Academia.eduAcademia.edu

Outline

Punching Above Their Digital Weight

2020, IGI Global eBooks

https://doi.org/10.4018/978-1-7998-2466-4.CH054

Abstract

This article describes how in recent years, Iran has joined the top ranks of the world powers in cyberspaceandhasdemonstratedtheabilitytoleveragecyberwarfareasasignificanttoolinitsarsenal forpursuingitsnationalsecuritygoals.Whilethisincreaseincyberpowerisrelativelyrecent,some oftheincidentsandeventsthatserveasthecatalystforthesuddendigitalsurgegobackdecades.The reasonsfortheseincreasedcapabilitiesrevolvearoundhistoricmeansofpowerprojection,defense andpreservationoftheprinciplesoftheIranianRevolution,responsetoWesternaggressionand Iraniannationalism.Thisarticleexplorestheseideologicaldriversandeventstoprovidecontextfor theirtrajectoryandanalysisoftheirlikelyimplications.

References (43)

  1. AP.(2016,August28).IranInauguratesitsHomegrownNationalNetworkofData.Retrievedfromhttp://bigstory. ap.org/article/2838efebdb2d43ffa98fc6fe6b200a5f/iran-inaugurates-its-homegrown-national-network-data Article19.(2016).TighteningtheNet:InternetSecurityandCensorshipinIran-Part1:TheNationalInternet Project. Retrieved November 17, 2017 from https://www.article19.org/data/files/medialibrary/38315/The- National-Internet-AR-KA-final.pdf
  2. Ashford,W.(2015).Stuxnet:Awake-upcallfornuclearcybersecurity.Computer Weekly.RetrievedNovember 17.2017fromhttp://www.computerweekly.com/news/4500255858/Stuxnet-A-wake-up-call-for-nuclear-cyber- security Bardin,J.(2016).Whatit'sliketobeahackerinIran.Business Insider.RetrievedNovember2,2017fromhttp:// www.businessinsider.com/what-its-like-to-be-a-hacker-in-iran-2016-2
  3. Bhattacharya,A.(2016).Iranisgivingitscitizensfastinternet,butcuttingthemofffromtherestoftheonline world.Quartz.RetrievedNovember15,2017fromhttp://qz.com/769278/iran-national-network-of-data-launches/ Breene,K.(2016).Whoarethecyberwarsuperpowers?World Economic Forum.RetrievedOctober27,2017 fromhttps://www.weforum.org/agenda/2016/05/who-are-the-cyberwar-superpowers/
  4. Brunner,J.(2015).IranHasBuiltanArmyofCyber-Proxies.The Tower Issue 29.RetrievedonOctober30, 2017fromhttp://www.thetower.org/article/iran-has-built-an-army-of-cyber-proxies/
  5. Bucala,P.,&Pendleton,S.C.(2015).IranianCyberStrategy:AViewfromtheIranianMilitary.American Enterprise Institute Iran Tracker.Retrieved28,2017fromhttps://www.criticalthreats.org/analysis/iranian-cyber- strategy-a-view-from-the-iranian-military CheckpointSoftwareTechnologies.(2015).RocketKitten:ACampaignwith9Lives.RetrievedNovember4, 2017fromhttps://blog.checkpoint.com/wp-content/uploads/2015/11/rocket-kitten-report.pdf Cylance.(2014).OperationCleaver.RetrievedOctober30,2017fromhttp://cdn2.hubspot.net/hubfs/270968/ assets/Cleaver/Cylance_Operation_Cleaver_Report.pdf
  6. Daftari,L.(2012).Iranexpandingarmsracetocyberspace,sayexperts.Fox News.RetrievedNovember2,2017 fromhttp://www.foxnews.com/world/2012/10/19/iran-expanding-arms-race-to-cyberspace-say-experts.html
  7. Daftari,L.(2012).Iranexpandingarmsracetocyberspace,sayexperts.Fox News.RetrievedNovember21, 2017fromhttp://www.foxnews.com/world/2012/10/19/iran-expanding-arms-race-to-cyberspace-say-experts.html
  8. Daoud,D.(2015).MeettheProxies:HowIranSpreadsItsEmpirethroughTerroristMilitias.The Tower, 24.
