Introduction
In September 2024, thousands of handheld pagers used by Hezbollah suddenly exploded. This audacious and sophisticated attack killed at least twelve people and injured thousands. With their primary mode of communication compromised, Hezbollah operatives switched to walkie-talkies. Those walkie-talkies exploded the following day in the vicinity of crowds who had gathered for the funerals of those killed by the pager attacks. Thirty-nine more died. There seems little question that Israel was responsible. The nature of this activity and its purposes, however, were not immediately clear. Some speculated this was a ‘monumental cyber-attack’Footnote 1, ushering a new era in cyberwarfare.Footnote 2 Others immediately saw it in the context of Israel’s long-standing approach to targeted killing.Footnote 3 Others, still, suggested that attacking Hezbollah’s communications was an alternative to military invasion, deterring Hezbollah and its allies to avoid a larger war.Footnote 4 Conversely, legal analysts questioned whether this was an act of war in breach of international law.Footnote 5
These ideas were plausible but incorrect. The pager attack was a classic act of sabotage: a deliberate effort to inject and weaponize friction into adversary systems, undermining their efficiency and morale. The individual explosions were small, but their combined effects devastated Hezbollah communications, sowed confusion, and induced paranoia.Footnote 6 Operatives were incapacitated and trust in communications plummeted. As it turned out, these effects helped facilitate Israel’s ensuing invasion.Footnote 7
The initial public response reflects deeper confusion about the scope, role, and nature of sabotage. This confusion is mirrored in the scholarly literature where sabotage remains ill-defined and often mythologized. This lack of conceptual clarity presents a significant challenge to international relations scholars, given the urgent need to put sabotage in theoretical and historical context. The pager operation was merely one in a spate of recent attacks. Security officials across Europe issued warnings following suspicious incidents in 2024, including fires in London and Lithuania, explosions at defence plants in Pennsylvania and Wales, and a string of plots to disrupt railways. German intelligence warned publicly that Russian sabotage had almost caused a plane crash. In September 2024, the head of Norwegian intelligence stated that ‘We see acts of sabotage happening in Europe now’.Footnote 8 This pattern continued into 2025, with multiple accusations of sabotage of underwear cables in the Baltic Sea.Footnote 9 In May, Poland closed the Russian consulate in Krakow after uncovering evidence proving Russian intelligence services were behind a huge fire that destroyed a shopping centre in the Polish capital.Footnote 10 Such activities, and their fallout, are only expected to increase.Footnote 11
One prominent scholar put it bluntly: ‘whereas previously special operations supported foreign policy, today special operations are [Russian] foreign policy’.Footnote 12 If Russia is responsible for many of these, what is the point? Is it an exercise in nihilism, sowing chaos for its own sake? Does Russia believe that sabotage will increase disillusionment with the so-called liberal international order? Or does it have more specific goals in mind, like increasing the costs of supporting Ukraine and slowing the delivery of military supplies?Footnote 13 The wide range of targets provides evidence for all of these interpretations. Indeed, sabotage has formed part of the conflict both before and following Russia’s full-scale invasion in 2022, spanning fires in arms depots and explosions on bridges to short term cyber-attacks on energy infrastructure and longer-term destruction of undersea gas pipelines. In May 2024, a huge blaze destroyed a factory of the arms manufacturer Diehl (producer of the ‘Iris-T’ air defence system Germany delivered to Ukraine) in Berlin.Footnote 14
As the pager attack demonstrates, Russia is not solely responsible for the surge in sabotage. Other states and non-state groups have become involved. In July 2024, for instance, a coordinated series of fires immobilized large sections of the French high-speed rail network on the eve of the Olympic Games. The French arson was quickly linked to the far left.Footnote 15
The growing prominence of sabotage and ongoing discussions – both within and beyond academia – highlight a problem. Observers use the word sabotage to describe a wide variety of actions. There are many ways to disrupt machines and physical infrastructure, for instance, from manipulating supply chains to arson and the use of explosives. Attacks on information systems may similarly range from cutting cables to offensive cyberspace operations. Sabotage is sometimes assumed to be inherently violent, but also used to describe bureaucratic sabotage, policy sabotage, electoral sabotage or ideological sabotage. Meanwhile, some campaigns are conspicuous while others are meant to be invisible. All of this creates a puzzle about the parameters of sabotage and its place in the wider security landscape.
Conceptual confusion has important implications. It risks misunderstandings of so-called grey zone activity by overemphasizing novelty, impact, and secrecy, which in turn complicates policy and legal responses. For example, the UK’s National Security Act 2023 created a new criminal offence of ‘sabotage’, but applies it only to attacks conducted by, on behalf of, or in the interests of a foreign state. Finding evidence that meets this ‘foreign condition’ is likely to prove difficult, given the murky details of unexpected fires, suspicious malfunctions, and sundry breakdowns.
In seeking to put sabotage firmly on the research agenda, this article addresses the following questions. First, what is sabotage and what differentiates it from adjacent activities and concepts? Second, what is its distinct strategic logic and how does it work? Third, what can it achieve and what are its limitations?
In doing so, it not only seeks to set the research agenda but also to use sabotage as a vehicle to advance theoretically the literature on covert action and so-called secret or ‘grey’ statecraft. We make three arguments. First, sabotage is the weaponization of friction to degrade the performance of a target’s system from within. Second, sabotage has a strategic logic distinct from related concepts of covert action (which hinges on non-acknowledgement or plausible deniability) and subversion (which hinges on manipulating behaviour). In short, its logic hinges on turning friction into advantage. Third, given this distinct logic, sabotage is limited as a stand-alone tool, but rather works to enhance and enable other policy instruments. Although other tools of ‘secret statecraft’ also act as force-multipliers, sabotage’s distinct logic makes it particularly well-placed to do so: degrading performance creates space for other policy tools.
We advance these arguments by surveying multiple literatures on sabotage and highlighting several unsolved challenges. We then use a process of qualitative meta-synthesis to distil core characteristics of sabotage, before testing these against related concepts of covert action and subversion. This helps determine the parameters of sabotage and refine our definition. Finally, we examine the strategic utility across a range of purposes: deterrence and counterproliferation, counterterrorism and counterinsurgency, diplomacy and war. The conclusion discusses new directions for research on sabotage and international security.
