced with only two options,
bombing or the bomb.
456
00:37:48,710 --> 00:37:55,550
He wanted options that made it far less
likely he or his
457
00:37:55,550 --> 00:37:56,550
successor.
458
00:37:56,760 --> 00:38:00,120
or successors would ever get to that
point where that's all you've got.
459
00:38:00,320 --> 00:38:06,000
We wanted to be energetic enough in
pursuing this problem that the Israelis
460
00:38:06,000 --> 00:38:10,260
would certainly believe, yeah, we get
it. The intelligence cooperation between
461
00:38:10,260 --> 00:38:14,280
Israel and the United States is very,
very good.
462
00:38:14,860 --> 00:38:19,060
And therefore the Israelis went to the
Americans and said, okay, guys, you
463
00:38:19,060 --> 00:38:20,860
want us to bomb Iran?
464
00:38:21,180 --> 00:38:23,860
Okay, let's do it differently.
465
00:38:24,750 --> 00:38:29,910
And then the American intelligence
community started rolling and joined
466
00:38:29,910 --> 00:38:31,610
with the Israeli intelligence community.
467
00:38:32,310 --> 00:38:38,170
One day, a group of intelligence and
military officials showed up in
468
00:38:38,170 --> 00:38:41,150
Bush's office and said, Sir, we have an
idea.
469
00:38:42,250 --> 00:38:43,410
It's a big risk.
470
00:38:44,010 --> 00:38:46,190
It might not work, but here it is.
471
00:38:53,960 --> 00:39:00,300
Moving forward in my analysis of the
code, I took a closer look at the
472
00:39:00,300 --> 00:39:06,100
photographs that had been published by
the Iranians themselves in a press tour
473
00:39:06,100 --> 00:39:11,020
from 2008, Ahmadinejad and the Chinese
centrifuges.
474
00:39:13,040 --> 00:39:18,920
The photographs of Ahmadinejad going
through the centrifuges at Natanz
475
00:39:18,920 --> 00:39:21,300
some very important clues.
476
00:39:22,280 --> 00:39:24,400
There was a huge amount to be learned.
477
00:39:32,900 --> 00:39:38,300
First of all, those photographs showed
many of the individuals who were guiding
478
00:39:38,300 --> 00:39:39,900
Ahmadinejad through the program.
479
00:39:40,280 --> 00:39:44,280
And there's one very famous photograph
that shows Ahmadinejad being shown
480
00:39:44,280 --> 00:39:47,300
something. You see his face. You can't
see what's on the computer.
481
00:39:47,540 --> 00:39:50,900
And one of the scientists who was behind
him.
482
00:39:51,320 --> 00:39:53,020
Was it fascinated a few months later?
483
00:39:57,480 --> 00:40:02,700
In one of those photographs, you could
see parts of a computer screen.
484
00:40:03,000 --> 00:40:05,400
We refer to that as a SCADA screen.
485
00:40:05,980 --> 00:40:09,460
The SCADA system is basically a piece of
software running on a computer.
486
00:40:09,740 --> 00:40:13,060
It enables the operators to monitor the
process.
487
00:40:14,560 --> 00:40:18,620
What you could see, when you look close
enough,
488
00:40:19,390 --> 00:40:23,070
was a more detailed view of the
configuration.
489
00:40:23,970 --> 00:40:30,610
There were the six groups of
centrifuges, and each group had 164
490
00:40:31,750 --> 00:40:33,010
And guess what?
491
00:40:33,370 --> 00:40:37,050
That was a perfect match to what we saw
in the attack code.
492
00:40:38,450 --> 00:40:44,410
It was absolutely clear that this piece
of code was attacking an array with...
493
00:40:44,460 --> 00:40:49,140
six different groups of, let's just say,
thingies, physical objects.
494
00:40:49,680 --> 00:40:55,040
And in those six groups, there were 164
elements.
495
00:40:59,040 --> 00:41:01,380
Were you able to do any actual physical
tests?
496
00:41:01,620 --> 00:41:03,580
Or it was all just a code analysis?
497
00:41:04,000 --> 00:41:07,560
Yeah. So, you know, we obviously
couldn't set up our own sort of nuclear
498
00:41:07,560 --> 00:41:08,560
enrichment facility.
499
00:41:08,640 --> 00:41:11,860
But what we did was we did obtain some
PLCs, the exact models.
500
00:41:19,690 --> 00:41:23,430
We then ordered an air pump, and that's
what we used as our proof of concept.
501
00:41:24,290 --> 00:41:28,250
We needed a visual demonstration to show
people what we discovered.
502
00:41:28,810 --> 00:41:32,470
So we thought of different things that
we could do, and we settled on blowing
503
00:41:32,470 --> 00:41:33,470
a balloon.
504
00:41:36,930 --> 00:41:40,890
We were able to write a program that
would inflate a balloon, and it was set
505
00:41:40,890 --> 00:41:41,990
stop after five seconds.
506
00:41:52,420 --> 00:41:55,020
So it would inflate the balloon to a
certain size, but it wouldn't burst the
507
00:41:55,020 --> 00:41:56,160
balloon, and it was all safe.
508
00:41:56,660 --> 00:42:01,260
And we showed everybody, this is the
code that's on the PLC, and the timer
509
00:42:01,260 --> 00:42:04,120
stop after five seconds. We know that's
what's going to happen.
510
00:42:04,760 --> 00:42:09,560
And then we would infect the computer
with Stuxnet, and we would run the test
511
00:42:09,560 --> 00:42:10,560
again.
512
00:42:41,290 --> 00:42:46,610
Here is a piece of software that should
only exist in the cyber realm, and it is
513
00:42:46,610 --> 00:42:52,030
able to affect physical equipment in a
plant or factory and cause physical
514
00:42:52,030 --> 00:42:54,310
damage. Real -world physical
destruction.
515
00:42:59,070 --> 00:43:03,670
At that time, things became very scary
to us. Here you had malware potentially
516
00:43:03,670 --> 00:43:06,770
killing people, and that was something
that was always Hollywood -esque to us,
517
00:43:06,830 --> 00:43:09,510
that we'd always laugh at when people
made that kind of assertion.
518
00:43:15,820 --> 00:43:20,040
At this point, you had to have started
developing theories as to who had built
519
00:43:20,040 --> 00:43:21,040
them.
520
00:43:21,320 --> 00:43:27,060
It wasn't lost on us that there were
probably only a few countries in the
521
00:43:27,060 --> 00:43:33,120
that would want and have the motivation
to sabotage Iranian nuclear enrichment
522
00:43:33,120 --> 00:43:36,700
facility. The U .S. government would be
up there. Israeli government certainly
523
00:43:36,700 --> 00:43:40,600
would be up there. You know, maybe U
.K., France, Germany, those sorts of
524
00:43:40,600 --> 00:43:45,930
countries. But we never found any
information that would... tie it back
525
00:43:45,930 --> 00:43:46,930
those countries.
526
00:43:47,030 --> 00:43:48,070
There are no telltale signs.
527
00:43:48,870 --> 00:43:52,970
You know, the attackers don't leave a
message inside saying, you know, it was
528
00:43:52,970 --> 00:43:53,970
me.
529
00:43:54,030 --> 00:43:55,450
And even if they did,
530
00:43:56,190 --> 00:43:57,390
all that stuff can be faked.
531
00:43:57,870 --> 00:44:02,070
So it's very, very difficult to do
attribution when looking at computer
532
00:44:03,350 --> 00:44:07,350
Subsequent work that's been done leads
us to believe that this was the work of
533
00:44:07,350 --> 00:44:11,050
collaboration between Israel and the
United States. Did you have any evidence
534
00:44:11,050 --> 00:44:13,610
terms of your analysis that would lead
you to...
535
00:44:13,920 --> 00:44:15,160
Believe that that's correct also?
536
00:44:15,440 --> 00:44:17,380
Nothing that I could talk about on
camera.
537
00:44:20,300 --> 00:44:21,680
Can I ask why?
538
00:44:22,000 --> 00:44:23,000
No.
539
00:44:23,860 --> 00:44:25,400
You can, but I won't answer.
540
00:44:27,640 --> 00:44:31,960
But even in the case of nation states,
one of the concerns is... This was
541
00:44:31,960 --> 00:44:33,520
beginning to really piss me off.
542
00:44:34,140 --> 00:44:38,880
Even civilians with an interest in
telling the Stuxnet story were refusing
543
00:44:38,880 --> 00:44:41,060
address the role of Tel Aviv and
Washington.
544
00:44:42,480 --> 00:44:47,580
But luckily for me, while D .C. is a
city of secrets, it is also a city of
545
00:44:47,580 --> 00:44:51,700
leaks. They're as regular as a heartbeat
and just as hard to stop.
546
00:44:52,780 --> 00:44:54,200
That's what I was counting on.
547
00:44:59,360 --> 00:45:04,360
Finally, after speaking to a number of
people on background, I did find a way
548
00:45:04,360 --> 00:45:07,380
confirming on the record the American
role in Stuxnet.
549
00:45:08,360 --> 00:45:10,600
In exchange for details of the
operation,
550
00:45:11,390 --> 00:45:15,030
I had to agree to find a way to disguise
the source of the information.
551
00:45:15,430 --> 00:45:16,089
You good?
552
00:45:16,090 --> 00:45:17,090
We're off.
553
00:45:18,230 --> 00:45:21,350
The first question I have to ask you is
about secrecy.
554
00:45:22,230 --> 00:45:24,790
I mean, at this point, everyone knows
about the document.
555
00:45:25,070 --> 00:45:26,530
Why can't we talk about it?
556
00:45:27,150 --> 00:45:28,390
It's a covert operation.
557
00:45:29,330 --> 00:45:32,490
Not anymore. I mean, we know what
happened. We know who did it.
558
00:45:33,230 --> 00:45:35,470
Well, maybe you don't know as much as
you think you know.
559
00:45:36,310 --> 00:45:39,970
Well, I'm talking to you because I want
to get the story right.
560
00:45:40,330 --> 00:45:41,890
Well, that's the same reason I'm talking
to you.
561
00:45:44,650 --> 00:45:46,110
Even though it's a covert operation.
562
00:45:47,870 --> 00:45:52,430
Look, this is not a Snowden kind of
thing, okay? I think what he did was
563
00:45:52,630 --> 00:45:53,710
He went too far.
564
00:45:54,330 --> 00:45:55,610
He gave away too much.
565
00:45:56,350 --> 00:45:59,490
Unlike Snowden, who was a contractor, I
was in NSA.
566
00:46:00,430 --> 00:46:04,030
I believe in the agency, so what I'm
willing to give you will be limited, but
567
00:46:04,030 --> 00:46:07,490
we're talking because everyone's getting
this story wrong, and we have to get it
568
00:46:07,490 --> 00:46:10,630
right. We have to understand these new
weapons. The stakes are too high.
569
00:46:10,990 --> 00:46:11,990
What do you mean?
570
00:46:14,390 --> 00:46:16,170
We did stuck in that.
571
00:46:17,610 --> 00:46:18,610
It's a fact.
572
00:46:19,230 --> 00:46:23,830
We came so fucking close to disaster,
and we're still on the edge.
573
00:46:25,610 --> 00:46:28,970
It was a huge, multinational...
574
00:46:29,240 --> 00:46:35,840
interagency operation in the u .s it was
cia nfa
575
00:46:35,840 --> 00:46:42,500
and the military cyber command from
britain we used iran intel out of gchq
576
00:46:42,500 --> 00:46:47,560
but the main partner was israel over
there massad ran the show and the
577
00:46:47,560 --> 00:46:53,240
work was done by unit 8200 israel is
really the key to the story
578
00:46:58,510 --> 00:47:00,170
Traffic in Israel is so unpredictable.
579
00:47:02,970 --> 00:47:05,910
Yossi, how did you get into this whole
Stuxnet story?
580
00:47:06,850 --> 00:47:11,810
I have been covering the Israeli
intelligence in general and the Mossad
581
00:47:11,810 --> 00:47:15,710
particular for nearly 30 years.
582
00:47:16,030 --> 00:47:22,590
In 1982, I was a London -based
correspondent and I covered a trial of
583
00:47:22,590 --> 00:47:26,670
and I became more familiar with this
topic of terrorism.
584
00:47:27,770 --> 00:47:31,090
Slowly but surely, I started covering it
as a beat.
585
00:47:34,130 --> 00:47:40,610
Israel, we live in a very rough
neighborhood where democratic values,
586
00:47:40,610 --> 00:47:42,670
values are very rare.
587
00:47:43,010 --> 00:47:48,690
But Israel pretends to be a free,
democratic, westernized society.
588
00:47:49,750 --> 00:47:55,150
Posh neighborhoods, rich people,
youngsters who are...