  9. Retrieved November 2, 2017 from http://www.thetower.org/article/meet-the-proxies-how-iran-spreads-its- empire-through-terrorist-militias/ Economist.(2009,March19).TheProblemofPersianpride.RetrievedNovember17,2017fromhttp://www. economist.com/node/13326150
  10. Eisenstadt,M.(2016).ResearchNotes:Iran'sLengtheningCyberShadow.The Washington Institute for near East Policy.RetrievedNovember21,2017fromhttp://www.washingtoninstitute.org/uploads/Documents/pubs/ ResearchNote34_Eisenstadt.pdf
  11. Elgin,B.,&Riley,M.(2014).NowattheSandsCasino:AnIranianHackerinEveryServer.Bloomberg.Accessed November17,2017fromhttps://www.bloomberg.com/news/articles/2014-12-11/iranian-hackers-hit-sheldon- adelsons-sands-casino-in-las-vegas
  12. Goldman,D.(2012).Majorbankshitwithbiggestcyberattacksinhistory.CNN Money.RetrievedNovember 7,2017fromhttp://money.cnn.com/2012/09/27/technology/bank-cyberattacks/
  13. Groll,E.(2016).TrumpandHisLieutenantsAreCyberHawks.WillTheyPlayHardballWithPutin?Foreign Policy.RetrievedNovember23,2017fromhttp://foreignpolicy.com/2016/12/16/trump-and-his-lieutenants-are- cyber-hawks-will-they-play-hardball-with-putin/
  14. Gross,M.J.(2011).ADeclarationofCyberWar.Vanity Fair.RetrievedOctober30,2017fromhttps://www. vanityfair.com/news/2011/03/stuxnet-201104
  15. Harris,S.(2014).ForgetChina:Iran'sHackersAreAmerica'sNewestCyberThreat.Foreign Policy.Retrieved October 27, 2017 from http://foreignpolicy.com/2014/02/18/forget-china-irans-hackers-are-americas-newest- cyber-threat/
  16. Herr,T.(2017).TheIranianCyberthreatIsReal.Foreign Policy.AccessedNovember21,2017fromhttp:// foreignpolicy.com/2017/07/26/the-iranian-cyberthreat-is-real/ IranSaysItWelcomesHackersWhoWorkforIslamicRepublic.(2011).Radio Free Europe -Persian Letters (blog).RetrievedNovember21,2017fromhttp://www.rferl.org/a/iran_says_it_welcomes_hackers_who_work_ for_islamic_republic/2330495.html IranUnveilsNationalInformationNetwork.(2016).TasnimNewsAgency.RetrievedNovember12,2017from http://bigstory.ap.org/article/2838efebdb2d43ffa98fc6fe6b200a5f/iran-inaugurates-its-homegrown-national- network-data
  17. Mcinnis,J.M.(2016).IranianDeterrenceStrategyandUseofProxies(testimony).HearingbeforetheCommittee on Foreign Relations, US Senate, 114th Cong. 2. Retrieved November 2, 2017 from http://www.aei.org/ publication/iranian-deterrence-strategy-and-use-of-proxies/ Islamic Republic of Iran. (1990). The Constitution of the Islamic Republic of Iran. Islamic Propagation Organization.
  18. Jones,S.(2016).Cyberwarfare:Iranopensanewfront-Withitsnuclearprogrammecurbed,digitalweaponry hasbecomeevenmorecentraltoTehran'sarsenal.The Financial Times.RetrievedNovember21,2017from https://www.ft.com/content/15e1acf0-0a47-11e6-b0f1-61f222853ff3
  19. Kagan,F.W.,&Stiansen,T.(2015).TheGrowingCyberthreatfromIran-TheInitialReportofProjectPistachio Harvest.American Enterprise Institute Critical Threats Project and Norse Corporation.RetrievedOctober27, 2017 from https://www.criticalthreats.org/wp-content/uploads/2016/07/imce-imagesGrowing_Cyberthreat_ From_Iran_AEI_Norse_Kagan_Stiansen-1.pdf
  20. Katz,Y.(2010).StuxnetVirusSetBackIran'sNuclearProgramby2Years.The Jerusalem Post.Retrieved October27,2017fromhttp://www.jpost.com/Iranian-Threat/News/Stuxnet-virus-set-back-Irans-nuclear-program- by-2-years