Sabotage: Current understandings and challenges
Multiple scholarly disciplines have addressed the issue of sabotage but have tended to do so within disciplinary silos, thereby creating competing understandings and conceptual confusion.
Military historians have devoted considerable attention to memorable case studies. Lawrence of Arabia’s efforts against Ottoman infrastructure dominated understandings of sabotage in the First World War and created an enduring legacy.Footnote 16 Historians have also focused on Special Operations Executive activity in the Second World War. Tasked by Churchill with ‘setting Europe ablaze’, it planted explosives deep behind enemy lines – hidden in everything from bottles to horse droppings – to disrupt railroads, military depots, bridges, etc.Footnote 17 British and American operatives organized resistance in Nazi occupied Europe, training locals in sabotage techniques. Most famous of all was the allied sabotage against Nazi Germany’s nuclear programme.Footnote 18
However dramatic, such stories warp our understanding of sabotage. They suggest that small numbers of daring and committed operatives can produce extraordinary results, even changing the course of war. In focusing on weapons, techniques, and operations, the phenomenon of sabotage is often left undefined or taken for granted.Footnote 19 Moreover, studies imply that sabotage involves explosive attacks on infrastructure, thereby often reducing it to a narrow military tactic, with little attention to underlying strategic questions or recognition of its existence beyond the conventional military domain.Footnote 20
Intelligence scholarship has expanded the study of sabotage in peacetime and has contributed important work on the use and limits of secrecy. Studies of covert operations are particularly relevant to students of sabotage, given that secrecy prevails in both domains.Footnote 21 Influenced by the US 1948 National Security Council Directive 10/2, which specified sabotage within a list of ‘clandestine activities’,Footnote 22 scholars have since typically presented sabotage as an option within the covert action toolkit, alongside propaganda, illicit financing of foreign groups, secret paramilitary support, assassinations, coup-plotting, and so forth. Indeed, Loch Johnson, perhaps the most influential scholar of such activities, describes sabotage as a ‘form’ of covert action, recognizing its economic role and its place often in the broader context of paramilitary attacks.Footnote 23
This is important, and sabotage – notably in the form of physically attacking infrastructure (described by Johnson as classic sabotage) – can undoubtedly be a form of covert action when conducted in a plausibly deniable or unacknowledged manner. However, this is not always the case, and interpreting it solely through the prism of covert action or intelligence studies leads to a limitation and a misunderstanding. Like military history, such scholarship is limited by its tendency to take definitions of sabotage as implicit or for granted and struggles to interrogate assumptions of ‘success’.Footnote 24 It risks overemphasizing the kinetic or paramilitary dimension of sabotage, at the expense of, for example, cyber-attacks or sabotage’s intangible psychological effects. This, in turn, creates some conceptual confusion about the relationship between sabotage and other ‘forms’ of covert action, risking the conflation of means with ends. For example, it struggles to explain famous examples of historical ‘administrative’ or ‘bureaucratic sabotage’ conducted by US and UK agencies, which conflate subversion and/or propaganda with sabotageFootnote 25; and, separately, why analysts have described propaganda as ideological sabotage.Footnote 26 In this sense, sabotage is a strategic method that can be implemented by a variety of means traditionally associated with covert action.
A welcome recent exception lies in Richterova et al., which defines sabotage as: ‘a classic form of kinetic covert warfare, [it] is designed to hit the enemy in a deniable, undetectable way: to weaken, sow chaos, heighten uncertainty or “weaponise friction” in times of crisis and escalation’.Footnote 27 This is helpful, but again explicitly limits sabotage to a ‘kinetic’ and ‘warfare’ context in which deniability and undetectability are central. The wider study of secrecy in international relations has developed hugely in recent years,Footnote 28 and defining sabotage as inherently deniable and undetectable does not recognize the more nuanced dimensions of exposure and attribution elsewhere.
Sabotage is also relevant to literature on cyber operations, much of which similarly emphasizes their military and extraordinary nature. The first wave of theorizing conceived of cyber operations primarily as a means of war.Footnote 29 Many ascribed extraordinary strategic potential to cyber-attacks, expecting them to herald a revolution in the nature of conflict itself.Footnote 30 Some scholars, however, identified the relevance of cyber operations for sabotage early on. Thomas Rid argued in 2013 that cyber operations primarily conduct three types of activity: espionage, sabotage, and subversion.Footnote 31 He suggests a narrow conception of sabotage as weakening or disabling military or economic systems, however, that excludes much of the activity described above. As a result, the impact is limited, and there is no need to articulate the range of outcomes it can achieve under different circumstances.Footnote 32 More recent scholarship on cyber conflict has shifted from a focus on warfare to low intensity conflict. An influential book acknowledges the suitability of cyber operations for sabotage yet treats them as different because cyber operations are capable of vastly more strategic impact than sabotage.Footnote 33 Consequently, the authors argue that cyber operations exist in a new category of power, and again conflate a range of distinct activities – i.e. espionage, sabotage, subversion – under the umbrella term. In short, the relevance of cyber operations as means of sabotage is underdeveloped, and consequently, the scope of activities involved and their strategic potential are unclear.
Sabotage spans scholarship far beyond the fields of military history, covert action, and cyber studies. Once again, other disciplinary approaches and their definitions focus narrowly on specific types of sabotage related to different domains. Sabotage is listed as one form of ‘bureaucratic spoiling’ by public administration scholars interested in organizational efficiency.Footnote 34 Others similarly define ‘policy sabotage’ as ‘the deliberate effort to hinder the implementation of a policy enacted by the opposition party’.Footnote 35 These terms give little sense of the types, usage, and deliberate coordination of sabotage recognizable to, say, military historians. They do, however, explicitly recognize that ‘sabotage is multifarious and not limited to violent actions’ (although defining it as ‘to be engaged in negative work’ is perhaps too broadFootnote 36), and emphasize that ‘administrative sabotage is defined by intent’ over means: an agency ‘deliberately seeks to kill or nullify a statutory program in whole or part, that Congress has charged the agency with administering’.Footnote 37 While the centrality of intent could apply beyond administrative and legal scholarship, the nullification of Congressional programmes is, again, limited to a specific domain.
