Identyfikatory
Warianty tytułu
Języki publikacji
Abstrakty
Iran is among the most advanced countries in terms of cyber capabilities. Activities in the digital sphere have both offensive and defensive dimensions and are directed both outward and inward. This article attempts to systematize information on Iran’s cyber capabilities, both internal and external. The purpose of the article is to discuss the challenges to individual states and the international community as a whole posed by Iranian activities in the digital sphere. The question the author seeks to answer in the article is how Tehran uses the digital tools it possesses to implement its security strategy. The author used theoretical methods related to the analysis and criticism of available sources, such as reports of technology companies and research institutes, intelligence documents, and legal acts. She also used a case study method, which enabled it to examine specific cases of Iranian cyber activities to find answers to the question of the strategic importance of cyberspace for the Iranian government.
Słowa kluczowe
Wydawca
Rocznik
Tom
Strony
267--290
Opis fizyczny
Bibliogr. 65 poz.
Twórcy
autor
- University of Warsaw, Warsaw, Poland
Bibliografia
- 1. “Iron Swords” War in Cyber Sphere: Insights, Recommendations and Mitigations, (2024). Israel National Cyber Directorate. https://www.gov.il/en/departments/publications/reports/publish_2412
- 2. Akbar, A., (2023). Iran’s soft power in the Middle East via the promotion of the Persian language. Contemporary Politics, vol. 29, no. 4, p. 424–445.
- 3. Alqahtani, A., (2013). The Potential Threat of Cyber‐Terrorism on National Security of Saudi Arabia. In: International Conference on Information Warfare and Security, Denver, USA.
- 4. Al-Rabiaah, S., (2018). The “Stuxnet” Virus of 2010 As an Example of A “APT” and Its “Recent” Variances. In: 21st Saudi Computer Society National Computer Conference, Riyadh, Saudi Arabia.
- 5. Anderson, C., (2013). Dimming the Internet. Detecting Throttling as a Mechanism of Censorship In Iran. arXiv:1306.4361v1. https://arxiv.org/abs/1306.4361
- 6. Annual Threat Assessment of the U.S. Intelligence Community. Office of the Director of National Intelligence. (2012–2023). https://www.intelligence.gov/annual-threat-assessment
- 7. ASL19, (2012, November). Iran’s National Information Network. The Citizen Lab. https://citizenlab.ca/2012/11/irans-national-information-network/
- 8. Baezner, M., Cordey, S., (2022). Influence Operations and Other Conflict Trends. In: Dunn Cavelty, M., Wenger, A. (eds.), Cyber Security Politics. Socio-Technological Transformations and Political Fragmentation, New York: Routlege, pp. 17–31.
- 9. Baldino, D., Goold, J., (2014). Iran and the emergence of information and communications technology. Australian Journal of International Affairs, vol. 68, no. 1, pp. 17–35.
- 10. Brodkin, J., (2007, 30 November). Government-sponsored Cyberattacks on the Rise, McAfee Says. CSOS. https://www.csoonline.com/article/520580/build-ci-sdlc-government- sponsored-cyberattacks-on-the-rise-mcafee-says.html
- 11. Bronk, Ch., Tikk-Ringas, E., (2013). The Cyber Attack on Saudi Aramco. Global Politics and Strategy, vol. 55, no. 2, pp. 81–96.
- 12. Brophy, J.E., (2010). Developing a corporeal cyberfeminism: beyond cyberutopia. New media & Society, vol. 12 no. 6, pp. 929–945.
- 13. Bucala, P. & Pendleton, C.S., (2015, 24 November). Iranian Cyber Strategy: A View from the Iranian Military. American Enterprise Institute: Critical Threats Project. https://www.criticalthreats.org/analysis/iranian-cyber-strategy-a-view-from-the-iranianmilitary#_ednfb6920276b92d07909bb64c2ad2405071
- 14. Cohen, S., (2019). Iranian Cyber Capabilities. Cyber, Intelligence, and Security, vol. 3, no. 1, p. 71–94.
