Oh no, you're thinking, yet another cookie pop-up. Well, sorry, it's the law. We measure how many people read us, and ensure you see relevant ads, by storing cookies on your device. If you're cool with that, hit “Accept all Cookies”. For more info and to customise your settings, hit “Customise Settings”.

Review and manage your consent

Here's an overview of our use of cookies, similar technologies and how to manage them. You can also change your choices at any time, by hitting the “Your Consent Options” link on the site's footer.

Manage Cookie Preferences
  • These cookies are strictly necessary so that you can navigate the site as normal and use all features. Without these cookies we cannot provide you with the service that you expect.

  • These cookies are used to make advertising messages more relevant to you. They perform functions like preventing the same ad from continuously reappearing, ensuring that ads are properly displayed for advertisers, and in some cases selecting advertisements that are based on your interests.

  • These cookies collect information in aggregate form to help us understand how our websites are being used. They allow us to count visits and traffic sources so that we can measure and improve the performance of our sites. If people say no to these cookies, we do not know how many people have visited and we cannot monitor performance.

See also our Cookie policy and Privacy policy.

Retired 4-star general probed over Stuxnet details leak - report

Marine Corps man under investigation over malware revelations


A retired general has been named as the target of a US Department of Justice probe into the release of confidential information about the Stuxnet virus.

An NBC report claimed that James Cartwright, a retired US Marine Corps four star general, was under investigation for allegedly leaking details of the virus.

Unnamed legal sources told NBC that Cartwright, a former vice-chairman of the Joint Chiefs of Staff, had been sent a letter informing him that he under investigation.

The 63-year-old general is the latest public figure to be caught up in the Obama regime's investigation into the leaks, which has already prosecuted or charged eight people under the Espionage Act.

Stuxnet was specifically designed to target the uranium-enriching centrifuges that are crucial to Iran's nuclear capabilities. In 2010, the virus caused 1,000 of the devices to spin out of control, temporarily disabling them. However, the worm did not entirely halt the Iranian nuclear programme, which has been widely interpreted as a scheme to produce atomic weapons.

It is thought that Israeli spooks worked with their American colleagues to produce the malware, which was seen as a safer alternative to bombing the Islamic Republic's nuclear facilities.

Neither the Justice Department or the US attorney's office in Baltimore have commented on the alleged investigation.

According to the New York Times' definitive report into the Stuxnet virus, President Obama made a clear decision to ramp up cyberattacks, building upon a programme called "Olympic Games" that began under George W Bush. It is understood that Cartwright was one of the top military personnel involved in this cyberwar effort.

Obama was reportedly furious at David Sanger's report in the NYT, promising to root out the people who leaked information. Initially, the focus was on White House sources, but investigators are thought to have turned their attention to high-ranking military figures late last year.

The Stuxnet virus was only identified after escaping from Iranian systems into the wild. Cartwright is said to be the man who told Obama that this sophisticated cyber-weapon had been let loose into the wilds of the internet, although there are still big questions about how it actually got there.

The effectiveness of Stuxnet has been questioned, with some US officials claiming that it actually helped Iran's nuclear effort and encouraged the country to launch its own cyber-jihad. ®

Similar topics

Broader topics


Other stories you might like

  • Apple iOS privacy clampdown 'did little' to reduce tracking
    Double-standard rules have strengthened iGiant's gatekeeper power

    Apple's ramp up in iOS privacy measures has affected small data brokers, yet apps can still collect group-oriented data and identify users via device fingerprinting, according to a study out of Oxford.

    What's more, the researchers claim, Apple itself engages in and allows some forms of tracking, which serve to strengthen its control over the iOS market.

    In a paper titled, "Goodbye Tracking? Impact of iOS App Tracking Transparency and Privacy Labels," due to be published in June for the ACM Conference on Fairness, Accountability, and Transparency 2022, Oxford academics Konrad Kollnig, Max Van Kleek, Reuben Binns, and Nigel Shadbolt, with independent US-based researcher Anastasia Shuba, describe what they found after analyzing 1,759 iOS apps from the UK App Store, both before and after the introduction of iOS 14.

    Continue reading
  • Microsoft dogs Strontium domains to stop attacks on Ukraine
    Software giant sinkholes systems used by Russian gang

    Microsoft this week seized seven internet domains run by Russia-linked threat group Strontium, which was using the infrastructure to target Ukrainian institutions as well as think tanks in the US and EU, apparently to support Russian's invasion of its neighbor.

    The seizure is also part of a long-running legal and technical hunt by Microsoft to disrupt the work of Strontium – aka APT28 and FancyBear, among other names – via an expedited court process that enables the company to quickly get judicial approval for such actions, according to Tom Burt, corporate vice president of customer security and trust at Microsoft.

    Before the latest seizures, Microsoft had used this process 15 times to take over more than 100 domains controlled by Strontium, which is thought to be run by the GRU, Russia's foreign military intelligence agency. Microsoft obtained a court order for the most recent operation on April 6 and acted immediately.

    Continue reading
  • Newly released Space Force data could save life on Earth
    Goodness, gracious, lots of insights on great balls of fire

    The US Space Force is publicly releasing nearly 30 years of data on fireball meteors in the hopes it can improve the detection and impact prediction of near-Earth objects (NEOs).

    The data contains information on bolides, classified as any meteor that has enough mass to become a fireball but not enough to cause a ground impact, several dozen of which happen each year.

    Data from NASA on bolides is publicly available, but the Space Force is adding light curve data to the mix, which the agency said has been greatly sought by the scientific community.

    Continue reading

Biting the hand that feeds IT © 1998–2022