Punching Above Their Digital Weight
2020, IGI Global eBooks
https://doi.org/10.4018/978-1-7998-2466-4.CH054Abstract
This article describes how in recent years, Iran has joined the top ranks of the world powers in cyberspaceandhasdemonstratedtheabilitytoleveragecyberwarfareasasignificanttoolinitsarsenal forpursuingitsnationalsecuritygoals.Whilethisincreaseincyberpowerisrelativelyrecent,some oftheincidentsandeventsthatserveasthecatalystforthesuddendigitalsurgegobackdecades.The reasonsfortheseincreasedcapabilitiesrevolvearoundhistoricmeansofpowerprojection,defense andpreservationoftheprinciplesoftheIranianRevolution,responsetoWesternaggressionand Iraniannationalism.Thisarticleexplorestheseideologicaldriversandeventstoprovidecontextfor theirtrajectoryandanalysisoftheirlikelyimplications.
References (43)
- AP.(2016,August28).IranInauguratesitsHomegrownNationalNetworkofData.Retrievedfromhttp://bigstory. ap.org/article/2838efebdb2d43ffa98fc6fe6b200a5f/iran-inaugurates-its-homegrown-national-network-data Article19.(2016).TighteningtheNet:InternetSecurityandCensorshipinIran-Part1:TheNationalInternet Project. Retrieved November 17, 2017 from https://www.article19.org/data/files/medialibrary/38315/The- National-Internet-AR-KA-final.pdf
- Ashford,W.(2015).Stuxnet:Awake-upcallfornuclearcybersecurity.Computer Weekly.RetrievedNovember 17.2017fromhttp://www.computerweekly.com/news/4500255858/Stuxnet-A-wake-up-call-for-nuclear-cyber- security Bardin,J.(2016).Whatit'sliketobeahackerinIran.Business Insider.RetrievedNovember2,2017fromhttp:// www.businessinsider.com/what-its-like-to-be-a-hacker-in-iran-2016-2
- Bhattacharya,A.(2016).Iranisgivingitscitizensfastinternet,butcuttingthemofffromtherestoftheonline world.Quartz.RetrievedNovember15,2017fromhttp://qz.com/769278/iran-national-network-of-data-launches/ Breene,K.(2016).Whoarethecyberwarsuperpowers?World Economic Forum.RetrievedOctober27,2017 fromhttps://www.weforum.org/agenda/2016/05/who-are-the-cyberwar-superpowers/
- Brunner,J.(2015).IranHasBuiltanArmyofCyber-Proxies.The Tower Issue 29.RetrievedonOctober30, 2017fromhttp://www.thetower.org/article/iran-has-built-an-army-of-cyber-proxies/
- Bucala,P.,&Pendleton,S.C.(2015).IranianCyberStrategy:AViewfromtheIranianMilitary.American Enterprise Institute Iran Tracker.Retrieved28,2017fromhttps://www.criticalthreats.org/analysis/iranian-cyber- strategy-a-view-from-the-iranian-military CheckpointSoftwareTechnologies.(2015).RocketKitten:ACampaignwith9Lives.RetrievedNovember4, 2017fromhttps://blog.checkpoint.com/wp-content/uploads/2015/11/rocket-kitten-report.pdf Cylance.(2014).OperationCleaver.RetrievedOctober30,2017fromhttp://cdn2.hubspot.net/hubfs/270968/ assets/Cleaver/Cylance_Operation_Cleaver_Report.pdf
- Daftari,L.(2012).Iranexpandingarmsracetocyberspace,sayexperts.Fox News.RetrievedNovember2,2017 fromhttp://www.foxnews.com/world/2012/10/19/iran-expanding-arms-race-to-cyberspace-say-experts.html
- Daftari,L.(2012).Iranexpandingarmsracetocyberspace,sayexperts.Fox News.RetrievedNovember21, 2017fromhttp://www.foxnews.com/world/2012/10/19/iran-expanding-arms-race-to-cyberspace-say-experts.html
- Daoud,D.(2015).MeettheProxies:HowIranSpreadsItsEmpirethroughTerroristMilitias.The Tower, 24.
