scispace - formally typeset
Journal ArticleDOI

Stuxnet and the Limits of Cyber Warfare

Jon R. Lindsay
- 01 Aug 2013 - 
- Vol. 22, Iss: 3, pp 365-404
TLDR
The empirical facts of Stuxnet support an opposite interpretation; cyber capabilities can marginally enhance the power of stronger over weaker actors, the complexity of weaponization makes cyber offense less easy and defense more feasible than generally appreciated, and cyber options are most attractive when deterrence is intact.
Abstract
Stuxnet, the computer worm which disrupted Iranian nuclear enrichment in 2010, is the first instance of a computer network attack known to cause physical damage across international boundaries. Some have described Stuxnet as the harbinger of a new form of warfare that threatens even the strongest military powers. The influential but largely untested Cyber Revolution thesis holds that the internet gives militarily weaker actors asymmetric advantages, that offense is becoming easier while defense is growing harder, and that the attacker's anonymity undermines deterrence. However, the empirical facts of Stuxnet support an opposite interpretation; cyber capabilities can marginally enhance the power of stronger over weaker actors, the complexity of weaponization makes cyber offense less easy and defense more feasible than generally appreciated, and cyber options are most attractive when deterrence is intact. Stuxnet suggests that considerable social and technical uncertainties associated with cyber operations ...

read more

Content maybe subject to copyright    Report

Citations
More filters
Journal ArticleDOI

Attributing Cyber Attacks

TL;DR: It is argued that attribution is what states make of it and to show how, the Q Model is introduced: designed to explain, guide, and improve the making of attribution.
Journal ArticleDOI

The Myth of Cyberwar: Bringing War in Cyberspace Back Down to Earth

TL;DR: Cyberwar has been described as a revolution in military affairs, a transformation of technology and doctrine capable of overturning the prevailing world order as discussed by the authors, which reflects a common tendency to conflate means and ends; studying what could happen in cyberspace (or anywhere else) makes little sense without considering how conflict over the internet is going to realize objectives commonly addressed by terrestrial warfare.
Journal ArticleDOI

Cyber threats confronting the digital built environment: Common data environment vulnerabilities and block chain deterrence

TL;DR: In this paper, the authors present a comprehensive review of cyber-threats confronting critical infrastructure asset management in the context of building information modelling (BIM) implementation, and a recommendation to utilize innovative block chain technology as a potential risk mitigation measure for digital built environment vulnerabilities.
Posted Content

Constructing Norms for Global Cybersecurity

TL;DR: The San Bernardino incident sparked a wide-ranging debate over the appropriate standards of behavior for companies like Apple and for their customers in constructing and using information and communication technologies (ICTs).
References
More filters
Journal ArticleDOI

Science friction: data, metadata, and collaboration

TL;DR: This work proposes an alternative view of metadata, focusing on its role in an ephemeral process of scientific communication, rather than as an enduring outcome or product, and argues that while metadata products can be powerful resources, usually they must be supplemented with metadata processes.
Journal ArticleDOI

What Is the Offense-Defense Balance and Can We Measure It?

TL;DR: Offense-defense theory offers an optimistic view of international politics based on the argument that war can be prevented if defense gains an advantage over offense as discussed by the authors, and argues that an effective arms control can reduce the risk of arms races and war.
Journal ArticleDOI

Attack and Conquer? International Anarchy and the Offense-Defense-Deterrence Balance

TL;DR: In this article, the authors argue that the relative efacacy of defense and offense changes over time and states should be more vulnerable to conquest and more likely to attack one another at some times than at others.