- 15. Dalton, M.G., (2017). How Iran’s hybrid-war tactics help and hurt it. Bulletin Of The Atomic Scientists, vol. 73, no. 5, pp. 312–315.
- 16. Dar moured-e Szouro-je Ali-je Fazo-je Modżazi. (2014, January). https://www.tabnak.ir/fa/tags/11225/1/
- 17. Dean, A., (2012). Cyber Threats in the 21st Century. Security, vol. 49(9), pp. 70–76.
- 18. Denning, D., (2001). Activism, Hacktivism, and Cyberterrorism: The Internet as a Tool for Influencing Foreign Policy. In: Arquilla, J., Ronfeldt, D. (eds), Networks and Netwars: The Future of Terror, Crime, and Militancy, Santa Monica: National Defense Research Institute RAND, pp. 239–288.
- 19. Feizi, H., Talebi, B., (2012). Iran’s Soft Power Borne of Necessity and Complexity of its Multi-Dimensional Audience. Exchange: The Journal of Public Diplomacy, vol. 3, no. 1, p. 48–52.
- 20. Fixler, A., (2022). The Dangers of Iran’s Cyber Ambitions. In: Ravich, S.F., Fixler, A. (eds.), The Attack on America’s Future. Cyber-Enabled Economic Warfare, Washington: FDD PRESS, pp. 50–63
- 21. Freedom On The Net 2021, The Global Drive to Control Big Tech. (2021). Freedom House. https://freedomhouse.org/sites/default/files/2021-09/FOTN_2021_Complete_Booklet_09162021_FINAL_UPDATED.pdf
- 22. Google Transparency Report. https://transparencyreport.google.com/traffic/overview?
- fraction_traffic=start:1571788800000;end:1574467200000;product:19;region:IR&lu=fraction_traffic
- 23. Górka, M., (2017). Wybrane aspekty definicyjne cyberterroryzmu i ich znaczenie w perspektywie polityki bezpieczeństwa. Cywilizacja i Polityka, vol. 15(15), pp. 295–315.
- 24. Iasiello, E., (2013). Cyber Attack: A Dull Tool to Shape Foreign Policy. In 5th International Conference on Cyber Conflict, Tallin, Estonia.
- 25. Internet disrupted in Iran amid fuel protests in multiple cities (Netblocks Report), (2019). https://netblocks.org/reports/internet-disrupted-in-iran-amid-fuel-protestsin-multiple-cities-pA25L18b
- 26. Internet shutdown in Iran following reported cyber-attack, (2020, 8 February). Net- Blocks. https://netblocks.org/reports/internet-shutdown-in-iran-following-reportedcyber-attack-18lJVDBa
- 27. Iran to implement National Information Network to keep people off the internet | Digital Watch Observatory, (2023, 11 September). Digital Watch Observatory. https://dig.watch/updates/iran-to-implement-national-information-network-to-keep-peopleoff-the-internet
- 28. Iran turning to cyber-enabled influence operations for greater effect (Threat Intelligence Report), (2023). Microsoft. https://query.prod.cms.rt.microsoft.com/cms/api/am/binary/RW13xRJ
- 29. Iran’s Cyberattacks Capabilities, (2020). King Faisal Center for Research and Islamic Studies. https://www.kfcris.com/pdf/50781c86a6f571af0edb0189aa7594d75e2d6570cfa06.pdf
- 30. Iran’s SIAM Manual for Tracking and Controlling Mobile Phones, (2022, 28 October). The Intercept. https://theintercept.com/document/2022/10/28/irans-siam-manualfor-tracking-and-controlling-mobile-phones/
- 31. Iranian Press Law, (1986). https://irandataportal.syr.edu/press-law.
- 32. Kargar, S., Rauchfleisch, A., (2019). State-aligned trolling in Iran and the double-edged affordances of Instagram. New Media & Society, vol. 21, no. 7, pp. 1506–1527.
- 33. Karimi, M., (2018). The Iranian Green Movement of 2009: Reverberating Echoes of Resistance. Lexington: Lexington Books.