589
00:47:55,840 --> 00:48:00,540
having almost similar mindset to their
American or Western European
590
00:48:00,540 --> 00:48:06,320
counterparts. On the other hand, you see
a lot of scenes and events which
591
00:48:06,320 --> 00:48:08,120
resemble the real Middle East.
592
00:48:08,520 --> 00:48:14,320
Terror attacks, radicals, fanatics,
religious zealots.
593
00:48:18,860 --> 00:48:24,080
I knew that Israel is trying to slow
down Iran's nuclear program, and
594
00:48:24,080 --> 00:48:29,120
I came to the conclusion that if there
was a virus affecting Iran's computers,
595
00:48:29,540 --> 00:48:36,220
it's one more element in this larger
picture based
596
00:48:36,220 --> 00:48:37,900
on past precedents.
597
00:48:42,820 --> 00:48:46,200
1981, I was a F -16 pilot.
598
00:48:47,120 --> 00:48:53,760
We were told that unlike our dream to do
dogfights and to kill pigs,
599
00:48:53,960 --> 00:49:00,300
we have to be prepared for a long -range
mission to destroy a valuable
600
00:49:00,300 --> 00:49:06,080
target. Nobody told us what is this very
valuable strategic target.
601
00:49:06,860 --> 00:49:10,240
It was 600 miles from Israel.
602
00:49:11,500 --> 00:49:13,280
So we trained ourselves.
603
00:49:14,140 --> 00:49:19,900
to do the job, which was very difficult.
No air refueling at that time. No
604
00:49:19,900 --> 00:49:21,360
satellite for reconnaissance.
605
00:49:22,920 --> 00:49:25,820
Fuel was on the limit.
606
00:49:29,860 --> 00:49:35,400
At the end of the day, we accomplished
the mission.
607
00:49:35,900 --> 00:49:36,900
Which was?
608
00:49:37,260 --> 00:49:42,460
To destroy the Iraqi nuclear reactor
near Baghdad.
609
00:49:42,890 --> 00:49:48,710
which was called Ost -Iraq, and Iraq
never was able to
610
00:49:48,710 --> 00:49:53,190
accomplish its ambition to have a
nuclear bomb.
611
00:49:55,630 --> 00:50:00,370
Amos Yadlin, General Yadlin, he was the
head of the military intelligence.
612
00:50:01,030 --> 00:50:06,090
The biggest unit within that
organization is Unit H -200.
613
00:50:06,730 --> 00:50:11,050
They bug telephones, they bug faxes,
they break into computers.
614
00:50:13,960 --> 00:50:19,360
A decade ago, when Yardim became the
chief of military intelligence, there
615
00:50:19,360 --> 00:50:22,880
no cyber warfare unit in H -200.
616
00:50:26,060 --> 00:50:32,120
So they started recruiting very talented
people, hackers, either from the
617
00:50:32,120 --> 00:50:36,640
military or outside the military, that
can contribute to the project of
618
00:50:36,640 --> 00:50:38,260
a cyber warfare unit.
619
00:50:41,040 --> 00:50:45,280
In the 19th century, there were only
army and navy.
620
00:50:45,760 --> 00:50:51,000
In the 20th century, we got air power as
a third dimension of war.
621
00:50:51,440 --> 00:50:57,060
In the 21st century, cyber will be the
fourth dimension of war.
622
00:50:57,880 --> 00:51:03,820
It's another kind of weapon, and it is
for unlimited range, in a very high
623
00:51:03,820 --> 00:51:06,700
speed, and in a very low signature.
624
00:51:07,040 --> 00:51:09,020
So this gives you a huge opportunity.
625
00:51:10,800 --> 00:51:15,460
And the superpowers have to change the
way we think about war.
626
00:51:17,680 --> 00:51:22,000
Finally, we are transforming our
military for a new kind of war that
627
00:51:22,000 --> 00:51:25,500
fighting now and for wars of tomorrow.
628
00:51:26,640 --> 00:51:31,960
We have made our military better
trained, better equipped, and better
629
00:51:31,960 --> 00:51:37,000
to meet the threats facing America today
and tomorrow and long in the future.
630
00:51:40,810 --> 00:51:45,170
Back in the end of the Bush
administration, people within the U .S.
631
00:51:45,170 --> 00:51:50,370
were just beginning to convince
President Bush to pour money into
632
00:51:50,370 --> 00:51:51,370
cyber weapons.
633
00:51:52,710 --> 00:51:55,330
Stuxnet started off in the Defense
Department.
634
00:51:55,830 --> 00:52:01,470
Then Robert Gates, Secretary of Defense,
reviewed this program and he said, this
635
00:52:01,470 --> 00:52:04,970
program shouldn't be in the Defense
Department. This should really be under
636
00:52:04,970 --> 00:52:07,550
covert authorities over in the
intelligence world.
637
00:52:08,560 --> 00:52:12,840
So the CIA was very deeply involved in
this operation.
638
00:52:13,080 --> 00:52:19,240
While much of the coding work was done
by the National Security Agency and Unit
639
00:52:19,240 --> 00:52:24,960
8200, its Israeli equivalent, working
together with a newly created military
640
00:52:24,960 --> 00:52:27,740
position called U .S. Cyber Command.
641
00:52:28,280 --> 00:52:34,440
And interestingly, the director of the
National Security Agency would also have
642
00:52:34,440 --> 00:52:36,880
a second role as the commander.
643
00:52:37,870 --> 00:52:39,170
of U .S. Cyber Command.
644
00:52:39,790 --> 00:52:46,770
And U .S. Cyber Command is located at
Fort Meade in the same building as the
645
00:52:46,770 --> 00:52:47,770
NSA.
646
00:52:51,430 --> 00:52:56,510
I was deployed for a year giving advice
on air operations in Iraq and
647
00:52:56,510 --> 00:53:01,130
Afghanistan. And when I was returning
home after that, the assignment I was
648
00:53:01,130 --> 00:53:03,150
given was to go to U .S. Cyber Command.
649
00:53:04,230 --> 00:53:05,910
Cyber Command is the...
650
00:53:07,200 --> 00:53:12,120
military command that's responsible for
essentially conducting the nation's
651
00:53:12,120 --> 00:53:13,840
military affairs in cyberspace.
652
00:53:14,660 --> 00:53:19,560
The stated reason the United States
decided it needed a cyber command was
653
00:53:19,560 --> 00:53:22,260
because of an event called Operation
Buckshot Yankee.
654
00:53:22,760 --> 00:53:28,280
In the fall of 2008, we found some
adversaries inside of our classified
655
00:53:28,280 --> 00:53:29,280
networks.
656
00:53:29,870 --> 00:53:33,990
While it wasn't completely true that we
always assumed that we were successful
657
00:53:33,990 --> 00:53:38,030
at defending things at the barrier, at
the kind of perimeter that we might have
658
00:53:38,030 --> 00:53:42,350
between our networks and the outside
world, there was a large confidence that
659
00:53:42,350 --> 00:53:44,030
we'd been mostly successful.
660
00:53:44,330 --> 00:53:48,070
But that was a moment in time when we
came to the quick conclusion that it's
661
00:53:48,070 --> 00:53:49,330
really ever secure.
662
00:53:50,790 --> 00:53:54,350
That then accelerated the Department of
Defense's progress towards what
663
00:53:54,350 --> 00:53:55,770
ultimately became Cyber Command.
664
00:54:01,600 --> 00:54:02,700
Good morning, sir.
665
00:54:03,580 --> 00:54:05,160
Team Cyber has one item for you today.
666
00:54:05,460 --> 00:54:09,280
Earlier this week, NTOC analysts
detected a foreign adversary using known
667
00:54:09,280 --> 00:54:11,280
methods to access the U .S. military
network.
668
00:54:11,800 --> 00:54:15,180
We identified the malicious activity via
data collected through our information
669
00:54:15,180 --> 00:54:18,740
assurance and signals intelligence
authorities and confirmed it was a cyber
670
00:54:18,740 --> 00:54:22,320
adversary. We provide data to our cyber
partners within the DOD. If you think of
671
00:54:22,320 --> 00:54:27,740
NSA as an institution that essentially
uses its abilities in cyberspace to help
672
00:54:27,740 --> 00:54:32,400
defend communications in that space,
Cyber Command extends that capability by
673
00:54:32,400 --> 00:54:35,100
saying that they will then take
responsibility to attack.
674
00:54:36,920 --> 00:54:39,620
NSA has no legal authority to attack.
675
00:54:39,860 --> 00:54:42,000
It's never had it. I doubt that it ever
will.
676
00:54:42,400 --> 00:54:46,620
It might explain why U .S. Cyber Command
is sitting out at Fort Meade on top of
677
00:54:46,620 --> 00:54:47,660
the National Security Agency.
678
00:54:48,190 --> 00:54:52,770
Because NSA has the ability to do these
things, Cyber Command has the authority
679
00:54:52,770 --> 00:54:56,910
to do these things. And these things
here refer to the cyber attack.
680
00:54:57,250 --> 00:55:03,190
This is a huge change for the nature of
the intelligence agencies.
681
00:55:03,650 --> 00:55:09,470
The NSA was supposed to be a code
-making and code -breaking operation to
682
00:55:09,470 --> 00:55:15,410
monitor the communications of foreign
powers and American adversaries in the
683
00:55:15,410 --> 00:55:16,810
defense of the United States.
684
00:55:17,630 --> 00:55:23,750
But creating a cyber command meant using
the same technology to do offense.
685
00:55:26,090 --> 00:55:32,470
Once you get inside an adversary's
computer networks, you put an implant in
686
00:55:32,470 --> 00:55:37,230
network. And we have tens of thousands
of foreign computers and networks that
687
00:55:37,230 --> 00:55:38,630
the United States has put implants in.
688
00:55:39,030 --> 00:55:43,030
You can use it to monitor what's going
across that network.
689
00:55:43,630 --> 00:55:47,310
And you can use it to insert cyber
weapons, malware.
690
00:55:48,590 --> 00:55:51,970
If you can spy on a network, you can
manipulate it.
691
00:55:52,730 --> 00:55:54,070
It's already included.
692
00:55:54,410 --> 00:55:56,770
The only thing you need is an act of
will.
693
00:56:00,910 --> 00:56:02,390
It played a role in Iraq.
694
00:56:02,810 --> 00:56:07,430
I can't tell you whether it was military
or not, but I can tell you NFA had
695
00:56:07,430 --> 00:56:08,810
combat support teams in country.
696
00:56:10,190 --> 00:56:15,410
And for the first time, units in the
field had direct access to NSA intel.
697
00:56:18,010 --> 00:56:21,710
Over time, we thought more about offense
than defense, you know, more about
698
00:56:21,710 --> 00:56:23,010
attacking than intelligence.
699
00:56:24,550 --> 00:56:29,270
In the old days, SIGINT units would try
to track radios, but through NSA in
700
00:56:29,270 --> 00:56:33,930
Iraq, we had access to all the networks
going in and out of the country. We
701
00:56:33,930 --> 00:56:36,750
hoovered off every text message, email,
and phone call.
702
00:56:37,590 --> 00:56:39,770
the complete surveillance state.
703
00:56:40,650 --> 00:56:46,950
We could find the bad guys, say a gang
making IEDs, map their networks, and
704
00:56:46,950 --> 00:56:48,670
follow them in real time.
705
00:56:49,170 --> 00:56:54,030
We could lock into cell phones even when
they were off, send a fake text from a
706
00:56:54,030 --> 00:57:00,630
friend, suggest a meeting place, and
then capture or kill.
707
00:57:02,930 --> 00:57:09,040
A lot of the people that came to cyber
command the military guys, came directly
708
00:57:09,040 --> 00:57:13,340
from an assignment in Afghanistan or
Iraq, because those are the people with
709
00:57:13,340 --> 00:57:17,440
experience and expertise in operations,
and those are the ones you want looking
710
00:57:17,440 --> 00:57:21,580
at this to see how cyber could
facilitate traditional military
711
00:57:34,030 --> 00:57:39,750
Fresh from the surge, I went to work at
NSA in 07 in a supervisory capacity.
712
00:57:40,490 --> 00:57:42,150
Exactly where did you work?
713
00:57:42,630 --> 00:57:46,470
Fort Meade. You know, I commuted to that
massive complex every single day.
714
00:57:47,990 --> 00:57:52,370
I was in TAO S321, The Rock.
715
00:57:53,030 --> 00:57:54,890
Okay, the TAO, The Rock?
716
00:57:55,350 --> 00:57:58,150
Right, sorry. TAO is Tailored Access
Operations.
717
00:57:58,650 --> 00:58:00,290
It's where NSA's hackers work.
718
00:58:00,530 --> 00:58:02,090
Of course, we didn't call them that.
719
00:58:02,370 --> 00:58:03,470
What did you call it?
720
00:58:03,900 --> 00:58:04,900
On -net operators.
