Development of the Concept of Deterrence Theory in the Country's Cyberspace Based on Upstream Documents and Available Approaches

Document Type : Original Article

Authors

Supreme National Defense University

Abstract

Preventing damage in cyberspace involves complex mechanisms such as threat, punishment, non-admission, plight and norms. The purpose of this article is to clarify some of these conceptual terms and the policy of using deterrence theory in the cyber territory of the Islamic Republic of Iran. Formulation of an effective strategy in the cyber arena, requires a deeper recognition of the various dimensions of deterrence and prevention in cyber domains. Developing the base theory of deterrence against enemy cyber threats in the country's cyberspace requires accurate knowledge of the domain of defense and formulation of strategies based on the base theory of deterrence in cyberspace which has unfortunately been neglected. Our problem in this research is the lack of a codified theory to create deterrence in the country's cyberspace in face of cyber threats and, consequently, the recognition of deterrence requirements based on upstream documents and existing approaches such that in the face of enemy threats, the country's cyberspace stands firm and resistant with the ability to continue the required functions and at the same time retaliate enemy threats.   Creating and using all possible human and technical cyber capabilities in order to be ready for adaptation (resilience) in variable and dynamic cyber conditions is an undeniable necessity that while sustaining resistance and sovereignty, it will maintain and increase national interests and goals. This issue should be considered as a fundamental and    national value in the theory of deterrence.  Considering the uncertainty of the cyberspace in addition to its dynamics and threats, and given the challenge of identifying the source of the threat, in order to prevent the failure of            deterrence, the evolutionary theory is proposed which seems capable of obtaining desirable, preferable and           sustainable strategies, and their constant updating and restoration. In this research, the strategic benefits of cyber deterrence (vision, macro goals, dominant basic values, principles, requirements in upstream documents) have been enumerated, based on the opinion of communication, information technology and passive defense experts in the     academic and executive bodies, and finally gained the necessary approvals in expert assemblies.
 

Keywords


  [1]      M. khaleghi, “Cyber Def Doctrine Study Report V0.66,” Telecommunication Research Center (ITRC), 2019. (In Persian)##
  [2]      A. Molaee and M. kargari, and M. R. khorashadizadeh, “Pattern of deterrence in cyberspace based on game theory,” 2018. (In Persian)##
  [3]      M. H. Farokh and A. Mohammadi, “Conceptology Cyber deterrenc,” Supreme National Defense University, 2015. (In Persian)##
  [4]      S. Joseph, “Deterrence and Dissuasion in Cyberspace,” Nye Jr -2016.##
  [5]      B. Annegret and M. Tobias, “Deterrence theory in the cyber-century,” Working Paper RD EU/Europe, 2015.##
  [6]      M. Ahadi and M. Shahmohammadi, “Strategic plan of cyber defense of the Islamic Republic of Iran in the field of deterrence,” 2017. (In Persian)##
  [7]      A. A. Dehghani, “Cyber deterrence in the new global security: Russia and China cyber threat against US critical infrastructure,”  Quarterly Journal of Political and International Approaches , Year 8, Issue 4, 2017. (In Persian)##
  [8]      F. D. Kramer, S. H. Starr, and L. K. Wentz, “Cyber power and national security Translation of the Vice Chancellor for Research and Production of Science,” Institute of Printing and Publishing, Faculty of Information, 2019. (In Persian)##
  [9]      Strategic document of the country's cyber passive defense, 2015. (In Persian)##
[10]      Russia-U.S., “Bilateral on Cybersecurity Critical Terminology Foundations,” 2014.##
[11]      T. M.  McKenzie, “Is Cyber Deterrence Possible?,” USAF, Colonel Air Force Research Institute Perspectives on Cyber Power Published by Air University in January, 2017.##
[12]      Cyber Deterrence Tougher in Theory than in Practice, Will Goodman Strategic Studies Quarterly, 2010.##
[13]      Cyber Deterrence: A Comprehensive Approach? Dr Joe Burton1 Visiting Researcher, NATO Cooperative Cyber Defence Centre of Excellence (CCD COE) Senior Lecturer, New Zealand Institute for Security and Crime Science, University of Waikato, January 2018.##
[14]      M. H. Farokh and A. Mohammadi, “Conceptology Cyber deterrenc,” Supreme National Defense University, 2015. (In Persian)##
[15]      S. Lotfiyan, “Deterrence of nuclear ransom and war,” various theories of nuclear proliferation and use, Information newspaper, 1997. (In Persian)##
[16]      H. Ashrafirizi  and Z. Kazempoor, “The concept of political geography of information, Tehran, 2009. (In Persian)##
[17]      A. M. Asgarkhani, “A look at theories of deterrence and control of nuclear weapons,Tehran,” Journal of Defense Policy, no. 25, 1998. (In Persian)##
[18]      The Challenge of Cyber Attack Deterrence Kenneth Geers Naval Criminal Investigative Service (NCIS) Cooperative Cyber Defence Centre of Excellence (CCD COE), 2010.##
[19]      F. Brantly,  “The Cyber Deterrence Problem   Aaron Assistant Professor,” Department of Political Science Virginia Polytechnic and State University United States, 2018.##
[20]      Gh. R. jalali, “Studies of the comprehensive system of cyber defense operations,” Telecommunication Research Center (ITRC), 2019. (In Persian)##
[21]      A. R. Ghaznavi, “Attached National Cyber Defense Information Network,” Ministry of Information and Communications Technology of Iran(ICT),Tehran, 2019. (In Persian)##
 
Volume 8, Issue 4 - Serial Number 32
January 2021
Pages 161-173
  • Receive Date: 03 October 2020
  • Revise Date: 18 November 2020
  • Accept Date: 05 December 2020
  • Publish Date: 21 December 2020