Here's how the Stuxnet virus could be used against the U.S.

Thinkstock

Virus provides the 'textbook' on how to attack key installations, experts say.

The cat is out of the bag: The United States is the first known country to carry out a sustained cyber attack with the intent of destroying another country's infrastructure. Earlier today, The New York Times' David Sanger confirmed America's role in developing Stuxnet, the computer worm deployed against Iran's nuclear facilities in coordination with the Israeli government. In interviews with curent and former American, European, and Israeli officials, Sanger outlined the Obama administration's decision to use the sophisticated virus, code-named Olympic Games, which was originally developed by the Bush administration. 

For cyber security experts, the coming-out party of Stuxnet in 2010, after it malfunctioned and spread across the world, was a worrying event. The code itself is 50 times bigger than your ordinary computer worm and, unlike most viruses, is capable of hijacking industrial facilities like nuclear reactors or chemical plants. With its release, anyone could download and manipulate the Stuxnet code for their own purposes. But now, with America's role confirmed, the fear is that a red target hangs on its back. What if Stuxnet was used against the U.S.?
 
The prospect has long worried Sean McGurk, former director of Homeland Security's national cybersecurity operations center. Not only has the Stuxnet technology been instantly democratized but it's also highly susceptible to being reverse engineered. In March, he aired his concerns with 60 Minutes' Steve Kroft, before America's role in creating Stuxnet was confirmed.
 
Read more at The Atlantic Wire.