• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Excelitas Qioptiq banner

BATTLESPACE Updates

   +44 (0)77689 54766
   

  • Home
  • Features
  • News Updates
  • Defence Engage
  • Company Directory
  • About
  • Subscribe
  • Contact
  • Media Pack 2023

CYBER WARFARE, EW, CLOUD HOMELAND SECURITY UPDATE

August 26, 2016 by

25 Aug 16. While China and Russia have built up a robust profile in cyberspace, many are warning against Iran’s growing capabilities and behavior. Iran is one of the five evolving strategic challenges facing the U.S., along with Russia and China, North Korea and terrorism, according to Defense Secretary Ash Carter. Iran’s malicious activity in the physical world — such as its pursuit for nuclear weapons, its testing of ballistic missiles and its support for proxies in the Middle East that have claimed the lives of American service members — has long made the Islamic Republic a threat. Iran has also been bolstering its cyber capabilities and activity to serve its interests.
In a July report published by the Washington Institute for Near East Policy titled “Iran’s Lengthening Cyber Shadow,” the report’s author and fellow at the Washington Institute, Michael Eisenstadt, offers three points that explain Iran’s growing interest in cyber. It fits well with Iran’s strategic culture given cyberspace’s inherent ambiguity and standoff; the lack of international cyber norms provides Iran with a “margin for maneuver” in cyberspace; and given the lack of norms, Iran hopes to shape the international framework so its cyberspying and offensive cyber operations become tolerated, similar to its support for proxies considered by many to be terrorist organizations.
“Iran believes that domestic and foreign threats form a seamless web, and that the domestic opposition is inspired by foreign cultural influences and enabled by foreign powers that seek to bring down the Islamic Republic,” Eisenstadt explained. “It likewise believes that Western popular culture has a morally corrosive impact on Iranian youth, and that U.S. soft warfare aims to alienate Iran’s youth from the ideology of the revolution, undermine popular support for the regime, and sap the social cohesion of the Islamic Republic. It sees both as existential threats to the Islamic Republic.”
For Iran, cyber also represents that existential threat — and provides an exceptional opportunity.
“This is why Tehran is investing so much effort in developing its cyber capabilities: to deter both cyber and traditional military challenges, to wage its own version of soft warfare while its proxy and conventional military forces are kept in reserve, and to be able to strike its enemies globally, instantaneously, and on a sustained basis—something it cannot do in the physical domain,” he noted.
According to the Soufan Group, a security consultancy firm, the joint U.S.-Israeli cyberattack on Iran’s nuclear infrastructure by way of the Stuxnet virus added to the “Iranian government’s sense of urgency for developing its cyber capabilities.” Additionally, “[t]he extensive use of social media by participants in the 2009 ‘Green Movement’ uprising in Iran convinced the regime it needed additional capabilities to control and monitor the public’s use of the Internet,” the Soufan Group concluded, noting “Iran’s security apparatus has developed advanced cyber capabilities that can be adapted to different missions.”
From a U.S. threat perspective however, Iran, while thought to be on the rise in terms of capability, is still considered to be a lower-tiered threat compared to Russia and China.
“The states that we watch most closely in cyberspace remain Russia, China, Iran and North Korea. Russia and China are both very capable cyber operators, while Iran and North Korea represent lesser, but still significant, challenges to U.S. interests,” read the joint statement of several top Defense Department cyber officials for a June House Armed Services Committee hearing.
The chief of Cyber Command has also provided a similar assessment.
“Iran and North Korea represent lesser but still serious challenges to U.S. interests. Although both states have been more restrained in this last year in terms of cyber activity directed against us, they remain quite active and are steadily improving their

Primary Sidebar

Advertisers

  • qioptiq.com
  • Exensor
  • TCI
  • Visit the Oxley website
  • Visit the Viasat website
  • Blighter
  • SPECTRA
  • Britbots logo
  • Faun Trackway
  • Systematic
  • CISION logo
  • ProTEK logo
  • businesswire logo
  • ProTEK logo
  • ssafa logo
  • Atkins
  • IEE
  • EXFOR logo
  • DSEi
  • sibylline logo
  • Team Thunder logo
  • Commando Spirit - Blended Scoth Whisy
  • Comtech logo
Hilux Military Raceday Novemeber 2023 Chepstow SOF Week 2023

Contact Us

BATTLESPACE Publications
Old Charlock
Abthorpe Road
Silverstone
Towcester NN12 8TW

+44 (0)77689 54766

BATTLESPACE Technologies

An international defence electronics news service providing our readers with up to date developments in the defence electronics industry.

Recent News

  • EXHIBITIONS AND CONFERENCES

    March 24, 2023
    Read more
  • VETERANS UPDATE

    March 24, 2023
    Read more
  • MANAGEMENT ON THE MOVE

    March 24, 2023
    Read more

Copyright BATTLESPACE Publications © 2002–2023.

This website uses cookies to improve your experience. If you continue to use the website, we'll assume you're ok with this.   Read More  Accept
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT