Modern Cyber warfare between the Islamic Republic of Iran and the United States (2010-20)

Document Type : Original Article from Result of Thesis

Authors

1 Department of Political Science and International Relations, Islamic Azad university, south Tehran branch. Tehran. Iran

2 Department of Political Science and International Relations. south Tehran branch.Islamic Azad university. Tehran. Iran

Abstract

The Internet and social media have altered the nature of communication between the Islamic Republic of Iran and the US, introducing new modes of action and reaction in their conflict. This study aims to find an answer to this question: What new strategies do Iran and the United States use to confront one another in cyberspace? To answer this question, we used a descriptive-analytical method to test the hypothesis and collected our data through a desk research and note-taking method, and then analyzed statements from the theory of authoritarian power. The findings revealed that the US and Iran disagreement about regional issues, the unresolved political conflicts between the two countries, the escalation of international sanctions against Iran, and, most significantly, the US withdrawal from BARJAM (Iran nuclear deal) and assassination of the commander of IRGC- Quds has increased the prominence of cyberspace as a stage for hostility between the two states. As a result, the US and Iran have used the potential of cyberspace as a tool to exert power and have tried to impose their demands, based on their level of competence and expertise in the field of cyber technologies, and through the use of a variety of tactics. Their goal in taking such actions is clearly to force each other to accept their will or change their behavior and ideologies.

Highlights

Introduction

In today’s world, the Internet and cyberspace have changed the way governments, people, and non-governmental groups such as organizations, enterprises, or even terrorists interact. As a result, new methods of interaction, as well as new forms of conflict, have developed. On the one hand, this technology has significantly facilitated and expanded access to information and knowledge on a national and worldwide scale; on the other hand, it has generated entities devoid of physical qualities and natural limits, resulting in an environment packed with anonymous users. It also has created an atmosphere in which authority is dispersed, has created an environment devoid of moral standards and values, and, most significantly, has had a profound effect on its audience. As a result, cyberspace has undermined not only states' national sovereignty in dealing with risks and threats but also considerably enhanced the efficacy of these threats. As the infrastructures in today’s world are highly dependent on software and communication technologies and because these technologies control the management, planning, and service infrastructure of governments and citizens, they have developed into hostile political tools by which the rivals try to subvert the other side's independence, enforce their demands and impose dominance.

Cyberspace expansion has changed several security concepts, including conflict, defense, and deterrence, and has produced new security implications for nations whose national security is based on cybersecurity. Thus, many observers of international relations see cyber warfare as the fifth battlefield, alongside naval, land, air, and space warfare, and believe that this modern battlefield threatens governments' political authority or even their international existence. This is particularly true in countries whose businesses, critical infrastructures, economy, and security are highly dependent on the Internet or cyberspace networks. As network-based technologies evolve, guaranteeing government cyber security of critical infrastructure has gained more importance. Regarding this, the kind of communication tools utilized by users and their degree of proficiency in employing them impact the pattern and intensity of interaction between cyberspace operators.

Over the last two decades, the Internet and cyberspace have developed into a borderless battlefield between Iran and the United States of America due to the development of new information and communication technology. This dispute has deteriorated to the point that it has altered the nature of relationships between the two states, particularly in the aftermath of the US cyberattacks on Iran's nuclear facilities in 2009, and has influenced both countries' practical and theoretical cyberspace policies.

Methodology

A comprehensive and accurate understanding of Iran's and the US's new cyberspace tactics demands acquiring adequate information and conducting constant and precise assessments of their cyber capabilities. Therefore, we attempted to address the following question: What new strategies do Iran and the United States use to confront one another in cyberspace? To answer this question, we used a descriptive-analytical method to test the hypothesis and collected our data through a desk research and note-taking method, and then analyzed statements from the theory of authoritarian power.

