Yeah, the author definitely doesn't really have a clue what the requirements are for various forms of intelligence operation.
It should be noted, however, that there apparently was a significant amount of animosity from the NSA towards unit 8200 for "turning up the volume" on the payload. Usually NSA really really really doesn't like catching attribution for stuff, and Mossad is more known for trying to send a message with obvious attributions (motorcycle assassinations etc). It was supposedly delivered from TAO to 8200 as a very covert weapon, and 8200 stripped off a bunch of the limitations in order to increase the odds of successfully completing the mission.
Stuxnet was assembled from a standard implant framework that is shared across "Five Eyes" countries. Everyone writes modules of various types that implement a standard API and share them across teams. For example, if the Australians need to compromise a diplomatic machine in Singapore, the UK may have a module already written a keylogger that hooks Pinyin (software for typing in Mandarin).
When the Israeli's pushed it to 11 they brought down a ton of scrutiny on the framework as a whole. Which is why people started discovering links to other sophisticated malware families - like Kaspersky's discovery that Stuxnet and Flame used the same LNK vulnerability which was not known to the public at the time. The "QWERTY" keylogger in the Snowden leaks was identified as part of the Regin malware family.
They effectively gave every nation on the planet a trail of breadcrumbs to either find western espionage tools, or strongly attribute tools they had previously found.
This also refutes most of the articles points, they _could_ have done all these things but SOP is to do the least amount of shady shit to get the job done. Being extra cool guy just makes it more likely to trigger an anti-virus system that detects a specific trick.
That's a smart thought. Ive always wondered why they called it that.
Snowden mentioned that they have some kind of a random operation name generator that they have to use, but people keep using it over and over to find a suitable name. I don't recall the specifics but it was in his book.
Yes I know, but people take pride in their work and they want a cool name for their project.
Like I said Snowden did mention that NSA mandated the use of this code name generator in his book, and it was indeed random for this reason. But he also describes people used to game the system for a cool code name by simply running the generator over and over until they got one they liked :)
I would imagine that a cool name would also make it easier to sell a proposal to the brass. Prudence or not, people are easily influenced this way. It's why marketing works.
It should be noted, however, that there apparently was a significant amount of animosity from the NSA towards unit 8200 for "turning up the volume" on the payload. Usually NSA really really really doesn't like catching attribution for stuff, and Mossad is more known for trying to send a message with obvious attributions (motorcycle assassinations etc). It was supposedly delivered from TAO to 8200 as a very covert weapon, and 8200 stripped off a bunch of the limitations in order to increase the odds of successfully completing the mission.
I'm not actually referencing the Wikipedia article, so I don't know if what I'm saying is reflected in there, but it's a good read either way: https://en.wikipedia.org/wiki/Operation_Olympic_Games