721
00:58:05,460 --> 00:58:09,580
They're the only people at NSA allowed
to break in or attack on the internet.
722
00:58:10,620 --> 00:58:14,240
Inside TAO headquarters is the ROC,
Remote Operations Center.
723
00:58:14,980 --> 00:58:20,640
If the US government wants to get in
somewhere, it goes to the ROC.
724
00:58:20,920 --> 00:58:23,560
I mean, we were flooded with requests.
725
00:58:24,460 --> 00:58:29,420
So many that we could only do about 30 %
of the missions that were requested of
726
00:58:29,420 --> 00:58:30,420
us at one time.
727
00:58:30,890 --> 00:58:34,550
through the web, but also by hijacking
shipments of parts.
728
00:58:35,450 --> 00:58:39,910
Sometimes the CIA would assist in
putting implants in machines.
729
00:58:41,290 --> 00:58:48,010
So once inside a target network, we
could just watch,
730
00:58:48,310 --> 00:58:51,790
or we could attack.
731
00:58:55,550 --> 00:58:59,150
Inside NSA was a strange kind of
culture.
732
00:59:00,160 --> 00:59:03,480
Two parts macho military and two parts
cyber geek.
733
00:59:04,160 --> 00:59:08,840
I mean, I came from Iraq, so I was used
to, yes, sir, no, sir, but for the
734
00:59:08,840 --> 00:59:12,020
weapons programmers, we needed more
think -outside -the -box types.
735
00:59:13,280 --> 00:59:19,940
From cubicle to cubicle, you'd see
lightsabers, tribbles, Naruto action
736
00:59:20,140 --> 00:59:22,380
lots of Aqua Teen Hunger Force.
737
00:59:25,280 --> 00:59:28,600
This one guy, they were mostly guys.
738
00:59:29,840 --> 00:59:31,840
who liked to wear a yellow hooded cape.
739
00:59:32,240 --> 00:59:36,100
He used a ton of gray Legos to build a
massive Death Star.
740
00:59:39,300 --> 00:59:41,340
Were they all working on Stuxnet?
741
00:59:41,940 --> 00:59:46,460
We never called it Stuxnet. That was the
name invented by the antivirus guys.
742
00:59:47,380 --> 00:59:50,770
When it hit the papers, We're not
allowed to read about classified
743
00:59:50,950 --> 00:59:54,270
even if it's in the New York Times. We
went out of our way to avoid the term. I
744
00:59:54,270 --> 00:59:58,290
mean, saying Stuxnet out loud was like
saying Voldemort in Harry Potter, the
745
00:59:58,290 --> 00:59:59,550
name that shall not be spoken.
746
01:00:00,190 --> 01:00:01,250
What did you call it then?
747
01:00:09,890 --> 01:00:16,570
The Natanz attack, and this is out there
already, was called Olympic Games,
748
01:00:16,650 --> 01:00:18,050
or OG.
749
01:00:21,800 --> 01:00:28,360
There was a huge operation to test the
code on PLCs here at Fort Meade and in
750
01:00:28,360 --> 01:00:29,360
Sandia, New Mexico.
751
01:00:31,580 --> 01:00:35,120
Remember during the Bush era when Libya
turned over all of its centrifuges?
752
01:00:35,460 --> 01:00:40,140
Those were the same models the Iranians
got from AQ Khan, P1s.
753
01:00:41,620 --> 01:00:46,880
We took them to Oak Ridge and used them
to test the code, just demolish the
754
01:00:46,880 --> 01:00:47,880
inside.
755
01:00:48,640 --> 01:00:52,760
At Dimona, The Israelis also tested on
the P -1s.
756
01:00:53,920 --> 01:00:58,400
Then, partly by using our intel on Iran,
we got the plans for the newer models,
757
01:00:58,600 --> 01:00:59,700
the IR -2s.
758
01:01:00,320 --> 01:01:02,660
We cut out different attack vectors.
759
01:01:03,020 --> 01:01:07,000
We ended up focusing on ways to destroy
the rotor tubes.
760
01:01:08,020 --> 01:01:11,360
In the tests we ran, we blew them apart.
761
01:01:12,800 --> 01:01:14,460
They swept up the pieces.
762
01:01:14,680 --> 01:01:15,940
They put it on an airplane.
763
01:01:16,220 --> 01:01:17,580
They flew it to Washington.
764
01:01:18,060 --> 01:01:21,300
They stuck it in the truck, they drove
it through the gates of the White House,
765
01:01:21,420 --> 01:01:26,960
and dumped the shards out on the
conference room table in the Situation
766
01:01:27,240 --> 01:01:30,040
And then they invited President Bush to
come down and take a look.
767
01:01:30,500 --> 01:01:35,880
And when he could pick up the shard of a
piece of centrifuge, he was convinced
768
01:01:35,880 --> 01:01:37,040
this might be worth it.
769
01:01:37,480 --> 01:01:38,920
And he said, go ahead and try.
770
01:01:39,840 --> 01:01:44,440
Was there legal concern inside the Bush
administration that this might be an act
771
01:01:44,440 --> 01:01:45,440
of undeclared war?
772
01:01:46,410 --> 01:01:49,970
If there were concerns, I haven't found
them.
773
01:01:51,310 --> 01:01:56,910
That doesn't mean that they didn't exist
and that some lawyers somewhere were
774
01:01:56,910 --> 01:02:00,570
concerned about it, but this was an
entirely new territory.
775
01:02:01,450 --> 01:02:06,590
At the time, there were really very few
people who had expertise specifically on
776
01:02:06,590 --> 01:02:08,030
the law of war and cyber.
777
01:02:08,350 --> 01:02:11,930
And basically what we did was looking
at, okay, here's our broad direction.
778
01:02:12,770 --> 01:02:15,390
Now let's look technically, what can we
do?
779
01:02:15,950 --> 01:02:17,610
to facilitate this broad direction.
780
01:02:18,010 --> 01:02:23,730
After that, maybe I would come in or one
of my lawyers would come in and say,
781
01:02:23,790 --> 01:02:26,530
okay, this is what we may do.
782
01:02:27,130 --> 01:02:28,130
Okay.
783
01:02:28,370 --> 01:02:32,190
There are many things we can do, but we
are not allowed to do them. And then
784
01:02:32,190 --> 01:02:35,270
after that, there's still a final level
that we look at, and that's what should
785
01:02:35,270 --> 01:02:36,049
we do?
786
01:02:36,050 --> 01:02:40,810
Because there are many things that would
be technically possible and technically
787
01:02:40,810 --> 01:02:42,570
legal, but a bad idea.
788
01:02:43,470 --> 01:02:49,460
For Natan, It was a CIA -led operation,
so we had to have agency sign off.
789
01:02:50,020 --> 01:02:56,800
Really? Someone from the agency stood
behind the operator and the analyst
790
01:02:56,800 --> 01:02:59,660
and gave the order to launch every
attack.
791
01:03:07,400 --> 01:03:11,460
Before they even started this attack,
they put inside of the code the kill
792
01:03:11,600 --> 01:03:13,420
a date at which it would stop operating.
793
01:03:14,129 --> 01:03:16,990
Cut -off date. We don't normally see
that in other threats.
794
01:03:17,310 --> 01:03:19,870
And you have to think, well, why is
there a cut -off date in there?
795
01:03:20,230 --> 01:03:24,410
And when you realize that, well,
succinct was probably written by
796
01:03:24,410 --> 01:03:29,610
that there are laws regarding how you
can use this sort of software, that
797
01:03:29,610 --> 01:03:33,450
may have been a legal team who said, no,
you need to have a cut -off date in
798
01:03:33,450 --> 01:03:36,630
there and you can only do this and you
can only go that far and we need to
799
01:03:36,630 --> 01:03:37,630
if this is legal or not.
800
01:03:39,550 --> 01:03:42,670
That date is a few days before Obama's
inauguration.
801
01:03:43,690 --> 01:03:48,390
So the theory was that this was an
operation that needed to be stopped at a
802
01:03:48,390 --> 01:03:53,470
certain time because there was going to
be a handover and that more approval was
803
01:03:53,470 --> 01:03:54,470
needed.
804
01:03:56,830 --> 01:03:58,850
Are you prepared to take the oath,
Senator?
805
01:03:59,110 --> 01:04:00,110
I am.
806
01:04:00,370 --> 01:04:03,730
I, Barack Hussein Obama, do solemnly
swear.
807
01:04:03,950 --> 01:04:06,450
I, Barack Hussein Obama, do solemnly
swear.
808
01:04:06,650 --> 01:04:11,310
The Olympic Games was reauthorized by
President Obama in his first year in
809
01:04:11,310 --> 01:04:12,310
office, 2009.
810
01:04:16,880 --> 01:04:20,020
It was fascinating because it was the
first year of the Obama administration
811
01:04:20,020 --> 01:04:23,180
they would talk to you endlessly about
cyber defense.
812
01:04:24,060 --> 01:04:28,240
We count on computer networks to deliver
our oil and gas, our power and our
813
01:04:28,240 --> 01:04:33,440
water. We rely on them for public
transportation and air traffic control.
814
01:04:34,000 --> 01:04:38,840
But just as we failed in the past to
invest in our physical infrastructure,
815
01:04:38,840 --> 01:04:43,800
roads, our bridges and rails, we failed
to invest in the security of our digital
816
01:04:43,800 --> 01:04:44,800
infrastructure.
817
01:04:45,320 --> 01:04:50,460
He was running East Room events, trying
to get people to focus on the need to
818
01:04:50,460 --> 01:04:53,780
defend cyber networks and defend
American infrastructure.
819
01:04:54,300 --> 01:04:59,700
But when you asked questions about the
use of offensive cyber weapons,
820
01:04:59,980 --> 01:05:02,780
everything went dead. No cooperation.
821
01:05:03,340 --> 01:05:07,120
White House wouldn't help. Pentagon
wouldn't help. NSA wouldn't help. Nobody
822
01:05:07,120 --> 01:05:08,140
would talk to you about it.
823
01:05:08,660 --> 01:05:13,110
But when you dug into the budget, for
cyber spending during the Obama
824
01:05:13,110 --> 01:05:18,590
administration, what you discovered was
much of it was being spent on offensive
825
01:05:18,590 --> 01:05:19,590
cyber weapons.
826
01:05:20,790 --> 01:05:25,430
You see phrases like Title X CNO.
827
01:05:25,690 --> 01:05:32,370
Title X means operations for the U .S.
military, and CNO means computer network
828
01:05:32,370 --> 01:05:33,370
operations.
829
01:05:34,090 --> 01:05:38,530
This is considerable evidence that
Stuxnet was just the opening wedge.
830
01:05:39,340 --> 01:05:45,460
of what is a much broader U .S.
government effort now to develop an
831
01:05:45,460 --> 01:05:46,500
class of weapons.
832
01:05:52,480 --> 01:05:54,860
Sexnet wasn't just an evolution.
833
01:05:55,160 --> 01:05:57,360
It was really a revolution in the threat
landscape.
834
01:05:59,420 --> 01:06:03,500
In the past, the vast majority of
threats that we saw were always
835
01:06:03,500 --> 01:06:04,500
an operator somewhere.
836
01:06:04,799 --> 01:06:08,060
They wouldn't infect your machine, but
they would have what's called a callback
837
01:06:08,060 --> 01:06:09,220
or command and control channel.
838
01:06:09,440 --> 01:06:12,500
The threats would actually contact the
operator and say, what do you want me to
839
01:06:12,500 --> 01:06:12,979
do next?
840
01:06:12,980 --> 01:06:16,380
And the operator would send down
commands and say, maybe search through
841
01:06:16,380 --> 01:06:19,520
directory, find these folders, find
these files, upload these files to me,
842
01:06:19,560 --> 01:06:21,760
spread to this other machine, things of
that nature.
843
01:06:22,420 --> 01:06:27,660
But Stuxnet couldn't have a command and
control channel because once it got
844
01:06:27,660 --> 01:06:30,480
inside in its hands, it would not have
been able to reach back out.
845
01:06:30,760 --> 01:06:31,538
to the attackers.
846
01:06:31,540 --> 01:06:35,300
The Natanz network is completely air
-gapped from the rest of the internet.
847
01:06:35,300 --> 01:06:37,680
not connected to the internet. It's its
own isolated network.
848
01:06:37,980 --> 01:06:40,980
Generally, getting across an air -gap is
one of the more difficult challenges
849
01:06:40,980 --> 01:06:45,760
that attackers will face just because of
the fact that everything is in place to
850
01:06:45,760 --> 01:06:46,760
prevent that.
851
01:06:46,800 --> 01:06:50,000
Everything, you know, the policies and
procedures and the physical network
852
01:06:50,000 --> 01:06:54,280
that's in place is specifically designed
to prevent you crossing the air -gap.
