TY - JOUR
T1 - Assembling cybersecurity
T2 - The politics and materiality of technical malware reports and the case of Stuxnet
AU - Stevens, Clare L
PY - 2019/10/15
Y1 - 2019/10/15
N2 - This is an article about how cybersecurity gets “made,” with a focus on the role of commercial computer security firms in generating knowledge in matters of international cybersecurity. The argument is two-fold. Firstly, malware may be an intangible artefact in some ways, but its success and its interpretation as malware is deeply interwoven in social, technical and material alliances. Secondly, a materialist-minded examination of Symantec’s Stuxnet reports will demonstrate the politically situated nature of how cybersecurity expertise emerges. The article finds that Symantec’s work was not a-political or neutrally-technical: Their experts made profoundly political choices in their analyses. By showing the processes that go into making cybersecurity, the article contributes to a widening and deepening of debates about what is at stake in cybersecurity knowledge and practices.
AB - This is an article about how cybersecurity gets “made,” with a focus on the role of commercial computer security firms in generating knowledge in matters of international cybersecurity. The argument is two-fold. Firstly, malware may be an intangible artefact in some ways, but its success and its interpretation as malware is deeply interwoven in social, technical and material alliances. Secondly, a materialist-minded examination of Symantec’s Stuxnet reports will demonstrate the politically situated nature of how cybersecurity expertise emerges. The article finds that Symantec’s work was not a-political or neutrally-technical: Their experts made profoundly political choices in their analyses. By showing the processes that go into making cybersecurity, the article contributes to a widening and deepening of debates about what is at stake in cybersecurity knowledge and practices.
KW - intangible artifacts
KW - cybersecurity
KW - security studies
KW - materiality
KW - Stuxnet
UR - https://www.scopus.com/record/display.uri?eid=2-s2.0-85074346041&origin=inward&txGid=90ee440296bdc44645987e2ee4abc1a3
U2 - 10.1080/13523260.2019.1675258
DO - 10.1080/13523260.2019.1675258
M3 - Article (Academic Journal)
SN - 1352-3260
JO - Contemporary Security Policy
JF - Contemporary Security Policy
ER -