Stuxnet, revisited (again): Producing the strategic relevance of cyber operations

Abstract

More than a decade after Stuxnet hit the Natanz uranium enrichment facility in Iran, it is still discussed as the most vivid example of a cyber operation causing kinetic damage to infrastructure with implications for national security. This article shows that Stuxnet is due a revisit by arguing that the operation represents a paradigmatic shift in perceptions that continue to produce the meaning of ‘strategic relevance’ for cyber operations. The exceptional story of Operation Olympic Games and the Stuxnet malware has underpinned the way contemporary understandings of the (potential) role of cyber operations in international conflict prevail. Through a critical review of academic and policy discourse largely driven by orthodox perspectives on strategic security, the article demonstrates how these perspectives continue to influence American and Western policy objectives based on the imagined utility of cyber operations as an instrument of power. When exploring the strategic relevance of cyber operations as historically and politically produced, tied up in discursive and material interactions, it allows for scholars across the spectrum of security studies to critically consider the emergence of ‘new’ security threats and strategic capabilities.Stuxnet, revisited (again): Producing the strategic relevance of cyber operationsStuxnet, revisited (again): Producing the strategic relevance of cyber operationspublishedVersionpublishedVersio

Similar works

Full text

thumbnail-image

NUPI Research Online (Norwegian Institute of International Affairs)

redirect
Last time updated on 01/08/2025

Having an issue?

Is data on this page outdated, violates copyrights or anything else? Report the problem now and we will take corresponding actions after reviewing your request.

Licence: http://creativecommons.org/licenses/by/4.0/deed.no