观点病毒

Stuxnet was about what happened next

Do not be deceived by Stuxnet’s destructive success. The computer worm that struck at Iran’s nascent nuclear infrastructure has been described as a precision-guided cyber-weapon heralding a new global arms race. That may be true. But its impact is likely to come more from strategic espionage than from technical sabotage.

That distinction matters enormously. Irrespective of who gave Stuxnet virtual life, Iran’s nuclear ambitions and capabilities remain poorly understood. Scientists, diplomats and intelligence officials disagree about its behaviour and intentions, the value of diplomacy versus economic sanctions, and the possibility of military intervention.

Given these uncertainties, any serious state-sponsored technical initiative to undermine a secretive nuclear programme would have a dual mission: first, to exploit known systems vulnerabilities and – arguably most important – to discover which individuals and institutions are brought in (and when) to deal with the problem. This worm was consequently much more than a weapon; it was a mechanism designed to generate actionable intelligence. This scenario is not idle speculation. Cyber-conflict doctrines of China, the US, Russia, Israel and – reportedly – the UK emphasise the potential intelligence benefits of “information operations”. Yesterday’s “mole” has become today’s “worm”.

您已阅读30%(1348字),剩余70%(3125字)包含更多重要信息,订阅以继续探索完整内容,并享受更多专属服务。
版权声明:本文版权归manbetx20客户端下载 所有,未经允许任何单位或个人不得转载,复制或以任何其他方式使用本文全部或部分,侵权必究。
设置字号×
最小
较小
默认
较大
最大
分享×