853
01:06:54,420 --> 01:06:58,320
But there's no truly air -gap network in
these real -world production
854
01:06:58,320 --> 01:07:01,060
environments. People got to get new code
into Natan.
855
01:07:01,260 --> 01:07:05,000
People have to get log files off of the
networks in Natan. People have to
856
01:07:05,000 --> 01:07:05,819
upgrade equipment.
857
01:07:05,820 --> 01:07:06,960
People have to upgrade computers.
858
01:07:07,240 --> 01:07:13,920
This highlights one of the major
security issues that we have in the
859
01:07:14,160 --> 01:07:19,200
If you think, well, nobody can attack
this power plant or this chemical plant
860
01:07:19,200 --> 01:07:22,420
because it's not connected to the
Internet, that's a bizarre illusion.
861
01:07:26,600 --> 01:07:31,620
The first time we introduced the code
into Natan, we used human assets.
862
01:07:32,800 --> 01:07:39,200
Maybe CIA, more likely than thought. But
our team was kept in the dark about the
863
01:07:39,200 --> 01:07:40,200
tradecraft.
864
01:07:40,560 --> 01:07:46,500
We heard rumors in Moscow, an Iranian
laptop infected by a phony semen
865
01:07:46,500 --> 01:07:47,920
technician with a flash drive.
866
01:07:49,800 --> 01:07:53,020
A double agent in Iran with access to
Natan.
867
01:07:53,600 --> 01:07:55,280
But I don't really know.
868
01:07:55,720 --> 01:08:01,260
What we had to focus on was to write the
code so that once inside, the worm
869
01:08:01,260 --> 01:08:02,260
acted on its own.
870
01:08:02,440 --> 01:08:06,460
They built in all the code and all the
logic into the threat to be able to
871
01:08:06,460 --> 01:08:07,460
operate all by itself.
872
01:08:07,660 --> 01:08:09,520
It had the ability to spread by itself.
873
01:08:09,840 --> 01:08:12,800
It had the ability to figure out, do I
have the right PLCs?
874
01:08:13,080 --> 01:08:15,740
Have I arrived in a TAM? Am I at the
target?
875
01:08:15,940 --> 01:08:19,300
And when it's on target, it executes
autonomously.
876
01:08:19,920 --> 01:08:23,000
That also means you cannot call off the
attack.
877
01:08:23,790 --> 01:08:29,550
It was definitely the type of attack
where someone had decided that this is
878
01:08:29,550 --> 01:08:30,550
they wanted to do.
879
01:08:30,609 --> 01:08:33,390
There was no turning back once Sexcent
was released.
880
01:08:38,710 --> 01:08:42,770
When it began to actually execute its
payload, you would have a whole bunch of
881
01:08:42,770 --> 01:08:46,090
centrifuges in a huge array of cascades,
sitting in a big hall.
882
01:08:46,930 --> 01:08:49,950
And then just off that hall, you would
have an operator's room.
883
01:08:50,270 --> 01:08:53,170
big control panels in front of them, a
big window where they could see into the
884
01:08:53,170 --> 01:08:54,170
hall.
885
01:08:54,229 --> 01:08:57,410
Computers monitor the activities of all
these centrifuges.
886
01:08:58,370 --> 01:09:02,490
So a centrifuge is driven by an
electrical motor.
887
01:09:03,069 --> 01:09:09,710
And the speed of this electrical motor
is controlled by another PLC, by another
888
01:09:09,710 --> 01:09:10,970
programmable logic controller.
889
01:09:13,790 --> 01:09:17,710
SexNet would wait for 13 days before
doing anything.
890
01:09:18,270 --> 01:09:23,050
Because 13 days is about the time it
takes to actually fill an entire cascade
891
01:09:23,050 --> 01:09:24,649
centrifuges with uranium.
892
01:09:25,090 --> 01:09:29,010
They didn't want to attack when the
centrifuges essentially were empty or at
893
01:09:29,010 --> 01:09:30,010
beginning of the enrichment process.
894
01:09:31,470 --> 01:09:35,990
What SexNet did was it actually would
sit there during the 13 days and
895
01:09:35,990 --> 01:09:40,149
record all of the normal activities that
were happening and save it.
896
01:09:40,850 --> 01:09:44,430
And once they saw them spinning for 13
days, then the attack occurred.
897
01:09:45,839 --> 01:09:51,260
Centrifuges spin at incredible speeds,
about 1 ,000 hertz. They have a safe
898
01:09:51,260 --> 01:09:55,040
operating speed, 63 ,000 revolutions per
minute.
899
01:09:55,400 --> 01:09:59,800
That's what caused the uranium
enrichment centrifuges to spin up to 1
900
01:09:59,800 --> 01:10:03,060
hertz. Up to 80 ,000 revolutions per
minute.
901
01:10:06,500 --> 01:10:10,320
What would happen was those centrifuges
would go through what's called a
902
01:10:10,320 --> 01:10:11,320
resonance frequency.
903
01:10:11,740 --> 01:10:15,140
It would go through a frequency at which
the metal would basically vibrate
904
01:10:15,140 --> 01:10:16,980
uncontrollably and essentially shatter.
905
01:10:17,460 --> 01:10:19,220
There'd be uranium gas everywhere.
906
01:10:20,560 --> 01:10:24,320
And then the second attack they
attempted was they actually tried to
907
01:10:24,320 --> 01:10:28,500
2 hertz. They were slowed down to almost
10 still.
908
01:10:29,280 --> 01:10:31,820
And at 2 hertz, sort of an opposite
effect occurred.
909
01:10:32,120 --> 01:10:36,100
You can imagine it to a top that you
spin, and as the top begins to slow
910
01:10:36,160 --> 01:10:38,680
it begins to wobble. That's what happens
to these centrifuges.
911
01:10:39,070 --> 01:10:41,750
They would begin to wobble and
essentially shatter and fall apart.
912
01:10:46,530 --> 01:10:50,350
And instead of sending back to the
computer what was really happening, it
913
01:10:50,350 --> 01:10:52,650
send back that old data that it had
recorded.
914
01:10:52,910 --> 01:10:55,570
And so the computer's sitting there
thinking, yep, running at 1 ,000 hertz,
915
01:10:55,690 --> 01:10:57,770
everything's fine. Running at 1 ,000
hertz, everything's fine.
916
01:10:58,070 --> 01:11:00,590
But those centrifuges are potentially
spinning up wildly.
917
01:11:01,010 --> 01:11:02,350
A huge noise would occur.
918
01:11:02,930 --> 01:11:04,410
It'd be like, you know, a jet engine.
919
01:11:08,040 --> 01:11:11,460
So the operators then would know, whoa,
something is going wrong here. They
920
01:11:11,460 --> 01:11:14,820
might look at their monitors and see, it
says 1 ,000 hertz, but they would hear
921
01:11:14,820 --> 01:11:17,340
that in the room something gravely bad
was happening.
922
01:11:17,600 --> 01:11:23,480
Not only are the operators fooled into
thinking everything's normal, but also
923
01:11:23,480 --> 01:11:28,360
any kind of automated protective logic
is fooled.
924
01:11:29,680 --> 01:11:31,440
You can't just turn these centrifuges
off.
925
01:11:31,660 --> 01:11:34,520
They have to be brought down in a very
controlled manner.
926
01:11:34,900 --> 01:11:36,700
And so they would hit literally the big
red button.
927
01:11:37,040 --> 01:11:38,160
to initiate a graceful shutdown.
928
01:11:38,660 --> 01:11:40,740
And that intercepts that code.
929
01:11:41,000 --> 01:11:44,340
So you would have these operators
slamming on that button over and over
930
01:11:44,460 --> 01:11:45,460
and nothing would happen.
931
01:11:47,060 --> 01:11:53,060
If your cyber weapon is good enough, if
your enemy is not aware of it,
932
01:11:53,300 --> 01:11:58,840
it is an ideal weapon, because the enemy
even don't understand what is happening
933
01:11:58,840 --> 01:11:59,679
to it.
934
01:11:59,680 --> 01:12:02,660
Maybe even better, the enemy begins to
doubt their own capability.
935
01:12:03,180 --> 01:12:04,180
Absolutely.
936
01:12:04,700 --> 01:12:05,700
Certainly.
937
01:12:06,250 --> 01:12:12,090
One must conclude that what happened at
Natanz must have driven the engineers
938
01:12:12,090 --> 01:12:17,770
crazy. Because the worst thing that can
happen to a maintenance engineer is not
939
01:12:17,770 --> 01:12:22,710
being able to figure out what the cause
of specific trouble is. So they must
940
01:12:22,710 --> 01:12:25,110
have been analyzing themselves to death.
941
01:12:27,850 --> 01:12:30,930
You know, you see centrifuges blowing
up.
942
01:12:31,150 --> 01:12:32,950
You look at the computer screens.
943
01:12:33,270 --> 01:12:34,890
They go with the proper speed.
944
01:12:35,790 --> 01:12:38,810
There's a proper gas pressure.
Everything looks beautiful.
945
01:12:41,630 --> 01:12:44,770
Through 2009, it was going pretty
smoothly.
946
01:12:45,330 --> 01:12:49,530
Centrifuges were blowing up. The
International Atomic Energy Agency
947
01:12:49,530 --> 01:12:53,710
would go into Natanz and they would see
that whole sections of the centrifuges
948
01:12:53,710 --> 01:12:54,710
had been removed.
949
01:12:55,610 --> 01:13:01,070
The United States knew from its
intelligence channels that some Iranian
950
01:13:01,070 --> 01:13:04,650
scientists and engineers were being
fired because...
951
01:13:05,040 --> 01:13:09,140
The centrifuges were blowing up, and the
Iranians had assumed that this was
952
01:13:09,140 --> 01:13:13,640
because they were making errors, they
were manufacturing mistakes. Clearly
953
01:13:13,640 --> 01:13:14,640
was somebody's fault.
954
01:13:15,440 --> 01:13:21,200
So the program was doing exactly what it
was supposed to be doing, which was it
955
01:13:21,200 --> 01:13:26,820
was blowing up centrifuges and it was
leaving no trace and leaving the
956
01:13:26,820 --> 01:13:32,300
to wonder what they got hit by. This was
the brilliance of Olympic Games.
957
01:13:32,760 --> 01:13:35,400
You know, as the former director of a
couple of big three -letter agencies,
958
01:13:35,820 --> 01:13:40,260
slowing down 1 ,000 centrifuges in a
ton, an unalloyed good.
959
01:13:40,500 --> 01:13:45,640
There was a need for buying time. There
was a need for slowing them down.
960
01:13:45,900 --> 01:13:49,120
There was a need to try to push them to
the negotiating table.
961
01:13:49,380 --> 01:13:51,480
I mean, there are a lot of variables at
play here.
962
01:13:56,000 --> 01:13:59,480
President Obama would go down into the
Situation Room.
963
01:13:59,960 --> 01:14:04,540
And he would have laid out in front of
him what they called the horse blanket,
964
01:14:04,700 --> 01:14:10,460
which was a giant schematic of the
Natanz nuclear enrichment plant.
965
01:14:11,000 --> 01:14:16,880
And the designers of Olympic Games would
describe to him what kind of progress
966
01:14:16,880 --> 01:14:21,280
they made and look for him for the
authorization to move on ahead to the
967
01:14:21,280 --> 01:14:22,280
attack.
968
01:14:23,720 --> 01:14:27,840
And at one point during those
discussions, he said to a number of his
969
01:14:27,840 --> 01:14:32,320
know, I had some concerns because once
word of this gets out, and eventually he
970
01:14:32,320 --> 01:14:36,440
knew it would get out, the Chinese may
use it as an excuse for their attacks on
971
01:14:36,440 --> 01:14:38,280
us or Russians might or others.
972
01:14:39,040 --> 01:14:44,940
So he clearly had some misgivings, but
they weren't big enough to stop him from
973
01:14:44,940 --> 01:14:45,940
going ahead with the program.
974
01:14:47,400 --> 01:14:52,180
And then in 2010, a decision was made.
975
01:14:52,640 --> 01:14:53,880
to change the code.
976
01:14:59,580 --> 01:15:05,020
Our human assets weren't always able to
get code updates into Natanz.
977
01:15:05,320 --> 01:15:07,160
And we weren't told exactly why.
978
01:15:07,640 --> 01:15:13,360
But we were told we had to have a cyber
solution for delivering the code.
979
01:15:13,960 --> 01:15:16,460
But the delivery systems were tricky.
980
01:15:16,680 --> 01:15:20,420
If they weren't aggressive enough, they
wouldn't get in. They were too
981
01:15:20,420 --> 01:15:23,490
aggressive. they could spread and be
discovered.
982
01:15:25,970 --> 01:15:29,810
When we got the first sample, there was
some configuration information inside of
983
01:15:29,810 --> 01:15:33,270
it, and one of the pieces in there was a
version number, 1 .1.