Industrial sabotage was originally seen as an anarcho-syndicalist tool to bolster workers’ pay and conditions,Footnote 38 with classic definitions including ‘the rule-breaking which takes the form of conscious action or inaction directed towards the mutilation or destruction of the work environment…’ (from 1971) and ‘the clogging of the machine of capitalist industry by the use of certain forms of action, not necessarily violent and not necessarily destructive…’ (from 1920).Footnote 39 Meanwhile, terrorism and political violence scholars debate ‘ecotage’, defined as ‘a variety of criminal acts (e.g. vandalism, arson, and threats) undertaken in the name of protecting nature’.Footnote 40 Expansive definitions of terrorism used by law enforcement agencies encompass environmentally motivated sabotage, yet critics point to a fundamental conceptual difference between violence against people (terrorism) and against property (sabotage).Footnote 41 Despite focusing on a siloed domain and limiting sabotage to physical violence, discussions of ecotage and ecoterrorism do highlight the political nature of the definition, raising important questions about labelling and power dynamics.
Fault lines within existing (and implicit) definitions include the levels of organization or coordination, intent versus means, and the roles of violence, criminality, target (people versus property), secrecy, and directness. We are left with a conceptual muddle. Observers define many different activities as sabotage, but it is not immediately clear what they have in common. At the same time, observers have described other activities, which look to us like sabotage, as something different, again eroding conceptual clarity and leading to scholars talking across each other.
Conceptualizing sabotage
To help overcome this problem and build a concept of sabotage that is useful to historians, social scientists, and policymakers, this section identifies common characteristics of sabotage activity from antiquity to the present. It does so using a method of qualitative meta-synthesis to systematically review and analyse studies across multiple disciplines to identify common themes, patterns, and concepts. We adopt an interpretative process, developed from social sciences but innovative in strategic studies, to code and refine similarities across a wide range of cases emanating from diverse fields, from military history to cybersecurity, industrial relations to terrorism studies.Footnote 42 This allows us to derive a novel and substantive definition and develop new conceptual insights.Footnote 43 Three common characteristics of sabotage stand out.
The weaponization of friction
Intentions are crucial: sabotage weaponizes friction. Friction refers to ordinary sources of organizational inefficiency, such as technical difficulties and workplace disputes. These prosaic problems affect all organizations, but they are usually manageable. Sabotage seeks to aggravate friction to cause a meaningful decline or disruption in productivity and morale. Done well, sabotage operations not only target an adversary’s physical and communications infrastructure, but also its esprit de corps. And these effects may radiate outwards: policymakers may have to shift resources in an effort to repair the damage, frustrated bureaucrats lose morale, and wider public confidence is undermined.Footnote 44
Put more abstractly, sabotage thus interferes with the normal functioning of complex systems. Sabotage may target any type of bureaucracy, such as industrial facilities, research institutes, government bureaus, international organizations, intelligence agencies, or military headquarters.Footnote 45 It can directly interfere in organizational processes to inject friction, using a range of techniques such as those described in the famous Office of Strategic Service’s field manual, including ‘misfiling essential documents’ and applying ‘all regulations to the last letter’.Footnote 46 Sabotage can also target the underlying infrastructure that the functioning of an organization or society depends upon – for example cutting the power in an industrial facility. Because a growing range of both organizational processes and infrastructure is computerized, cyber operations are capable of a growing scope of sabotage.
Finally, friction affects the public and private sector, rendering both vulnerable to sabotage. All these targets are also subject to physical and psychological harm. Indeed, the immediate physical consequences of sabotage may be less important than secondary psychological effects of weaponized friction, as colleagues start to question each other’s competence and loyalty. Sabotage thus not only targets friction within systems but also amongst people within those systems by targeting trust (hence moving beyond certain terrorism definitions limiting sabotage to attacks on property to incorporate wider understandings from public administration scholarship). Indeed, public administration scholars have long recognized the importance of trust in navigating friction.Footnote 47 Sabotage exploits this linkage. Throughout history, saboteurs have undermined the target’s trust in their infrastructure. Lawrence of Arabia attacked Ottoman confidence in its railway system. The Soviets accompanied Cold War sabotage plans with propaganda campaigns designed to amplify any kinetic effects to spread further confusion and paralysis. One GRU defector, in the early 1970s, told of a plan to sow panic about the presence of nuclear submarines by contaminating Holy Loch, on the east coast of Scotland, with radioactive material.Footnote 48 Similar psychological effects exist today. Fears of electoral sabotage in the United States may be more important than hypothetical operations against election machines, for example, if they exacerbate the loss of faith in government institutions.
Working from the inside–out – physically or digitally
Most forms of political power work from the outside in. Diplomacy can put external pressure on a government to act according to one’s interest. Threats of using force can further facilitate coercion. Warfare in turn projects power by deploying one’s material capabilities against and within enemy territory.
Sabotage, in contrast, works from the inside–out. It is intrusive, quietly burrowing into a target organization to weaponize friction. Historically, saboteurs required human agents who were willing to put themselves at risk while infiltrating enemy organizations, or (para)military units conducting stealthy operations within adversary territory. Their deployment in enemy territory and organizations means these agents can be captured or killed, and the more daring the activity involved, the higher these risks become.
Modern sabotage can reduce this risk because of increasingly long and complex global supply chains. Rather than operating within enemy territory, supply chains can be compromised and machinery sabotaged from neutral or friendly territory. Implanting faulty hardware from a distance can cause machines to fail. Hiding bombs in machine parts delivered to a facility can damage or destroy it. Finally, cyber operations offer a way to conduct sabotage across borders as well, adding to the range of available means to induce friction. Computer systems can be sabotaged remotely using a range of social engineering or hacking techniques, i.e. exploiting vulnerabilities in people, hardware, and software.Footnote 49 Irrespective of how one gains access to enemy systems, the effects are produced from within. Hackers stealthily gain control of systems to disrupt or disable them as desired.