  21. Khamenei,S.A.H.(2016a).ClergyShouldActivelyUseCyberTechnologies:AyatollahKhamenei.Official website of Ayatollah Khamenei.RetrievedOctober28,2017fromhttp://english.khamenei.ir/news/4149/Clergy- Should-Actively-Use-Cyber-Technologies-Ayatollah-Khamenei khamenei_ir.(2016b,July3).MuslimstudentscanlaunchcampaignsincyberspacetoopposeUS&Zionist regimepolicies.[Twitterpost].Retrievedfromhttps://twitter.com/khamenei_ir/status/749563097900351488
  22. Kitten,R.ACampaignwith9Lives.(2015).Checkpoint Software Technologies.RetrievedNovember4,2017 fromhttps://blog.checkpoint.com/wp-content/uploads/2015/11/rocket-kitten-report.pdf
  23. Kovacs,E.(2016).GazaCybergang'AttacksAttributedtoHamas.Security Week.RetrievedNovember7,2017 fromhttp://www.securityweek.com/gaza-cybergang-attacks-attributed-hamas Kravets,D.(2011).U.N.ReportDeclaresInternetAccessaHumanRight.Wired.RetrievedNovember15,2017 fromhttps://www.wired.com/2011/06/internet-a-human-right/
  24. Levitt,J.(2014).IranSupremeLeaderKhameneiTellsStudentstoGetReadyforCyberWar.The Algemeiner. Retrieved November 21, 2017 from http://www.algemeiner.com/2014/02/12/iran-supreme-leader-khamenei- tells-students-to-get-ready-for-cyber-war/
  25. Moskowitz,J.(2015).CyberattacktiedtoHezbollahupstheanteforIsrael'sdigitaldefenses.Christian Science Monitor.RetrievedNovember8,2017fromhttp://www.csmonitor.com/World/Passcode/2015/0601/Cyberattack- tied-to-Hezbollah-ups-the-ante-for-Israel-s-digital-defenses
  26. Nader, A. (2015). The Revolutionary Guards. United States Institute of Peace. The Iran Primer. Retrieved November27,2017fromhttp://iranprimer.usip.org/resource/revolutionary-guards
  27. Newman,L.H.(2016).TrumpCallsFor'Crippling'CyberwarAttackCapabilities.Wired.RetrievedNovember 21,2017fromhttps://www.wired.com/2016/10/trump-calls-crippling-cyberwar-attack-capabilities/ Newton,P.(2008).HezbollahandCyberWar.CNN.RetrievedNovember8,2017fromhttp://edition.cnn.com/ WORLD/blogs/security.files/2008/03/hezbollah-and-cyber-war.html
  28. Archuleta,K.(2015).OPMDataBreach:HearingbeforetheCommitteeonOversightandGovernmentReforms, USHouseofRepresentatives,114thCong.Retrievedfromhttps://www.gpo.gov/fdsys/pkg/CHRG-114hhrg99659/ pdf/CHRG-114hhrg99659.pdf
  29. Perkovich,G.(2005).ForTehran,NuclearProgramIsaMatterofNationalPride.YaleGlobal Online.Retrieved November17,2017fromhttp://yaleglobal.yale.edu/content/tehran-nuclear-program-matter-national-pride PressTV.(2010).IRGCchiefwarnsofculturalthreats.RetrievedNovember27,2017fromhttp://edition.presstv. ir/detail/129769.html
  30. Rafizadeh,M.(2016).Iran'sasymmetricalwarfare:Thecyberattackcapabilities.Al Arabiya English.Retrieved November2,2017fromhttp://english.alarabiya.net/en/views/news/middle-east/2016/04/02/Iran-s-asymmetrical- warfare-The-cyberattack-capabilities.html
  31. Ramazani,R.K.(2012).UnderstandingIranianForeignPolicy.Middle East Institute.RetrievedNovember17, 2017fromhttp://www.mei.edu/content/understanding-iranian-foreign-policy
  32. Rubin, M. (2014). Basij Organization Enters Cyber Operations. American Enterprise Institute. Retrieved November21,2017fromhttps://www.aei.org/publication/basij-organization-enters-cyber-operations/ Shafa,L.T.C.,&Eric,K.(2014).Iran'sEmergenceasaCyberPower.Strategic Studies Institute.Retrieved October27,2017fromhttps://www.hsdl.org/?view&did=757312