Results and Discussion

US cyber-activities against the Islamic Republic of Iran started in 2006 under the guise of the Olympic Games and were directed by George W. Bush. They grew in intensity throughout the administrations of Barack Obama and following presidents. The United States has frequently targeted critical network infrastructure with its capabilities and skills in the field of new cyber technologies, as well as with the latest and most contemporary destructive tools in this sector - such as Stuxnet malware, Film, Doqu, and others. Iran's Islamic Republic has been the victim of damaging cyber assaults, which have caused significant damage. By contrast, the Islamic Republic of Iran's approach in the realm of cyberspace during the previous two decades might be seen as punitive reactions to geopolitical tensions at the regional or worldwide level caused by the US and its allies. Iran has established a robust structure for the employment of aggressive cyberspace actions, which are mostly a reaction to geopolitical events. In other words, Iran's cyber strategy against the US is linked to its geopolitical goals, and the government has built its cyber strategy around these interests. While Iran is not now regarded as one of the world's leading cyber superpowers, it is a significant actor that has improved its cyber position in terms of complexity, variety, and power while increasing its activities in cyberspace. Indeed, it has used cyber-retaliation to keep the US outside its physical and ideological borders. These measures may raise awareness among the US and its allies about the vulnerability of their crucial security and cyberinfrastructure systems. It implies that if these states target Iran's critical infrastructure, Iran may react by attacking their key infrastructure and threatening them with widespread, severe, and destructive assaults.

Conclusion

The findings of this study indicate that, as a result of the divergent approaches of the US and Iran to regional issues, the unresolved issues between them, the escalation of international sanctions against Iran, and, most significantly, the US withdrawal from BARJAM (Iran nuclear deal) and the assassination of Iran's Quds Force commander, cyberspace is increasingly becoming a battleground between the two countries. Accordingly, given their competence and capacities in the sphere of cyber technologies, each of these two states has resorted to modern methods to impose their demands on the other and even compel one another to modify their stance or accept their requests. For instance, they have resorted to hacking, cyber espionage, and cyber sabotage, using tools such as malware, viruses, and destructive code to leverage their cyber dominance to exert power on each other.

