Safe City

Safe City

Defensive and preventive patterns of the Islamic Republic of Iran against cyber-attacks emphasizing on the Stuxnet attack

Document Type : Original Article

Authors
1 Associate Professor, National Defense University, Tehran, Iran
2 Assistant Professor, Allameh Tabatabai University, Tehran, Iran
3 PhD student in Information Technology Management, Allameh Tabatabai University, Tehran, Iran
Abstract
It was thought for many years that the use of nuclear weapons was the biggest threat against the
contemporary world. Concerning governments’ resorting to cyberspace to advance their short-term and
long-term goals, some consider the most serious current threat to be the governments’ abuse of the
widespread and flexible concept of cyberspace in order to achieve their goals. However, it seems that the
most serious threat of the contemporary world, in practice, is realized when both factors are combined. In
this situation, it is possible to organize a cyber war against the nuclear facilities and bases of the victim
states, and this combined scenario causes the aggravation of the previous risk factors and multiplies the
severity of the risk. Although, due to the lack of realization of the threshold of war in most of the cases,
there is no hope for the rule of international humanitarian law, this article intends to analyze how the
interests and rights of the victim government can be achieved in such cases by explaining one of the most
serious and obvious examples in this field, the Stuxnet virus case. For this, along with the conceptology of
such measures, we will address the international laws governing the situation described above and examine
the possibility of legitimate defense and reciprocity of the victim, especially considering the passage of
time
Keywords

[5] Benatar Marco, The Use of Cyber Force: Need for Legal Justification?, Goettingen Journal of
International Law 1 (2009)
[6] Berkman, S., Boswell, N.Z., Brüner, F.H., Gough, M., McCormick, J.T., Pedersen, P.E., Ugaz, J. and
Zimmermann, S. (2008), “The fight against corruption: international organizations at a
cross-roads”, Journal of Financial Crime, Vol. 15 No. 2
[7] Bradbury Steven G., The Developing Legal Framework for Defensive and Offensive Cyber
Operations, 2 Harv. Nat'l Sec. J. 629, 2011
[8] Cilluffo FrankJ, Paul Byron Pattak , George Charles Salmoiraghi Bad Guys and Good Stuff: When
and Where Will the Cyber Threats Converge?, 12 DePaul Bus. L.J. 131 1999-2000
[9] Cilluffo FrankJ. & Paul Byron Pattak, Cyber Threats: Ten Issues for Consideration, 1 Geo. J. Int'l Aff.
41 2000
[10] Elvins,M. (2003), “Europe's response to transnational organised crime”, in Edwards,A. and Gill,
P. (Eds), Crime: Perspectives on Global Security, Routledge, London.
[11] Ferrer, M. (2009), “Prosecuting extortion victims: how counter-terrorist finance measure
executive order 13224 is going to far”, Journal of Financial Crime, Vol. 16 No. 3.
[12] Filho, L.A. (2008), “The dynamics of drug-related organized crime and corruption in Brazil from
a development perspective”, Journal of Financial Crime, Vol. 15 No. 1.
[13] Fisher, J. (2008), “The UK's faster payment project: avoiding a bonanza for cybercrime
fraudsters”, Journal of Financial Crime, Vol. 15 No. 2.