While the rise of cyber operations offers new opportunities for sabotage, it also introduces added challenges – especially when more violent means are required to achieve the desired degree of friction. Perhaps somewhat counterintuitively, given the widespread fear of catastrophic cyber-attacksFootnote 50, traditional means retain an edge in these cases. Reporting on the Hezbollah case discussed at the outset illustrated pervasive dread of catastrophic cyber sabotage. Yet reality showed the opposite. Hezbollah’s fear of cyber-attacks and espionage motivated it to turn to an obsolete communications technology. This choice in turn provided an opportunity for traditional sabotage with explosives as supply chains were fragmented and suppliers scarce. According to detailed public reporting, Israel ingeniously exploited this opportunity. In short, when damage and destruction are the aim, traditional sabotage likely remains the more potent threat.Footnote 51 Israel’s choice in favour of plastic explosives over cyber means in 2021’s sabotage of Iran’s Natanz nuclear enrichment facility provides further evidence of this realization amongst states.Footnote 52 It is all the more pertinent given Natanz was the target of the first cyber-physical sabotage operation, Stuxnet.
Novel opportunities provided by cyber means promise to expand the strategic impact of sabotage in two ways. First, attackers can combine traditional and cyber sabotage operations to strike deep and wide. Success will require significant preparation time, coordination, and organizational capacity. Second, attackers can also combine traditional and cyber means within individual operations. Russia’s so-called use of local ‘gig workers’ for sabotage operations provides a key example.Footnote 53 The ‘cyber’ component is the digitally networked command and control infrastructure, facilitating recruitment and coordination of local agents. Conversely, human agents can offer a way to compromise highly secured computer systems lacking technical vulnerabilities in order to sabotage them via cyber means.
Similarly, advances in lethal autonomous weapons systems offer new opportunities to assassinate targets within adversary territory remotely, without human agents involved. Instead of deploying field agents or soldiers into harm’s way, weapons systems can be assembled in safe houses within adversary territory from individually inconspicuous parts. Yet just like with cyber operations, there are new challenges as well. Because autonomous weapon systems depend on artificial intelligence, for example, and because artificial intelligence is prone to unpredictable and unexplainable behaviour, relying on such systems introduces new causes of failure.Footnote 54
Clandestine intrusions: Visible outcomes
Tactical success requires a commitment to operational secrecy. Sabotage campaigns rely on their targets’ ignorance because successful intrusions require that defenders remain unaware. Targeted organizations may be concerned about sabotage in general, but – when sabotage is successful – they do not discover specific operations until it is too late. Keeping defenders in the dark is a prerequisite for generating meaningful effects, because revelation may allow them to take pre-emptive actions (e.g. changes to operations procedures and communications protocols) before the effects of sabotage accumulate. Conventional military attacks can succeed, by contrast, by overwhelming the defender. In these cases, the enemy knows it is under attack but simply cannot stop it.
The need for clandestine intrusion is a characteristic shared with espionage. However, sabotage and espionage are distinct. Both rely on deception to enter enemy networks, but spies seek to remain hidden to keep collecting information. Espionage facilitates sabotage by providing vital information about adversary vulnerabilities as well as best practices for gaining entry and maximizing effect. As a result, spies are temperamentally averse to exploiting their presence to disrupt enemy operations. Sabotage risks this kind of compromise. That said, because sabotage often requires long lead times, agents may have ample opportunities to steal secrets in the course of their preparatory work. In this sense, sabotage can enable espionage if the goal is to learn more about how adversaries behave under stress. Sabotage might also create new opportunities to recruit human sources, because increasing friction can alienate disgruntled bureaucrats. In these senses, sabotage and espionage are mutually reinforcing. In other cases, however, they work at cross-purposes. Because sabotage heightens the risk of discovery, agents have good reasons to lay low. And if the discovery of sabotage causes counterintelligence services to become more vigilant and ruthless, agents may stop collecting altogether.
It is important here to distinguish ‘clandestine’ from ‘covert’. The conceptual difference is familiar to students of intelligence but may not be for IR generalists. Clandestine operations are secret; adversaries cannot see evidence of anything amiss. Covert operations are deniable; adversaries may well see the problem, but they cannot necessarily determine who is responsible. As with espionage, sabotage campaigns rely on clandestine intrusions.
Following the clandestine intrusion, sabotage becomes distinct from espionage in another core manner: unlike espionage, it generates visible outcomes. It exists in the realm of policy execution and, like covert action, often exploits uncertainty and ambiguity regarding sponsorship. Indeed, sabotage efforts are often (but not always) covert, concealing the perpetrator’s identity if not the act itself. Saboteurs can then exploit the victim’s resulting uncertainty, weaponizing friction further. Even after targets realize that something is wrong, they often remain uncertain about the cause. The search for an explanation might help them find answers. On the other hand, it might compound the problem by triggering security measures that lead to paranoia, accusations, and internal recriminations. Lingering doubt about the real source of trouble may be just as consequential as the actual physical effect of sabotage. This is one reason why sabotage can cheaply impose long-term costs. By playing on the psychology of targets and exploiting the unsettling sense that their machines have been compromised, a small investment can yield outsize results.
Consequently, determining the line between foreign sabotage and internal dysfunction is often difficult. The upshot is uncertainty about the cause and the perpetrator. More than two centuries ago, a petty criminal, deludedly thinking he had the full backing of the American envoy in Paris and the Continental Congress in Philadelphia, sabotaged British naval shipyards during the American War of Independence. Panicked British officers were convinced that the gang of saboteurs was far bigger, and better directed, than was actually the case.Footnote 55 Leaders also point to external sabotage to divert attention from internal infrastructure failures. When an Indian train derailed in 2016, killing 151 people, the railway minister later alluded to sabotage before having to insist that he was not looking for scapegoats, while the prime minister spoke of ‘conspiracy’ directed by Pakistan. Investigators ultimately did not file a charge sheet after forensic reports ruled out the fractured track being caused by explosives.Footnote 56
At the other end of the spectrum, saboteurs may want to be discovered. Here, sabotage follows similar logics to so-called implausibly deniable covert actions. They include seeking to signal the state’s ability to penetrate adversary security protocols, to signal credible resolve while mitigating the broader diplomatic consequences,Footnote 57 or to generate ambiguity in the grey zone between exposure and acknowledgement.Footnote 58 In a particularly outlandish example, in February 2025 Benjamin Netanyahu presented Donald Trump with a golden pager during a visit to the United States supposedly representing a turning point in Israel’s war with Hezbollah.Footnote 59 Exposure does not always mean failure. At the same time, it is essential not to give too much credit to saboteurs by assuming that all exposed operations were carefully calibrated, rather than caused by poor tradecraft.Footnote 60
In some cases, saboteurs seek to leave no trace. In others, they find it useful to imply their role.Footnote 61 Curiouser still is the notion that victims of sabotage might find it useful to allow their adversaries to retain a modicum of deniability. Doing so might buy time to quietly rebuild defences without tipping off the saboteur, while simultaneously gaining valuable intelligence about their methods. Public attribution also risks creating public pressure for leaders to act, even if they would rather not.Footnote 62
This section has drawn on multiple cases and definitions across multiple literatures to distil core common characteristics of sabotage. They include (a) the weaponization of friction to enable a political or military goal, and (b) a clandestine means of undermining adversary institutions from within, but one which has visible effects, and which has the potential for generating further uncertainty and friction.
