Trump Regime’s Electricity War in Venezuela More Serious Than First Believed

ER Editor: Readers may be interested in this 2010 BBC summary piece on the Stuxnet worm that infected the operations of Iran’s two power plants, explained by Stephen Lendman below, titled Stuxnet worm ‘targeted high-value Iranian assets’.  
.
********

Trump Regime Electricity War in Venezuela More Serious Than First Believed

STEPHEN LENDMAN

On Thursday (ER: one week ago), Venezuela’s Guri dam hydroelectric power plant was cyberattacked at 5:00 PM during the late afternoon rush hour to cause maximum disruption.

Up to 80% of the country was affected, damage done more severe than initially thought. Weeks or months of planning likely preceded what happened – US dark forces almost certainly behind it, considerable expertise needed to pull it off.

On Friday, another cyberattack occurred, followed by a third one on Saturday, affecting parts of the country where power was restored, further complicating resolution of the problem, Maduro saying:

After power was restored to about 70% of the country, “we received another attack, of a cybernetic nature, at midday…that disturbed the reconnection process and knocked out everything that had been achieved until noon,” adding:

“(O)ne of the sources of generation that was working perfectly” was sabotaged again…infiltrators…attacking the electric company from the inside.”

Power is being restored “manually,” efforts continuing to learn precisely why computerized systems failed – things further complicated after a Bolivar state substation transformer exploded and burned, suggesting more sabotage.

What’s happening in Venezuela is similar to infecting Iran’s Bushehr (pictured below) and Natanz nuclear power facilities with a Stuxnet malware computer virus in 2010, a likely joint US/Israeli intelligence operation. Edward Snowden blamed them for what happened.

At the time, operations were halted indefinitely. Iran called the incident a hostile act. General Gholam-Reza Jalali said if the affected facilities went online infected, Iran’s entire electrical power grid could have been shut down.

It took months to fully resolve the problem. Following the summer 2010 attack, the malware continued to infect the facilities’ centrifuges, requiring their replacement.

An Institute for Science and International Security analysis said “(a)ssuming Iran exercises caution, Stuxnet is unlikely to destroy more centrifuges at the (affected plants).”

“Iran likely cleaned the malware from its control systems. To prevent re-infection, Iran will have to exercise special caution since so many computers in Iran contain Stuxnet,” adding:

“Although Stuxnet appears to be designed to destroy centrifuges at (Iranian nuclear facilities), destruction was by no means total.”

“Stuxnet did not lower the production of low-enriched uranium (LEU) during 2010. LEU quantities could have certainly been greater, and Stuxnet could be an important part of the reason why they did not increase significantly.”

“(T)here remain important questions about why Stuxnet destroyed only 1,000 centrifuges. One observation is that it may be harder to destroy centrifuges by use of cyber attacks than often believed.”

Head of Bushehr’s nuclear power plant said only personal computers of staff were infected by the Stuxnet virus. Then-Iranian Telecommunications Minister Reza Taghipour said government systems experienced no serious damage.

Iran’s Information Technology Council director Mahmud Liaii said “(a)n electronic war has been launched against Iran… This computer worm is designed to transfer data about production lines from our industrial plants to locations outside Iran.”

Deputy head of Iran’s government Information Technology Company Hamid Alipour said “(t)he attack is still ongoing and new versions of this virus are spreading,” adding:

“We had anticipated that we could root out the virus within one to two months, but the virus is not stable, and since we started the cleanup process three new versions of it have been spreading.

If malware similar to Stuxnet was used against Venezuela’s power grid, the problem could linger for months, parts of the country continued to be affected by outages for some time.

Maduro’s government will need to marshal considerable technical expertise to fully resolve things – the type cybersecurity/anti-virus/security software skills Russia-based multinational firm Kaspersky Lab can provide.

It can also identify the attack’s source and lay blame where it belongs – the US most likely responsible. It clearly has motive, opportunity and expertise – waging war on Venezuela by other means to topple its government and gain another imperial trophy.

If the malware infection is widespread, continued outages may happen until the problem is fully resolved.

Resolution may take months, disruption in the country persisting, clearly the motive behind the attack.

stephenlendman.org

************

Original article

ER recommends other articles by Strategic Culture Foundation