Feeds

Retired 4-star general probed over Stuxnet details leak - report

Marine Corps man under investigation over malware revelations

Securing Web Applications Made Simple and Scalable

A retired general has been named as the target of a US Department of Justice probe into the release of confidential information about the Stuxnet virus.

An NBC report claimed that James Cartwright, a retired US Marine Corps four star general, was under investigation for allegedly leaking details of the virus.

Unnamed legal sources told NBC that Cartwright, a former vice-chairman of the Joint Chiefs of Staff, had been sent a letter informing him that he under investigation.

The 63-year-old general is the latest public figure to be caught up in the Obama regime's investigation into the leaks, which has already prosecuted or charged eight people under the Espionage Act.

Stuxnet was specifically designed to target the uranium-enriching centrifuges that are crucial to Iran's nuclear capabilities. In 2010, the virus caused 1,000 of the devices to spin out of control, temporarily disabling them. However, the worm did not entirely halt the Iranian nuclear programme, which has been widely interpreted as a scheme to produce atomic weapons.

It is thought that Israeli spooks worked with their American colleagues to produce the malware, which was seen as a safer alternative to bombing the Islamic Republic's nuclear facilities.

Neither the Justice Department or the US attorney's office in Baltimore have commented on the alleged investigation.

According to the New York Times' definitive report into the Stuxnet virus, President Obama made a clear decision to ramp up cyberattacks, building upon a programme called "Olympic Games" that began under George W Bush. It is understood that Cartwright was one of the top military personnel involved in this cyberwar effort.

Obama was reportedly furious at David Sanger's report in the NYT, promising to root out the people who leaked information. Initially, the focus was on White House sources, but investigators are thought to have turned their attention to high-ranking military figures late last year.

The Stuxnet virus was only identified after escaping from Iranian systems into the wild. Cartwright is said to be the man who told Obama that this sophisticated cyber-weapon had been let loose into the wilds of the internet, although there are still big questions about how it actually got there.

The effectiveness of Stuxnet has been questioned, with some US officials claiming that it actually helped Iran's nuclear effort and encouraged the country to launch its own cyber-jihad. ®

The smart choice: opportunity from uncertainty

More from The Register

next story
Mozilla fixes CRITICAL security holes in Firefox, urges v31 upgrade
Misc memory hazards 'could be exploited' - and guess what, one's a Javascript vuln
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Don't look, Snowden: Security biz chases Tails with zero-day flaws alert
Exodus vows not to sell secrets of whistleblower's favorite OS
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Researcher sat on critical IE bugs for THREE YEARS
VUPEN waited for Pwn2Own cash while IE's sandbox leaked
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.