Cyber warfare from Clausewitz’s perspective: a case study on Stuxnet

Authors

DOI:

https://doi.org/10.11606/issn.2446-5240.malala.2024.213860

Keywords:

Clausewitz, Cyber, Middle East, Military Sciences, Stuxnet

Abstract

In research on the Middle East, there is a tendency and preponderance for studies of interstate wars that have plagued the region for decades. Having said that, in recent times, with the accelerated process of technological development and the impact of the relationship between science and war, confrontations have been acquiring new elements, without moving away from the clausewitzian maxim that war is the continuation of politics with the mixture of other ways. Therefore, nowadays, rapid scientific progress, with emphasis on cybernetic issues, presents crucial components for achieving the military and political objectives underway in a war. In this sense, this research proposes to answer the following question: can the Stuxnet case be characterized as an act of war, according to Clausewitz’s perception? Thus, it is based on the clausewitzian understanding that war is a political act, with the aim of disarming the opponent and imposing their will. Based on this, this article observes and analyzes how the development of this worm is constituted and applied, being able to understand whether it constitutes an occurrence of an act of war. The hypothesis developed, which is intended to be corroborated, presents that Stuxnet can be characterized as an act of war, taking into account that it was a political act with the intention of forcing its purpose on the opponent. The results reveal a contemporary approach, without ignoring the contributions of the past, by highlighting this relationship between war and cyber technology. Based on this panorama, the work consists of a discussion with a single case study, in the area of Military Sciences, aiming to work with the Stuxnet episode that had Iran as its main target, in the early 2010s.

Downloads

Download data is not yet available.

Author Biographies

  • Amanda Neves Leal Marini, Escola de Comando e Estado-Maior do Exército

    Doutoranda e mestra em Ciências Militares pelo PPGCM do Instituto Meira Mattos na ECEME, sendo bolsista CAPES. Graduada em Relações Internacionais pela UFF. Pesquisadora do Núcleo de Avaliação da Conjuntura/ Boletim Geocorrente, na área de Oriente Médio. Currículo Lattes: http://lattes.cnpq.br/2367832962491369. ORCID: https://orcid.org/0000-0003-2902-6901. Contato: amanda.nlmarini@gmail.com.

  • Lucas Chrystello Pederneiras, Escola de Comando e Estado-Maior do Exército

    Mestre em Ciências Militares pelo PPGCM da ECEME e graduado em Relações Internacionais pela Unilasalle-RJ. Foi pesquisador da Unidade de Inteligência Comercial em parceria com a Subsecretaria de RI do RJ e autor do “Guia do Exportador Fluminense”. Experiência em Geopolítica, Defesa e Segurança Cibernética. Currículo Lattes: http://lattes.cnpq.br/1742625560245256. ORCID: https://orcid.org/0000-0002-7596-8695. Contato: chrystellolucas@gmail.com.

  • Sandro Teixeira Moita, Escola de Comando e Estado-Maior do Exército

    Doutor em Ciências Militares pelo PPGCM da ECEME. Graduação e licenciatura em História pela UFF (2007), Especialização em História Militar Brasileira (2011) e Mestrado em História (2013) pela UNIRIO. Currículo Lattes: http://lattes.cnpq.br/1223210921186615. ORCID: https://orcid.org/0000-0003-4795-3880. Contato: sandrotm@gmail.com.

References

ARON, Raymond. Pensar a Guerra: Clausewitz – a Era Planetária. Tradução de Elisabeth Maria Speller Trajano. Brasília, DF: Editora Universidade de Brasília, 1986.

BUZAN, Barry; HANSEN, Lene. The Evolution of International Security Studies. Cambridge University Press, 2009.

CANONGIA, Claudia; Raphael, MANDARINO. “Segurança cibernética: o desafio da nova Sociedade da Informação”. Parcerias Estratégicas, v.14, n.29, jul-dez. 2009.

CAVELTY, Myriam Dunn; BALZACQ, Thierry. Routledge Handbook of Security Studies. New York: Routledge, 2017.

CLAUSEWITZ, Carl von; HOWARD, Michael.; PARET, Paret (Eds.). On War. Princeton: Princeton University Press, 1984.

