The culture, history and language of Persia are indelible. Since the rule of Cyrus the Great in 550 BC, dynastic and monarchical Persian empires maintained hegemonic influence over the Middle East for 2500 years. This longstanding dominance dissipated in 1979, when a revolution was waged by multiple political factions against the last Shah of Iran, eventually leading to the usurp of power by a clergy-led state. From that point, the Islamic Republic of Iran has sought to reconstitute itself as a regional hegemony, expanding its presence by quietly inserting itself into surrounding conflicts. In the era of digital industrialization, where geographic boundaries are blurred by binary code, Iran leverages the cyberspace domain to conduct soft war against its adversaries, engaging in both destructive cyber operations and espionage-oriented ones. In an effort to provide a more detailed analysis on the latter of these two categories, IRANIAN CYBER ESPIONAGE outlines this use of cyber warfare to achieve intelligence objectives, chronicling and detailing tactics by the most prominent Iranian cyber threat actors, and analyzing the results to make determinations about Iran as a 21st century cyber power.
|Advisor:||Riddell, Christopher, Hagestad, William|
|School Location:||United States -- New York|
|Source:||MAI 58/05M(E), Masters Abstracts International|
|Subjects:||Middle Eastern Studies, Computer science|
|Keywords:||Cyber, Cybersecurity, Espionage, Iran, Iranian, Warfare|
Copyright in each Dissertation and Thesis is retained by the author. All Rights Reserved
The supplemental file or files you are about to download were provided to ProQuest by the author as part of a
dissertation or thesis. The supplemental files are provided "AS IS" without warranty. ProQuest is not responsible for the
content, format or impact on the supplemental file(s) on our system. in some cases, the file type may be unknown or
may be a .exe file. We recommend caution as you open such files.
Copyright of the original materials contained in the supplemental file is retained by the author and your access to the
supplemental files is subject to the ProQuest Terms and Conditions of use.
Depending on the size of the file(s) you are downloading, the system may take some time to download them. Please be