  33. Shalal-Esa, A. (2013). Iran strengthened cyber capabilities after Stuxnet: U.S. general. Reuters. Retrieved November17,2017fromhttps://www.reuters.com/article/us-iran-usa-cyber/iran-strengthened-cyber-capabilities- after-stuxnet-u-s-general-idUSBRE90G1C420130118
  34. Shamah, D. (2015). Official: Iran, Hamas conduct cyber-attacks against Israel. Times of Israel. Retrieved November7fromhttp://www.timesofisrael.com/official-iran-hamas-conduct-cyber-attacks-against-israel/ Shams,A.(2015).TheStateofSurveillanceinIran'sCyberspace.Article 19.RetrievedNovember12,2017 fromhttps://www.article19.org/resources/state-surveillance-irans-cyberspace/
  35. Siboni,G.,&Siman-Tov,D.(2014).Extortion:NorthKoreaversustheUnitedStates.INSS Insight No. 646. RetrievedOctober27,2017fromhttp://www.inss.org.il/publication/cyberspace-extortion-north-korea-versus- the-united-states/
  36. Smith, L. (2013). The Cyber-War Against Iran is a Real War, and a Rehearsal for Future Conflicts. Tablet Magazine. Retrieved November 21, 2017 from http://www.tabletmag.com/jewish-news-and-politics/148159/ the-real-war-against-iran TheAttributionProbleminCyberAttacks.(2013).Infosec Institute.AccessedNovember4,2017fromhttp:// resources.infosecinstitute.com/attribution-problem-in-cyber-attacks/
  37. Berman,I.(2013).TheIranCyberThreat.Revisited(testimony).HearingbeforetheCommitteeonHomeland Security, Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies. US House, 113thCong.RetrievedNovember17,2017fromhttp://docs.house.gov/meetings/HM/HM08/20130320/100523/ HHRG-113-HM08-Wstate-BermanI-20130320.pdf
  38. Thompson,M.(2016).IranianCyberAttackonNewYorkDamShowsFutureofWar.Time Magazine.Retrieved November17,2017fromhttp://time.com/4270728/iran-cyber-attack-dam-fbi/
  39. Toosi,N.(2016).IrandealcriticstoTrump:Pleasedon'tripitup.Politico.RetrievedNovember21,2017from http://www.politico.com/story/2016/11/donald-trump-iran-nuclear-deal-231419
  40. Torbati,Y.(2012).Iranseescyberattacksasgreaterthreatthanactualwar.Reuters.RetrievedOctober28,2017 fromhttps://www.reuters.com/article/net-us-iran-military/iran-sees-cyber-attacks-as-greater-threat-than-actual- war-idUSBRE88O0MY20120925
  41. Wärn,M.StayingtheCourse:the'Lebanonization'ofHizbullah.Al Mashriq -The Levant.RetrievedNovember 12,2017fromhttp://almashriq.hiof.no/lebanon/300/320/324/324.2/hizballah/warn2/shiism.html#khomeinism
  42. Ralph Peter Martins has over twenty-two years of professional experience as a management consultant and a United States Marine leading teams in the cyber security, cyber warfare and intelligence fields. He is the founder and CEO of RPM Consulting, a company which serves clients in the Department of Defense and Intelligence Community, and as a Marine, has served in Iraq, Africa, and Cuba, among other locations. He holds graduate degrees in Engineering Management and Military Studies from George Washington University and American Military University respectively and is currently pursuing graduate studies in International Relations at Harvard University.
  43. Zetter, K. (2014). An Unprecedented Look at Stuxnet, the World's First Digital Weapon. Wired. Retrieved October30,2017fromhttps://www.wired.com/2014/11/countdown-to-zero-day-stuxnet/