984
01:15:34,130 --> 01:15:37,650
And that made us realize, well, look,
this likely isn't the only copy.
985
01:15:37,850 --> 01:15:42,070
We went back through our databases
looking for anything that looked similar
986
01:15:42,070 --> 01:15:43,070
Stuxnet.
987
01:15:44,290 --> 01:15:47,750
As we began to collect more samples, we
found a few earlier versions of Stuxnet.
988
01:15:48,830 --> 01:15:54,130
And when we analyzed that code, we saw
that versions previous to 1 .1 were a
989
01:15:54,130 --> 01:15:55,130
less aggressive.
990
01:15:55,510 --> 01:15:59,530
The earlier version of Sexton, it
basically required humans to do a little
991
01:15:59,530 --> 01:16:02,970
of double -clicking in order for it to
spread from one computer to another.
992
01:16:03,310 --> 01:16:06,310
And so what we believe after looking at
that code is two things.
993
01:16:07,250 --> 01:16:11,330
One, either they didn't get into Natanz
with that earlier version because it
994
01:16:11,330 --> 01:16:13,790
simply wasn't aggressive enough, wasn't
able to jump over that error gap.
995
01:16:14,870 --> 01:16:17,850
And or two, that payload as well...
996
01:16:18,220 --> 01:16:19,220
Didn't work properly.
997
01:16:19,520 --> 01:16:20,800
Didn't work to their satisfaction.
998
01:16:21,380 --> 01:16:23,100
Maybe was not explosive enough.
999
01:16:23,640 --> 01:16:28,560
There were slightly different versions,
which were aimed at different parts of
1000
01:16:28,560 --> 01:16:29,580
the centrifuge cascade.
1001
01:16:30,260 --> 01:16:33,640
But the guys at Symantec figured you
changed the code because the first
1002
01:16:33,640 --> 01:16:35,720
variations couldn't get in and didn't
work right.
1003
01:16:36,300 --> 01:16:37,300
Bullshit.
1004
01:16:37,700 --> 01:16:39,920
We always found a way to get across the
air gap.
1005
01:16:40,320 --> 01:16:43,920
At TAO, we laughed when people thought
they were protected by an air gap.
1006
01:16:44,750 --> 01:16:47,770
And for OG, the early versions of the
payload did work.
1007
01:16:48,030 --> 01:16:54,370
But what NSA did was always low -key and
subtle.
1008
01:16:55,290 --> 01:17:00,410
The problem was that Unit 8200, the
Israeli, kept pushing up to be more
1009
01:17:00,410 --> 01:17:01,410
aggressive.
1010
01:17:02,650 --> 01:17:05,270
The later version of DuckNet, 1 .1.
1011
01:17:05,690 --> 01:17:09,190
That version had multiple ways of
spreading. It had the four zero days
1012
01:17:09,190 --> 01:17:12,130
it, for example, that allowed it to
spread all by itself without you doing
1013
01:17:12,130 --> 01:17:13,870
anything. It could spread via network
shares.
1014
01:17:14,310 --> 01:17:15,890
It could spread via USB keys.
1015
01:17:16,190 --> 01:17:20,270
It was able to spread via network
exploits. That's the sample that
1016
01:17:20,270 --> 01:17:21,710
the stolen digital certificate.
1017
01:17:22,170 --> 01:17:27,810
That is the sample that all of a sudden
became so noisy and caught the attention
1018
01:17:27,810 --> 01:17:29,450
of the antivirus guys.
1019
01:17:30,250 --> 01:17:33,110
In the first sample, we don't find that.
1020
01:17:35,530 --> 01:17:42,090
This is very strange because it tells us
that in the process of this
1021
01:17:42,090 --> 01:17:47,430
development, the attackers were less
concerned with operational security.
1022
01:17:53,330 --> 01:17:58,030
Pac -Man actually kept a log inside of
itself of all the machines that it
1023
01:17:58,030 --> 01:18:01,850
infected along the way as it jumped from
one machine to another to another to
1024
01:18:01,850 --> 01:18:04,610
another. And we were able to gather up.
1025
01:18:04,990 --> 01:18:08,750
All the samples that we could acquire,
tens of thousands of samples. We
1026
01:18:08,750 --> 01:18:12,390
extracted all of those logs. We can see
the exact path that took.
1027
01:18:15,370 --> 01:18:19,090
Eventually, we were able to trace back
this version of Stuxnet to ground zero,
1028
01:18:19,230 --> 01:18:21,890
to the first five infections in the
world.
1029
01:18:22,770 --> 01:18:27,110
The first five infections are all
outside an intense plant, all inside of
1030
01:18:27,110 --> 01:18:32,010
organizations inside of Iran, all
organizations that are involved in
1031
01:18:32,010 --> 01:18:33,010
control systems.
1032
01:18:33,180 --> 01:18:37,880
The construction of industrial control
facilities, clearly contractors who were
1033
01:18:37,880 --> 01:18:41,260
working on the Natanz facility, and the
attackers knew that.
1034
01:18:41,760 --> 01:18:45,640
They're electrical companies, they're
piping companies, they're, you know,
1035
01:18:45,640 --> 01:18:49,180
sorts of companies, and they knew that
technicians from those companies would
1036
01:18:49,180 --> 01:18:53,440
visit Natanz. So they would infect these
companies, and then technicians would
1037
01:18:53,440 --> 01:18:57,080
take... Their computer or their laptop
or their USB, that operator then goes
1038
01:18:57,080 --> 01:19:00,380
down into Natanz. And he plugs in his
USB key, which has some code that he
1039
01:19:00,380 --> 01:19:02,900
to update into Natanz, into the Natanz
network.
1040
01:19:03,120 --> 01:19:05,980
And now Sucset is able to get inside
Natanz and conduct its attack.
1041
01:19:07,980 --> 01:19:11,760
These five companies were specifically
targeted to spread Sucset into Natanz.
1042
01:19:12,000 --> 01:19:13,380
And that it wasn't that...
1043
01:19:13,920 --> 01:19:17,260
So it kind of escaped out in the town
and then spread all over the world. And
1044
01:19:17,260 --> 01:19:20,760
was this big mistake and, oh, it wasn't
meant to spread that far, but it really
1045
01:19:20,760 --> 01:19:25,040
did. No, that's not the way we see it.
The way we see it is that they wanted it
1046
01:19:25,040 --> 01:19:27,160
to spread far so that they could get it
into the town.
1047
01:19:27,480 --> 01:19:32,260
Someone decided that we're going to
create something new, something evolved,
1048
01:19:32,600 --> 01:19:35,420
that's going to be far, far, far more
aggressive.
1049
01:19:36,800 --> 01:19:41,240
And we're okay, frankly, with it
spreading all over the world.
1050
01:19:41,480 --> 01:19:43,980
to innocent machines and in order to go
after our target.
1051
01:19:49,560 --> 01:19:56,140
The Mossad had the role, had the
assignment to
1052
01:19:56,140 --> 01:20:03,000
deliver the virus, to make sure that
Stuxnet would be put
1053
01:20:03,000 --> 01:20:06,400
in place in a time to affect the
centrifuges.
1054
01:20:08,300 --> 01:20:13,400
Mayor Dagan, the head of Mossad, was
under growing pressure from the prime
1055
01:20:13,400 --> 01:20:16,700
minister, Benjamin Netanyahu, to produce
results.
1056
01:20:18,640 --> 01:20:21,420
Inside Iraq, we were furious.
1057
01:20:23,240 --> 01:20:28,280
The Israelis took our code for delivery
system and changed it.
1058
01:20:29,740 --> 01:20:34,080
Then, on their own, without our
agreement, they just fucking launched
1059
01:20:34,879 --> 01:20:38,280
2010, around the same time they started
killing Iranian scientists.
1060
01:20:38,640 --> 01:20:40,080
And they fucked up the code.
1061
01:20:40,740 --> 01:20:45,640
Instead of hiding, the code started
shutting down computers, so naturally
1062
01:20:45,640 --> 01:20:46,640
noticed.
1063
01:20:48,280 --> 01:20:51,200
Because they were in a hurry, they
opened Pandora's box.
1064
01:20:52,260 --> 01:20:56,700
They let it out, and it spread all over
the world.
1065
01:21:02,000 --> 01:21:03,560
The worm spread quickly.
1066
01:21:04,120 --> 01:21:07,640
But somehow it remained unseen until it
was identified in Belarus.
1067
01:21:08,780 --> 01:21:13,240
Soon after, Israeli intelligence
confirmed that it had made its way into
1068
01:21:13,240 --> 01:21:17,200
hands of the Russian Federal Security
Service, a successor to the KGB.
1069
01:21:18,940 --> 01:21:23,660
So it happened that the formula for a
secret cyber weapon designed by the U
1070
01:21:23,660 --> 01:21:27,740
and Israel fell into the hands of Russia
and the very country it was meant to
1071
01:21:27,740 --> 01:21:28,740
attack.
1072
01:21:51,869 --> 01:21:58,170
When some country or a coalition of
countries targets a nuclear facility,
1073
01:21:58,370 --> 01:22:00,370
it's an act of war.
1074
01:22:01,420 --> 01:22:04,200
Please, let's be frank here.
1075
01:22:04,660 --> 01:22:10,780
If it wasn't Iran, if a nuclear facility
in the United States
1076
01:22:10,780 --> 01:22:17,700
was targeted in the same way, the
American government
1077
01:22:17,700 --> 01:22:20,860
would not sit by and let this go.
1078
01:22:21,940 --> 01:22:25,440
Shuxnet is an attack in peacetime on
critical infrastructure.
1079
01:22:25,640 --> 01:22:26,459
Yes, it is.
1080
01:22:26,460 --> 01:22:30,180
Look, when I read about it, I thought,
whoa.
1081
01:22:30,670 --> 01:22:31,670
That's a big deal.
1082
01:22:32,050 --> 01:22:33,050
Yeah.
1083
01:22:34,530 --> 01:22:39,450
The people who were running this
program, including Leon Panetta, the
1084
01:22:39,450 --> 01:22:45,130
of the CIA at the time, had to go down
into the Situation Room and face
1085
01:22:45,130 --> 01:22:50,610
President Obama, Vice President Biden,
and explain that this program was
1086
01:22:50,610 --> 01:22:52,490
suddenly on the loose.
1087
01:22:53,530 --> 01:22:58,230
Vice President Biden, at one point
during this discussion...
1088
01:22:58,760 --> 01:23:03,100
sort of exploded in Biden -esque fashion
and blamed the Israelis.
1089
01:23:03,420 --> 01:23:08,260
He said, it must have been the Israelis
who made a change in the code that
1090
01:23:08,260 --> 01:23:09,660
enabled it to get out.
1091
01:23:11,500 --> 01:23:15,620
President Obama said to the senior
leadership, you told me it wouldn't get
1092
01:23:15,620 --> 01:23:19,340
of the network. It did. You told me the
Iranians would never figure out it was
1093
01:23:19,340 --> 01:23:20,239
the United States.
1094
01:23:20,240 --> 01:23:26,100
They did. You told me it would have a
huge effect on their nuclear program,
1095
01:23:26,100 --> 01:23:27,100
it didn't.
1096
01:23:28,279 --> 01:23:33,740
The Natanz plant is inspected every
couple of weeks by the International
1097
01:23:33,740 --> 01:23:35,300
Energy Agency inspectors.
1098
01:23:35,520 --> 01:23:39,840
And if you line up what you know about
the attacks with the inspection reports,
1099
01:23:40,200 --> 01:23:41,460
you can see the effects.
1100
01:23:42,940 --> 01:23:47,580
If you go to the IAEA reports, we really
saw that a lot of centrifuges were
1101
01:23:47,580 --> 01:23:50,140
switched off and they were removed.
1102
01:23:50,760 --> 01:23:53,960
As much as almost a couple of thousand
got compromised.
1103
01:23:55,500 --> 01:23:59,700
When you put it all together, I wouldn't
be surprised if the program got delayed
1104
01:23:59,700 --> 01:24:00,700
by the one year.
1105
01:24:01,140 --> 01:24:07,540
But go then to year 2012 -13 and look,
you know, how the centrifuges started to
1106
01:24:07,540 --> 01:24:08,540
come up again.
1107
01:24:08,940 --> 01:24:14,420
Iran's number of centrifuges went up
exponentially to 20 ,000 with a
1108
01:24:14,420 --> 01:24:16,160
of low -enriched uranium.
1109
01:24:16,480 --> 01:24:18,460
These are high numbers.
1110
01:24:19,500 --> 01:24:21,780
Iran's nuclear facility has expanded.
1111
01:24:22,510 --> 01:24:26,830
with the construction of Fordow and
other highly protected facilities.
1112
01:24:28,670 --> 01:24:34,930
So ironically, cyber warfare,
assassination of its nuclear scientists,
1113
01:24:35,390 --> 01:24:38,750
economic sanctions, political isolation.