Sabotage as a distinct phenomenon
Our initial conceptualization of sabotage raises questions about its relationship to related concepts of covert action and subversion. Addressing these – and explicitly differentiating sabotage – is vital to provide conceptual clarity; add nuance to discussions of secret statecraft and theoretically advance the literature on covert action by differentiating logics of secrecy from action; and justify the need to place sabotage on the research agenda. (See Table 1).
Table 1. Key Attributes of the Dark Arts

As alluded to earlier, sabotage and covert action overlap but are conceptually distinct, and the differences matter. Covert action involves influencing political, economic, or military conditions abroad where the essential characteristic is that the responsible party disclaims responsibility. As Title 50 of the US Code puts it, covert action occurs ‘where it is intended that the role of the United States will not be apparent or acknowledged publicly’. This can be pursued using a range of activities, from unattributable propaganda to targeted killings.
Given its secretive characteristics, it is unsurprising that sabotage is subject to similar limitations and trade-offs described in the recent wave of literature on covert action in international relations. We do not claim otherwise. Sabotage, like covert action, is designed to shape outcomes and is an enabler or force multiplier of other policy levers.Footnote 63 Like covert action, and as discussed above, it can follow similar logics of (im)plausible deniability, and also like covert action, secrecy is both a boon and a bane because it limits the extent of the damage sabotage can achieve. Existing literature identifies a trade-off between secrecy and scale in covert operations at large limiting their strategic impact.Footnote 64 Operations large enough to make a difference strategically face a high risk of being discovered and neutralized before producing an effect, while those small enough to stay hidden are likely to fall short of producing a strategically relevant impact. More recent work on subversion, which shares the reliance on infiltration of systems from within that is typical of many sabotage operations, identifies two additional trade-offs: speed and unreliability.Footnote 65 Specifically, Lennart Maschmeyer discovered a trilemma between speed, intensity, and volatility in subversion operations that we argue is shared by sabotage operations as well.Footnote 66
Yet sabotage is conceptually distinct. Covert action is fundamentally characterized by the perpetrator’s non-acknowledgement of its interfering role; it does not describe the strategic logic of the act itself. Sabotage focuses on that logic: to degrade a target’s performance by weaponizing friction inside a system.Footnote 67 This end can be pursued by various means, including those traditionally seen as sabotage (arson, cable cutting, etc.), as well as propaganda, covert political influence, economic activity, cyber-attacks, assassination, and so on. Unlike covert action, the interferer’s role can be denied or acknowledged; instead, the defining feature of sabotage is the use of various means to weaponize friction to degrade performance.
Revealing this strategic logic of sabotage helps distinguish between covert – or ‘grey’ – activity that may use the same means but for other ends. For example, disinformation can subversively manipulate a specific foreign policy outcome and/or degrade an information ecosystem.
There are clear similarities between sabotage and subversion. Subversion also exploits target systems from within, and sometimes seeks to undermine them. However, it does so through manipulation. Subversion is an indirect means of interfering in adversary affairs by exploiting vulnerabilities in institutions, societies, and, today, also computer systems to infiltrate and manipulate them.Footnote 68 Melissa Lee defines subversion as the empowerment of proxy groups to undermine rival states from within, and, critically, to encourage civilians to question their loyalties.Footnote 69 As Jill Kastner and William Wohlforth put it, subversion uses ‘domestic interference to undermine or manipulate a rival’.Footnote 70
Sabotage is different. Whereas subversion manipulates behaviour, sabotage degrades performance. Sabotage is disruptive and destructive, seeking to throw sand in the gears of the machine, whereas subversion is generative, seeking to alter what the machine produces or even change the machine altogether. Subversion manipulates targets towards behaving in a way the subverter wants to produce a distinct outcome. It turns people and institutions into unwitting agents pursuing the subverter’s interests. Sabotage does not change the behaviour of targets, but rather subtracts capability by degrading their performance. It is degenerative. Our distinction challenges other works on subversion which rely on broader definitions.Footnote 71
This core difference matters because it shapes the range of ends that sabotage and subversion can serve. Subversion attempts to manipulate people and institutions in order to produce specific opinions, behaviours, and policies. Sabotage attempts to degrade organizational performance, information systems, and facilities. This distinction allows us to code the logic of different activities. Disinformation, for example, is sabotage if it degrades the information ecosystem but subversive if it generatively influences opinion. Similarly, electoral interference is sabotage if it degrades electoral processes but subversive if it generatively manipulates electoral outcomes. This conceptual clarity helps differentiate between distinct logics usually unhelpfully conflated under the generic banner of covert action. Real-world intelligence contests, of course, often involve elements of both sabotage and subversion. This is especially the case in protracted campaigns amongst rivals, which are likely to include a mix of activities.
Having compared our conceptualization of sabotage to related concepts of covert action and subversion, we propose that sabotage is the weaponization of friction to degrade the performance of systems from within. This inherently relies on clandestine intrusion but deliberately leaves open levels of acknowledgement and violence.
Sabotage in strategy
Having defined and conceptualized sabotage, we now address its strategic use and utility. We do so by returning to the diverse case studies and, through a process of systematic comparison, assess effectiveness, limitations, and contextual factors. Below we show how and why sabotage offers utility as an enabler in adversarial diplomacy, counterproliferation efforts, counterterrorism and counterinsurgency, deterrence, and conventional war.