CLAUSEWITZ, Carl von. Da Guerra. 3 ed. Tradução de Maria Teresa Ramos. São Paulo: WWF Martins Fontes, 2010.

CLAUSEWITZ, Carl von. On War. Comentários de Beatrice Heuser. Oxford University Press, 2007.

COLLINS, Sean; MCCOMBIE, Stephen. “Stuxnet: the emergence of a new cyber weapon and its implications”. Journal of Policing, Intelligence and Counter Terrorism, v.7, n.1, mar. 2012.

ECHEVARRIA, Antulio Joseph. Clausewitz and contemporary war. New York: Oxford University Press, 2007.

FALLIERE, Nicolas; O’ MURCHU, Liam; CHIEN Eric. W32.Stuxnet Dossier. Symantec Security Response, fev. 2011.

FARWELL, James P.; ROHOZINSKI, Rafal. “Stuxnet and the Future of Cyber War”. Survival Global Politics and Strategy, v.53, n.1, jan. 2011.

FREILICH, Chuck. “Israel and the Iran Nuclear Deal: The Best of Bad Options”. Survival Global Politics and Strategy, v. 64, n.3, maio 2022.

GEORGE, Alexander L.; BENNETT, Andrew. Case Studies and Theory Development in the Social Sciences. Cambridge, Harvard University, 2005.

GERRING, John. Case study research: principles and practices. New York: Cambridge University Press, 2007.

GIBSON, William F. Neuromancer. Edição especial de 30 anos. Tradução: Fábio Fernandes. São Paulo: Aleph, 2014.

GRAY, Colin S. Strategy and History: essays on theory and practice. Oxon: Routledge, 2006.

HARKNETT, Richard J.; SMEETS, Max. “Cyber campaigns and strategic outcomes”. Journal of Strategic Studies, v.45, n.4, 2022.

HAUSKEN, Kjell. “Protecting complex infrastructures against multiple strategic attackers”. International Journal of Systems Science, v.42, n.1, 2011.

HERBERG-ROTHE, Andreas. Clausewitz’s puzzle: the political theory of war. Oxford University Press, 2007.

HEW STRACHAN. Sobre a Guerra de Clausewitz/ Hew Strachan; tradução, Maria Luiza X. de A. Borges. - Rio de Janeiro: Jorge Zahar Ed., 2008.

KALDOR, Mary. New and old wars- organized violence in a global era. Stanford: Stanford University Press, 1999.

KEEGAN, John. Uma história da guerra. São Paulo: Companhia das Letras, 2006.

KUEHL, Daniel. “From Cyberspace to Cyberpower: Defining the Problem”. In KRAMER, Franklin D.; STARR, Stuart S.; WENTZ, Larry K. (Eds.) Cyberpower and National Security. University of Nebraska Press, 2009, pp. 24-42.

LA MAISONNEUVE, Eric de. Metamorfosis de la violencia: ensayos sobre la guerra moderna. Buenos Aires: Grupo Editor Latinoamericano, 1998.

LIBICKI, Martin C. Cyberdeterrence and Cyberwar. Santa Monica: RAND, 2009.

LIBICKI, Martin C. “The Specter of Non-Obvious Warfare”. Strategic Studies Quarterly, v.6, n.3, Cyber Special Edition, 2012.

LINDSAY, Jon R. “Stuxnet and the Limits of Cyber Warfare”. Security Studies, v.22, n.3, ago. 2013.

LUTTWAK, Edward N. Estratégia: a lógica da guerra e da paz / Edward N. Luttwak; tradução Álvaro Pinheiro. – Rio de Janeiro: Biblioteca do Exército, 2009.

JUNIO, Timothy J. “How Probable is Cyber War? Bringing IR Theory Back Into the Cyber Conflict Debate”. Journal of Strategic Studies, v.36, n.1, 2013.

McGRAW, Gary. “Cyber War is Inevitable (Unless We Build Security In)”. Journal of Strategic Studies, v.36, n.1, fev. 2013.

MEDEIROS, Breno Pauli; GOLDONI, Luiz Rogério Franco. “The Fundamental Conceptual Trinity of Cyberspace”. Contexto Internacional. v.42, n.1, 2020.