1114
01:24:40,170 --> 01:24:46,550
Iran has gone through A to X of every
coercive policy that the US,
1115
01:24:46,850 --> 01:24:50,490
Israel and those who ally with them.
1116
01:24:50,880 --> 01:24:52,020
have placed on Iran.
1117
01:24:52,380 --> 01:24:57,680
And they have actually made Iran's
nuclear program more advanced today than
1118
01:24:57,680 --> 01:24:58,680
was ever before.
1119
01:25:02,300 --> 01:25:09,300
This is a very, very dangerous minefield
that we are walking. And the nations
1120
01:25:09,300 --> 01:25:16,120
who decide to take these covert actions
should be taking into consideration
1121
01:25:16,120 --> 01:25:19,960
all the effects.
1122
01:25:20,460 --> 01:25:21,840
including the moral effect.
1123
01:25:22,500 --> 01:25:29,280
I would say that this is the price that
we have to pay in this
1124
01:25:29,280 --> 01:25:35,200
war, and our blade of righteousness
should be so sharp.
1125
01:25:40,920 --> 01:25:45,860
In Israel and in the United States, the
blade of righteousness cut both ways,
1126
01:25:46,100 --> 01:25:48,660
wounding the targets and the attackers.
1127
01:25:50,060 --> 01:25:54,360
When Stuxnet infected American
computers, the Department of Homeland
1128
01:25:54,780 --> 01:25:59,800
unaware of the cyber weapons launched by
the NSA, devoted enormous resources
1129
01:25:59,800 --> 01:26:02,320
trying to protect Americans from their
own government.
1130
01:26:03,020 --> 01:26:05,560
We had met the enemy, and it was us.
1131
01:26:11,470 --> 01:26:14,890
The purpose of the watch stations that
you see in front of you is to aggregate
1132
01:26:14,890 --> 01:26:19,050
the data coming in from multiple feeds
of what the cyber threats could be. So
1133
01:26:19,050 --> 01:26:23,510
we see threats, we can provide real
-time recommendations for both private
1134
01:26:23,510 --> 01:26:25,430
companies as well as federal agencies.
1135
01:26:26,070 --> 01:26:29,450
Can you give us a readout on this
DuckNet virus?
1136
01:26:30,110 --> 01:26:32,650
Absolutely. We'd be more than happy to
discuss that.
1137
01:26:33,210 --> 01:26:38,290
Early July of 2010, we received a call
that said that this piece of malware was
1138
01:26:38,290 --> 01:26:40,510
discovered, and could we take a look at
it?
1139
01:26:41,870 --> 01:26:45,990
When we first started the analysis,
there was that, oh, crap moment, you
1140
01:26:46,010 --> 01:26:49,030
where we sat there and said, this is
something that's significant. It's
1141
01:26:49,030 --> 01:26:50,290
impacting industrial control.
1142
01:26:50,570 --> 01:26:54,830
It can disrupt it to the point where it
could cause harm and not only damage to
1143
01:26:54,830 --> 01:26:57,130
the equipment, but potentially harm or
loss of life.
1144
01:26:57,810 --> 01:27:01,710
We were very concerned because Stuxnet
was something that we had not seen
1145
01:27:01,710 --> 01:27:03,950
before. So there wasn't a lot of sleep
that night.
1146
01:27:04,460 --> 01:27:08,460
Basically, light up the phones, call
everybody we know, inform the Secretary,
1147
01:27:08,920 --> 01:27:13,460
inform the White House, inform the other
departments and agencies, wake up the
1148
01:27:13,460 --> 01:27:17,260
world, and figure out what's going on
with this particular malware.
1149
01:27:19,460 --> 01:27:21,660
Good morning, Chairman Lieberman,
Ranking Member Collins.
1150
01:27:22,420 --> 01:27:26,200
Something as simple and innocuous as
this becomes a challenge for all of us
1151
01:27:26,200 --> 01:27:29,440
maintain accountability and control of
our critical infrastructure systems.
1152
01:27:29,720 --> 01:27:31,760
This actually contains the Stuxnet
virus.
1153
01:27:32,330 --> 01:27:35,410
I've been asked on a number of
occasions, did you ever think this was
1154
01:27:35,630 --> 01:27:40,890
And at no point did that ever really
cross our mind because we were looking
1155
01:27:40,890 --> 01:27:44,250
it from the standpoint of, is this
something that's coming after the
1156
01:27:44,510 --> 01:27:48,650
You know, what's going to potentially
impact, you know, our industrial control
1157
01:27:48,650 --> 01:27:49,750
base here in the United States?
1158
01:27:50,030 --> 01:27:52,850
You know, I liken it to, you know, field
battle.
1159
01:27:53,170 --> 01:27:56,550
You don't think the sniper that's behind
you is going to be shooting at you
1160
01:27:56,550 --> 01:27:58,530
because you expect him to be on your
side.
1161
01:27:59,360 --> 01:28:04,040
We really don't know who the attacker
was in the Stuxnet case.
1162
01:28:04,260 --> 01:28:10,920
So help us understand a little more what
this thing is, whose origin
1163
01:28:10,920 --> 01:28:14,820
and destination we don't understand.
1164
01:28:16,140 --> 01:28:20,320
Did anybody ever give you any indication
that it was something that they already
1165
01:28:20,320 --> 01:28:24,580
knew about? No. At no time did I get the
impression from someone that that's
1166
01:28:24,580 --> 01:28:27,680
okay, you know, get the little pat on
the head and scoot it out the door.
1167
01:28:27,900 --> 01:28:29,560
I never received a stand -down order.
1168
01:28:29,840 --> 01:28:33,180
No one ever asked to stop looking at
this.
1169
01:28:33,700 --> 01:28:38,940
Do we think that this was a nation
-state actor and that there are a
1170
01:28:38,940 --> 01:28:43,080
number of nation -states that have such
advanced capacity?
1171
01:28:45,320 --> 01:28:48,900
Sean McGurk, the director of cyber for
the Department of Homeland Security,
1172
01:28:49,220 --> 01:28:53,920
testified before the Senate about how he
thought Suxnet was a terrifying threat
1173
01:28:53,920 --> 01:28:55,020
to the United States.
1174
01:28:55,300 --> 01:28:56,520
Is that not a problem?
1175
01:28:56,840 --> 01:28:58,540
And how do you mean?
1176
01:28:58,880 --> 01:29:01,280
That the Suxnet thing was a bad idea?
1177
01:29:01,920 --> 01:29:06,100
No, no, no, just that before he knew
what it was and what it attached to. Oh,
1178
01:29:06,100 --> 01:29:10,060
get it. Yeah, that he was responding to
something that... He thought it was a
1179
01:29:10,060 --> 01:29:12,740
threat to critical infrastructure in the
United States. Yeah.
1180
01:29:13,150 --> 01:29:14,150
The worm is loose.
1181
01:29:14,350 --> 01:29:15,710
The worm is loose. I understand.
1182
01:29:16,090 --> 01:29:22,170
But there's a further theory having to
do with whether or not, following upon
1183
01:29:22,170 --> 01:29:26,550
David Sanger. I got the subplot. And who
did that? Was it the Israelis? Yeah. I
1184
01:29:26,550 --> 01:29:28,290
truly don't know.
1185
01:29:29,070 --> 01:29:31,930
And even though I don't know, I still
can't talk about it. All right?
1186
01:29:32,310 --> 01:29:34,650
Sucks not with somebody's covert action.
1187
01:29:35,050 --> 01:29:39,750
All right? And the definition of covert
action is an activity in which you want
1188
01:29:39,750 --> 01:29:42,450
to have the hand of the actor forever
hidden.
1189
01:29:42,880 --> 01:29:47,460
So by definition, it's going to end up
in this, we don't talk about these
1190
01:29:47,460 --> 01:29:48,460
box.
1191
01:29:53,520 --> 01:30:00,260
To this day, the United States
government has never acknowledged
1192
01:30:00,260 --> 01:30:03,140
offensive cyber attack anywhere in the
world.
1193
01:30:05,140 --> 01:30:11,580
But thanks to Mr. Snowden, we know that
in 2012, President Obama issued an
1194
01:30:11,580 --> 01:30:12,580
executive order.
1195
01:30:12,780 --> 01:30:18,440
that laid out some of the conditions
under which cyber weapons can be used.
1196
01:30:18,440 --> 01:30:24,520
interestingly, every use of a cyber
weapon requires presidential sign -off.
1197
01:30:25,380 --> 01:30:31,240
That is only true in the physical world
for nuclear weapons.
1198
01:30:42,480 --> 01:30:46,400
Nuclear war and nuclear weapons are
vastly different from cyber war and
1199
01:30:46,400 --> 01:30:49,580
weapons. Having said that, there are
some similarities.
1200
01:30:50,240 --> 01:30:55,040
And in the early 1960s, the United
States government suddenly realized it
1201
01:30:55,040 --> 01:30:59,620
thousands of nuclear weapons, big ones
and little ones, weapons on Jeeps,
1202
01:30:59,680 --> 01:31:00,680
weapons on submarines.
1203
01:31:01,520 --> 01:31:05,400
And it really didn't have a doctrine. It
really didn't have a strategy.
1204
01:31:05,620 --> 01:31:09,560
It really didn't have an understanding
at the policy level about how it was
1205
01:31:09,560 --> 01:31:10,800
going to use all of these things.
1206
01:31:11,770 --> 01:31:18,350
And so academics started publishing
unclassified documents about nuclear war
1207
01:31:18,350 --> 01:31:20,250
and nuclear weapons.
1208
01:31:22,090 --> 01:31:28,330
And the result was more than 20 years in
the United States of very vigorous
1209
01:31:28,330 --> 01:31:33,450
national debates about how we want to go
use nuclear weapons.
1210
01:31:36,910 --> 01:31:41,050
And not only did that cause the Congress
and people in the executive branch in
1211
01:31:41,050 --> 01:31:46,110
Washington to think about these things,
it caused the Russians to think about
1212
01:31:46,110 --> 01:31:47,110
these things.
1213
01:31:47,290 --> 01:31:54,190
And out of that grew nuclear doctrine,
mutual assured destruction, all of that
1214
01:31:54,190 --> 01:31:57,290
complicated set of nuclear dynamics.
1215
01:31:58,050 --> 01:32:03,890
Today, on this vital issue, at least, we
have seen what can be accomplished when
1216
01:32:03,890 --> 01:32:04,890
we pull together.
1217
01:32:05,130 --> 01:32:10,850
We can't have that discussion in a
sensible way right now about cyber war
1218
01:32:10,850 --> 01:32:12,590
cyber weapons because everything is
secret.
1219
01:32:13,950 --> 01:32:19,470
And when you get into a discussion with
people in the government, people still
1220
01:32:19,470 --> 01:32:22,690
in the government, people who have
security clearances, you run into a
1221
01:32:22,690 --> 01:32:26,880
wall. Trying to stop Iran is really my
number one job.
1222
01:32:27,260 --> 01:32:31,800
Can I ask you in that context about the
Stuxnet computer virus potentially? You
1223
01:32:31,800 --> 01:32:32,920
can ask, but I won't comment.
1224
01:32:33,640 --> 01:32:34,760
Can you tell us anything?
1225
01:32:35,460 --> 01:32:40,960
No. What do you think has had the most
impact on their nuclear decision
1226
01:32:41,080 --> 01:32:42,300
The Stuxnet virus?
1227
01:32:42,960 --> 01:32:48,380
I can't talk about Stuxnet. I can't even
talk about the operation of Iran
1228
01:32:48,380 --> 01:32:53,280
centrifuges. Was the U .S. involved in
any way in the development of Stuxnet?
1229
01:32:53,740 --> 01:32:57,520
It's hard to get into any kind of
comment on that until we've finished our
1230
01:32:57,520 --> 01:32:58,520
examination.
1231
01:32:59,380 --> 01:33:03,020
But, sir, I'm not asking you if you
think another country was involved. I'm
1232
01:33:03,020 --> 01:33:04,720
asking you if the U .S. was involved.
1233
01:33:05,060 --> 01:33:08,900
And this is not something that we're
going to be able to answer at this
1234
01:33:09,560 --> 01:33:13,060
Look, for the longest time, I was in
fear that I couldn't actually say the
1235
01:33:13,060 --> 01:33:14,620
phrase computer network attack.
1236
01:33:14,940 --> 01:33:20,800
This stuff is hideously overclassified,
and it gets into the way of a mature
1237
01:33:20,800 --> 01:33:27,460
public discussion as to what it is we as
a democracy want our nation to be doing
1238
01:33:27,460 --> 01:33:29,260
up here in the cyber domain.
1239
01:33:30,300 --> 01:33:34,140
This is the former director of NSA and
CIA saying this stuff is overclassified.
