2013
DOI: 10.1080/09636412.2013.816122
|View full text |Cite
|
Sign up to set email alerts
|

Stuxnet and the Limits of Cyber Warfare

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
89
0
7

Year Published

2014
2014
2023
2023

Publication Types

Select...
5
3
2

Relationship

0
10

Authors

Journals

citations
Cited by 240 publications
(96 citation statements)
references
References 0 publications
0
89
0
7
Order By: Relevance
“…The fact that the intelligence community reportedly used human agents to deliver the Stuxnet virus in Iran by infiltrating the Natanz uranium enrichment facility also suggests that boots on the ground are not necessarily key to keeping an eye on regional developments, or to influencing them. 9 Extraordinary gains in signals intelligence collection and processing also now allow analysts to rapidly combine information from ground, airborne, and space-based sensors. 10 Finally, the United States can make good use of the growing number of drones, especially the RQ-170, that are capable of loitering at high altitudes for long stretches.…”
Section: Preparing To Pivotmentioning
confidence: 99%
“…The fact that the intelligence community reportedly used human agents to deliver the Stuxnet virus in Iran by infiltrating the Natanz uranium enrichment facility also suggests that boots on the ground are not necessarily key to keeping an eye on regional developments, or to influencing them. 9 Extraordinary gains in signals intelligence collection and processing also now allow analysts to rapidly combine information from ground, airborne, and space-based sensors. 10 Finally, the United States can make good use of the growing number of drones, especially the RQ-170, that are capable of loitering at high altitudes for long stretches.…”
Section: Preparing To Pivotmentioning
confidence: 99%
“…With Stuxnet and the Saudi Aramco attacks, and with an increasing trend for ransomware being used against utility companies, a new clear policy direction of protecting critical services emerged on national agendas. 9 However, the policymakers and lawmakers have also seen major setbacks in their attempt to raise cyber resilience. The Liebermann Cybersecurity Act was voted down in the US Senate in 2012.…”
Section: Regulatory Initiatives Advancing Cyber Security Of Critical mentioning
confidence: 99%
“…Military attacks in the physical domain are thus far easier, they also make scenario thinking and scenario planning a more affordable task compared to cyber-attacks. The problematic point regarding cyber-attacks is that it is possible to be exposed to an extensive attack without ever detecting it (Lindsay, 2013). Deibert et al (2012) have analyzed the impact of cyberspace on the conflict between Russia and Georgia in 2008.…”
Section: Introductionmentioning
confidence: 99%