PARET, Peter. Construtores da estratégia moderna: de Maquiavel à era nuclear/ Editado por Peter Paret com colaboração de Gordon A. Graig e Felix Gilbert, traduzido por Joubert de Oliveira Brízida. - Rio de Janeiro: Biblioteca do Exército Editora, 2001.

PARET, Peter; HOWARD, Michael; BRODIE, Bernard. Ensaios introdutórios. In: CLAUSEWITZ, Carl von. Da Guerra. London: Oxford University Press, 1984.

PROENÇA JÚNIOR, Domício et al. Guia de Estudos de Estratégia. Rio de Janeiro: Zahar, 1999.

RID, Thomas. “Cyber war will not take a place”. In MAHNKEN, Thomas G.; MAIOLO, Joseph A. (Eds.) Strategic Studies: a reader. New York: Routledge, 2014, pp.408-429.

S/N. Detectar um dispositivo desconhecido e encontrar seus drivers. S/D. Microsoft. Disponível em: <https://support.microsoft.com/pt-br/topic/detectar-um-dispositivo-desconhecido-e-encontrar-seus-drivers-ede88764-40b0-8219-14e0-ca59fc44b320> Acesso em: 3 jun. 2023.

S/N. Internet Usage Statistics: The Internet Big Picture World Internet Users and 2022 Population Stats. Internet World Stats. 2022. Disponível em: <https://www.internetworldstats.com/stats.htm> Acesso em: 2 jun. 2023.

S/N. Internet Growth Statistics: Today's road to e-Commerce and Global Trade. Internet Technology Reports. Internet World Stats. 2022. Disponível em: <https://www.internetworldstats.com/emarketing.htm> Acesso em: 2 jun. 2023.

S/N. O que são ataques de DDoS?. Kaspersky. S/D. Disponível em: <https://www.kaspersky.com.br/resource-center/threats/ddos-attacks> Acesso em: 6 jun. 2023.

S/N. What is SCADA?. SCADA INTERNATIONAL. S/D. Disponível em: <https://scada-international.com/what-is-scada/> Acesso em: 3 jun. 2023.

SAINT-PIERRE, Hector. “´Defesa´ ou ´Segurança´? Reflexões em torno de conceitos e ideologias”. Contexto Internacional, v.33, n.2, 2011.

STEVENS, Clare. “Assembling cybersecurity: The politics and materiality of technical malware reports and the case of Stuxnet”. Comparative Security Policy, v.41, n.1, 2020.

STONE, John. “Clausewitz’s Trinity and Contemporary Conflict”. Civil Wars, v.9, n.3, 2007.

STONE, John. “Cyber War Will Take Place!” Journal of Strategic Studies, v.36, n.1, 2013.

STONE, John. “Rebooting Clausewitz: On War in the Twenty-First Century”. The RUSI Journal, v.163, n.2, 2018.

TILLY, Charles. The Formation of National States in Western Europe. Princeton: Princeton University Press, 1975.

VAN CREVELD, Martin; OLSEN, John Andreas. The Evolution of Operational Art – From Napoleon to the Present. Oxford: Oxford University Press, 2011.

VENTRE, Daniel. Ciberguerra. In: Academia General Militar. Seguridad Global y Potencias Emergentes en un Mundo Multipolar. XIX Curso Internacional de Defensa. Zaragoza: Universidad Zaragoza. 2012.

WILLIAMS, Paul D.; McDONALD, Matt. Security Studies: An Introduction. New York: Routledge, 2008.

ZETTER, Kim. Countdown to Zero Day: Stuxnet and the launch of the world’s first digital weapon. Crown Publishers. Nova York, 2014.

Published

2024-12-22

Issue

Section

Artigos

How to Cite

Marini, A. N. L., Pederneiras, L. C., & Moita, S. T. (2024). Cyber warfare from Clausewitz’s perspective: a case study on Stuxnet. Malala, International Journal of Studies on the Middle East and the Muslim World, 12(15), 159-178. https://doi.org/10.11606/issn.2446-5240.malala.2024.213860