1240
01:33:34,900 --> 01:33:39,140
One of the reasons it's as highly
classified as it is, this is a peculiar
1241
01:33:39,140 --> 01:33:42,580
system. This is a weapon system that's
come out of the espionage community.
1242
01:33:42,940 --> 01:33:46,060
And so those people have a habit of
secrecy.
1243
01:33:46,340 --> 01:33:50,480
Secrecy is still justifiable in certain
cases to protect sources or to protect
1244
01:33:50,480 --> 01:33:51,480
national security.
1245
01:33:51,700 --> 01:33:56,780
But when we deal with secrecy, don't
hide behind it to use it as an excuse to
1246
01:33:56,780 --> 01:33:59,500
not disclose something properly that
you...
1247
01:33:59,930 --> 01:34:03,270
know should be, or that the American
people need ultimately to see.
1248
01:34:05,890 --> 01:34:10,710
While most government officials refused
to acknowledge the operation, at least
1249
01:34:10,710 --> 01:34:13,590
one key insider did leak parts of the
story to the press.
1250
01:34:14,650 --> 01:34:20,170
In 2012, David Sanger wrote a detailed
account of Olympic Games that unmasked
1251
01:34:20,170 --> 01:34:24,030
the extensive joint operation between
the U .S. and Israel to launch cyber
1252
01:34:24,030 --> 01:34:25,270
attacks on Matanz.
1253
01:34:25,930 --> 01:34:30,480
The publication of this story Coming at
a time that turned out that there were a
1254
01:34:30,480 --> 01:34:35,360
number of other unrelated national
security stories being published led to
1255
01:34:35,360 --> 01:34:38,760
announcement of investigations by the
Attorney General.
1256
01:34:39,560 --> 01:34:43,080
Into the press and into the leaf. Into
the press and into the leaf.
1257
01:34:45,640 --> 01:34:49,840
Soon after the article, the Obama
administration targeted General James
1258
01:34:49,840 --> 01:34:54,580
Cartwright in a criminal investigation
for allegedly leaking classified details
1259
01:34:54,580 --> 01:34:55,760
about Stuxnet.
1260
01:34:57,100 --> 01:35:01,120
There are reports of cyber attacks on
the Iranian nuclear programs that you've
1261
01:35:01,120 --> 01:35:03,560
ordered. What's your reaction to this
information getting out? Well, first of
1262
01:35:03,560 --> 01:35:07,720
all, I'm not going to comment on the
details of what are
1263
01:35:07,720 --> 01:35:14,400
supposed to be classified items.
1264
01:35:15,220 --> 01:35:20,400
Since I've been in office, my attitude
has been zero tolerance for these kinds
1265
01:35:20,400 --> 01:35:21,400
of leaks.
1266
01:35:21,660 --> 01:35:25,920
We have mechanisms in place where if we
can root out folks.
1267
01:35:26,440 --> 01:35:29,360
who have leaked, they will suffer
consequences.
1268
01:35:29,980 --> 01:35:35,320
It became a significant issue and a very
wide -ranging investigation in which I
1269
01:35:35,320 --> 01:35:38,940
think most of the people who were
cleared for Olympic Games at some point
1270
01:35:38,940 --> 01:35:40,500
been, you know, interviewed and so
forth.
1271
01:35:40,740 --> 01:35:44,860
When Stuxnet hit the media, they
polygraphed everyone in our office,
1272
01:35:44,860 --> 01:35:48,100
people who didn't know shit. You know,
they poly the interns, for God's sake.
1273
01:35:48,800 --> 01:35:51,680
These are criminal acts when they
release information like this.
1274
01:35:52,280 --> 01:35:58,240
and we will conduct thorough
investigations as we have in the past.
1275
01:36:00,080 --> 01:36:05,400
The administration never filed charges,
possibly afraid that a prosecution would
1276
01:36:05,400 --> 01:36:07,740
reveal classified details about Stuxnet.
1277
01:36:08,200 --> 01:36:13,000
To this day, no one in the U .S. or
Israeli governments has officially
1278
01:36:13,000 --> 01:36:15,340
acknowledged the existence of the joint
operation.
1279
01:36:17,100 --> 01:36:20,740
I would never compromise ongoing
operations in the field,
1280
01:36:22,190 --> 01:36:24,450
We should be able to talk about
capability.
1281
01:36:26,330 --> 01:36:29,950
We can talk about our bunker busters.
1282
01:36:30,250 --> 01:36:31,570
Why not our cyber weapons?
1283
01:36:32,170 --> 01:36:34,650
The secrecy of the operation has been
blown.
1284
01:36:36,310 --> 01:36:40,590
Our friends in Israel took a weapon that
we jointly developed, in part to keep
1285
01:36:40,590 --> 01:36:44,470
Israel from doing something crazy, and
then used it on their own in a way that
1286
01:36:44,470 --> 01:36:47,590
blew the cover of the operation and
could have led to war. And we can't talk
1287
01:36:47,590 --> 01:36:48,590
about that?
1288
01:36:52,750 --> 01:36:54,630
There's a way to talk about Stuxnet.
1289
01:36:55,450 --> 01:37:01,530
It happened. The deny that it happened
is foolish. So the fact that it happened
1290
01:37:01,530 --> 01:37:05,330
is really what we're talking about here.
What are the implications of the fact
1291
01:37:05,330 --> 01:37:07,490
that we now are in a post -Stuxnet
world?
1292
01:37:07,910 --> 01:37:12,690
What I said to David Sanger was I
understand the difference in destruction
1293
01:37:12,690 --> 01:37:15,410
dramatic, but this has the whiff of
August 1945.
1294
01:37:16,730 --> 01:37:21,190
Somebody just used a new weapon, and
this weapon will not be put back into
1295
01:37:21,190 --> 01:37:27,580
box. I know no operational details and
don't know what anyone did or didn't do
1296
01:37:27,580 --> 01:37:33,160
before someone decided to use the
weapon. I do know this. If we go out and
1297
01:37:33,160 --> 01:37:38,280
something, most of the rest of the world
now thinks that's a new standard and
1298
01:37:38,280 --> 01:37:41,040
it's something that they now feel
legitimated to do as well.
1299
01:37:42,420 --> 01:37:47,420
But the rules of engagement,
international norms, treaty standards,
1300
01:37:47,420 --> 01:37:48,420
exist right now.
1301
01:37:52,200 --> 01:37:57,320
The law of war, because it began to
develop so long ago, is really dependent
1302
01:37:57,320 --> 01:38:00,660
thinking of things kinetically, in the
physical realm.
1303
01:38:01,080 --> 01:38:04,320
So, for example, we think in terms of
attacks.
1304
01:38:05,260 --> 01:38:08,880
You know an attack when it happens in
the kinetic world. It's not really much
1305
01:38:08,880 --> 01:38:14,020
a mystery. But in cyberspace, it is sort
of confusing to think, how far do we
1306
01:38:14,020 --> 01:38:16,260
have to go before something is
considered an attack?
1307
01:38:16,640 --> 01:38:20,080
So we have to take all the vocabulary.
1308
01:38:21,000 --> 01:38:26,880
and the terms that we use in strategy
and military operations and adapt them
1309
01:38:26,880 --> 01:38:28,620
into the cyber realm.
1310
01:38:29,780 --> 01:38:33,280
For nuclear, we have these extensive
inspection regimes.
1311
01:38:33,660 --> 01:38:35,680
The Russians come and look at our silos.
1312
01:38:35,960 --> 01:38:37,560
We go and look at their silos.
1313
01:38:38,040 --> 01:38:42,020
Bad as things get between the two
countries, those inspection regimes have
1314
01:38:42,020 --> 01:38:46,460
up. But working that out for cyber would
be virtually impossible.
1315
01:38:46,840 --> 01:38:48,340
Where do you send your inspector?
1316
01:38:48,960 --> 01:38:53,100
Inside the laptop of, you know, how many
laptops are there in the United States
1317
01:38:53,100 --> 01:38:53,679
and Russia?
1318
01:38:53,680 --> 01:38:58,200
It's much more difficult in the cyber
area to construct an international
1319
01:38:58,200 --> 01:39:02,200
based on treaty commitments and rules of
the road and so forth.
1320
01:39:02,920 --> 01:39:07,140
Although we've tried to have discussions
with the Chinese and Russians and so
1321
01:39:07,140 --> 01:39:09,060
forth about that, but it's very
difficult.
1322
01:39:10,220 --> 01:39:15,240
Right now, the norm in cyberspace is do
whatever you can get away with.
1323
01:39:16,300 --> 01:39:18,660
That's not a good norm, but it's the
norm that we have.
1324
01:39:19,120 --> 01:39:22,760
That's the norm that's preferred by
states that are engaging in lots of
1325
01:39:22,760 --> 01:39:25,400
different kinds of activities that they
feel are benefiting their national
1326
01:39:25,400 --> 01:39:26,400
security.
1327
01:39:27,080 --> 01:39:33,320
Those who excel in cyber are trying to
slow down the process of creating
1328
01:39:33,320 --> 01:39:34,320
regulation.
1329
01:39:34,540 --> 01:39:40,420
Those who are victims will like the
regulation to be in the open as
1330
01:39:40,420 --> 01:39:42,240
soon as possible.
1331
01:39:44,580 --> 01:39:49,840
International law in this area is
written by custom, and customary law
1332
01:39:49,840 --> 01:39:52,340
a nation to say, this is what we did and
this is why we did it.
1333
01:39:52,940 --> 01:39:56,840
And the U .S. doesn't want to push the
law in that direction, and so it chooses
1334
01:39:56,840 --> 01:39:58,220
not to disclose its involvement.
1335
01:39:58,820 --> 01:40:03,020
And one of the reasons that I thought it
was important to tell the story of
1336
01:40:03,020 --> 01:40:08,760
Olympic Games was not simply because
it's a cool spy story. It is, but it's
1337
01:40:08,760 --> 01:40:10,220
because as a nation...
1338
01:40:11,050 --> 01:40:16,130
We need to have a debate about how we
want to use cyber weapons because we are
1339
01:40:16,130 --> 01:40:20,090
the most vulnerable nation on earth to
cyber attack ourselves.
1340
01:40:24,430 --> 01:40:29,430
If you get up in the morning and turn
off your alarm and make coffee and pump
1341
01:40:29,430 --> 01:40:34,610
gas and use the ATM, you've touched
industrial control systems. It's what
1342
01:40:34,610 --> 01:40:40,110
our lives. And unfortunately, these
systems are connected and interconnected
1343
01:40:40,110 --> 01:40:41,730
some ways that make them vulnerable.
1344
01:40:42,280 --> 01:40:45,720
Critical infrastructure systems
generally were built years and years and
1345
01:40:45,720 --> 01:40:49,320
ago without security in mind, that they
didn't realize how things were going to
1346
01:40:49,320 --> 01:40:52,940
change. Maybe they weren't even meant to
be connected to the Internet. And we've
1347
01:40:52,940 --> 01:40:57,000
seen through a lot of experimentation
and through also, unfortunately, a lot
1348
01:40:57,000 --> 01:41:00,900
attacks, that most of these systems are
relatively easy for a sophisticated
1349
01:41:00,900 --> 01:41:02,760
hacker to get into.
1350
01:41:04,560 --> 01:41:07,200
Let's say you took over the control
system of a railway.
1351
01:41:07,420 --> 01:41:09,060
You could switch tracks.
1352
01:41:09,660 --> 01:41:13,440
you could cause derailment of trains
carrying explosive materials.
1353
01:41:14,680 --> 01:41:20,340
What if you were in the control system
of gas pipelines, and when a valve was
1354
01:41:20,340 --> 01:41:24,800
supposed to be open, it was closed from
the pressure built up that the pipeline
1355
01:41:24,800 --> 01:41:25,800
exploded?
1356
01:41:26,340 --> 01:41:31,860
There are companies that run electric
power generation or electric power
1357
01:41:31,860 --> 01:41:36,580
distribution that we know have been
hacked by foreign entities.
1358
01:41:36,800 --> 01:41:38,180
To have the ability...
1359
01:41:38,410 --> 01:41:39,470
to shut down the power grid.
1360
01:41:40,290 --> 01:41:45,650
Imagine for a moment that not only all
the power went off on the East Coast,
1361
01:41:45,650 --> 01:41:47,210
the entire Internet came down.
1362
01:41:47,950 --> 01:41:52,650
Imagine what the economic impact of that
is, even if it only lasted for 24
1363
01:41:52,650 --> 01:41:53,650
hours.
1364
01:41:55,630 --> 01:42:00,690
According to the officials, Iran is the
first country ever in the Middle East to
1365
01:42:00,690 --> 01:42:05,450
actually be engaged in a cyber war with
the United States and Israel. If
1366
01:42:05,450 --> 01:42:10,170
anything, they said the recent cyber
attacks were what encouraged them to
1367
01:42:10,170 --> 01:42:13,550
to set up the cyber army, which will
gather computer scientists,
1368
01:42:14,290 --> 01:42:20,050
programmers, software engineers. If you
are youth and you see assassination or
1369
01:42:20,050 --> 01:42:23,730
nuclear scientists, your nuclear
facilities are getting attacked.