- Retrieved November 2, 2017 from http://www.thetower.org/article/meet-the-proxies-how-iran-spreads-its- empire-through-terrorist-militias/ Economist.(2009,March19).TheProblemofPersianpride.RetrievedNovember17,2017fromhttp://www. economist.com/node/13326150
- Eisenstadt,M.(2016).ResearchNotes:Iran'sLengtheningCyberShadow.The Washington Institute for near East Policy.RetrievedNovember21,2017fromhttp://www.washingtoninstitute.org/uploads/Documents/pubs/ ResearchNote34_Eisenstadt.pdf
- Elgin,B.,&Riley,M.(2014).NowattheSandsCasino:AnIranianHackerinEveryServer.Bloomberg.Accessed November17,2017fromhttps://www.bloomberg.com/news/articles/2014-12-11/iranian-hackers-hit-sheldon- adelsons-sands-casino-in-las-vegas
- Goldman,D.(2012).Majorbankshitwithbiggestcyberattacksinhistory.CNN Money.RetrievedNovember 7,2017fromhttp://money.cnn.com/2012/09/27/technology/bank-cyberattacks/
- Groll,E.(2016).TrumpandHisLieutenantsAreCyberHawks.WillTheyPlayHardballWithPutin?Foreign Policy.RetrievedNovember23,2017fromhttp://foreignpolicy.com/2016/12/16/trump-and-his-lieutenants-are- cyber-hawks-will-they-play-hardball-with-putin/
- Gross,M.J.(2011).ADeclarationofCyberWar.Vanity Fair.RetrievedOctober30,2017fromhttps://www. vanityfair.com/news/2011/03/stuxnet-201104
- Harris,S.(2014).ForgetChina:Iran'sHackersAreAmerica'sNewestCyberThreat.Foreign Policy.Retrieved October 27, 2017 from http://foreignpolicy.com/2014/02/18/forget-china-irans-hackers-are-americas-newest- cyber-threat/
- Herr,T.(2017).TheIranianCyberthreatIsReal.Foreign Policy.AccessedNovember21,2017fromhttp:// foreignpolicy.com/2017/07/26/the-iranian-cyberthreat-is-real/ IranSaysItWelcomesHackersWhoWorkforIslamicRepublic.(2011).Radio Free Europe -Persian Letters (blog).RetrievedNovember21,2017fromhttp://www.rferl.org/a/iran_says_it_welcomes_hackers_who_work_ for_islamic_republic/2330495.html IranUnveilsNationalInformationNetwork.(2016).TasnimNewsAgency.RetrievedNovember12,2017from http://bigstory.ap.org/article/2838efebdb2d43ffa98fc6fe6b200a5f/iran-inaugurates-its-homegrown-national- network-data
- Mcinnis,J.M.(2016).IranianDeterrenceStrategyandUseofProxies(testimony).HearingbeforetheCommittee on Foreign Relations, US Senate, 114th Cong. 2. Retrieved November 2, 2017 from http://www.aei.org/ publication/iranian-deterrence-strategy-and-use-of-proxies/ Islamic Republic of Iran. (1990). The Constitution of the Islamic Republic of Iran. Islamic Propagation Organization.
