Deterring Iran's Use of Offensive Cyber: A Case Study
Author(s) -
Michael Connell
Publication year - 2014
Language(s) - English
Resource type - Reports
DOI - 10.21236/ada617308
Subject(s) - offensive , deterrence theory , phishing , computer security , denial of service attack , cyberwarfare , government (linguistics) , internet privacy , engineering , business , political science , computer science , operations research , the internet , law , world wide web , linguistics , philosophy
: Since 2011, Iran and the United States have been engaged in a low-level cyber conflict. Iranian cyber forces and cyber proxies have launched distributed denial of service (DDoS), web defacement, spear phishing, and data manipulation attacks against U.S. and allied banks, media outlets, government offices, social networking sites, and military communications networks. These attacks pose critical questions for U.S. entities with cyber roles and missions. Can Iran be deterred from engaging in offensive cyber? If so, how? What would a deterrence strategy that targets Iran s use of offensive cyber look like? This paper explores how the concept of tailored deterrence could be applied to Iran in the cyber sphere. Utilizing a case-studies approach, it analyzes some of the unique features associated with the regime s political and military decision making processes, how its cyber programs and entities are structured and affiliated with the regime, the TTP that these entities employ, their relative capabilities, and how these factors could play in a cyber-deterrence scenario.
Accelerating Research
Robert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom
Address
John Eccles HouseRobert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom