Reference list
- Albright, B., Brannan, P., & Walrond, C. (2010). Institute for science and international security Did Stuxnet Take Out 1, 000 Centrifuges at the Natanz enrichment plant? Retrieved from http://isis-online.org/uploads/isis-reports/documents/stuxnet_FEP_22Dec2010.pdf
- Albright, D., Brannan, P., & Walrond, C. (2011). Stuxnet Malware and Natanz: Update of ISIS December 22, 2010 Report. Retrieved from http://isis-online.org/isis-reports/detail/stuxnet-malware-and-natanz-update-of-isis-december-22-2010-reportsupa-href1/
- Albright, D., & Stricker, A. (2010). ISIS Reports Stuxnet worm targets automated systems for frequency converters: Are Iranian centrifuges the target? Retrieved from http://isis-online.org/isis-reports/detail/stuxnet-worm-targets-automated-systems-for-frequency-converters-is-irans-ce/8
- Anaïs, S., & Walby, K. (2016). Secrecy, publicity, and the bomb: Nuclear publics and objects of the Nevada Test site, 1951–1992. Cultural Studies, 30, 949–968. doi: 10.1080/09502386.2015.1113553
- Aradau, C. (2010). Security that matters: Critical Infrastructure and objects of Protection. Security Dialogue, 41, 491–514. doi: 10.1177/0967010610382687
- Austin, J. L. (2017). We have never been civilized: Torture and the materiality of world political binaries. European Journal of International Security, 23, 49–73. doi: 10.1177/1354066115616466
- Balzacq, T., & Dunn Cavelty, M. (2016). A theory of actor-network for cyber-security. European Journal of International Security, 1, 176–198. doi: 10.1017/eis.2016.8
- Banks, J. (2015). The Heartbleed bug: Insecurity repackaged, rebranded and resold. Crime, Media, Culture, 11, 259–279. doi: 10.1177/1741659015592792
- Best, J., & Walters, W. (2013). Translating the sociology of translation. International Political Sociology, 7, 345–349. doi: 10.1111/ips.12026_5
- Birchall, C. (2014). Aesthetics of the secret. New Formations, 83, 25–46. doi: 10.3898/NeWf.83.03.2014
- Bossong, R., & Wagner, B. (2016). A typology of cybersecurity and public-private partnerships in the context of the European Union. Crime, Law and Social Change, 67, 219–247. doi: 10.1007/978-3-319-63010-6_10
- Broad, W., Markoff, J., & Sanger, D. (2011). Israeli test on worm called crucial in Iran nuclear delay. New York Times. Retrieved from http://www.nytimes.com/2011/01/16/world/middleeast/16stuxnet.html
- Bumgarner, J. (2013). A virus of biblical distortions. Retrieved from https://www.darkreading.com/attacks-breaches/a-virus-of-biblical-distortions/d/d-id/1141007
- Carr, M. (2016). Public-private partnerships in national cyber-security strategies. International Affairs, 92, 43–62. doi: 10.1111/1468-2346.12504
- Christensen, K. K., & Petersen, K. L. (2017). Public-private partnerships on cyber security: A practice of loyalty. International Affairs, 93, 1435–1452. doi: 10.1093/ia/iix189
- Chronicle. (2019). Who is Gossipgirl? Retrieved from https://medium.com/chronicle-blog/who-is-gossipgirl-3b4170f846c0.