Despite the limitations briefly discussed above and familiar to scholars of covert action, sabotage can enable and enhance other operations. We argue that given its distinct strategic logic – degrading performance rather than generating outcomes – its enabling function is more pronounced compared to other tools of secret statecraft. Sabotage degrades, creating space for other tools. By ‘enable’ we mean laying groundwork for operations using different policy tools. By ‘enhance’ we mean adding to the overall effect of broader campaigns. Our analysis of multiple existing literatures revealed that cases of sabotage span the entire spectrum of war, peace, and the so-called grey zones in between. Here, we distil them into five broad, if fuzzy-edged, categories whereby policymakers use sabotage in support of broader objectives, along with historical illustration to offer insight into the conditions under which sabotage acts as an enabler and enhancer – and how things go wrong.
Adversarial diplomacy
Sabotage operations can enhance adversarial diplomacy, defined as efforts to isolate and pressure rival states. ‘Wedge strategies’ designed to pry adversary coalitions apart are a good example. Recent research has focused on the role of accommodation in drawing a rival’s allies away from its orbit.Footnote 72 Yet states can also use sabotage to raise costs, adding coercive pressure to accommodation strategies. Sabotage may be ideal for this purpose: it creates enough friction to make alliance membership a headache, but not so much that it provokes a direct conflict. Its deniability helps diplomats gently wrest allies apart, without inadvertently forcing them to fight for their own public credibility. Overt violence, by contrast, would be more likely to drive adversaries together.
Wedges have intrigued strategic theorists going back to antiquity. Sun Tzu’s Art of War (5th cen. BCE) describes the value of attacking enemy alliances, though it does not provide specific recommendations for how to do so.Footnote 73 Sabotage might help. States may weaponize friction against their enemy’s allies not only to reduce the enemy’s capabilities but also to remind foreign patrons about the costs of their support, all the while using deniability to control the risk of escalation. Allegations of Russian sabotage may fit this pattern. In 2011, Russia allegedly destroyed an ammunition depot in Bulgaria with artillery destined for Georgia. In 2014, it targeted a Czech warehouse with military materials destined for Ukraine, and Western officials suspect Russia’s hand in a series of fires in Europe and the United States following their expressions of support for Ukraine in the ongoing war.Footnote 74
Sabotage may also improve the effectiveness of economic sanctions by preventing targets from evading them. Sanctions impose costs and imply relief as a reward for compliance. Targets of sanctions are incentivized to evade these costs by finding alternative suppliers for imports and new export markets to continue trading in secret. Sabotage can help disrupt these activities by targeting and imposing costs on the third parties (states and firms) involved. For example, the CIA allegedly sabotaged Leyland buses en route from the UK to Cuba in contravention of an economic blockade against Havana, potentially even including the sinking of a ship carrying 42 buses in 1964.Footnote 75
Although this logic is straightforward, sabotage is ultimately of limited value for adversarial diplomacy. The problem, derived from our first trade-off above, is that the demands of deniability are inversely proportional to the cost on adversaries. Because sabotage operations need to be small enough to remain ostensibly covert, they cannot impose sufficient costs to coerce the victim towards changing course. This is likely why they have been ineffectual at reducing Western support for Ukraine. At most, sabotage operations work slowly and cumulatively, reminding their targets about the costs of noncompliance. Again, the war in Ukraine is instructive. The costs of sabotage pale in comparison with the human and material toll of the war itself.
Counterproliferation
Sabotage is famously associated with counterproliferation. Alleged sabotage against Iraq and Iran targeted their nascent nuclear weapons programmes. Israel reportedly sabotaged the supply chain feeding Iraq’s nuclear effort in the 1970s, planting explosives on a reactor core bound for Iraq while sitting in a French port.Footnote 76 More recently, the Stuxnet virus targeted Iran’s nuclear programme by sabotaging uranium centrifuges at its enrichment facility at Natanz.Footnote 77
Sabotage seems tailor made for counterproliferation. Aspiring nuclear powers require money, expertise, fissile material, and highly specialized components, many of which need to be sourced from witting and unwitting international suppliers.Footnote 78 The existence of multiple supply networks creates opportunities for intrusion by saboteurs. They create bottlenecks, which may be vulnerable to attack, as in the case of Iraq the 1970s. The expansion of cyberspace creates other sabotage opportunities, as in the case of Iran in the 2000s. Making a nuclear weapon is hard for newcomers. Sabotage makes it harder.
Sabotage is also appealing for counterproliferation because of the bureaucratic complexity of emerging nuclear efforts. Most countries starting nuclear programmes have ultimately failed to build nuclear weapons. A key reason is the difficulty in sustaining long-term political support for scientific and engineering research. Successful programmes require a combination of sharp-elbowed bureaucrats and dogged researchers, working in concert for many years.Footnote 79 Maintaining this relationship is sometimes too much. Foreign saboteurs might exploit that reality by adding an extra dose of bureaucratic friction to a demanding scientific problem.
Yet sabotage is unlikely to succeed on its own, especially if emerging nuclear powers are committed to achieving a full fuel cycle and weapons capability. States are capable of replacing faulty parts and finding alternative suppliers. They are able to withstand setbacks as they accumulate the knowledge and physical capabilities required to make progress independently. Once they start enriching uranium, moreover, they can absorb sabotage while continuing to accumulate fissile material. In the Iran case, for example, the total production of enriched uranium actually increased during the Stuxnet virus’s attack window.Footnote 80 Meaningful counterproliferation therefore requires more than sabotage: military action, sanctions, and diplomacy all play a part. A mixture of sanctions and diplomatic incentives culminated in the 2015 agreement to eliminate Iran’s enriched uranium stockpile and limit future production. Sabotage at best enabled and enhanced the diplomatic effort if Iranian leaders feared that efforts to subvert the deal would be in vain.
