Confronting an Axis of Cyber?: China, Iran, North Korea, Russia in Cyberspace by Fabio Rugge

Confronting an Axis of Cyber?: China, Iran, North Korea, Russia in Cyberspace by Fabio Rugge

Author:Fabio Rugge [Rugge, Fabio]
Language: eng
Format: epub
Tags: Computers, Cybernetics, Security, General, Political Science, International Relations, Geopolitics
ISBN: 9788867058655
Google: 4DFHvgEACAAJ
Goodreads: 57016804
Publisher: Ledizioni
Published: 2018-01-15T07:39:32+00:00


5. Iran’s Cybered Warfare Meets Western Cyber-Insecurity

Lior Tabansky

A security threat stems from a combination of intent and capability. According to the current National Security Strategy of the United States of America, Iranian expansion, jihadist ideology, and regional rivalries have for years convulsed the Middle East55. Iran exploits cyber technology for every instrument of power, but IT-security practitioners only focus on technical aspects of the adversarial action. Similarly, many political analysts fail to overcome conceptual limitations regarding state responsibility for cyberattacks. The article aims to strategically analyse cyber power, integrating strategic Iran’s intent and Iran’s latest global cyber offense. Improved conceptualisation of cyber power may mitigate the Western difficulties with providing national cybersecurity.

Cyber Power

Kuehl has defined cyber power as “[…] the ability to use cyberspace to create advantages and influence events in other operational environments and across the instruments of power”56. Cyber power thus cuts across Diplomatic, Informational, Military, and Economic (DIME) instruments of power as technology morphs and interconnects these elements. These changes enable numerous known and unknown methods to produce preferred outcomes within and outside cyberspace. Since most of the world’s information is digitally produced, processed, stored, and transmitted, cyber power must be intertwined with information57. Indeed, adversaries have long experimented with applying cyber power in espionage-driven economic damage, threats to critical infrastructure, and mass subversion58. Joseph Samuel Nye, Jr, one of the most influential International Relations scholars as well as an experienced practitioner, defined hard and soft power in a seminal 1990 article59. Hard power relies on coercion and payment, while soft power uses the framing of agendas, attraction, or persuasion. Manipulation of information may, in principle, assist each type of hard and soft power along a spectrum from command to co-option. Two decades later, Nye also masterfully discussed cyber power, including both physical and informational aspects60.

Cybered conflict, the term coined by Demchak and Dombrowski, means that adversarial and competitive relationships have a significant computerised dimension. The success or failure of major participants is critically dependent on computerised key activities along the path of events.

Cybered conflict differs from cyber war or cyber battle. The latter is fully technological and could, in principle, be conducted entirely within a network. It is normally a component of the former. A cybered conflict is any conflict of national significance in which key events determining the path to the generally accepted outcome of the conflict could not have proceeded unless cyber means were non-substitutable and critically involved61.

To illustrate the adversarial cybered operations and their role as an instrument of power, I analyse Iran’s strategy, goals, and cyber means, employing the recently disclosed Iranian cyber offense campaign.

Iran National Security Strategy and the Volatile Environment

The Islamic Republic of Iran is a revolutionary ideology-driven regime. Given the history of the 1979 revolution, the main threat to Iran is the US: Khamenei refers to the US as the “Great Satan”, and to Israel as the “Little Satan”. The risk of Western military invasion was high in Iran’s eyes when the US invaded Iraq to topple Saddam’s regime.



Download



Copyright Disclaimer:
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.