1370
01:42:24,780 --> 01:42:28,100
Wouldn't you join your national cyber
army?
1371
01:42:28,760 --> 01:42:35,260
Well, many did. And that's why today
Iran has one of the largest cyber
1372
01:42:35,260 --> 01:42:37,060
armies in the world.
1373
01:42:37,360 --> 01:42:42,240
So whoever initiated this and was very
proud of themselves to see that little
1374
01:42:42,240 --> 01:42:48,560
dip in Iran's centrifuge numbers should
look back now and acknowledge
1375
01:42:48,560 --> 01:42:50,960
that it was a major mistake.
1376
01:42:51,740 --> 01:42:52,880
Very quickly.
1377
01:42:53,500 --> 01:42:59,600
Iran sent a message to the United
States, very sophisticated message, and
1378
01:42:59,600 --> 01:43:01,360
did that with two attacks.
1379
01:43:02,180 --> 01:43:08,320
First, they attacked Saudi Aramco, the
biggest oil company in the world, and
1380
01:43:08,320 --> 01:43:14,240
wiped out every piece of software, every
line of code on 30 ,000 computer
1381
01:43:14,240 --> 01:43:15,240
devices.
1382
01:43:16,360 --> 01:43:21,760
Then... Iran did a surge attack on the
American banks.
1383
01:43:21,980 --> 01:43:26,220
The most extensive attack on American
banks ever, launched from the Middle
1384
01:43:26,360 --> 01:43:27,540
happening right now.
1385
01:43:27,840 --> 01:43:31,120
Millions of customers trying to bank
online this week blocked.
1386
01:43:31,420 --> 01:43:36,840
Among the targets, Bank of America, PNC,
and Wells Fargo. The U .S. suspects
1387
01:43:36,840 --> 01:43:39,040
hackers in Iran may be involved.
1388
01:43:40,980 --> 01:43:45,600
When Iran hit our banks, we could have
shut down their botnet.
1389
01:43:46,000 --> 01:43:50,280
But the State Department got nervous
because the servers weren't actually in
1390
01:43:50,280 --> 01:43:55,780
Iran. So until there was a diplomatic
solution, Obama let the private sector
1391
01:43:55,780 --> 01:43:56,780
deal with the problem.
1392
01:43:57,160 --> 01:44:02,560
I imagine that in the White House
Situation Room, people sat around and
1393
01:44:02,780 --> 01:44:08,600
let me be clear, I don't imagine, I
know, people sat around in the White
1394
01:44:08,600 --> 01:44:12,940
Situation Room and said, the Iranians
have sent us a message which is
1395
01:44:12,940 --> 01:44:14,660
essentially, stop.
1396
01:44:15,100 --> 01:44:19,000
attacking us in cyberspace the way you
did at Natanz with Stuxnet.
1397
01:44:19,440 --> 01:44:20,900
We can do it too.
1398
01:44:22,640 --> 01:44:27,260
There are unintended consequences of the
Stuxnet attack.
1399
01:44:27,700 --> 01:44:32,540
You wanted to cause confusion and damage
to the other side, but then the other
1400
01:44:32,540 --> 01:44:34,460
side can do the same to you.
1401
01:44:34,960 --> 01:44:40,480
The monster turned against its creator,
and now everyone is in this game.
1402
01:44:41,340 --> 01:44:46,940
They did a good job in showing the
world, including the bad guys, what you
1403
01:44:46,940 --> 01:44:51,760
need to do in order to cause serious
trouble that could lead to injuries and
1404
01:44:51,760 --> 01:44:57,060
deaths. It's inevitable that more
countries will acquire the capacity to
1405
01:44:57,060 --> 01:45:00,860
cyber both for espionage and for
destructive activities.
1406
01:45:01,500 --> 01:45:05,260
And we've seen this in some of the
recent conflicts that Russia's been
1407
01:45:05,260 --> 01:45:09,320
in. If there's a war, then somebody will
try to knock out our communications
1408
01:45:09,320 --> 01:45:10,740
system or the radar.
1409
01:45:10,980 --> 01:45:16,260
State -sponsored cyber sleeper cells,
they're out there everywhere today. It
1410
01:45:16,260 --> 01:45:20,360
could be for communications purposes. It
could be for data exfiltration.
1411
01:45:20,840 --> 01:45:24,380
It could be to, you know, shepherd in
the next Stuxnet.
1412
01:45:24,600 --> 01:45:28,640
I mean, you've been focusing on Stuxnet,
but that was just a small part of a
1413
01:45:28,640 --> 01:45:30,300
much larger Iranian mission.
1414
01:45:30,740 --> 01:45:32,720
It was a larger Iranian mission?
1415
01:45:35,960 --> 01:45:36,960
Nitro Zeus.
1416
01:45:38,200 --> 01:45:39,200
NZ.
1417
01:45:40,300 --> 01:45:44,600
We spent hundreds of millions, maybe
billions on it.
1418
01:45:47,180 --> 01:45:52,900
In the event the Israelis did attack
Iran, we assumed we would be drawn into
1419
01:45:52,900 --> 01:45:53,900
conflict.
1420
01:45:54,800 --> 01:45:59,260
We built in attacks on Iran's command
and control systems so the Iranians
1421
01:45:59,260 --> 01:46:00,640
couldn't talk to each other in a fight.
1422
01:46:01,290 --> 01:46:05,750
We infiltrated their IADs, military air
defense systems, so they couldn't shoot
1423
01:46:05,750 --> 01:46:07,030
down our planes if we flew over.
1424
01:46:07,670 --> 01:46:12,970
We also went after their civilian
support systems, power grids,
1425
01:46:13,550 --> 01:46:16,410
communications, financial systems.
1426
01:46:17,010 --> 01:46:23,510
We were inside, waiting, watching, ready
to disrupt, degrade, and destroy those
1427
01:46:23,510 --> 01:46:25,130
systems with cyber attacks.
1428
01:46:28,570 --> 01:46:29,570
In comparison,
1429
01:46:30,560 --> 01:46:32,500
That was a back alley operation.
1430
01:46:34,100 --> 01:46:39,200
NZ was the plan for a full -scale cyber
war with no attribution.
1431
01:46:39,860 --> 01:46:42,500
The question is, is that the kind of
world we want to live in?
1432
01:46:42,760 --> 01:46:48,040
And if we don't, as citizens, how do we
go about a process where we have a more
1433
01:46:48,040 --> 01:46:49,040
sane discussion?
1434
01:46:49,100 --> 01:46:52,340
We need an entirely new way of thinking
about how we're going to solve this
1435
01:46:52,340 --> 01:46:53,340
problem.
1436
01:46:53,640 --> 01:46:57,060
You're not going to get an entirely new
way of solving this problem.
1437
01:46:57,640 --> 01:47:02,800
until you begin to have an open
acknowledgement that we have cyber
1438
01:47:02,800 --> 01:47:08,540
well and that we may have to agree to
some limits on their use if we're going
1439
01:47:08,540 --> 01:47:11,420
get other nations to limit their use.
It's not going to be a one -way street.
1440
01:47:11,800 --> 01:47:16,360
I'm old enough to have worked on nuclear
arms control and biological weapons
1441
01:47:16,360 --> 01:47:19,340
arms control and chemical weapons arms
control.
1442
01:47:20,620 --> 01:47:25,900
And I was told in each of those types of
arms control, when we were beginning,
1443
01:47:26,629 --> 01:47:29,490
It's too hard. There are all these
problems.
1444
01:47:30,150 --> 01:47:32,010
It's technical. There's engineering.
1445
01:47:32,350 --> 01:47:33,350
There's science involved.
1446
01:47:33,630 --> 01:47:35,610
There are real verification
difficulties.
1447
01:47:36,230 --> 01:47:37,510
You'll never get there.
1448
01:47:37,850 --> 01:47:40,430
Well, it took 20, 30 years in some
cases.
1449
01:47:40,750 --> 01:47:44,530
But we have a biological weapons treaty
that's pretty damn good. We have a
1450
01:47:44,530 --> 01:47:48,550
chemical weapons treaty that's pretty
damn good. We've got three or four
1451
01:47:48,550 --> 01:47:49,550
weapons treaties.
1452
01:47:49,750 --> 01:47:53,610
Yes, it may be hard, and it may take 20
or 30 years.
1453
01:47:54,140 --> 01:47:58,140
But it'll never happen unless you get
serious about it. And it'll never happen
1454
01:47:58,140 --> 01:47:59,140
unless you start it.
1455
01:48:04,920 --> 01:48:10,520
Today, after two years of negotiations,
the United States, together with our
1456
01:48:10,520 --> 01:48:15,180
international partners, has achieved
something that decades of animosity has
1457
01:48:15,180 --> 01:48:20,700
not. A comprehensive, long -term deal
with Iran that will prevent it from
1458
01:48:20,700 --> 01:48:22,040
obtaining a nuclear weapon.
1459
01:48:22,480 --> 01:48:27,260
It was reached in Lausanne, Switzerland,
by Iran, the U .S., Britain, France,
1460
01:48:27,540 --> 01:48:33,300
Germany, Russia, and China. It is a deal
in which Iran will cut its installed
1461
01:48:33,300 --> 01:48:39,040
centrifuges by more than two -thirds.
Iran will not enrich uranium with its
1462
01:48:39,040 --> 01:48:41,600
advanced centrifuges for at least the
next ten years.
1463
01:48:41,860 --> 01:48:46,140
It will make our country, our allies,
and our world safer.
1464
01:48:47,320 --> 01:48:50,860
Seventy years after the murder of six
million Jews.
1465
01:48:51,440 --> 01:48:58,120
Iran's rulers promised to destroy my
country, and the response from nearly
1466
01:48:58,120 --> 01:49:04,220
every one of the governments represented
here has been utter silence,
1467
01:49:04,440 --> 01:49:06,440
deafening silence.
1468
01:49:14,140 --> 01:49:16,140
Perhaps you can all understand.
1469
01:49:17,480 --> 01:49:20,820
why Israel is not joining you in
celebrating this deal.
1470
01:49:21,820 --> 01:49:26,760
History shows that America must lead not
just with our might, but with our
1471
01:49:26,760 --> 01:49:27,760
principles.
1472
01:49:28,120 --> 01:49:32,980
It shows we are stronger not when we are
alone, but when we bring the world
1473
01:49:32,980 --> 01:49:33,980
together.
1474
01:49:34,820 --> 01:49:40,880
Today's announcement marks one more
chapter in the pursuit of a safer and
1475
01:49:40,880 --> 01:49:43,020
helpful, more hopeful world.
1476
01:49:44,200 --> 01:49:45,199
Thank you.
1477
01:49:45,200 --> 01:49:46,200
God bless you.
1478
01:49:46,640 --> 01:49:48,620
And God bless the United States of
America.
1479
01:50:15,850 --> 01:50:19,630
The science fiction cyber war scenario
is here. That's Nitro Zeus.
1480
01:50:21,090 --> 01:50:27,290
But my concern, the reason I'm talking,
is because when you shut down a
1481
01:50:27,290 --> 01:50:31,710
country's power grid, it doesn't just
pop back up.
1482
01:50:32,450 --> 01:50:34,390
It's more like Humpty Dumpty.
1483
01:50:35,710 --> 01:50:41,130
And if all the king's men can't turn the
lights back on or filter the water for
1484
01:50:41,130 --> 01:50:43,490
weeks, then lots of people die.
1485
01:50:46,140 --> 01:50:49,540
and something we can do to others, they
can do to us too.
1486
01:50:51,660 --> 01:50:53,780
Is that something that we should keep
quiet?
1487
01:50:55,220 --> 01:50:56,600
Or should we talk about it?
1488
01:50:57,800 --> 01:51:01,380
I've gone to many people on this film,
even friends of mine, who won't talk to
1489
01:51:01,380 --> 01:51:04,660
me about the NSA or Sucks, not even off
the record, for fear of going to jail.
1490
01:51:05,180 --> 01:51:06,800
Is that fear protecting us?
1491
01:51:08,280 --> 01:51:10,500
No, but it protects me.
1492
01:51:11,340 --> 01:51:12,560
Or should I say, we.
1493
01:51:14,350 --> 01:51:18,110
I'm an actor playing a role written from
the testimony of a small number of
1494
01:51:18,110 --> 01:51:23,270
people from NSA and CIA, all of whom are
angry about the secrecy, but too scared
1495
01:51:23,270 --> 01:51:25,550
to come forward. Now we're forward.
1496
01:51:27,170 --> 01:51:29,730
Well, forward leaning.
136401
Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.