- Chun, W. H. K. (2008). On “sourcery,” or code as fetish. Configurations, 16, 299–324. doi: 10.1353/con.0.0064
- Cluley, G. (2010). 19790509: The mysterious number inside the Stuxnet worm. Retrieved from https://nakedsecurity.sophos.com/2010/11/23/19790509-the-mysterious-number-inside-the-stuxnet-worm/
- Collier, J. (2018). Cyber security assemblages: A framework for understanding the dynamic and contested nature of security provision. Politics and Governance, 6(2), 13–21. doi: 10.17645/pag.v6i2.1324
- Congressional Research Service website. (2014). Mission (About Us). Retrieved from http://www.loc.gov/crsinfo/about/
- De Falco, M. (2012). Stuxnet facts report: A technical and strategic analysis. NATO Cooperative Cyber Defense Centre of Excellence. Retrieved from: https://ccdcoe.org/library/publications/stuxnet-facts-report-a-technical-and-strategic-analysis-2/
- De Goede, M. (2018). The chain of security. Review of International Studies, 44, 24–42. doi: 10.1017/S0260210517000353
- Dunn Cavelty, M. (2018). Cybersecurity research meets science and technology studies. Politics and Governance, 6(2), 22–30. doi: 10.17645/pag.v6i2.1385
- Dunn-Cavelty, M., & Suter, M. (2009). Public-private partnerships are no silver bullet: An expanded governance model for critical infrastructure protection. International Journal of Critical Infrastructure Protection, 2(4), 179–187. doi: 10.1016/j.ijcip.2009.08.006
- Eichensehr, K. E. (2017). Public-private cybersecurity. Texas Law Review, 95, 467–538. doi: 10.3868/s050-004-015-0003-8
- ENISA. (2018). ENISA Threat LANDSCAPE REPORT 2018: 15 Top Cyberthreats and trends. Retrieved from https://www.enisa.europa.eu/publications/enisa-threat-landscape-report-2018
- ESET. (2016). En Route with Sednit. Retrieved from http://www.welivesecurity.com/wp-content/uploads/2016/10/eset-sednit-part3.pdf
- F-Secure. (2010). Stuxnet Redux Q&A. Retrieved from https://www.f-secure.com/weblog/archives/00002066.html
- Falliere, N. (2010). Exploring Stuxnet’s PLC Infection Process. Retrieved from https://www.symantec.com/connect/blogs/exploring-stuxnet-s-plc-infection-process
- Falliere, N., O’Murchu, L. O., & Chien, E. (2011). W32.Stuxnet dossier version 1.4 (February 2011) (Vol. 4). Retrieved from https://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/w32_stuxnet_dossier.pdf
- Farwell, J. P., & Rohozinski, R. (2011). Stuxnet and the future of cyber war. Survival, 53(1), 23–40. doi: 10.1080/00396338.2011.555586
- Fitzgerald, P. (2010). The hackers behind Stuxnet. Retrieved from http://www.symantec.com/connect/blogs/hackers-behind-stuxnet
- Fruhlinger, J. (2017). What is Stuxnet, who created it and how does it work? Retrieved from https://www.csoonline.com/article/3218104/what-is-stuxnet-who-created-it-and-how-does-it-work.html
- Goodin, D. (2015). Stepson of Stuxnet stalked Kaspersky for months, tapped Iran nuke talks. Retrieved from https://arstechnica.com/information-technology/2015/06/stepson-of-stuxnet-stalked-kaspersky-for-months-tapped-iran-nuke-talks/
- ISIS. (2013). Basic attack strategy of Stuxnet 0.5. Retrieved from http://isis-online.org/uploads/isis-reports/documents/Stuxnet_attack_strategy_26Feb2012.pdf
- Jackson Higgins, K. (2019). New Twist in the Stuxnet Story. Retrieved from https://www.darkreading.com/threat-intelligence/new-twist-in-the-stuxnet-story/d/d-id/1334511
- Joque, J. (2018). Deconstruction machines: Writing in the age of cyberwar. Minneapolis, MI: University of Minnesota Press.
- Kearns, O. (2016). State secrecy, public assent, and representational practices of U.S. covert action. Critical Studies on Security, 4, 276–290. doi: 10.1080/21624887.2016.1246305
- Kearns, O. (2017). Secrecy and absence in the residue of covert drone strikes. Political Geography, 57, 13–23. doi: 10.1016/j.polgeo.2016.11.005
- Kerr, P. K., Rollins, J., & Theohary, C. (2010). The Stuxnet computer worm: Harbinger of an emerging warfare capability (CRS report for congress No. R41524). Washington, DC: Congressional Research Service.
- Kitchin, R., & Dodge, M. (2011). Code/space: Software and everyday life. Cambridge, MA: The MIT Press.
- Kuchinskaya, O. (2014). The politics of invisibility: Public knowledge about radiation health effects after Chernobyl. Cambridge, MA: The MIT Press.
- Latour. (2005). From realpolitik to dingpolitik or how to make things public. Human Relations, 69(5), 4–31. doi: 10.1177/0018726715600230
- Latour, B. (2007). Turning around politics. A note on Gerard de Vries’ paper. Social Studies of Science, 37, 811–820. doi: 10.1177/0306312707081222
- Latour, B., & Woolgar, S. (2013). Laboratory life: The construction of scientific facts. Princeton, NJ: Princeton University Press.