- 34. Kazemi, M., (2021, 3 September). #Internet Shutdown Trends in Iran: November 2019 to July 2021. Filterwatch. https://filter.watch/en/2021/09/03/internet-shutdown-trendsin-iran-from-november-2019-to-july-2021/
- 35. Kermani, H., (2023). #MahsaAmini: Iranian Twitter Activism in Times of Computational Propaganda. Social Movement Studies, pp. 1–11.
- 36. Kontselidze, A., (2015). Cyberterrorism – when technology became a weapon. European Scientific Journal, pp. 24–29.
- 37. Koo, G.Y., (2016). To be Myself and have My Stealthy Freedom: The Iranian Women’s Engagement with Social Media. Revista de estudios internacionales mediterráneos, no. 21, pp. 1–17.
- 38. Matusitz, J., (2008). Cyberterrorism: Postmodern State of Chaos. Information Security Journal: A Global Perspective, vol. 17(4), pp. 179–187.
- 39. Netolicka, V., Mares, M., (2018). Arms race “in cyberspace” – A case study of Iran and Israel. Comparative Strategy, vol. 37, no. 5, pp. 414–429.
- 40. Nye, J., (2011). The future of power. New York: Public Affairs.
- 41. Nine Iranians Charged With Conducting Massive Cyber Theft Campaign on Behalf of the Islamic Revolutionary Guard Corps [U.S. Department of Justice Press Release], (2018, 23 March). https://www.justice.gov/opa/pr/nine-iranians-charged-conducting-massive-cyber-theft-campaign-behalf-islamic-revolutionary
- 42. Padmanabhan, R., (2019). Iran’s nation-wide Internet blackout: Measurement data and technical observations (Open Observatory of Network Interference (OONI) Report). https://ooni.org/post/2019-iran-internet-blackout/
- 43. Padmanabhan, R. et al., (2019). Iran’s nation-wide Internet blackout: Measurement data and technical observations (Open Observatory of Network Interference (OONI) Report). https://ooni.org/post/2019-iran-internet-blackout/
- 44. Pedersen, Ch., (2014). Much Ado about Cyber-space: Cyber-terrorism and the Reformation of the Cyber-security. Pepperdine Policy Review, vol. 7(1).
- 45. Pirotti, M., (2021, 26 September). The Ever-Growing Iranian Cyber Threat. BESA Center Perspectives Paper 2021, No. 2/160. https://besacenter.org/iran-cyber-threat/
- 46. Rosson, Z., Anthonio, F., & Tackett, C., (2023). Weapons of Control, Shields of Impunity. Internet shutdowns in 2022 (KeepItOn Report). https://www.accessnow.org/internetshutdowns-2022/
- 47. Salamatian, L., Douzet, F., Limonier, K., Salamatian K., (2019). The geopolitics behind the routes data travels: a case study of Iran. arXiv: 1911.07723. https://arxiv.org/abs/1911.07723
- 48. Samane-je Jekparcze-je Este’lamat-e Muchabarati (SIEM). (b. d.). https://www.documentcloud.org/documents/23199209-irans-siam-manual-in-persian-for-tracking-and-controlling-mobile-phones.
- 49. Seven Iranians Working for Islamic Revolutionary Guard Corps-Affiliated Entities Charged for Conducting Coordinated Campaign of Cyber Attacks Against U.S. Financial Sector [U.S. Department of Justice Press Release]. (2016, 24 March). https://www.justice.gov/opa/pr/seven-iranians-working-islamic-revolutionary-guard-corps-affiliated-entities-charged
- 50. Siboni, G., Kronenfeld, S., (2012). Iran And Cyberspace Warfare. Military and Strategic Affairs, vol. 4, no. 3, pp. 77–99.