Counterterrorism and counterinsurgency
Sabotage can bolster campaigns against armed non-state groups, causing them physical and psychological harm. Terrorist and insurgent groups suffer friction like anyone else, though their small size, relative to the state, could be conceived to limit the effects of sabotage and direct action is difficult because members have powerful incentives to remain hidden and vigilant. Yet their small size also reduces their margin for error. Friction within armed groups may significantly reduce their capacity for violence. Friction can come, for example, in the form of setting members against each other, a long-time tactic of British intelligence,Footnote 81 or targeting communications systems as Western intelligence did to confuse and disrupt Islamic State.Footnote 82 The recent operation against Hezbollah is a reminder that sabotage is possible. It also highlights sabotage as a method of disrupting coordination. Denying armed groups access to communications technologies forces them into face-to-face meetings, limiting the extent of their plans.Footnote 83
The psychological consequences of sabotage on armed groups may be substantial, even if the physical effects are modest. Successful intrusions may affect group morale, an important levelling factor for militants with limited means. The shocking discovery of sabotage may lead to a destructive spiral of accusations and counteraccusations, as militants try to identify the saboteurs in their midst. A sense of group cohesion and unity of purpose are likely to suffer.Footnote 84
Injecting friction can extend beyond the group itself to its patrons. An external supplier of money and guns can be a lifeline for a non-state group with few organic capabilities. Sabotaging financial networks might complicate efforts to pay the foot soldiers or acquire weapons, as the French attempted during the Algerian War by sabotaging West German arms dealers.Footnote 85 The more ambitious the armed group, the more resources it will require – and the larger the supporting organizational infrastructure that will become involved in its efforts.Footnote 86
Where an insurgent group eschews terroristic violence and coercion in favour of winning ‘hearts and minds’, sabotage can play another role. Individuals have a range of choices when confronted with an armed insurgency. They can support counterinsurgency efforts, joining the state’s security forces, or they can support the insurgency, joining the armed movement and putting their lives at risk. In between these poles lie ways that civilians can aid an insurgency – or work against it.Footnote 87 People are inclined to support a rebellion if they believe that organization is capable. States can use this calculus to their advantage, employing sabotage against insurgent organizations to make them look inept and doomed to fail. Successful sabotage operations throw a wrench the works of rebel groups, making them less able to do what they must to challenge a state: fundraising, recruiting, organizing, planning, and coordinating attacks. The less they can perform these tasks, and the more they descend into toxic infighting, the less likely civilians will be willing to move along the spectrum from neutrality to full support. Sabotage helps to defeat insurgent groups by embarrassing them.
Despite its potential, sabotage is unlikely to serve as a foundation of counterterrorism and counterinsurgency. Most armed groups succumb to intelligence and law enforcement – or collapse on their own – without need for sabotage.Footnote 88 Weaponizing friction may help against larger groups with more resources and a wider support network, but working successfully against these groups requires a combination of public diplomacy, international police work, cooperative intelligence efforts, and joint military operations. Sabotage may contribute to this broader campaign by both enhancing overall effectiveness and enabling other tools, but it will not be decisive.
Deterrence
States tend to be more aggressive if they believe that they enjoy a clear technological advantage over their adversaries, allowing them to control events in crises and war.Footnote 89 Sabotage may help disabuse them of these ideas by degrading technical capabilities and undermining adversary confidence. Peacetime sabotage of military equipment and communications infrastructure can produce accumulating evidence of failures. It can also target supply chains, deceiving adversaries into using faulty hardware and software. Adversaries may lose confidence in their capabilities as a result. Well-timed information operations can further exacerbate these effects. They might inject fog onto hypothetical battlefields during military exercises, casting doubt on hopes that adversaries can rapidly seize control of the information environment in a future conflict. Poor exercise performance might cause leaders to jettison hopes of decisive victory.Footnote 90
Saboteurs reinforce the message by designing operations that make it possible for the victim to identify the attacker, because doing so might cause them to reassess the technological balance. States that thought they enjoyed a technological advantage might reconsider. Demonstrating logics of implausible deniability, the attacker might disclaim responsibility in public, but the victim should have little doubt about the attackers’ technological prowess.
Deterrence via sabotage, however, depends on other factors. Power parity means that slight differences in operational efficiency could mean a lot in the event of war. States with overwhelming numerical advantages, however, will be more willing to tolerate peacetime friction. They can succeed without exquisite precision and recover in the event of wartime mishaps. The utility of sabotage for deterrence, then, depends on tangible issues like force posture and the military balance, along with intangible factors like political determination and the will to persist.
Timing also matters. All things being equal, sabotage is more likely to succeed during peacetime than in a deep crisis or conflict. Friction accumulates slowly. In line with our trade-offs above, efforts to accelerate the effect through more expansive sabotage campaigns are more likely to be discovered. In addition, states in crises are likely to take pre-emptive steps to harden communications, create alternative and redundant networks, and test their physical capabilities in the expectation of combat. Saboteurs will have a difficult time achieving their goals against alert defenders.Footnote 91
Conventional war
Finally, sabotage can enable conventional military operations. It can inject friction into command and control (C2) systems, making it harder for enemies to organize and coordinate their activities; into intelligence networks, making it harder for enemies to maintain battlespace awareness; and into the routines of large armed bureaucracies, making it harder to fight coherently. Combined, such sabotage would leave the adversary scrambling to improvise under the weight of accumulating friction.
This applies to attack as well as defence. Attackers may use sabotage for ‘operational preparation of the battlefield’Footnote 92, quietly undermining enemy defensive preparations by throwing communications into disarray. Israel’s sabotage against Hezbollah before the recent invasion provides a potential example. Suddenly lacking safe communications devices, wounded and isolated Hezbollah operatives struggled to organize a defence of southern Lebanon. There is some evidence that Second World War sabotage campaigns helped pin down German forces, reducing their presences in Normandy and easing the D-Day invasion in June 1944.Footnote 93
Conversely, defenders can protect themselves by sabotaging enemy capabilities and undermining confidence – as illustrated by Mujahideen (covertly supported by Saudi Arabia) sabotage of fuel supplies to Soviet helicopters during the 1980s Afghanistan War causing helicopters to fall from the sky.Footnote 94
Indeed, sabotage of production capabilities and storage facilities can hamper the enemy’s ability to sustain the fight. Shortages in key supplies amongst military units can reduce their battlefield effectiveness and morale. Russia’s alleged sabotage against military depots supplying Ukraine might have served this purpose. An ancillary benefit is that enemy leaders may feel compelled to redirect their military forces towards counter sabotage work, when they would be better served at the front. In other cases, sabotage may deny the enemy key technological breakthroughs. The famous sabotage against the Nazis’ nuclear programme played a role in stopping it from acquiring the bomb. This might have prevented Adolf Hitler from gambling on escalation in the later stages of the war. Given Hitler’s affinity for miracle weapons, this was not an abstract concern.Footnote 95
The common thread in these propositions is the confrontation between pre-war expectations and wartime realities. No army can escape friction, but sabotage can make it worse. Indeed, the logic of wartime sabotage requires thinking about conflict as a contest of bureaucratic efficiency, not just a test of strength.
