Discover
/
Article

Worm disabled Iran’s nuclear centrifuges via their frequency controllers

NOV 19, 2010
Physics Today
New York Times : Eric Chien, Nicolas Falliere, and Liam Murchu of Symantec, the world’s largest maker of computer security software, have figured out how the Stuxnet worm was able to disable the centrifuges that enrich uranium for Iran’s nuclear program. According to the Symantec analysis, Stuxnet targeted frequency controllers, the devices that govern how fast the centrifuges spin. Stuxnet instructed the controllers to speed up and slow down erratically, rendering the centrifuges useless. As the New York Times‘s William Broad and David Sanger report, Stuxnet’s paternity remains in doubt, although Israel is the prime suspect.
Related content
/
Article
The physicist-philosopher’s work on understanding climate change is also relevant for adaptation measures in health, law, and the economy.
/
Article

Get PT newsletters in your inbox

pt_newsletter_card_blue.png
PT The Week in Physics

A collection of PT's content from the previous week delivered every Monday.

pt_newsletter_card_darkblue.png
PT New Issue Alert

Be notified about the new issue with links to highlights and the full TOC.

pt_newsletter_card_pink.png
PT Webinars & White Papers

The latest webinars, white papers and other informational resources.

By signing up you agree to allow AIP to send you email newsletters. You further agree to our privacy policy and terms of service.