Stuxnet, Japan Division (Michael Rivero)

  • 13 years ago
Audio from MIchael Riveros' radio show March 21st 2011. His website: http://www.whatreallyhappened.com Related: New cybervirus found in Japan / Stuxnet designed to attack off-line servers via USB memory sticks LINK: http://www.yomiuri.co.jp/dy/national/T101004003493.htm From the what really happened website: Here is a nightmare scenario for you. 1. Israel and the US create Stuxnet. 2. Stuxnet is deployed to wreck Iran's nuclear power station. 3. But Stuxnet escapes from its intended target and spreads across Asia! 4. As the above article documents, Stuxnet was in Japan last October, presumably still spreading and intended to wreck nuclear power plants. Here is another story about Stuxnet being in Japan and infecting computers last October. 5. Stuxnet targets the Siemens controller 6. The head of the IAEA only last month warned that Stuxnet posed a threat to all nuclear power stations around the world! And Fukushima uses the Seimens controllers Stuxnet was designed to interfere with! So now the difficulty the Fukushima nuclear plant operators faced in recovering control over their runaway reactors takes on a darker significance. Remember that the first problem following the quake was that the automated shutdown systems failed to operate at some of the reactors, because pumps failed and valves would not open even while running on batteries; the very sorts of mischief Stuxnet supposedly was designed to cause at Iran's power station. We have yet to confirm Stuxnet was inside the Fukushima plant, but we obviously cannot rule it out, either!