This piece of information revealed that the malware program had infected resulted in heavy damage for the Iranian nuclear enrichment facilities. The program became the very first of its kind as there had never been any cyber attacks that lead to a computer program resulting in physical damage to mechanical systems on a large scale basis as was the desired attacked of the program. Additionally, the malware program also infected the local household and office computer systems throughout the country of Iran. This caused damage on a very large scale to the Iranian nation and its people.
Nobody has come out to claim the creation of the Stuxnet and neither the actual intentions of the attackers have surfaced. But the attack revealed that the attackers intended to either sabotage or espionage the nuclear enrichment process being conducted by the Iranians. The complexity and intricacy to become such a damaging malware clearly reveal that the attackers had to be quite a lot resourceful and had strong support. Nevertheless, Iranian government has not held back in blaming the specific group of countries for attacking the country and its nuclear enrichment program with the Stuxnet worm. After the widespread impact of the malware program attack, the angered officials of the Iranian government announced that the attack was a plot of the Western world who did not want Iran to continue with its nuclear activities by indulging into psychological form of attacks using the latest means of warfare, the cyber attacks.
The Iranian government did not take the attack lightly and decided to bring in counter measures to detect where the source of this malware attack was, and who was responsible it. Iran's response was quite unexpected to the entire world, but was a sensible one. The Iranian regime had decided to launch a cyber warfare militia within its ranks of the already existing national force, the Revolutionary Guard. The task of this cyber warfare militia would be to crackdown any potential threats to the country of Iran on the cyber battlefield. This minor force would be formed by enrolling highly competent computer and technology experts as the soldiers for the militia. This force was formed by the employing of over a million young recruits on the militia to help Iran with its mission on the cyber warfare front. In relation to the formation of such a militia, a former member of the Iran's Revolutionary Guard, Reza Kahlili said, "There are many true believers in Iran who are highly educated and very savvy with computers. Cyber warfare is cheap, effective and doesn't necessarily cause fatalities. It makes much more sense for not-so-wealthy nation states to build up cyber warfare capability rather than investing in missiles and warships." (Kellogg 2011). The overall aim of this force was to create an organization that was responsible for the protection of their country against any future cyber attacks after the Stuxnet program attack.
The Stuxnet malware program became a revolutionary step for the modern cyber warfare and was a huge leap for programming attacks towards forming a more intense means of cyber warfare. This form of warfare is relatively new and witnessed only a few attacks that have caused any trouble for the general public. But as the world becomes more and more relying on the advancement of technology in almost every field, the theme of such attacks can become more damaging and possibly catastrophic, just similar to any other mode of warfare. Although Stuxnet's uses were specific for the attack on the Iranian nuclear facilities, with further research and updates, such a malware program can prove to be a huge advancement for the stage of global cyber warfare, providing countries the means of lodging into a new form of warfare to claim supremacy.
Farwell, John P., and Rafal Rohozinski. "Stuxnet and the Future of Cyber War." Survival (Vol.53, No. 1), 2011: 23-40.
Kellogg, Amy. "Iran is Recruiting Hacker Warriors for its Cyber Army to Fight 'Enemies'." Fox News. March 14, 2011. http://www.foxnews.com/world/2011/03/14/iran-recruiting-hacker-warriors-cyber-army/.
Yong, William, and Robert F. Worth. "Bombing Hit Atomic Experts in Iran Streets." The New York Times. November 29, 2010. http://www.nytimes.com/2010/11/30/world/middleeast/30tehran.html?_r=3&hp&.