- Law, J. (1992). Notes on the theory of the actor-network: Ordering, strategy, and heterogeneity. Systems Practice, 5, 379–393. doi: 10.1007/BF01059830
- Law, J., & Singleton, V. (2005). Object lessons. Organization, 12, 331–355. doi: 10.1177/1350508405051270
- Leander, A. (2014). Understanding US national intelligence: Analyzing practices to capture the chimera. In J. Best, & J. Gheciu (Eds.), The return of the public in global governance (pp. 197–221). Cambridge: Cambridge University Press.
- Lundborg, T., & Vaughan-Williams, N. (2015). New materialisms, discourse analysis, and international relations: A radical intertextual approach. Review of International Studies, 41, 3–25. doi: 10.1017/S0260210514000163
- Matrosov, A., Rodionov, E., Harley, D., & Malcho, J. (2010). Stuxnet under the microscope (Revision 1.1). ESET. Retrieved from http://ece.wpi.edu/~dchasaki/papers/Stuxnet_Under_the_Microscope.pdf
- McCarthy, D. R. (2018). Privatizing political authority: Cybersecurity, public-private partnerships, and the reproduction of liberal political order. Politics and Governance, 6(2), 5–12. doi: 10.17645/pag.v6i2.1335
- Mcdonald, G., O’Murchu, L., Doherty, S., & Chien, E. (2013). Stuxnet 0.5: The Missing Link. Retrieved from https://www.symantec.com/content/dam/symantec/docs/security-center/white-papers/stuxnet-missing-link-13-en.pdf
- Miller, J. (2016, June). What We Learned About Cyber Warfare From the Heroes of Stuxnet. New Yorker Magazine. Retrieved from http://nymag.com/intelligencer/2016/06/what-we-learned-about-cyber-warfare-from-the-heroes-of-stuxnet.html
- Mol, A. (2002). The body multiple: Ontology in medical practice. Durham, NC: Duke University Press.
- Paglen, T. (2010). Goatsucker: Toward a spatial theory of state secrecy. Environment and Planning D: Society and Space, 28, 759–771. doi: 10.1068/d5308
- Porche III, I. R., Sollinger, J. M., & McKay, S. (2011). A cyberworm that knows no boundaries. Santa Monica, CA: RAND.
- Rankin, W. (2014). The geography of radionavigation and the politics of intangible artifacts. Technology and Culture, 55, 622–674. doi: 10.1353/tech.2014.0077
- Schouten, P. (2014). Security as controversy: Reassembling security at Amsterdam Airport. Security Dialogue, 45, 23–42. doi: 10.1177/0967010613515014
- Scott Smith, T. (2013). The least provocative path: An ANT lens on development project formation and dissolution (Actor-Network Theory for Development No. 3). Retrieved from http://www.cdi.manchester.ac.uk/resources/ant4d.
- Shearer, J. (2019). W.32 Stuxnet Write-up. Retrieved from https://www.symantec.com/security-center/writeup/2010-071400-3123-99
- Shires, J., & Smeets, M. (2017). Contesting “cyber.” Retrieved from https://www.newamerica.org/cybersecurity-initiative/c2b/c2b-log/contesting-cyber/
- Slowik, J. (2019). Extracting community from the communitarian. Retrieved from https://pylos.co/2019/04/24/extracting-community-from-the-communitarian/.
- Stevens, T. (2018). Editorial: Global cybersecurity: New directions in theory and methods. Politics and Governance, 6(2), 1–4. doi:10.17645/pag.v6i2.1569
- UNSC. (2006, July 31). Security council demands Iran suspend uranium enrichment by 31 August, or face possible, economic, diplomatic sanctions. Security Council Press Release, SC/8792. Retrieved from https://www.un.org/press/en/2006/sc8792.doc.htm
- Van Veeren, E. (2014). Materializing US security: Guantanamo’s object lessons and concrete messages. International Political Sociology, 8, 20–42. doi: 10.1111/ips.12038
- Walters, W. (2014). Drone strikes, dingpolitik and beyond: Furthering the debate on materiality and security. Security Dialogue, 45, 101–118. doi: 10.1177/0967010613519162
- White House. (2003). The national strategy to secure cyberspace. Retrieved from https://www.us-cert.gov/sites/default/files/publications/cyberspace_strategy.pdf
- Weedon, J., Nuland, W., & Stamos, A. (2017). Information operations and Facebook. Facebook. doi:10.1016/B978-1-4377-2003-7.00058-3
- Zetter, K. (2014). Countdown to zero day: Stuxnet and the launch of the world’s first digital weapon. New York, NY: Broadway Books.