Keywords

Main Subjects


  1. Alikhani, M. (2020). Examining Trump's "Maximum Pressure Strategy" on Iran from the Perspective of "Coercive Power". International Studies Journal (ISJ), 17(1), 63-86. doi: 10.22034/isj.2020.119268 (In Persian)
  2. Baezner, M. (2019). Hotspot Analysis: Iranian cyber-activities in the context of regional rivalries and international tensions. Zurich: Center for Security Studies, at: https://www.researchgate.net/publication/333339073_Hotspot_Analysis_Iranian_cyber -activities_in_the_context_of_regional_rivalries_and_international_tensions.
  3. Barnes, J., Gibbons, T. (2019). U.S. Carried Out Cyberattacks on Iran. The New York Times. at: https://www.nytimes.com/2019/06/22/us/politics/us-iran-cyber-attacks.html.
  4. Bulut, S. (2021). Iran's Cyberspace Activities: Findings on the Joint Comprehensive Plan of Action Process. Gaziantep University Journal of Social Sciences, Vol. 20(1), 166-19, at: file:///C:/Users/ASUS/Desktop/10.21547-jss.718313-1047027.pdf
  5. Burak, A., Soner, C. (2022). National Security 2.0: The Cyber Security of Critical Infrastructure. Perception: Journal of International Affairs, Vol. 26(2), 259–276, at: https://dergipark.org.tr/en/pub/perception/issue/68005/1055264.
  6. Cilluffo, Frank J. (2012). The Iranian Cyber Threat to the United States, The George Washington University, Homeland Security Policy Institute, at: https://www.govinfo.gov/content/pkg/CHRG-112hhrg77381/html/CHRG-112hhrg77381.htm.
  7. Congressional Research Service. (2020, January 13). Iranian Offensive Cyber Attack Capabilities. at: https://sgp.fas.org/crs/mideast/IF11406.pdf.
  8. Craig, A., Valeriano, B. (2016). Conceptualising cyber arms races. 8th International Conference on Cyber Conflict (CyCon). Tallinn: NATO CCD COE Publications, pp. 141-158
  9. Eisenstadt, M. (2016). Iran’s Lengthening Cyber Shadow. The Washington Institute for Near East Policy, 34, 1-19.
  10. Epps, D. (2021). Offensive Cyber Operations Reshaping the Modern Battlespace. New York, Utica College, M.A. Thesis, of Cybersecurity at: https://www.proquest.com/openview/175887c1b151855dd298a55aaf3b536f/1?pq-origsite=gscholar&cbl=18750&diss=y.
  11. Fars News Agency. (2019). Iran Opts for New Civil Defense Approach to Confront US Threats. at: http://fna.ir/dd595c.
  12. Fischerkeller, M. (2017). Incorporating Offensive Cyber Operations into Conventional. Deterrence Strategies. Survival, Vol. 59(1), 103–134. at: https://doi.org/10.1080/00396338.2017.1282679.
  13. Fixler, A. (2020). The Cyber Threat from Iran after the Death of Soleimani. CTC Sentilel, Vol. 13(2), 1-40.
  14. Goel, S. (2020). How Improved Attribution in Cyber Warfare Can Help De-Escalate Cyber Arms Race. Connections The Quarterly Journal, Vol. 19(1), 87-95
  15. Gompert, D. C., Binnendijk, H. (2016). The Power to Coerce, Countering Adversaries Without Going to War. at: https://www.rand.org/content/dam/rand/pubs/research_reports/RR1000/RR1000/RAN D_RR1000.pdf.
  16. Gundert, L., Chohan, S., Lesnewich, G. (2018). Iran’s Hacker Hierarchy Exposed: How the Islamic Republic of Iran Uses Contractors and Universities to Conduct Cyber Operations. at: https://www.recordedfuture.com/iran-hacker-hierarchy/.
  17. Harris, S. (2014). Forget China: Iran’s Hackers Are America’s Newest Cyber Threat,” Foreign Policy. at: https://foreignpolicy.com/2014/02/18/forget-china-irans-hackers-are-americas-newest-cyber-threat/.
  18. Kaminski, M. (2020). Operation “Olympic Games.” Cyber-sabotage as a tool of American Intelligence Aimed at Counteracting the Development of Iran’s Nuclear Program. Security Defence, Faculty of National Security. War Studies University, Warsaw, Poland, at: http://doi.org/10.35467/sdq/121974.
  19. Katzman, K. (2020). U.S.-Iran Conflict and Implications for U.S. Policy. Congressional Research Service, Updated May 8, 2020, at: https://fas.org/sgp/crs/mideast/R45795.pdf.
  20. Kronenfeld, S., Siboni, G. (2014). Developments in Iranian Cyber Warfare. Military and Strategic Affairs, Vol. 6(2), 83-104.
  21. Lewis, J. A. (2019). Iran and Cyber Power. Center for Strategic and International Studies: CSIS, June 25, at: https://www.csis.org/analysis/iran-and-cyber-power?amp.
  22. Lorestani, A. (2019). A review of methods to deal with malware and spyware. Disciplinary Security and Protection Studies Journal, 13(49), 125-152. (In Persian)
  23. McMillan, R. (2019). Iranian Hackers Have Hit Hundreds of Companies in Past Two Years. Wall Street Journal, at: https://www.wsj.com/articles/iranian-hackers-have-hit-hundreds-of-companies-in-past-two-years-11551906036.
  24. Movahedian, E. (2020). US Cyber Diplomacy Towards Iran During Barack Obama's Presidency. Tehran: Irana Media. (In Persian).
  25. Saneian, A. (2019). Cyber Security in America; Structures and trends. Foreign Policy Journal, 33(1),191-228. (In Persian).
  26. Sanger, D., Barnes, J. (2020). U.S. Tried a More Aggressive Cyberstrategy, and the Feared Attacks Never Came. The New York Times, at: https://www.nytimes.com/2020/11/09/us/politics/cyberattacks-2020-election.html.
  27. Schaefer, B. (2018). The Cyber Party of God: How Hezbollah Could Transform Cyberterrorism. Georgetown Security Studies Review, at: https://georgetownsecuritystudiesreview.org/2018/03/11/the-cyber-party-of-god-how-hezbollah-could-transform-cyberterrorism.
  28. Shafa, E. (2014). Iran's Emergence as a Cyber Power. United States Army War College, at: https://vdocuments.net/reader/full/irans-emergence-as-a-cyber-power.
  29. Tikk, E. (2019). Cyber arms control and resilience. Yearbook- Armaments, Disarmament and International Security, Oxford University Press.
  30. Utinková, H. (2021). Cyber-attacks Against Iran as Instruments of Hybrid Warfare. Master’s Thesis. Charles University, Institute of Political Studies, Department of Security Studies.
  31. Vuletic, D., Milenkovic, M., Dukic, A. (2021). Cyberspace as a domain of conflict: The case of the United States - Iran and North Korea. Military work Journal, University of Defence, Strategic Research Institute, Belgrade, Vol. 73(1), 1-14
  32. Zetter, K. (2012). Meet 'Flame,' The Massive Spy Malware Infiltrating Iranian Computers. at: https://www.wired.com/2012/05/flame.