Cybersecurity Policies and International Relations: The Case of the US and Iran
DOI:
https://doi.org/10.47611/jsrhs.v11i2.2666Keywords:
Cybersecurity, Iran, USAbstract
One area of increased attention for defense departments around the world is the area of cybersecurity. This paper takes two very different players in cybersecurity--the US and Iran--to outline their general approaches, find areas of potential conflict, and outline confrontations that may be possible in the future. In this sense, this paper makes a wider contribution to the many ways in which states are pursuing cyber goals today and also contributes to the discussion of how even non-allied states might work together in this sphere.
Downloads
References or Bibliography
Jacquelyn Schneider, “A Strategic Cyber No-First-Use Policy? Addressing the US Cyber Strategy Problem,” The Washington Quarterly 43 (2020), https://www.tandfonline.com/doi/abs/10.1080/0163660X.2020.1770970?journalCode=rwaq20&.
Ralph Langner, “Stuxnet: Dissecting a Cyberwarfare Weapon,” IEEE Security & Privacy 9, no. 3 (2011), https://ieeexplore.ieee.org/abstract/document/5772960.
Hal Brands, “Why America Can’t Quit The Middle East,” no. 1921 (March 21, 2019), https://www.hoover.org/research/why-america-cant-quit-middle-east.
“OPEC Share of Crude Oil Reserves, 2018,” n.d., https://www.opec.org/opec_web/en/data_graphs/330.htm.
Seymour Hersh, “U.S. Secretly Gave Aid to Iraq Early in Its War Against Iran,” New York Times, January 26, 1992, https://www.nytimes.com/1992/01/26/world/us-secretly-gave-aid-to-iraq-early-in-its-war-against-iran.html?pagewanted=1.
Janae Diaz and James Di Pane, “Iran Is Targeting the Strait of Hormuz. The World Needs to Take Heed.,” The Heritage Foundation, October 22, 2020, https://www.heritage.org/middle-east/commentary/iran-targeting-the-strait-hormuz-the-world-needs-take-heed.
Stephen Zunes, “Why the U.S. Supports Israel,” Institute for Policy Studies, May 1, 2002, https://ips-dc.org/why_the_us_supports_israel/.
Krysta Wise, “Islamic Revolution of 1979: The Downfall of American-Iranian Relations,” Legacy 11, no. 1 (n.d.), https://opensiuc.lib.siu.edu/legacy/vol11/iss1/2/?utm_source=opensiuc.lib.siu.edu%2Flegacy%2Fvol11%2Fiss1%2F2&utm_medium=PDF&utm_campaign=PDFCoverPages.
“State Sponsors of Terrorism,” U.S. Department of State, n.d., https://www.state.gov/state-sponsors-of-terrorism/.
“Foreign Terrorist Organizations,” U.S. Department of State, n.d., https://www.state.gov/foreign-terrorist-organizations/.
François Carrel-Billiard and Christine Wing, “Iran and the NPT,” n.d., https://www.ipinst.org/wp-content/uploads/2010/04/pdfs_iranchapt.pdf.
“Department of Defense Cyber Strategy 2018,” Department of Defense, n.d., https://media.defense.gov/2018/Sep/18/2002041658/-1/-1/1/CYBER_STRATEGY_SUMMARY_FINAL.PDF.
Samantha Ravich and Ed Cardon, “Defending Forward in the Cyber Domain,” Foundation for Defense of Democracies, n.d., https://www.fdd.org/analysis/2020/12/15/defending-forward-defending-forward-in-the-cyber-domain/.
Itamar Rabinovich, “How Iran’s Regional Ambitions Have Developed since 1979,” Brookings Institution, January 24, 2019, https://www.brookings.edu/blog/order-from-chaos/2019/01/24/how-irans-regional-ambitions-have-developed-since-1979/.
Madyson Hutchinson Posey, “Here Are 4 Ways Iran Is Destabilizing the Middle East,” The Heritage Foundation, October 16, 2017, https://www.heritage.org/middle-east/commentary/here-are-4-ways-iran-destabilizing-the-middle-east.
Claire Brenner, “Iran’s Destabilizing Activities in the Middle East,” American Security Project, March 5, 2021, https://www.americansecurityproject.org/irans-destabilizing-activities-in-the-middle-east/.
“Iran’s Foreign and Defense Policies,” Congressional Research Service R44017 (January 11, 2021), https://fas.org/sgp/crs/mideast/R44017.pdf.
“Iran’s Networks of Influence - Chapter Four: Iraq,” International Institute for Strategic Studies, November 2019.
“Annex to U.S.-Gulf Cooperation Council Camp David Joint Statement,” The White House, May 14, 2015, https://obamawhitehouse.archives.gov/the-press-office/2015/05/14/annex-us-gulf-cooperation-council-camp-david-joint-statement.
Kali Robinson, “What Is the Iran Nuclear Deal?,” Council on Foreign Relations, June 29, 2021, https://www.cfr.org/backgrounder/what-iran-nuclear-deal.
Saeed Ghasseminejad and Richard Goldberg, “The Impact of Sanctions Two Years After U.S. Withdrawal From the Nuclear Deal,” Foundation for Defense of Democracies, May 6, 2020, https://www.fdd.org/analysis/2020/05/06/sanctions-impact-two-years-after-jcpoa-withdrawal/.
Robert Einhorn, “Averting a New Iranian Nuclear Crisis,” Brookings Institution, January 17, 2020, https://www.brookings.edu/policy2020/bigideas/averting-a-new-iranian-nuclear-crisis/.
Laurel Wamsley and Emily Kwong, “Iran Abandons Nuclear Deal Limitations In Wake Of Soleimani Killing,” National Public Radio, January 5, 2020, https://www.npr.org/2020/01/05/793814276/iran-abandons-nuclear-deal-limitations-in-wake-of-soleimani-killing.
