The US Cyberattack on Iran: The Campaign-Level and Strategic Dimensions | INSS
go to header go to content go to footer go to search
INSS logo The Institute for National Security Studies, Strategic, Innovative, Policy-Oriented Research, go to the home page
INSS
Tel Aviv University logo - beyond an external website, opens on a new page
  • Campus
  • Contact
  • עברית
  • Support Us
  • Research
    • Topics
      • Israel and the Global Powers
        • Israel-United States Relations
        • Glazer Israel-China Policy Center
        • Russia
        • Europe
        • Antisemitism and Delegitimization
      • Iran and the Shi'ite Axis
        • Operation Roaring Lion
        • Iran
        • Lebanon and Hezbollah
        • Syria
        • Yemen and the Houthi Movement
        • Iraq and the Iraqi Shiite Militias
      • Conflict to Agreements
        • Israeli-Palestinian Relations
        • Hamas and the Gaza Strip
        • Peace Agreements and Normalization in the Middle East
        • Saudi Arabia and the Gulf States
        • Turkey
        • Egypt
        • Jordan
      • Israel’s National Security Policy
        • Military and Strategic Affairs
        • Societal Resilience and the Israeli Society
        • Jewish-Arab Relations in Israel
        • Climate, Infrastructure and Energy
        • Terrorism and Low Intensity Conflict
      • Cross-Arena Research
        • Data Analytics Center
        • Law and National Security
        • Advanced Technologies and National Security
        • Foreign Information Manipulation and Interference
        • Economics and National Security
    • Projects
      • Preventing the Slide into a One-State Reality
  • Publications
    • -
      • All Publications
      • INSS Insight
      • Policy Papers
      • Special Publication
      • Strategic Assessment
      • Technology Platform
      • Memoranda
      • Posts
      • Books
      • Archive
  • Database
    • Surveys
    • Spotlight
    • Maps
    • Dashboards
  • Events
  • Team
  • About
    • Vision and Mission
    • History
    • Research Disciplines
    • Chairman of the Board
    • Board of Directors
    • Fellowship and Prizes
    • Internships
  • Media
    • Communications
    • Video gallery
    • Press Releases
  • Podcast
  • Newsletter
  • Campus
Search in site
  • Research
    • Topics
    • Israel and the Global Powers
    • Israel-United States Relations
    • Glazer Israel-China Policy Center
    • Russia
    • Europe
    • Antisemitism and Delegitimization
    • Iran and the Shi'ite Axis
    • Operation Roaring Lion
    • Iran
    • Lebanon and Hezbollah
    • Syria
    • Yemen and the Houthi Movement
    • Iraq and the Iraqi Shiite Militias
    • Conflict to Agreements
    • Israeli-Palestinian Relations
    • Hamas and the Gaza Strip
    • Peace Agreements and Normalization in the Middle East
    • Saudi Arabia and the Gulf States
    • Turkey
    • Egypt
    • Jordan
    • Israel’s National Security Policy
    • Military and Strategic Affairs
    • Societal Resilience and the Israeli Society
    • Jewish-Arab Relations in Israel
    • Climate, Infrastructure and Energy
    • Terrorism and Low Intensity Conflict
    • Cross-Arena Research
    • Data Analytics Center
    • Law and National Security
    • Advanced Technologies and National Security
    • Foreign Information Manipulation and Interference
    • Economics and National Security
    • Projects
    • Preventing the Slide into a One-State Reality
  • Publications
    • All Publications
    • INSS Insight
    • Policy Papers
    • Special Publication
    • Strategic Assessment
    • Technology Platform
    • Memoranda
    • Posts
    • Books
    • Archive
  • Database
    • Surveys
    • Spotlight
    • Maps
    • Dashboards
  • Events
  • Team
  • About
    • Vision and Mission
    • History
    • Research Disciplines
    • Chairman of the Board
    • Board of Directors
    • Fellowship and Prizes
    • Internships
    • Privacy Policy and Terms of Use
  • Media
    • Communications
    • Video gallery
    • Press Releases
  • Podcast
  • Newsletter
  • Campus
  • Contact
  • עברית
  • Support Us
bool(false)

Publications

Home Publications INSS Insight The US Cyberattack on Iran: The Campaign-Level and Strategic Dimensions

The US Cyberattack on Iran: The Campaign-Level and Strategic Dimensions

INSS Insight No. 1191, July 10, 2019

עברית
Ron Tira
Iran's Supreme Leader Ayatollah Ali Khamenei is seen near a

The international media reported that the United States conducted a cyberattack on command and control computers belonging to Iran’s air defense and surface-to-surface missile apparatuses. The working premise of this essay is that these reports are factually correct. The United States decision not to retaliate against Iran for the downing of the UAV with a kinetic attack, and its choice instead of a standalone cyberattack, i.e., absent synergy with complementary kinetic steps, further entrenches the US posturing as an actor deterred by risks and costs. In this sense, it may well be that the downside of the cyberattack outweighs it benefits. While it does illustrate capabilities, it also helps cement the United States positioning – in Iran’s eyes and its own – as a risk-averse actor.


The international media reported that the United States conducted a cyberattack on command and control computers belonging to Iran’s air defense and surface-to-surface missile apparatuses. The working premise of this essay is that these reports are factually correct.

The Particular Context

Since withdrawing from the nuclear deal (JCPOA), the United States has tightened the pressure on Iran - mostly in the form of the gradual reinstitution of economic sanctions - designed to lead to negotiations over a new, improved agreement, without reaching military confrontation. For its part, Iran is trying to skirt the United States pressure, or at least gain enough cards to allow it reach a consensual outcome from the current dynamics rather than an externally coerced outcome. Iran seeks – or at least sought – to defer the moment of truth until the United States reaches the election year (it may be that President Trump’s scope for maneuvering and appetite for risk will ebb then, and it may be that by the end of the election year a new president will enter the White House) or to create a situation in which Iran’s interests are taken into account and not overridden by the US economic pressure.

To do so, Iran has tried to create deterrence by demonstrating its capabilities to harm the interests of the United States and its allies, as well as its willingness to make use of those capabilities while inching toward the brink of a violent crisis. Therefore, Iran put on a display of its capabilities and willingness to disrupt maritime traffic in the Strait of Hormuz. Moreover, because the Saudis have in recent years built an overland oil-pipe network connecting the Gulf with the Red Sea, bypassing the Strait of Hormuz, it was important for Iran to demonstrate its capabilities to attack the said land-based infrastructure, possibly from both Iraqi and Yemenite soil. Iran’s willingness to push the envelope and take risks that might cross a line reached a new height with the downing of the US UAV on June 19, 2019.

The United States was ready to “retaliate” for the downed drone by means of a kinetic attack, though the word “retaliation” in this context is inaccurate, as it is difficult to define a strategic rationale of “retaliation.” The strategic rationale seems to have been both to set limits for Iran, thereby shaping rules of the game in the Gulf that the United States can tolerate, and to demonstrate to Iran that the United States too is willing to cross the line separating force application from force projection. However, the United States changed its mind about using kinetic force, reportedly opting instead to demonstrate its ability to conduct a cyberattack against Iran’s air defense and surface-to-surface apparatuses.

A Standalone Cyberattack: The Campaign-Level Dimension

The effectiveness of cyberattacks against the computer systems of Iran’s air defense and surface-to-surface missiles apparatuses, without resorting concurrently to additional lines of operation, might be limited, because within a relatively short time (days or weeks) the Iranians may be able to identify and root out the malware, and have the targeted systems up and running again.

A cyberattack against such systems is effective primarily if it is a preparatory action to an ensuing kinetic attack against the same systems, or if it is designed to provide freedom for some other conventional line of operation. For example, a cyberattack against air defense systems can facilitate a kinetic attack against them or gain the freedom to enter the airspace usually protected by these systems for a limited amount of time. It is effective to attack with cyber command and control networks when one intends to carry out an immediate kinetic offensive against the apparatuses these networks command and control. In other words, it is more effective to use cyberattacks in synergy with conventional military lines of operation.

With the exception of instances in which cyberattacks can lead to physical destruction of equipment (and there have been no reports that this was the case here), standalone cyberattacks that are not part of a larger campaign might not achieve lasting results, and might prematurely expose capabilities – both in terms of the cyber access to the targeted systems (the attack vector) and in terms of the cyber weapon (APT). To date, the exposure of cyberattack capabilities against weapon systems was marginal. Potential opponents are not necessarily familiar with the possible attack vectors and existing malwares, and therefore their exposure might be disadvantageous. The Iranian learning curve could thus become steeper, and Iran might gain a certain advantage in the learning competition.

Cyberattacks: The Strategic Dimension

The cyberattack allowed the United States to demonstrate its capabilities to Iran, thus contributing to US deterrence, as well as expand the range of pressure applied on the Islamic Republic. In addition, Iran’s trust in its weapon systems and its belief it will have them at its disposal at the moment of truth might erode, which could affect Iran’s confidence and therefore also its conduct. Moreover, because the US strategy is to apply economic pressure on Iran while avoiding an armed conflict, the decision to replace the kinetic attack with a cyberattack allowed the United States to retain its strategy. A kinetic attack might have led to an unpredictable path whose future development would have been difficult to forecast, and might have inadvertently and undesirably diverted the United States from its chosen strategy.

However, the American decision also has negative ramifications. First and foremost, the fact that Iran has carried out a series of attacks on ships, overland pipelines, and now an American UAV without being immediately and contextually punished with sufficient magnitude to deter it from attempting similar attacks in the future, turns the Iranian uses of force into “permissible” according to the emerging rules of the game.

The US decision is problematic in a deeper sense as well. The arm twisting between the United States and Iran on the path to negotiations can develop into at least three different scenarios: one, with only economic pressure; two, with economic pressure plus bilateral demonstrations of force; or three, with a limited military conflict. In the first scenario, if the United States applies a steamroller of economic pressure to Iran, the US advantage is obvious. The leverage is unilateral, and Iran has few cards to play. In the third scenario too, that of a limited military conflict, the US advantage is unequivocal. Iran has no ability to resist the intensity, effectiveness, and tempo of the US war machine. The United States thus benefits from a competitive advantage in the first and third scenarios, but its relative advantage in the second scenario is lesser. However, the US decision to change the kinetic attack to a cyberattack actually makes it more likely the conflict will develop according to that second scenario.

In the second scenario, the two sides are prone to demonstrate their capabilities to operate against one another in very measured ways, and here the US advantage is reduced. This becomes more acute at a time when Iran does not recoil from using kinetic force, but the United States does. Iran will likely continue to gradually violate its nuclear agreement commitments and, from time to time, stage attacks against maritime traffic, pipelines, and US military assets, and for its part, the United States will provide examples of capabilities such as cyberattacks. Thus, a reciprocal equation with certain mutual aspects emerges. Each illustrates its capabilities to the other; both sides gain and lose cards on the road to the US presidential election.

Likewise, Iran will steer the conflict to where it can maximize its capabilities. Iran cannot establish naval or air supremacy or even denial over time in the Strait of Hormuz, and it is incapable of disrupting the overland flow of oil for any significant period. It has relatively limited capabilities in a direct conflict of mid to high intensity. But Iran is quite adept at maximizing its capabilities when all it is called on to do is illustrate them from time to time in a low friction, clandestine manner, such as attacking a single vessel or causing localized damage to pipelines.

In an even deeper sense, one can say that in any strategic clash, one must multiply the sides’ capabilities by their willingness to use them, i.e., the sides’ appetite to take risks and pay the price. Notwithstanding the power of the United States, both sides are deterred by the costs and risks of a military conflict. But Iran manages to posture as if it is willing to bear the risks and costs of the use of force (and of a gradual retreat from its nuclear agreement commitments), while the United States is seen as lacking the will to take risks and incur the cost of using force.

The choice of a standalone cyberattack, i.e., absent synergy with complementary kinetic steps, further entrenches the US posturing as an actor deterred by risks and costs. In this sense, it may well be that the downside of the cyberattack outweighs it benefits. While it does illustrate capabilities, it also helps cement the United States positioning – in Iran’s eyes and its own – as a risk-averse actor.

The opinions expressed in INSS publications are the authors’ alone.
Publication Series INSS Insight
TopicsAdvanced Technologies and National SecurityIranIsrael-United States Relations
עברית

Events

All events
Iran, US, Israel, and the Global Jewish Community
10 March, 2026
12:00 - 13:00
Shutterstock

Related Publications

All publications
Shutterstock
The Pentagon’s AI-First Doctrine and Its Implications for Modern Warfare: Lessons from the Conflict with Iran
How has the new US policy—under which AI is positioned as a foundational component in the chain of command, intelligence gathering, and the planning of complex operations—been reflected on the battlefield, and what conclusions should be drawn in Israel?
19/03/26
Shutterstock
Digital Sovereignty: A Conceptual Framework for Israel and Policy Recommendations
Digital sovereignty has, in recent years, become one of the central components of national power, economic resilience, and security. Artificial intelligence, cloud computing, data, and capital-intensive computing infrastructure constitute foundational elements for governmental, military, and economic activity. Accordingly, control over digital infrastructure is not merely a technological or economic issue but a strategic concern of the highest order. Israel, as a powerhouse of technological innovation, currently finds itself in a paradox. It is a leader in the development of advanced technologies and benefits from a highly developed technological ecosystem. At the same time, it is increasingly dependent on digital infrastructures controlled by foreign actors, including global cloud providers, semiconductor supply chains, and a regulatory framework that is not always aligned with the scale of investment, the risks involved, and the unique characteristics of strategic digital infrastructure. This situation presents Israel with a strategic challenge: how to preserve openness and innovation while ensuring control, resilience, and sovereignty over critical digital assets. This paper aims to present a conceptual framework for digital sovereignty, to identify principal policy challenges, and to propose an infrastructural and regulatory agenda for integrated implementation that balances public, economic, and security interests.  
23/02/26
Subsea Data Centers: An Opportunity for the State of Israel
What are the opportunities, risks, and challenges involved in establishing data centers—intended, in part, for AI applications—within the sea?
09/02/26

Stay up to date

Registration was successful! Thanks.
  • Research

    • Topics
      • Israel and the Global Powers
      • Israel-United States Relations
      • Glazer Israel-China Policy Center
      • Russia
      • Europe
      • Antisemitism and Delegitimization
      • Iran and the Shi'ite Axis
      • Operation Roaring Lion
      • Iran
      • Lebanon and Hezbollah
      • Syria
      • Yemen and the Houthi Movement
      • Iraq and the Iraqi Shiite Militias
      • Conflict to Agreements
      • Israeli-Palestinian Relations
      • Hamas and the Gaza Strip
      • Peace Agreements and Normalization in the Middle East
      • Saudi Arabia and the Gulf States
      • Turkey
      • Egypt
      • Jordan
      • Israel’s National Security Policy
      • Military and Strategic Affairs
      • Societal Resilience and the Israeli Society
      • Jewish-Arab Relations in Israel
      • Climate, Infrastructure and Energy
      • Terrorism and Low Intensity Conflict
      • Cross-Arena Research
      • Data Analytics Center
      • Law and National Security
      • Advanced Technologies and National Security
      • Foreign Information Manipulation and Interference
      • Economics and National Security
    • Projects
      • Preventing the Slide into a One-State Reality
  • Publications

    • All Publications
    • INSS Insight
    • Policy Papers
    • Special Publication
    • Strategic Assessment
    • Technology Platform
    • Memoranda
    • Database
    • Posts
    • Books
    • Archive
  • About

    • Vision and Mission
    • History
    • Research Disciplines
    • Chairman of the Board
    • Board of Directors
    • Fellowship and Prizes
    • Internships
    • Support
    • Privacy Policy and Terms of Use
  • Media

    • Communications
    • Video Gallery
    • Press Release
    • Podcast
  • Home

  • Events

  • Database

  • Team

  • Contact

  • Newsletter

  • עברית

INSS logo The Institute for National Security Studies, Strategic, Innovative, Policy-Oriented Research, go to the home page
40 Haim Levanon St. Tel Aviv, 6997556 Israel | Tel: 03-640-0400 | Fax: 03-744-7590 | Email: info@inss.org.il
Developed by Daat ,Yael Group.
Accessibility Statement
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.