- Jones,S.(2016).Cyberwarfare:Iranopensanewfront-Withitsnuclearprogrammecurbed,digitalweaponry hasbecomeevenmorecentraltoTehran'sarsenal.The Financial Times.RetrievedNovember21,2017from https://www.ft.com/content/15e1acf0-0a47-11e6-b0f1-61f222853ff3
- Kagan,F.W.,&Stiansen,T.(2015).TheGrowingCyberthreatfromIran-TheInitialReportofProjectPistachio Harvest.American Enterprise Institute Critical Threats Project and Norse Corporation.RetrievedOctober27, 2017 from https://www.criticalthreats.org/wp-content/uploads/2016/07/imce-imagesGrowing_Cyberthreat_ From_Iran_AEI_Norse_Kagan_Stiansen-1.pdf
- Katz,Y.(2010).StuxnetVirusSetBackIran'sNuclearProgramby2Years.The Jerusalem Post.Retrieved October27,2017fromhttp://www.jpost.com/Iranian-Threat/News/Stuxnet-virus-set-back-Irans-nuclear-program- by-2-years
- Khamenei,S.A.H.(2016a).ClergyShouldActivelyUseCyberTechnologies:AyatollahKhamenei.Official website of Ayatollah Khamenei.RetrievedOctober28,2017fromhttp://english.khamenei.ir/news/4149/Clergy- Should-Actively-Use-Cyber-Technologies-Ayatollah-Khamenei khamenei_ir.(2016b,July3).MuslimstudentscanlaunchcampaignsincyberspacetoopposeUS&Zionist regimepolicies.[Twitterpost].Retrievedfromhttps://twitter.com/khamenei_ir/status/749563097900351488
- Kitten,R.ACampaignwith9Lives.(2015).Checkpoint Software Technologies.RetrievedNovember4,2017 fromhttps://blog.checkpoint.com/wp-content/uploads/2015/11/rocket-kitten-report.pdf
- Kovacs,E.(2016).GazaCybergang'AttacksAttributedtoHamas.Security Week.RetrievedNovember7,2017 fromhttp://www.securityweek.com/gaza-cybergang-attacks-attributed-hamas Kravets,D.(2011).U.N.ReportDeclaresInternetAccessaHumanRight.Wired.RetrievedNovember15,2017 fromhttps://www.wired.com/2011/06/internet-a-human-right/
- Levitt,J.(2014).IranSupremeLeaderKhameneiTellsStudentstoGetReadyforCyberWar.The Algemeiner. Retrieved November 21, 2017 from http://www.algemeiner.com/2014/02/12/iran-supreme-leader-khamenei- tells-students-to-get-ready-for-cyber-war/
- Moskowitz,J.(2015).CyberattacktiedtoHezbollahupstheanteforIsrael'sdigitaldefenses.Christian Science Monitor.RetrievedNovember8,2017fromhttp://www.csmonitor.com/World/Passcode/2015/0601/Cyberattack- tied-to-Hezbollah-ups-the-ante-for-Israel-s-digital-defenses
- Nader, A. (2015). The Revolutionary Guards. United States Institute of Peace. The Iran Primer. Retrieved November27,2017fromhttp://iranprimer.usip.org/resource/revolutionary-guards
- Newman,L.H.(2016).TrumpCallsFor'Crippling'CyberwarAttackCapabilities.Wired.RetrievedNovember 21,2017fromhttps://www.wired.com/2016/10/trump-calls-crippling-cyberwar-attack-capabilities/ Newton,P.(2008).HezbollahandCyberWar.CNN.RetrievedNovember8,2017fromhttp://edition.cnn.com/ WORLD/blogs/security.files/2008/03/hezbollah-and-cyber-war.html
- Archuleta,K.(2015).OPMDataBreach:HearingbeforetheCommitteeonOversightandGovernmentReforms, USHouseofRepresentatives,114thCong.Retrievedfromhttps://www.gpo.gov/fdsys/pkg/CHRG-114hhrg99659/ pdf/CHRG-114hhrg99659.pdf
- Perkovich,G.(2005).ForTehran,NuclearProgramIsaMatterofNationalPride.YaleGlobal Online.Retrieved November17,2017fromhttp://yaleglobal.yale.edu/content/tehran-nuclear-program-matter-national-pride PressTV.(2010).IRGCchiefwarnsofculturalthreats.RetrievedNovember27,2017fromhttp://edition.presstv. ir/detail/129769.html
- Rafizadeh,M.(2016).Iran'sasymmetricalwarfare:Thecyberattackcapabilities.Al Arabiya English.Retrieved November2,2017fromhttp://english.alarabiya.net/en/views/news/middle-east/2016/04/02/Iran-s-asymmetrical- warfare-The-cyberattack-capabilities.html