Matthew Lee, “Iran Still Top State Sponsor of Terrorism, U.S. Report Says,” Public Broadcasting Server, July 19, 2017, https://www.pbs.org/newshour/world/iran-still-top-state-sponsor-terrorism-u-s-report-says.
Madyson Hutchinson Posey, “Here Are 4 Ways Iran Is Destabilizing the Middle East.”
Matthew Levitt, “Hezbollah Finances: Funding the Party of God,” Washington Institute, February 13, 2005, https://www.washingtoninstitute.org/policy-analysis/hezbollah-finances-funding-party-god.
Ashley Lane, “Iran’s Islamist Proxies in the Middle East,” Wilson Center, n.d., https://www.wilsoncenter.org/article/irans-islamist-proxies.
James Andrew Lewis, “Iran and Cyber Power,” Center for Strategic and International Studies, June 25, 2019, https://www.csis.org/analysis/iran-and-cyber-power.
“Iranian Offensive Cyber Attack Capabilities,” Congressional Research Service, January 13, 2020, https://fas.org/sgp/crs/mideast/IF11406.pdf.
Julia Voo et al., “National Cyber Power Index 2020,” Belfer Center for Science and International Affairs, September 2020, https://www.belfercenter.org/sites/default/files/2020-09/NCPI_2020.pdf.
James Andrew Lewis, “Iran and Cyber Power,” Center for Strategic and International Studies, June 25, 2019, https://www.csis.org/analysis/iran-and-cyber-power.
“Publicly Reported Iranian Cyber Actions in 2019,” Center for Strategic and International Studies, n.d., https://www.csis.org/programs/technology-policy-program/publicly-reported-iranian-cyber-actions-2019.
Quinten E Hodgson et al., “Fighting Shadows in the Dark: Understanding and Countering Coercion in Cyberspace,” RAND Corporation RR-2961-OSD (n.d.), https://www.rand.org/pubs/research_reports/RR2961.html.
James Andrew Lewis, “Iran and Cyber Power,” Center for Strategic and International Studies, June 25, 2019, https://www.csis.org/analysis/iran-and-cyber-power.
Andrew Hanna, “The Invisible U.S.-Iran Cyber War,” United States Institute of Peace, October 25, 2019, https://iranprimer.usip.org/blog/2019/oct/25/invisible-us-iran-cyber-war.
Michael Mazzar, “Understanding Deterrence,” RAND Corporation, n.d., https://www.rand.org/content/dam/rand/pubs/perspectives/PE200/PE295/RAND_PE295.pdf.
Clorinda Trujilo, “The Limits of Cyberspace Deterrence,” National Defense University Press, Quarter 2014, https://ndupress.ndu.edu/Portals/68/Documents/jfq/jfq-75/jfq-75_43-52_Trujillo.pdf.
Michael Schmitt, “NOTEWORTHY RELEASES OF INTERNATIONAL CYBER LAW POSITIONS—PART I: NATO,” Lieber Institute, August 27, 2020, https://lieber.westpoint.edu/nato-release-international-cyber-law-positions-part-i/.
Michael Schmitt, “NOTEWORTHY RELEASES OF INTERNATIONAL CYBER LAW POSITIONS—PART II: IRAN,” Lieber Institute, August 27, 2020, https://lieber.westpoint.edu/iran-international-cyber-law-positions/.
Hanna, “The Invisible U.S.-Iran Cyber War.”
“Targeting of U.S. Grid,” Council on Foreign Relations, January 2020.
Paul Mueller and Babak Yadegari, “The Stuxnet Worm,” The University of Arizona, n.d., https://www2.cs.arizona.edu/~collberg/Teaching/466-566/2013/Resources/presentations/2012/topic9-final/report.pdf.
“Stuxnet: Tool of Nonproliferation or Pandora’s Box,” Columbia University K=1 Project Center for Nuclear Studies, August 19, 2012, https://k1project.columbia.edu/news/stuxnet.
David Albright, Paul Brannan, and Christina Walrond, “Stuxnet Malware and Natanz: Update of ISIS December 22, 2010 Report,” Institute for Science and International Security, February 15, 2011, http://large.stanford.edu/courses/2011/ph241/grayson2/docs/stuxnet_update_15Feb2011.pdf.
Max Smeet, “The Strategic Promise of Offensive Cyber Operations,” Air University Strategic Studies Quarterly, Fall 2018, https://www.airuniversity.af.edu/Portals/10/SSQ/documents/Volume-12_Issue-3/Smeets.pdf.
Yaakov Katz, “‘Stuxnet Virus Set Back Iran’s Nuclear Program by 2 Years,’” The Jerusalem Post, December 15, 2010, https://www.jpost.com/iranian-threat/news/stuxnet-virus-set-back-irans-nuclear-program-by-2-years.
John Glaser, “Cyberwar on Iran Won’t Work. Here’s Why,” CATO Institute, August 21, 2017.
Glenn Greenwald, “NSA CLAIMS IRAN LEARNED FROM WESTERN CYBERATTACKS,” The Intercept, February 10, 2015, https://theintercept.com/2015/02/10/nsa-iran-developing-sophisticated-cyber-attacks-learning-attacks/.
Vasileios Karagiannopoulos, “How Real Is the Threat of Cyberwar Between Iran and the US?,” IPI Global Observatory, January 23, 2020, https://theglobalobservatory.org/2020/01/how-real-is-threat-of-cyberwar-between-iran-and-us/.
Published
How to Cite
Issue
Section
Copyright (c) 2022 Ryan Aminloo; Tyler Vitone
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
Copyright holder(s) granted JSR a perpetual, non-exclusive license to distriute & display this article.