Conclusion
Sabotage is a seductive option for the same reasons that limit its stand-alone impact. It promises to derail adversary plans and undermine their strength without the consequences of overt attribution. Working in secret, it weaponizes friction to throw sand in the gears of organizations and infrastructure from the inside. It operates on a destructive strategic logic to degrade performance. Ideally, it helps throw an adversary off balance or foil their action without the risk and costs of going to war. Crucially, however, in most cases its secret and insider approach bring uncertainty about outcomes and limit their scope. Sabotage is therefore most consequential when paired with other instruments, enabling and facilitating the use of other means to produce desired outcomes. It can support a range of policies, from adversarial diplomacy and economic statecraft to war, but it has limited value as a stand-alone tool.
Its degradation of performance means that its impact lies primarily as a force enabler: degradation creates time, space, and a more conducive atmosphere for other tools to be effective. This role especially highlights why technological change is unlikely to change sabotage’s key characteristics and subsequent role in world politics. The post-Cold War era has undoubtedly witnessed extraordinary changes to information technologies. Yet recent events suggest that sabotaging these technologies via cyberspace often carries less punch than old-fashioned kinetic action. The fact that the recent string of sabotage operations against NATO members in Europe overwhelmingly involves traditional rather than cyber means underlines this division of labour. What better metaphor for this situation than commercial ships dragging their anchors to sever high-speed internet cables that establish the interconnected world making cyber operations possible in the first place?
Sabotage, by whatever means, is back. States are simultaneously enthused and alarmed by this trend; they have invested a lot of time and effort in developing sabotage operations for a range of purposes, while simultaneously sounding the alarm about their own vulnerability. American national security officials have expressed concerns about sabotage via cyberspace intrusions onto critical infrastructure, warning that in the event of a conflict, adversaries could cause enormous social and economic upheaval.Footnote 96 European intelligence officers have warned that physical attacks could have similar effects across the continent.Footnote 97 And most recently, Australian officials have become unusually willing to go public about the danger, assessing a rising threat of ‘high-impact sabotage’ against high-profile targets.Footnote 98 Sabotage is a pressing global concern.
Policymaker fears, however, are sometimes exaggerated. It may be that the current wave of warnings about sabotage overstates the threat. Indeed, we find that sabotage is potentially useful, but only when it is coupled with other tools. Along the same lines, sabotage may be escalatory in some cases, but it might act as a release valve for political tension in others. Scholars are in the early stages of hypothesizing the conditions that make sabotage more or less useful – and more or less dangerous.
An evolving research agenda might tackle a host of other questions that connect history, secret statecraft, and international security. Did the growth of the modern administrative state encourage the rise of new forms of sabotage? If so, what were the results? Does the looming threat of sabotage tend to limit the peacetime expansion of military organizations, which were, after all, large armed bureaucracies that were particularly vulnerable to friction? Or did the fear of sabotage lead to the construction of parallel security services?
Similarly, we might compare the use of sabotage in peacetime and war. Although a great deal of the literature focuses on sabotage during conflict, it may be that it is more useful during periods of peace. The reason is that saboteurs struggle to remain hidden in the midst of wartime vigilance. Achieving peacetime intrusions may be easier in peacetime, when the watchers are prone to neglect. Yet even when the chances of discovery are low, states may consider the value of sabotage against the political and diplomatic risks. How have statesmen thought about this trade-off historically, if they have thought about it at all? How have the weighed the possible costs and benefits? And how have they measured success and failure?
Finally, how have the victims of sabotage reacted? Have targeted institutions suffered lasting damage from friction, or have been they learned to adapt and mitigate the effects? Were some victims better than others at recognizing the problem? Did they practice forms of surveillance which helped them spot sabotage operations in early days? Did organizational leaders sense a trade-off between strict security regime and organizational morale? If so, how did they manage that trade-off? And to what extent did bureaucrats urge policymakers to act against the foreign states who they suspected were responsible for weaponizing friction? Did sabotage lead to escalation? Alternatively, is there a risk of unwittingly overemphasizing the threat of sabotage and, in turn doing the adversary’s job for them by creating more friction and paranoia, or wittingly overemphasize the threat to create scapegoats for internal conditions such as poor safety standards?
Such questions are clearly relevant to policy today, given the ongoing surge of sabotage in international politics. But they also have large theoretical implications for students of international security. This article provides a conceptual and historical basis for finding answers.
Acknowledgements
The authors would like to thank the editors at EJIS and the two anonymous reviewers for their excellent criticism and suggestions.
Joshua Rovner is an Associate Professor of International Relations at American University, where he researches intelligence, strategy, and international politics. His latest book is Strategy and Grand Strategy (Routledge, 2025).
Rory Cormac is a Professor of International Relations at the University of Nottingham. His research specializes in covert operations and secret statecraft, and he is the author of six books, including Disrupt and Deny, Secret Royals, and How to Stage a Coup. He has testified before UK and Australian parliamentary inquiries on subversion, disinformation, and electoral interference, and has shared his research findings with practitioners and policymakers across NATO and G7 states. His next book is FAKERS: A Top-Secret Tale of Phantoms and Forgeries on the Disinformation Front Lines (Oxford University Press, 2026).
Lennart Maschmeyer is an Assistant Professor in Cybersecurity Policy at the Jimmy and Rosalynn Carter School of Public Policy at the Georgia Institute of Technology. He is the author of Subversion: From Covert Operations to Cyber Conflict (Oxford University Press, 2024). His work has been published in International Security, the Journal of Peace Research, the Journal of Strategic Studies, and the Journal of Information Technology and Politics.