- Ramazani,R.K.(2012).UnderstandingIranianForeignPolicy.Middle East Institute.RetrievedNovember17, 2017fromhttp://www.mei.edu/content/understanding-iranian-foreign-policy
- Rubin, M. (2014). Basij Organization Enters Cyber Operations. American Enterprise Institute. Retrieved November21,2017fromhttps://www.aei.org/publication/basij-organization-enters-cyber-operations/ Shafa,L.T.C.,&Eric,K.(2014).Iran'sEmergenceasaCyberPower.Strategic Studies Institute.Retrieved October27,2017fromhttps://www.hsdl.org/?view&did=757312
- Shalal-Esa, A. (2013). Iran strengthened cyber capabilities after Stuxnet: U.S. general. Reuters. Retrieved November17,2017fromhttps://www.reuters.com/article/us-iran-usa-cyber/iran-strengthened-cyber-capabilities- after-stuxnet-u-s-general-idUSBRE90G1C420130118
- Shamah, D. (2015). Official: Iran, Hamas conduct cyber-attacks against Israel. Times of Israel. Retrieved November7fromhttp://www.timesofisrael.com/official-iran-hamas-conduct-cyber-attacks-against-israel/ Shams,A.(2015).TheStateofSurveillanceinIran'sCyberspace.Article 19.RetrievedNovember12,2017 fromhttps://www.article19.org/resources/state-surveillance-irans-cyberspace/
- Siboni,G.,&Siman-Tov,D.(2014).Extortion:NorthKoreaversustheUnitedStates.INSS Insight No. 646. RetrievedOctober27,2017fromhttp://www.inss.org.il/publication/cyberspace-extortion-north-korea-versus- the-united-states/
- Smith, L. (2013). The Cyber-War Against Iran is a Real War, and a Rehearsal for Future Conflicts. Tablet Magazine. Retrieved November 21, 2017 from http://www.tabletmag.com/jewish-news-and-politics/148159/ the-real-war-against-iran TheAttributionProbleminCyberAttacks.(2013).Infosec Institute.AccessedNovember4,2017fromhttp:// resources.infosecinstitute.com/attribution-problem-in-cyber-attacks/
- Berman,I.(2013).TheIranCyberThreat.Revisited(testimony).HearingbeforetheCommitteeonHomeland Security, Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies. US House, 113thCong.RetrievedNovember17,2017fromhttp://docs.house.gov/meetings/HM/HM08/20130320/100523/ HHRG-113-HM08-Wstate-BermanI-20130320.pdf
- Thompson,M.(2016).IranianCyberAttackonNewYorkDamShowsFutureofWar.Time Magazine.Retrieved November17,2017fromhttp://time.com/4270728/iran-cyber-attack-dam-fbi/
- Toosi,N.(2016).IrandealcriticstoTrump:Pleasedon'tripitup.Politico.RetrievedNovember21,2017from http://www.politico.com/story/2016/11/donald-trump-iran-nuclear-deal-231419
- Torbati,Y.(2012).Iranseescyberattacksasgreaterthreatthanactualwar.Reuters.RetrievedOctober28,2017 fromhttps://www.reuters.com/article/net-us-iran-military/iran-sees-cyber-attacks-as-greater-threat-than-actual- war-idUSBRE88O0MY20120925
- Wärn,M.StayingtheCourse:the'Lebanonization'ofHizbullah.Al Mashriq -The Levant.RetrievedNovember 12,2017fromhttp://almashriq.hiof.no/lebanon/300/320/324/324.2/hizballah/warn2/shiism.html#khomeinism
- Ralph Peter Martins has over twenty-two years of professional experience as a management consultant and a United States Marine leading teams in the cyber security, cyber warfare and intelligence fields. He is the founder and CEO of RPM Consulting, a company which serves clients in the Department of Defense and Intelligence Community, and as a Marine, has served in Iraq, Africa, and Cuba, among other locations. He holds graduate degrees in Engineering Management and Military Studies from George Washington University and American Military University respectively and is currently pursuing graduate studies in International Relations at Harvard University.
- Zetter, K. (2014). An Unprecedented Look at Stuxnet, the World's First Digital Weapon. Wired. Retrieved October30,2017fromhttps://www.wired.com/2014/11/countdown-to-zero-day-stuxnet/