- 51. Singh, Dh., Sinha, R., Songara, P., Rathi, R., (2014). Vulnerabilities and Attacks Targeting Social Networks and Industrial Control Systems. arXiv: 1403.5628. https://arxiv.org/abs/1403.5628
- 52. State of the Threat. A Year in Review, (2023). Secureworks. https://www.secureworks.com/resources/rp-state-of-the-threat-2023
- 53. Tahaghagh-e Tabligh-e Din dar Faaza-ye Majazi ba Internet-e Melli, (b. d.). Gerdab. ir. https://gerdab.ir/fa/news/12005
- 54. Technical multi-stakeholder report on Internet shutdowns: The case of Iran amid autumn 2022 protests, (2022). (OONI, IODA, M-Lab, Cloudflare, Kentik, Censored Planet, ISOC, Article19 Report). https://ooni.org/post/2022-iran-technical-multistakeholder-report/
- 55. The Iranian Cyber Threat, (2022). United Against Nuclear Iran. (2022). https://www.unitedagainstnucleariran.com/sites/default/files/UPDATE%20-%20The%20Iranian%20Cyber%20Threat_9.7.22_JC_JMB_CMJ.pdf
- 56. Three Iranian Nationals Charged with Engaging in Computer Intrusions and Ransomware- Style Extortion Against U.S. Critical Infrastructure Providers [U.S. Department of Justice Press Release], (2022, 14 July). https://www.justice.gov/opa/pr/three-iraniannationals-charged-engaging-computer-intrusions-and-ransomware-style-extortion
- 57. Topor, S., (2016). Cyber criminal and cyber terrorist – two concepts that need to be differently treated. In: International Scientific Conference. Strategies XXI, Bucharest, Romania.
- 58. Two Iranian Men Indicted for Deploying Ransomware to Extort Hospitals, Municipalities, and Public Institutions, Causing Over $30 Million in Losses, [U.S. Department of Justice Press Release], (2018, 28 November). https://www.justice.gov/opa/pr/two-iranianmen-indicted-deploying-ransomware-extort-hospitals-municipalities-and-public
- 59. Two Iranian Nationals Charged for Cyber-Enabled Disinformation and Threat Campaign Designed to Influence the 2020 U.S. Presidential Election [U.S. Department of Justice Press Release], (2021, 18 November). https://www.justice.gov/opa/pr/two-iraniannationals-charged-cyber-enabled-disinformation-and-threat-campaign-designed
- 60. Two Iranian Nationals Charged in Cyber Theft Campaign Targeting Computer Systems in United States, Europe, and the Middle East [U.S. Department of Justice Press Release], (2020, 16 September). https://www.justice.gov/opa/pr/two-iranian-nationalscharged-cyber-theft-campaign-targeting-computer-systems-united-states
- 61. Two Iranian Nationals Charged in Hacking of Vermont Software Company [U.S. Department of Justice Press Release], (2017, 17 July). https://www.justice.gov/opa/pr/two-iranian-nationals-charged-hacking-vermont-software-company
- 62. Users – Tor Metrics, (b. d.). Welcome to Tor Metrics. https://metrics.torproject.org/userstats-relay-country.html?start=2019-11-10&end=2019-11-21&country=ir&events=off
- 63. Warrick, J., & Nakashima, E., (2020, 20 May). Foreign intelligence officials say attempted cyberattack on Israeli water utilities linked to Iran. The Washington Post. https://www.washingtonpost.com/national-security/intelligence-officials-say-attempted-cyberattack-on-israeli-water-utilities-linked-to-iran/2020/05/08/f9ab0d78-9157-11ea-9e23-6914ee410a5f_story.html
- 64. Webster W., Cilluffo F., (1998). Cybercrime Cyberterrorism Cyberwarfare: Averting an Electronic Waterloo, Washington D.C.: CSIS Press.
- 65. Wilson, C., (2014). Cyber threats to Critical Information Infrastructure. In: Chen, T. M., Jarvis, L., Macdonald, S., (eds.), Cyberterrorism. Understanding, Assessment, and Response, New York: Springer, pp. 123–136.
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-f22a302b-b8ce-402b-ac09-794fa9b3829f
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.